|By Paul Diamond||
|April 5, 2014 04:00 PM EDT||
The proliferation of cloud-based applications for the enterprise grows each day, and more and more professionals have grown dependent on these apps as the consumerization of IT flourishes in today's mobile enterprise. With the consumerization of IT, employees have become their own IT experts and demand that their IT departments add cloud services or enable them to use a particular app with the corporate network. IT departments, naturally, want to use the latest technologies to make the entire company more efficient and productive - and they see how the cloud can help accomplish this. What employees don't often see is that there are roadblocks to rolling out a new service or enabling an app to work with the network. Everything from budget to security to integration issues may cause the IT department to turn down the requests. However, unlike in the past, employees now have the power and the means to just use these services anyway, without IT's approval.
Similar to BYOD, this concept of bring-your-own-cloud (BYOC) is not going anywhere. Just think - it's incredibly easy for employees to access preferred technology offerings on a mobile or personal device, but it's still on the company network. Just download it, watch a YouTube video on how to make it work and voila - you have your cloud service. Any professional with a smartphone is enabled by cloud, social computing, analytics and mobile - and wants to transfer that experience seamlessly between their personal and professional computing.
This obviously poses a huge problem for the company network. IT staff either doesn't know this happened, or is forced to quickly address network and security issues, often leading to Band-Aid fixes. Results from Forrester's Forrsights Workforce Employee Survey, Q4 2012 indicate that at least 85 percent of employees use phone/tablet applications and web-based services, which is putting corporate information security under serious threat. Just to start, BYOC could hypothetically:
- Denigrate the network - Deploying cloud technologies and operating models muddies the role that networking plays. Further, the impact of the cloud on the networks may not always be clear, and while the network is indeed important to cloud computing, the network also must change in order to facilitate these preferences. In a hybrid environment, the relationship and connection between a user's cloud and the provider's network must be secure - but the structure should be in place beforehand. The bottom line is, no network means no cloud - without networks, users cannot access their cloud services.
- Challenge traditional security practices - It's really hard to ensure that information on employee-owned hardware and software is secure. For security professionals, BYOC seems like a nightmare. Personal devices are getting smarter and are better able to store and do more with corporate data, especially with the proliferation of personal cloud storage like Evernote, Amazon S3 and even Facebook. They also become a bigger target for hackers.
- Introduce viruses - In BYOC environments you will inevitably have one employee who leisurely browses the web, opens email attachments, stores phantom files, freely clicks on links, and can't - or rarely - updates their security software. Without a policy in place, this is a veritable virus breeding ground.
- Expose critical company data over unsecure networks and devices - This one seems pretty obvious, right? Downloading sensitive company files to an iPad, saving it to iCloud, and then connecting to the Starbucks Wi-Fi network down the street is not an ideal scenario - but it's a likely one.
Where does an enterprise start? The pros and cons are clear, and while it's important in this day and age to be accommodating and supportive of the innovative models that professionals take to accomplish their work, day-in and day-out, it's also very important to have a policy and framework in place that keeps all constituents on the same page while living on the same network. Let's start there - what frame of mind when devising a BYOC policy is reasonable and will be accepted by employees?
It's important to have a solid understanding of the stage at which cloud applications have infiltrated the organization. Once an organization understands the true level of cloud adoption across the board, they can better understand the true implications for their network and security, and how critical an organization-wide policy is to institute rules and regulations.
Network Monitoring and Inventory
Solutions exist that will take a complete look at your network and take stock of what is connected to your network (wired and wireless). It will know who owns it, what kind of memory it has, if and what software is installed and running, user information, network configurations and more. This is step one in your diagnosis, but also important throughout to keep track of the state of your network and to dissuade rogue users.
From there, your IT organization can determine how to protect itself from this phenomenon. Users are both the champions for this, as well as the weakest link - they likely own the device and they likely own the storage and access of the corporate data - so it's most important to invest in their knowledge, understanding and commitment to the policy.
Train and Instruct
Let employees know that they are responsible for their devices and cloud service from a cost and upkeep perspective, but also for what happens as a result of any personal computing or professional computing over personal assets. If an employee is not a good fit for any BYOC policy, such as a legal professional, instruct them of a revised policy.
Regardless, physical training of employees should happen over digital programs that they can quickly skip through and provide a digital signature without fully understanding or comprehending the responsibility that is in their hands - literally.
Security, Security, Security
Many companies are aware of how to secure devices that are introduced onto the network. For instance, there are a plethora of mobile device management solutions available that secure, monitor, manage and support mobile devices deployed across a corporate network. But for the cloud, to secure data and applications, it's important to invest in solutions with built-in data loss prevention (DLP), giving users an encrypted storage space on the mobile device to safely store business critical data.
For the network, there are a variety of network access control solutions that will give administrators the ability to enforce role-based access. In some cases, these types of solutions might just be viewed as Band-Aid fixes to a larger problem. Depending on your organization, however, these can be good first steps, building up to the implementation of a more holistic hybrid cloud environment that offers employees a full-scale cloud solution to support such bandwidth.
The bottom line, you must be in the know - you must know where your network stands at all times; you must know what your employees want from a cloud perspective; you must know what they currently have from a cloud perspective; and you must know what the best path is to take for your organization - be that a six-month path of quick-fixes and BYOC policies, or a full-fledged cloud offering that puts your mind at ease and keeps your employees happy.
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
Oct. 23, 2016 03:30 PM EDT Reads: 1,467
SYS-CON Events announced today that Coalfire will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Coalfire is the trusted leader in cybersecurity risk management and compliance services. Coalfire integrates advisory and technical assessments and recommendations to the corporate directors, executives, boards, and IT organizations for global brands and organizations in the technology, cloud, health...
Oct. 23, 2016 03:30 PM EDT Reads: 1,511
A completely new computing platform is on the horizon. They’re called Microservers by some, ARM Servers by others, and sometimes even ARM-based Servers. No matter what you call them, Microservers will have a huge impact on the data center and on server computing in general. Although few people are familiar with Microservers today, their impact will be felt very soon. This is a new category of computing platform that is available today and is predicted to have triple-digit growth rates for some ...
Oct. 23, 2016 03:00 PM EDT Reads: 34,022
SYS-CON Events announced today that Transparent Cloud Computing (T-Cloud) Consortium will exhibit at the 19th International Cloud Expo®, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The Transparent Cloud Computing Consortium (T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data proces...
Oct. 23, 2016 02:15 PM EDT Reads: 1,309
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Oct. 23, 2016 02:00 PM EDT Reads: 4,439
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Oct. 23, 2016 01:00 PM EDT Reads: 1,780
SYS-CON Events announced today that MathFreeOn will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MathFreeOn is Software as a Service (SaaS) used in Engineering and Math education. Write scripts and solve math problems online. MathFreeOn provides online courses for beginners or amateurs who have difficulties in writing scripts. In accordance with various mathematical topics, there are more tha...
Oct. 23, 2016 12:45 PM EDT Reads: 970
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
Oct. 23, 2016 12:30 PM EDT Reads: 4,513
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
Oct. 23, 2016 12:00 PM EDT Reads: 8,352
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
Oct. 23, 2016 11:30 AM EDT Reads: 11,327
In the next forty months – just over three years – businesses will undergo extraordinary changes. The exponential growth of digitization and machine learning will see a step function change in how businesses create value, satisfy customers, and outperform their competition. In the next forty months companies will take the actions that will see them get to the next level of the game called Capitalism. Or they won’t – game over. The winners of today and tomorrow think differently, follow different...
Oct. 23, 2016 11:00 AM EDT Reads: 941
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
Oct. 23, 2016 10:30 AM EDT Reads: 1,464
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Oct. 23, 2016 09:45 AM EDT Reads: 800
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service.
Oct. 23, 2016 09:45 AM EDT Reads: 1,030
The Internet of Things (IoT), in all its myriad manifestations, has great potential. Much of that potential comes from the evolving data management and analytic (DMA) technologies and processes that allow us to gain insight from all of the IoT data that can be generated and gathered. This potential may never be met as those data sets are tied to specific industry verticals and single markets, with no clear way to use IoT data and sensor analytics to fulfill the hype being given the IoT today.
Oct. 23, 2016 09:45 AM EDT Reads: 2,510
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Oct. 23, 2016 09:30 AM EDT Reads: 3,828
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Oct. 23, 2016 08:30 AM EDT Reads: 1,344
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr...
Oct. 23, 2016 08:00 AM EDT Reads: 5,691
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Oct. 23, 2016 07:00 AM EDT Reads: 4,112
Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office. In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat...
Oct. 23, 2016 06:30 AM EDT Reads: 4,759