Licensing software for a cloud environment can be tricky: who owns the license? Should you buy it outright or treat is as an operational expense and part of your subscription? But beyond the puzzle of setting up the license itself, there is the problem of software license sprawl and expense in general.
Gartner predicts $332 billion in software charges this year. One report found that of these massive software expenses, wasted licensing cost an average of $224 per computer. That added up to $7 billion in idle or underused licenses.
Adding software licensing to your list of things to actively manage might sound like a hassle, but reclaiming those expenses will allow you to demonstrate IT cost savings and put that budget towards more valuable projects.
Encrypting virtual machines within the VMware hypervisor platform has been possible for some time, but can be tricky and it often impacts performance. Often the best solution is to encrypt at the storage level, as VMware does not always support OS-level encryption, either.
That may be changing as the latest version of vSphere includes VM encryption that is simple to implement as a policy. Read on to learn what’s new with this method, how it simplifies administration, and how you can implement it within vSphere 6.5.
Many cloud discussions center around data security. When infrastructure is out of corporate control, it’s natural to be concerned about the precautions taken to protect vital information assets. Ultimately, cloud security is not any weaker than on-premise data centers, but it turns out that corporate IT departments aren’t really concerned about losing data, anyway.
They’re worried about what everyone else will think if they lose that data.
With only 25% of companies are equipped to handle data breaches, corporations still cite damage to reputation as the biggest risk of being hacked. A recent study from the International Association of Privacy Professionals found that 83% of public companies in the United States cite the impact to corporate reputation as the number one risk of a data breach.
Passwords – we love to hate them. Despite scribbled pages of notes and password keepers, we always forget them at the most inconvenient time. (By the way, written notes are a very insecure way to remember your password). They expire before we remember to reset them, as the IT department sets required password change rules. These days it feels like they have to be one hundred letters long, including hieroglyphics, roman numerals, and emojis.
And despite all that, they still aren’t very secure. Every few months we hear about another massive breach. One of the biggest, and most recent, was Yahoo. The company only just reported a 2014 breach that compromised 500 million users’ names, e-mail address, and other personally identifying information. If the password information could be decrypted and used along with this other PII, user accounts across other services – even bank logins – could be accessed. According the 2016 Verizon Data Breach Investigations Report, compromised passwords were used as a means of access for many attacks as well.
Is it time to ditch passwords all together? What might replace them? The technology, it turns out, is just around the corner.
Cloud is scalable, it’s flexible, it’s a whole host of cool-sounding adjectives. But what does that all mean in practice? While it’s nice for the IT budget to be able to adjust infrastructure resources on the fly, cloud servers are also facilitating a subtle shift in the way your department should be managing infrastructure.
It’s time to quit relying on monitoring solutions and simply reacting to problems as they arise. Proactive cloud management involves digging in across every department in your organization to more closely align IT resources with business objectives.
Here’s how the new paradigm of proactive cloud management differs from simple monitoring, patching, updates, and other firefighting.