Decentralization of IT purchases widens security gaps.

MIKE WHEATLEY | November 17, 2016

article image
The rapid growth of information technology as a service is decentralizing the purchase of devices, apps and cloud services, leading to growing security concerns at large enterprises. That’s according to a new study from VMware Inc., which said its survey highlights growing concerns about IT fragmentation and the security gaps it creates. The company argues that IT managers are failing to keep up with the cloud shift, and that their embrace of “non-secure solutions” is creating a multitude of new security and compliance issues.

Spotlight

Advocate - The Cloud & Connectivity Insiders

Since 2001, Advocate, the Cloud and Connectivity Insiders, has helped more than 600 global enterprises transform and optimize their cloud, connectivity and unified communications infrastructure, while achieving $20 Billion in cumulative savings. As Cloud and Connectivity Insiders, we have more expertise and data to work with which is why we deliver an average of 25 percent savings and a 10-to-1 return on investment.

OTHER ARTICLES

WIRELESS DATA CENTERS AND CLOUD COMPUTING

Article | April 13, 2020

One of the most exciting areas of Vubiq Network’s innovative millimeter wave technology is in the application of ultra high-speed, short-range communications as applied to solving the scaling constraints and costs for internal data center connectivity and switching. Today’s limits of cabled and centralized switching architectures are eliminated by leveraging the wide bandwidths of the millimeter wave spectrum for the high-density communications requirements inside the modern data center. Our patented technology has the ability to provide more than one terabit per second of wireless uplink capacity from a single server rack through an innovative approach to create a millimeter wave massive mesh network. The elimination of all inter-rack cabling – as well as the elimination of all aggregation and core switches – is combined with higher throughput, lower latency, lower power, higher reliability, and lower cost by using millimeter wave wireless connectivity.

Read More

Benefits of Kubernetes on bare metal cloud infrastructure

Article | March 3, 2020

Bare metal cloud infrastructure is being introduced to run 5G applications in containers. This is a natural development of the shift the industry is going through from virtualized network functions to cloud native applications. But what are the benefits of running Kubernetes on a bare metal cloud infrastructure compared to a virtualized infrastructure? Let’s start with a brief recap on cloud native and CNCF – Cloud Native Computing Foundation. With the introduction of 5G, new use cases drive the need for designing applications based on containers and service-based architecture to address some technology gaps associated with virtualization. The most important technology gaps involve smoother software upgrades, automation and the realization of a CI/CD software pipeline to end customers.

Read More

How to Scale IT Infrastructure

Article | April 25, 2020

IT infrastructure scaling is when the size and power of an IT system are scaled to accommodate changes in storage and workflow demands. Infrastructure scaling can be horizontal or vertical. Vertical scaling, or scaling up, adds more processing power and memory to a system, giving it an immediate boost. Horizontal scaling, or scaling out, adds more servers to the cloud, easing the bottleneck in the long run, but also adding more complexity to the system.

Read More

5 Essential Principles for Managing SD-Branch Security

Article | March 5, 2020

Software-defined wide-area networking (SD-WAN) is revolutionizing the way that local branches are managed. As we’ve previously pointed out in our article on 4 things you should know about SD-Branch, it is being used to enable faster cloud adoption and greatly improve centralized control over the systems running in branch offices. Unfortunately, these advantages also come with some downsides. As SD-WAN has developed in SD-Branch, the number of IoT and end-user devices connected to these networks has grown exponentially. This means that the surface attack area of the average SD-Branch setup has increased enormously over the past few years. At the same time, business-critical applications are now sharing more data than ever over broadband internet connections, exposing critical data to interception or disruption.

Read More

Spotlight

Advocate - The Cloud & Connectivity Insiders

Since 2001, Advocate, the Cloud and Connectivity Insiders, has helped more than 600 global enterprises transform and optimize their cloud, connectivity and unified communications infrastructure, while achieving $20 Billion in cumulative savings. As Cloud and Connectivity Insiders, we have more expertise and data to work with which is why we deliver an average of 25 percent savings and a 10-to-1 return on investment.

Events