Security Planning | Cloud industry forum

Security Planning

Resources found: 48
This White Paper outlines how far the UK public sector has progressed on the path to cloud adoption and the challenges that it will face along the way. We acknowledge that in this research we do not distinguish between the different segments within the public sector, such as health, education and central and local government. Our intention is to commission further research to help us to better understand the specific issues and differences within these segments.
Author: 
Access level: 
Subscriber & Member
TM_logo_red_2c_rgb.jpg In 2018, digital extortion will be at the core of most cybercriminals’ business model and will propel them into other schemes that will get their hands on potentially hefty payouts. Vulnerabilities in IoT devices will expand the attack surface as devices get further woven...
Author: 
Access level: 
Public
Spending money on cyber security, we are told, has become the most important investment a company can make. It is said that companies large and small are not investing the right amount or, indeed, in the right things.
Access level: 
Public
Organisations all over EMEA are waking up to the transformative possibilities offered by public cloud computing deployments. The drive for greater IT efficiency, business agility, and productivity has become an increasingly urgent one—especially since those businesses that tap the cloud effectively begin to pull ahead of their rivals. Yet, anecdotal evidence and quantitative surveys tell us that security is still a major barrier to greater cloud adoption.
Author: 
Access level: 
Subscriber & Member
The Cloud Industry Forum is pleased to present our 20 th whitepaper outlining the position of cloud adoption across the UK. We have been measuring cloud trends for the last 7 years; although growth is slowing marginally it demonstrates that cloud services are clearly now mainstream strategy for most UK businesses.
Author: 
Access level: 
Subscriber & Member
Today's technology systems must be built for resilience. They must be engineered to survive natural disasters such as storms, power outages, and water damage—as well as human error, hardware malfunctions, and software failures. In this year’s report, we examine the ability of businesses to maintain service even in the face of threats and challenges.
Author: 
Access level: 
Public
This paper from Atos describes the structural challenges enterprises are facing when establishing an outsourced SIaM function. Several Best Practices such as a functional blueprint, tooling considerations and partner alignment prerequisites (Commonly Shared KPIs, a SIaM Information model and the Service Catalogue) provide guidance for anyone on the SIaM journey. Finally the Outlook chapter explains the evolution of Service Integration towards Business Process Agility and links this capability to underlying technical capabilities such as Service Brokerage, Cloud Orchestration and Cloud Messaging. The Conclusions chapter lists a set of key take-away.
Author: 
Access level: 
Subscriber & Member
[[{"attributes":{},"fields":{}}]]With the multitude of cloud services readily available for consumption, organisations need to plan their cloud strategy carefully to ensure they are fully leveraging the benefits the cloud offers. In this exclusive webinar, Insight’s Mike Wheeler (GTM Director for...
Author: 
Access level: 
Subscriber & Member
As with all IT implementations a cloud migration needs to meet the business goals and the best way to measure whether the business goals have been satisfied is to have a clear quality assurance delivery programme. The focus of this guide is to ensure the delivery is fit for purpose and works for your organisation.
Author: 
Access level: 
Member only

This is not a paper about why or if you should migrate to a cloud environment, whether for one particular application or for your entire infrastructure, or for something in-between. Nor is it a paper about which provider of cloud infrastructure, applications or services you should choose to partner with. What this paper is about are the technical considerations that you should bear in mind during the process of moving to, or implementing, products or solutions that are cloud based. Note that we are specifically concerned with technical issues rather than with any personal, political or other concerns that may arise. In other words, we are principally concerned with "what" and "how": what issues you need to think about and, how, in general terms, these can be resolved.

Author: 
Access level: 
Subscriber & Member
Are you heading for a Cloud thunderstorm? Having a QA and testing framework while selecting and implementing a cloud service can help you avoid a lightning strike
Author: 
Access level: 
Public
Slides from Cloud Expo 2015 keynote presentations. Sumeet Sabharwal. Navisite
Author: 
Access level: 
Member only
Today, cloud adoption is rapidly expanding its footprint and is no longer simply a theoretical or academic conversation that enterprise organizations are debating.
Author: 
Access level: 
Subscriber & Member
Slides from Cloud Expo 2015 keynote presentations. Johan Holder. Co-founder, Kazoop
Author: 
Access level: 
Member only
Outsourcing elements of your IT infrastructure to an external hosting provider necessarily demands a different approach to governance than with traditional dedicated environments. This paper maps out some high-level recommendations to common governance standards to ease their successful implementation in cloud environments
Author: 
Access level: 
Subscriber & Member
Inside this paper you will find an introduction to what the Cloud is about – and why you need to take it seriously, along with my four most recent columns that seek to address how the Board, together with the CIO, should give practical substance to their paranoid optimism!
Author: 
Access level: 
Subscriber & Member
How are government departments planning to deliver transformative services, previously managed entirely by a small number of major suppliers? This paper discusses the best practice steps to achieve disaggregation and how to avoid the pitfalls associated with such a significant overhaul.
Access level: 
Subscriber & Member
“Shadow IT” presents significant threats to your information security and availability that can impact your customers, and in turn affect your revenue. In some cases, customers may leave if you have a sustained outage or loss of client data.
Author: 
Access level: 
Subscriber & Member
The predictions that many industry pundits have been making about the rise of Bring Your Own Device (BYOD) are coming to fruition. The surprise is that it is happening at a much-accelerated rate in businesses of all sizes, around the world.
Author: 
Access level: 
Subscriber & Member
We speak to Apay Obang-Oyway, Ingram Micro Cloud’s general manager, about the changing nature of cloud governance
Author: 
Access level: 
Public
The idea cloud can’t be used by regulated industries doesn’t stand up to scrutiny. Indeed, there are many ways in which the technology can be deployed…
Author: 
Access level: 
Subscriber & Member
We discuss cloud security concerns and why businesses needn’t worry so much with Peter Groucutt, managing director of Databarracks.
Author: 
Access level: 
Public
The purpose of this paper is to provide a framework of understanding around the use of cloud computing technology, and suggest a process to create and implement your own enterprise cloud strategy for your organization.
Author: 
Access level: 
Subscriber & Member
Moving to the cloud has plenty of implications for the way that data governance is handled within organisations. How should firms approach this?
Author: 
Access level: 
Subscriber & Member
The Databarracks annual Data Health Check surveys hundreds of IT professionals across 19 different fields to capture a snapshot of the way businesses use and think about IT. Here are the highlights from 2014.
Author: 
Access level: 
Member only
The law around cloud has been confusing, particularly when national boundaries are taken into account. But that could be about to change...
Author: 
Access level: 
Member only
Set of slides from the Cloud Expo 2014 exhibitions keynote presentations. Martin Prendergast. Member, Cloud Industry Forum. CEO, Concorde Solutions
Author: 
Access level: 
Member only
This White Paper describes the technical challenges and potential solutions for preserving digital artifacts, for long intervals of time (several decades, centuries) in a new world of massive, distributed data.
Author: 
Access level: 
Member only
What should your first steps be when formulating a security policy for cloud use? Davey Winder has been talking to the experts about this very subject. Read on to find out more…
Author: 
Access level: 
Member only
Public, private and hybrid cloud all have their own security challenges. What are the options for the CIO?
Author: 
Access level: 
Subscriber & Member
Businesses are beginning to make the most of their data, but they to need to ensure security issues are sorted out first...
Author: 
Access level: 
Subscriber & Member
We speak to Conor Ward, consultant with international law firm Hogan Lovells and chair of the CIF Legal Forum, about the current state of play.
Author: 
Access level: 
Public
Penetration testing is a customer-sanctioned intrusion of a network or computing infrastructure by a specialist 3rd party.
Author: 
Access level: 
Member only
Virtualisation plays an important part in many IT transformation plans, but few organisations take the time to investigate the effects that this strategy has on their existing software estate, licensing deployment and behaviour in the virtualised world
Author: 
Access level: 
Member only
We speak to Martin Prendergast, CEO and co-founder of Concorde, about the changing nature of software asset management and the role cloud plays here
Author: 
Access level: 
Public
Is cloud the nirvana of IT deployment models? Will everything make the transition to the cloud? Are we facing the terminal demise of on-premise IT? This comprehensive e-book from CIF and CloudPro examines a broad section of topics related to the adoption of cloud in the enterprise. Advice, insight and guidance to help you make tomorrow’s tech decisions, today.
Author: 
Access level: 
Public
For law firms and corporate legal departments, the dynamics of a cloud delivery approach can be especially attractive—making it possible to increase staff productivity, deliver better client service, and improve business agility while reducing expense.
Author: 
Access level: 
Member only
A survey by IDG Research Services reveals that organizations face confusion in researching cloud options, forcing them to adjust goals and search for more flexible and open cloud solutions that can help them prevent vendor lock-in.
Author: 
Access level: 
Subscriber & Member
A year is a long time in the cloud sector. Last year we wrote “The Real Challenges and Benefits of Cloud Computing to Law Firms”. In preparing that paper we interviewed a number of technology directors at law firms to gauge their attitudes to cloud computing, whether their firm had adopted cloud (or was looking to do so) and what type.
Author: 
Access level: 
Public
More mobile devices means more data, but this data could hold the key to future success – as long as organisations can ride the terabyte tidal wave.
Author: 
Access level: 
Subscriber & Member

Cloud-based applications and services, and software-as-a-service applications in particular, are coming into widespread use by organisations of all sizes. Such applications are used to process and store sensitive information making it imperative that user access rights are tightly controlled to ensure that information is secure from loss or theft and remains private. This paper discusses recent developments in identity and access management technologies that aim to extend such controls to services provided from external sources.

Author: 
Access level: 
Public
This White Paper examines the extent to which access to data in the Cloud by governments in various jurisdictions is possible, regardless of where a Cloud provider is located. “Governmental access,” as that term is used here, includes access by all types of law enforcement authorities and other governmental agencies, recognizing that the rules may be different for law enforcement and national security access
Author: 
Access level: 
Member only
In the UK today over 50 per cent of organisations have formally utilised at least one Cloud service and satisfaction levels relating to that experience grew to an astonishing 96 per cent by the end of 2011. Furthermore, 85 per cent of IT Executives stated that they now formally considered Cloud as a viable option for delivering new IT projects within their wider IT strategy, signaling that the technical model has established a mainstream status among the profession.
Author: 
Access level: 
Subscriber & Member
Software Value Management (SVM) is the practice of informed active governance over access, utilisation, licensing, and cost efficiency of software throughout its useful life within an enterprise regardless of the IT deployment models used or methods of access.
Author: 
Access level: 
Member only
General Purpose PaaS would allow Cloud capabilities to be exploited to their full potential for applications. A General Purpose PaaS would be a comprehensive, open, flexible, and interoperable solution that simplifies the process of developing, deploying, integrating, and managing applications both in public and private Clouds
Author: 
Access level: 
Member only
Practical solutions for the digital age of Global Communications and Mass data exchange.
Author: 
Access level: 
Member only
Industry surveys consistently show that security is the number one concern when it comes to cloud adoption. In our related, previous report, "Secure your data - protect your business" we discussed best practice recommendations arising from interviews with a number of organisations and how they treat their data. In this follow up report, we answer key questions that people are asking us about cloud adoption and data management.
Author: 
Access level: 
Public
The research polled 450 senior IT and business decision makers in enterprises, small-to medium businesses (SMBs) and public sector organisations.
Author: 
Access level: 
Subscriber & Member