|By Kevin Nikkhoo||
|March 15, 2013 11:45 AM EDT||
I spend a great deal of my day thinking about security. How it affects the enterprise; how to best position and protect assets. How it shapes risk management and how it delivers potential benefits through smoother operations, enhanced trust and loss prevention.
At its core, security is about risk versus reward. It’s no great secret that many executives look at security as a cost center. Compounded by the requirements of compliance, the expansion of technology, and the nature of the modern enterprise, no one doubts the need to secure the enterprise…but to what degree? Securing your IT environment is not free, but there are best practices and technology options designed to mitigate costs while still providing a strong, manageable and proactive defense. While many companies still would rather spend capital on commodity assets, many CIOs recognize that information security is an important business driver. Many more still are looking to the cloud for security solutions to further reduce resource reliance.
In the end, it is a question each company must answer on its own. I can talk until I am blue in the face about the bogeymen of hacking, slipshod employees opening suspect emails, the exposure of a company’s most precious data, but the needs of the company—how it interacts with customers, the access it provides third parties, employee productivity processes, compliance requirements and all the other moving parts of an active organization--must create and prioritize the roadmap based on understood vulnerabilities and available resources.
However, therein lies the problem…understood vulnerabilities. This decision is based on assumptions, resource limitations and previous experience. But security issues are a moving target...it's more about knowing what you don't know. Obviously a bank or medical management facility is at more risk than a local dog grooming company, but that doesn’t mean it is any less vulnerable. In fact, the modest company might be at greater risk because even a small breach of customer data can devastate a company. A large company may be able to absorb (although painful) the fines, lawsuits and the loss of proprietary assets, but the impact on a small or mid-sized company is magnified. The damage to the trust factor alone could put them out of business.
This is not meant to be some sort of scare tactic, but the reality of doing business in the 21st century means every company must take some level of action to protect itself beyond filtering emails. However understanding investments in CapEx, resource and personnel expenditures, hardware and software management, this might be untenable for every company. This is where the CIO earns his keep. How much time and capital is necessary to invest versus the real threats to the network/assets (is a barking dog enough to chase away robbers, or do you need bolt locks, motion sensors, round-the-clock-sentries, gun turrets, etc…)
This is why cloud security (security managed from the cloud) provides the necessary balance in the risk versus reward quotient. Not only does it support a unified platform (PaaS or REACT), but eliminates many of the costs that throw the equation out of balance. A smaller company no longer has to decide to invest in virus sweepers OR access management, identity credentialing OR intrusion detection. A larger organization can reallocate important resources towards key revenue drivers and core competencies. A unified/centralized approach from the cloud provides all the capabilities with no additional capital expenditures. In the fact that it centralizes all the activity under a centralized pane of glass not only makes an organization response ready, but also automates a great deal of what compliance regulators are demanding.
What about the risk? Are organizations exposing or ceding control of their data in order to save a few bucks? Is a Pandora’s Box opening because functionality and reporting is virtualized? Of course not. Yet, with all business initiatives, there are risks. However, by applying such best practices as 24/7/365 monitoring, event correlation across multiple silos, and fostering interactive communication between functions closes the vulnerability gap significantly. But to harness all those capabilities a company would need to invest in SIEM, Access Management, Log Management, IDM and other security solutions. Before the cloud, this combined initiative was only an option available to Fortune 500 enterprises. Even applying some cloud-based tools, each of the referenced solutions typically works in parallel. What is needed is the ability to centralize and have each of the solutions leverage one another.
Now cloud security solutions and applications are two different animals when it comes to the all important data ownership and information liability. Security manages the data wherever it is stored-cloud or some locked server room in the basement of a fortified campus. It is the fence, not the animals held within. If there is a break in the fence, or the rancher hires irresponsible cowboys, then the herd is at risk. But if the foreman is vigilant about riding the perimeter and managing his employees, then there should be as many cows in the barn as there were the day before.
This is not to say data is unassailable every time the sales guy accesses the product demo site to present to a prospect via online third party collaboration software, but if the tools are in place, properly automated and integrated and the policies (access rules, credentialing, web authorization, monitoring etc…) are sound, risk goes down and reward goes up.
On Wall Street there is a “measurement” called the Sharpe Index. Essentially it characterizes how well the return of an asset compensates the investor for the risk taken. Part of the complex equation analyzes the variables to get to a positive return. Applied to finance the axiom typically means the greater the risk, the greater the return. When applied to security, and more pointedly, cloud-based security, the variables line up so that there doesn’t have to be a high trade off of risk and return Considering the lower investment, the faster deployment, the reduction of personnel and computing resources against an expanded enterprise toolset, improved capabilities, continuous and centralized alerts, security-as-a-service support and enhanced visibility across the organization, the path to realize rewards and ROI point to the cloud.
Bottom line, cloud-based security functionality is as trustworthy, as powerful and as comprehensive as any on-premise deployment. Because it is infinitely more affordable, flexible and manageable, it allows you to increase the layers of security around your enterprise for a fraction of the hard and soft costs. It allows you to concentrate on priorities, policies and core competencies to ensure your perimeters are safe and the cattle can always come in from the fields. Each company is unique in terms of its needs and security comfort level and its concept in determining risk versus reward. Yet biggest risk, in terms of security, is standing still.
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists will discuss how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations m...
Apr. 25, 2015 10:15 AM EDT Reads: 2,017
SYS-CON Events announced today the IoT Bootcamp – Jumpstart Your IoT Strategy, being held June 9–10, 2015, in conjunction with 16th Cloud Expo and Internet of @ThingsExpo at the Javits Center in New York City. This is your chance to jumpstart your IoT strategy. Combined with real-world scenarios and use cases, the IoT Bootcamp is not just based on presentations but includes hands-on demos and walkthroughs. We will introduce you to a variety of Do-It-Yourself IoT platforms including Arduino, Ras...
Apr. 25, 2015 10:15 AM EDT Reads: 2,980
One of the most frequently requested Rancher features, load balancers are used to distribute traffic between docker containers. Now Rancher users can configure, update and scale up an integrated load balancing service to meet their application needs, using either Rancher's UI or API. To implement our load balancing functionality we decided to use HAproxy, which is deployed as a contianer, and managed by the Rancher orchestration functionality. With Rancher's Load Balancing capability, users ...
Apr. 25, 2015 10:15 AM EDT Reads: 1,076
The only place to be June 9-11 is Cloud Expo & @ThingsExpo 2015 East at the Javits Center in New York City. Join us there as delegates from all over the world come to listen to and engage with speakers & sponsors from the leading Cloud Computing, IoT & Big Data companies. Cloud Expo & @ThingsExpo are the leading events covering the booming market of Cloud Computing, IoT & Big Data for the enterprise. Speakers from all over the world will be hand-picked for their ability to explore the economic...
Apr. 25, 2015 10:00 AM EDT Reads: 4,151
As we recently previewed (read more about our London PoP in Jesse's post), Blue Box is opening a new Data Center in London, but hadn't announced the provider. Today we're excited to partner with TelecityGroup, whom we've selected as our data center partner in London. We chose their Powergate location, which is one of the U.K.'s most advanced, flexible and energy efficient carrier-neutral data centres. Why does that matter to you? Well, when customers choose Blue Box, they're trusting us with ...
Apr. 25, 2015 10:00 AM EDT Reads: 1,352
How do you securely enable access to your applications in AWS without exposing any attack surfaces? The answer is usually very complicated because application environments morph over time in response to growing requirements from your employee base, your partners and your customers. In his session at 16th Cloud Expo, Haseeb Budhani, CEO and Co-founder of Soha, will share five common approaches that DevOps teams follow to secure access to applications deployed in AWS, Azure, etc., and the frict...
Apr. 25, 2015 10:00 AM EDT Reads: 1,636
Cloud Expo New York is happening from June 9 - 11. This event brings together the worlds of Cloud Computing, DevOps, IoT, WebRTC, Big Data and SDDC. We hope to see you there-members of the Blue Box team will exhibit in booth 218 next to the DevOps area. Plus, our Chief Product Officer, Hernan Alvarez, will present his talk "The Cloud Has a Down-and-Dirty Lining" as part of the Operations track in the DevOps Summit portion of the event on June 9 at 11 am. Learn more about his session her...
Apr. 25, 2015 10:00 AM EDT Reads: 1,500
As a company making software for Continuous Delivery and Devops at scale, at XebiaLabs we’re pretty much always in discussions with users about the benefits and challenges of new development styles, application architectures, and runtime platforms. Unsurprisingly, many of these discussions right now focus on microservices on the application side and containers and related frameworks […]
Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch ...
Apr. 25, 2015 10:00 AM EDT Reads: 2,803
Financial services organizations were among the earliest enterprise adopters of cloud computing. The ability to leverage massive compute, storage and networking resources via RESTful APIs and automated tools like Chef and Puppet made it possible for their high-horsepower IT users to develop a whole new array of applications. Companies like Wells Fargo, Fidelity and BBVA are visible, vocal and engaged supporters of the OpenStack community, running production clouds for applications ranging from d...
Apr. 25, 2015 10:00 AM EDT Reads: 1,517
A few weeks ago, SmartBear hosted API Craft Boston with the folks from Akana, Ian Goldsmith and Laura Heritage, to talk about microservices. It was an extremely informative presentation of where microservices came from, what it solves, and considerations around how it might fit into an organizational API strategy. It’s one thing to read everyone else’s opinions on blogs, twitter, etc. It’s great to go to workshops and conferences, but this was so intelligently presented (and for a meetup too)...
Apr. 25, 2015 10:00 AM EDT Reads: 741
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? Join this panel of experts as they peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud environment, and we must architect and code accordingly. At the very least, you’ll have no problem filling in your buzzword bingo cards.
Apr. 25, 2015 10:00 AM EDT Reads: 2,191
So I guess we’ve officially entered a new era of lean and mean. I say this with the announcement of Ubuntu Snappy Core, “designed for lightweight cloud container hosts running Docker and for smart devices,” according to Canonical. “Snappy Ubuntu Core is the smallest Ubuntu available, designed for security and efficiency in devices or on the cloud.” This first version of Snappy Ubuntu Core features secure app containment and Docker 1.6 (1.5 in main release), is available on public clouds, ...
Apr. 25, 2015 10:00 AM EDT Reads: 1,346
SYS-CON Events announced today that Column Technologies, a global technology solutions company, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Established in 1998, Column Technologies is a leader in application performance and infrastructure management for commercial and federal markets. The company is headquartered in the United States, with a diverse and talented team of more than 350 employees around th...
Apr. 25, 2015 10:00 AM EDT Reads: 1,787
SYS-CON Events announced today Sematext Group, Inc., a Brooklyn-based Performance Monitoring and Log Management solution provider, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Sematext is a globally distributed organization that builds innovative Cloud and On Premises solutions for performance monitoring, alerting and anomaly detection (SPM), log management and analytics (Logsene), search analytics (S...
Apr. 25, 2015 09:30 AM EDT Reads: 3,832
The stack is the hack, Jack. That's my takeaway from several events I attended over the past few weeks in Silicon Valley and Southeast Asia. I listened to and participated in discussions about everything from large datacenter management (think Facebook Open Compute) to enterprise-level cyberfraud (at a seminar in Manila attended by the US State Dept. and Philippine National Police) to the world of entrepreneurial startups, app deployment, and mobility (in a series of meetups and talks in bot...
Apr. 25, 2015 09:15 AM EDT Reads: 1,350
SYS-CON Events announced today Isomorphic Software, the global leader in high-end, web-based business applications, will exhibit at SYS-CON's DevOps Summit 2015 New York, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software ...
Apr. 25, 2015 09:15 AM EDT Reads: 4,851
SOA Software has changed its name to Akana. With roots in Web Services and SOA Governance, Akana has established itself as a leader in API Management and is expanding into cloud integration as an alternative to the traditional heavyweight enterprise service bus (ESB). The company recently announced that it achieved more than 90% year-over-year growth. As Akana, the company now addresses the evolution and diversification of SOA, unifying security, management, and DevOps across SOA, APIs, microser...
Apr. 25, 2015 09:15 AM EDT Reads: 2,394
An explosive combination of technology trends will be where ‘microservices’ and the IoT Internet of Things intersect, a concept we can describe by comparing it with a previous theme, the ‘X Internet.' The idea of using small self-contained application components has been popular since XML Web services began and a distributed computing future of smart fridges and kettles was imagined long back in the early Internet years.
Apr. 25, 2015 09:00 AM EDT Reads: 2,544
SYS-CON Events announced today that Cisco, the worldwide leader in IT that transforms how people connect, communicate and collaborate, has been named “Gold Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Cisco makes amazing things happen by connecting the unconnected. Cisco has shaped the future of the Internet by becoming the worldwide leader in transforming how people connect, communicate and collaborat...
Apr. 25, 2015 08:30 AM EDT Reads: 5,816