Leveraging The Business Value Of Your Cloud Strategy

value-of-cloud-strategy | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-business-discussion/481407035

Cash is easier for a CEO to understand than the finer points of cloud computing. When a CIO closely aligns cloud strategy with current business initiatives, they find it much easier to gain support from executives and business leaders. The key is for the CIO to couch cloud benefits in terms relevant to business concerns and objectives.

Read more >>

PaaS Cloud Services And Today’s IT Landscape

today-it-landscape | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-business-communications/469753665

Many companies are moving servers to the cloud, but I urge them to look further ahead. As IT continues to evolve beyond Infrastructure-as-a-Service (IaaS) and virtual machines, I see Platform-as-a-Service (PaaS) as the future for cloud services. According to a recent InfoQ.com article, Azure Web Sites now offers upgrades that place it among the top public PaaS services.

Read more >>

Secure Identity Management In A Hybrid Cloud Environment

secure-ID-management | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-finger-in-fingerprint-reader/86796606

Keeping track of multiple passwords is a headache. As enterprise users try to juggle new logins to work in a hybrid cloud environment, strategic identity management has become a necessity. As your company develops its roadmap to the cloud, I’d suggest single sign-on in your cloud strategy, and addressing identity management in your security audit.

Read more >>

Even ‘Zero-Knowledge’ Cloud Services Have Security Risks

zero-knowledge-cloud | Photo Courtesy of ThinkStock http://www.thinkstockphotos.com/image/stock-photo-risk/477928521

Some cloud services now offer “zero-knowledge” storage in which only customers are able to unencrypt their data. A CIO.com article questions the claims of these storage providers, pointing to a potential vulnerability in the encryption process. It’s arguably more useful to be aware of security risks than trust anything to be 100-percent secure.

Read more >>