|By Gilad Parann-Nissany
|April 4, 2014 09:00 AM EDT
When large enterprises move to a public infrastructure cloud (such as Amazon Web Services or others), it is a gradual, and often times, carefully measured process. Large enterprises strive for 100 percent certainty that the migration process will not impact the business; therefore, they’ll usually start slowly, by migrating one application or process to the cloud.
This is where hybrid clouds kick in. Hybrid clouds offer (just as their name insinuates) a hybrid between on-premise and cloud infrastructure. But once even part of the business is in the cloud, the need arises for cloud security. As data is migrated away from the local “safe” data center, access to the information is no longer controlled by the enterprise, and different, cloud-oriented, security measures must be considered.
Hybrid Cloud Example: Components and Risks
Let’s take a classic hybrid cloud example and dissect its components and risks. Recovery as a Service, RaaS, will contain an on-premise component: usually a physical appliance or an agent of some sort. Additionally, it requires a cloud component: the technology and capacity to allow an organization to recover from failure away from the data center.
The pros are many, specifically the ability to dramatically reduce costs, moving away from a physical recovery solution to a cloud, pay-per-use, solution.
With the benefits come the risks. As soon as data is no longer in the hands of the enterprise, but rather resides in the cloud, cloud security (and in most cases, cloud compliance as well) becomes a primary concern. An enterprise must make cloud security a top priority to ensure that its data is as secure in the cloud as it was in the data center.
Cloud Security Best Practices for Hybrid Clouds
Cloud encryption is considered best practice and a “must-have” as part of any cloud security architecture. It allows for data segregation using mathematical walls instead of the physical walls of the data center world. But in fact, when it comes to cloud security, cloud encryption is the easy part.
The challenge is mostly with the encryption keys. Or, more accurately, who controls and manages your encryption keys? Would you trust your banker to hold on to your safety deposit box key? Probably not, and for a good reason! Same goes for cloud security best practice: never trust your cloud provider to manage the encryption keys for you. As with your safety deposit box, you, and only you, should own your key.
Recent cloud security advancements present an innovative approach to the key management issue using technologies such as split-key encryption. Going back to the banker metaphor, with split-key encryption, the encryption key is split in half, allowing the customer to maintain control of the encryption key while, at the same time, host its most sensitive data in the cloud. Such technologies are enabling secure migration to the cloud and support hybrid use cases such as RaaS.
Don’t Delay Cloud Adoption Because of Cloud Security
We often fear the unknown. We have been inundated with opinions professing that the cloud is not secure. This is not necessarily the case. As our computing environments have advanced, so have the security protocols that protect them. By using the latest cloud security models, your data can be as secure in the cloud as it was in the data center (in my opinion, it is even more secure this way).
But, what about the breaches? Between the media storm caused by Snowden and the NSA and the one caused by the Target credit card hackers, we are led to think that everyone who operates in the cloud will meet their demise. Again, simply not the case. First of all, breaches happen in the physical world too – whether it is a stolen laptop or an employee “mole,” security breaches were not born in the cloud. In fact, migrating to the cloud with cloud security measures like split-key encryption ensures that fewer “hands” touch your data and therefore, reduces the access points.
The post Cloud Security Solutions for Hybrid Clouds appeared first on Porticor Cloud Security.
Read the original blog entry...
Let's just nip the conflation of these terms in the bud, shall we?
"MIcro" is big these days. Both microservices and microsegmentation are having and will continue to have an impact on data center architecture, but not necessarily for the same reasons. There's a growing trend in which folks - particularly those with a network background - conflate the two and use them to mean the same thing.
They are not.
One is about the application. The other, the network. T...
May. 26, 2015 11:30 AM EDT Reads: 1,018
The stack is the hack, Jack. That's my takeaway from several events I attended over the past few weeks in Silicon Valley and Southeast Asia.
I listened to and participated in discussions about everything from large datacenter management (think Facebook Open Compute) to enterprise-level cyberfraud (at a seminar in Manila attended by the US State Dept. and Philippine National Police) to the world of entrepreneurial startups, app deployment, and mobility (in a series of meetups and talks in bot...
May. 26, 2015 11:15 AM EDT Reads: 2,574
SYS-CON Events announced today that EnterpriseDB (EDB), the leading worldwide provider of enterprise-class Postgres products and database compatibility solutions, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY.
EDB is the largest provider of Postgres software and services that provides enterprise-class performance and scalability and the open source freedom to divert budget from more costly traditiona...
May. 26, 2015 11:00 AM EDT Reads: 1,971
The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging.
In his session a...
May. 26, 2015 11:00 AM EDT Reads: 4,152
Do you think development teams really update those BMC Remedy tickets with all the changes contained in a release? They don't. Most of them just "check the box" and move on.
They rose a Risk Level that won't raise questions from the Change Control managers and they work around the checks and balances. The alternative is to stop and wait for a department that still thinks releases are rare events. When a release happens every day there's just not enough time for people to attend CAB meeting...
May. 26, 2015 10:45 AM EDT Reads: 1,762
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong?
In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud en...
May. 26, 2015 10:00 AM EDT Reads: 2,151
There is no question that the cloud is where businesses want to host data. Until recently hypervisor virtualization was the most widely used method in cloud computing. Recently virtual containers have been gaining in popularity, and for good reason. In the debate between virtual machines and containers, the latter have been seen as the new kid on the block – and like other emerging technology have had some initial shortcomings. However, the container space has evolved drastically since coming on...
May. 26, 2015 09:45 AM EDT Reads: 1,920
Python is really a language which has swept the scene in recent years in terms of popularity, elegance, and functionality. Research shows that 8 out 10 computer science departments in the U.S. now teach their introductory courses with Python, surpassing Java. Top-ranked CS departments at MIT and UC Berkeley have switched their introductory courses to Python. And the top three MOOC providers (edX, Coursera, and Udacity) all offer introductory programming courses in Python. Not to mention, Python ...
May. 26, 2015 09:45 AM EDT Reads: 714
I’ve been thinking a bit about microservices (μServices) recently. My immediate reaction is to think: “Isn’t this just yet another new term for the same stuff, Web Services->SOA->APIs->Microservices?” Followed shortly by the thought, “well yes it is, but there are some important differences/distinguishing factors.”
Microservices is an evolutionary paradigm born out of the need for simplicity (i.e., get away from the ESB) and alignment with agile (think DevOps) and scalable (think Containerizati...
May. 26, 2015 09:45 AM EDT Reads: 1,620
In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, president of Intellyx, panelists Roberto Medrano, Executive Vice President at Akana; Lori MacVittie, IoT_Microservices Power PanelEvangelist for F5 Networks; and Troy Topnik, ActiveState’s Technical Product Manager; will peel away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of ...
May. 26, 2015 09:45 AM EDT Reads: 1,944
T-Mobile has been transforming the wireless industry with its “Uncarrier” initiatives. Today as T-Mobile’s IT organization works to transform itself in a like manner, technical foundations built over the last couple of years are now key to their drive for more Agile delivery practices.
In his session at DevOps Summit, Martin Krienke, Sr Development Manager at T-Mobile, will discuss where they started their Continuous Delivery journey, where they are today, and where they are going in an effort ...
May. 26, 2015 09:30 AM EDT Reads: 1,946
SYS-CON Media named Andi Mann editor of DevOps Journal.
DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. DevOps Journal brings valuable information to DevOps professionals who are transforming the way enterprise IT is done.
Andi Mann, Vice President, Strategic Solutions, at CA Technologies, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, communicator, and thought lea...
May. 26, 2015 09:00 AM EDT Reads: 2,109
Even though it’s now Microservices Journal, long-time fans of SOA World Magazine can take comfort in the fact that the URL – soa.sys-con.com – remains unchanged. And that’s no mistake, as microservices are really nothing more than a new and improved take on the Service-Oriented Architecture (SOA) best practices we struggled to hammer out over the last decade. Skeptics, however, might say that this change is nothing more than an exercise in buzzword-hopping. SOA is passé, and now that people are ...
May. 26, 2015 09:00 AM EDT Reads: 3,880
Enterprises are fast realizing the importance of integrating SaaS/Cloud applications, API and on-premises data and processes, to unleash hidden value. This webinar explores how managers can use a Microservice-centric approach to aggressively tackle the unexpected new integration challenges posed by proliferation of cloud, mobile, social and big data projects.
Industry analyst and SOA expert Jason Bloomberg will strip away the hype from microservices, and clearly identify their advantages and d...
May. 26, 2015 09:00 AM EDT Reads: 2,315
You often hear the two titles of "DevOps" and "Immutable Infrastructure" used independently.
In his session at DevOps Summit, John Willis, Technical Evangelist for Docker, will cover the union between the two topics and why this is important. He will cover an overview of Immutable Infrastructure then show how an Immutable Continuous Delivery pipeline can be applied as a best practice for "DevOps." He will end the session with some interesting case study examples.
May. 26, 2015 09:00 AM EDT Reads: 2,318
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open.
Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the...
May. 26, 2015 08:30 AM EDT Reads: 4,500
There are 182 billion emails sent every day, generating a lot of data about how recipients and ISPs respond. Many marketers take a more-is-better approach to stats, preferring to have the ability to slice and dice their email lists based numerous arbitrary stats. However, fundamentally what really matters is whether or not sending an email to a particular recipient will generate value. Data Scientists can design high-level insights such as engagement prediction models and content clusters that a...
May. 26, 2015 07:00 AM EDT Reads: 5,327
In today's application economy, enterprise organizations realize that it's their applications that are the heart and soul of their business. If their application users have a bad experience, their revenue and reputation are at stake.
In his session at 15th Cloud Expo, Anand Akela, Senior Director of Product Marketing for Application Performance Management at CA Technologies, discussed how a user-centric Application Performance Management solution can help inspire your users with every applicati...
May. 26, 2015 04:00 AM EDT Reads: 4,970
As enterprises engage with Big Data technologies to develop applications needed to meet operational demands, new computation fabrics are continually being introduced. To leverage these new innovations, organizations are sacrificing market opportunities to gain expertise in learning new systems.
In his session at Big Data Expo, Supreet Oberoi, Vice President of Field Engineering at Concurrent, Inc., discussed how to leverage existing infrastructure and investments and future-proof them against e...
May. 26, 2015 02:00 AM EDT Reads: 3,336
Once the decision has been made to move part or all of a workload to the cloud, a methodology for selecting that workload needs to be established. How do you move to the cloud?
What does the discovery, assessment and planning look like? What workloads make sense?
Which cloud model makes sense for each workload? What are the considerations for how to select the right cloud model? And how does that fit in with the overall IT transformation?
May. 26, 2015 12:00 AM EDT Reads: 4,533