You’ve likely heard of “shadow IT” or BYOD (bring your own device). Both terms refer to employees using private devices or software at the workplace—think iPads for work, or Google Drive to share files in a department. These practices may not be sanctioned by the IT department, but they improve productivity and save provisioning costs. However, they come with the risk of security breaches or other issues, causing IT headaches. By implementing an official BYOD policy and deploying hybrid cloud tools, companies can eliminate shadow IT and empower employees at the same time.
At the end of August, news broke that two hackers had broken the two-factor security deployed by Dropbox, a cloud storage platform used by millions of people across the globe. The hackers published their methods in order to promote an open-source version of the program that could, they claimed, be safer for users overall. The hack puts cloud providers and users on edge: how safe is SSL?
By now, you’re probably using some form of cloud storage. People generally think about storing their current files in the cloud to access remotely or collaborate with others. Whether it’s Dropbox or Google Drive for personal use or logging into your company server for work, storing files remotely is becoming more commonplace everyday.
However, storing older files in the cloud is also wise. Many enterprises use a form of cloud backup, or Backup as a Service in some cases. Others may need to archive old data for compliance standards or other reasons. The cloud can help these companies remain flexible as they store data, adding resources as necessary; as well as meet compliance, easily manage data, and avoid in-house expenditure. Cloud backup and cloud archiving are very similar—after all, they both store files in the cloud to access later if something goes awry—but they have several key differences.
One vital managed service for Green House Data virtualization deployments is taking steps to ensure the security of your critical data. Although our data center compliance standards attest to our security management protocols, additional steps are necessary to secure data within a vSphere environment. One of our most popular services is therefore the security hardening and audit.
The Ponemon Institute released a survey this month that paints an unfortunate picture about the state of mobile devices and cloud technology in industries that must deal with regulation or compliance standards, like healthcare or government.
The survey questioned nearly 800 IT professionals about the use of regulated data and what they perceived as the biggest security risks. They defined regulated data as “sensitive and confidential data that organizations are legally required to keep safe and secure”, like ePHI (electronic protected health information), financial information, or customer accounts.
Since the launch of vSphere 3.5, ESXi has been the default hypervisor for VMware environments. Here’s a quick description of how to get your ESXi environment up and running.
ESXi uses approximately 2 GB of space and 1 GB of RAM. It requires a 64-Bit x86 CPU, 2 GB RAM and at least a 1 GB network card. There is a free version of ESXi but it lacks many of the features of a licensed version. Be sure to check your system for compatibility before continuing: http://www.vmware.com/resources/compatibility/search.php.
Businesses large and small are looking for the most effective way to develop a safe and secure BYOD policy for their workers. This trend is sweeping not only tech workplaces, but across industries. BYOD stands for “Bring Your Own Device.” The general gist of it is that employees will bring personal devices, such as laptops, tablets, and smart phones, and use them for work. While BYOD is still very controversial, companies have found that there are some serious pros (and cons) when it comes to allowing employees to use their own devices.
Continuing our recent coverage of cloud storage, this post seeks to clear up the different types available. Despite some new technologies starting to gain ground to take advantage of the cloud’s unique topology (see our exploration of Gartner’s 2013 Cloud Storage Trends), the most common terms relating to storage in a data center environment are SAN, NAS and DAS.
With 2013 half over, we take a look at cloud backup in our latest infographic. How and why are companies using cloud backup? What are the biggest obstacles for adoption? How does cloud backup work, anyway? See more in the our cloud backup infographic below.
We’re pleased to announce that Green House Data Principal Architect Sean Bales passed his VCP5-DCV (VMware Certified Professional 5 – Data Center Virtualization) exam last week. Sean’s certification brings our total number of VCP5-DCV technicians up to three.