Superb Internet Facebook Superb Internet Twitter Superb Internet Google Plus Superb Internet printerest Subscribe to Superb Internet's blog RSS feed

What Acai Berry & the Cloud Have in Common

  • Cloud
  • General

Acai Berry

This article will look at marketing hype that fuels misconception of the cloud. To get there, we will first look at what the technology has in common with a particular berry that has been a source of great, unbridled, loopy excitement for those in the natural food industry. We will progress as follows:

  • Ambiguity & Marketing Jargon – Superfruits
  • Money Falling from the Sky: False Cloud Advertising
  • Ridiculous Imagery
  • Studies & Perspectives – Citrix, Microsoft & Oracle
  • Right terminology for a Transparent Cloud

Ambiguity & Marketing Jargon – Superfruits

If you are in the world of natural health, you are probably familiar with the term “superfruit.” We should not be surprised to see the acai berry at the top of a list of superfruits. The pomegranate also recently experienced a surge of popularity when it was realized that it was not simply a fruit but possessed strange powers, as with these other impossibly healthy fruits.

The truth is that superfruit is a word that has been used in marketing and labeling but does not have a standardized definition used by science or government agencies such as the Food and Drug Administration (although many now consider the latter to be a front for the pharmaceutical industry, since it kind of is).

The basic problem with the concept of the superfruit is that it is ambiguous. Fruit and vegetable growers, distributors, and marketers are the ones who decide what fits into the category.

As a Wikipedia article on the topic humorously puts it, “The term superfruit is used liberally to include fruits having sparse scientific evidence for being ‘super’ other than being relatively unknown to common consumers.”

Sound anything like “the cloud”? It should.

Money Falling from the Dky: False Cloud Advertising

Tech people are typically smart and knowledgeable folks who can be easily annoyed by nonsense, hogwash, and “bulls$%t” (as it might be called in the funnies). In that spirit, Chris Magiet of IT tutorial company Pluralsite eviscerated the cloud marketing field in May 2013, pausing occasionally to dance on its entrails and sing a happy tune.

Chris argues that one of the main issues in terms of the presentation of cloud computing is the misuse of the terms that separate it into different categories – IaaS, PaaS, and SaaS (infrastructure, platform, and software “as-a-service”). He also noted that it’s unclear exactly what hybrid means. Furthermore, no one is quite sure where the data is located. All in all, “the cloud can mean confusion as often as it means effective, creative solutions.”

Ridiculous Imagery

The first aspect of marketing with which Chris takes issue is stock photos, providing the following examples:

  • Symbolic shapes formed by clouds in the sky, such as “www.”
  • The word “Cloud” integrated into code.
  • Personification of the cloud – with arms and legs (but no face, because the cloud doesn’t have any feelings).
  • Loosely constructed diagrams that contain such bizarrely broad elements as “people,” “world,” “technology,” and “business,” with a cloud as backdrop.
  • Dollars and coins falling out of the sky and into a tablet.
  • A lady sitting on a cloud and looking out across a vast system in the sky.
  • Sales guy sitting within an apish grin on his face, surrounded by a fantasyland of technological connectivity.
  • Computer cords plugging directly into a cloud.
  • Data falling like rain down into a PC.

Studies & Perspectives – Citrix, Microsoft & Oracle

Chris references an August 2012 survey by Citrix that polled 1000 consumers in the US to determine just how clueless we were about distributed virtualization at the time. The survey revealed that 51% of Internet users think that thunderstorms damage the reliability of the cloud, and that 95% of those who don’t think they use the cloud at all actually do.

It’s been a couple years, but certainly much of that confusion continues – in part, Chris argues, because of careless marketing strategies by firms wanting to attract customers with sexy solutions. He specifically fingers Microsoft for its fluffy mumbo-jumbo.

On the other side of the aisle is Larry Ellison, CEO of Oracle, who discusses the concept critically. Chris reports, “[Ellison] jokes that the cloud appeared one day when someone ran a Find & Replace command in Word to swap ‘Internet’ for ‘cloud,’ and then emailed it to a bunch of VCs.”

Right Terminology for a Transparent Cloud

Hey, dudes, cloud ain’t all bad. We just have to know what we mean. Chris references a humorous post on Everything SysAdmin that says cloud computing is a worthless term until you accurately define what type of service is being offered:

  • SaaS – a website or application
  • PaaS – a framework
  • IaaS – a virtual machine

To conclude, this piece by Chris (although it appeared 18 months ago) hit close to home for us at Superb Internet. Just look at the language on our home page: “We take confusion out of the Cloud!”

Our customers appreciate our transparency: “Great customer service, dedication and expertise,” commented Stephan Mitchev. “Thank you for the great support!!”Plus, with Flex Cloud, you can start for free.

By Kent Roberts

Is Edward Snowden Right About Amazon?

  • Cloud
  • General
  • Security
  • What's New?

CIA

Sure, it’s easy to dislike the dominant player in your field. They sneeze, and journalists scramble to collect the airborne discharge and analyze it.

However, the power of the big dogs is often left unchecked. We see that in both the public sector and private sector, and sometimes in relationships between the two.

In this article, we will look at the relationship between Amazon Web Services (AWS) and the Central Intelligence Agency (CIA), as follows:

  • It Wasn’t Us: Red “Delete” Button
  • Shoddy Intelligence: Cooking the Books on Torture
  • CIA & Amazon: So Happy Together
  • Is Amazon “Morally Irresponsible”?
  • Partnering with a Company You Can Trust

It Wasn’t Us: Red “Delete” Button

The CIA’s publicity director has been having trouble keeping the brand’s sparkling reputation untarnished lately. A couple of leading legislators bolstered opposition to a CIA proposal, which goes something like this: “Hey, we’ve got a great idea to cut fat from the federal government’s data storage: get rid of our emails.”

Julian Hattem reported in The Hill on December 1 that Texas Sen. John Cornyn, “the No. 2 Senate Republican,” had co-written a letter with Senate Judiciary Chairman Patrick Leahy of Vermont. The two senators crossed the aisles, shook hands, and politely requested that the CIA maybe just not do something as absurd as destroy communications from everyone but the 22 top executives at the espionage agency.

Contrary to the plot line of the pilot for Diff’rent Strokes: The Next Generation, the correspondence did not start out, “Dear Willis, What are you talking about?”

Instead, the legislators wrote to the National Archives and Records Administration advising them not to disappear the messages: “Transparency and accountability are critical to a functioning democracy.” They also argued that trashing the communications would directly impair accountability and make it less possible for American citizens to have access to knowledge about the functionality of the public sector.

Shoddy Intelligence: Cooking the Books on Torture

Okay, so the CIA wants to get rid of its emails. I can’t imagine why that would be. Oh, right, maybe because of that crazy report from the Senate Intelligence Committee that suggested CIA interrogation tactics were not only incredibly inhumane, but also useless. In other words, regardless the human rights issue that some may want to debate (freedom of personal bodily liberty versus freedom of security), the Senate report argued that the United States basically tortured a bunch of people for no reason.

The Chairwoman of the committee, Dianne Feinstein, said that the CIA did not operate in a way that was in line with the core values of the United States.

Not everyone in the intelligence community agrees that the CIA was at fault, though. It’s important to consider the perspective of CIA Director John Brennan, who said, Our review indicates that interrogations of detainees (subject to enhanced interrogation) did produce intelligence that helped thwart attack plans, capture terrorists, and save lives.”

Well, John, sounds like you are looking at different information. Perhaps you might want to share it with the rest of us. Then again, I doubt that a government official would try to mislead us. Oh, and about the JFK assassination…

CIA & Amazon: So Happy Together

Now, it would be unfair for me to suggest that Amazon Web services is going to torture you. However, AWS created a $600 million cloud for the CIA, as reported in The Atlantic Monthly.

The real reason it’s a shocker that the CIA and Amazon have signed a deal is that top-secret operations of the CIA, NSA, and similar organizations are not typically intertwined with private service providers.

Three years ago, as many private firms switched from dedicated servers to the cloud, the intelligence community started to consider the idea of virtualizing its data throughout a private network.

One leader in the intelligence field mentioned in Government Executive that the discussion over a more acceptable cloud system was opinionated and sometimes heated. Nonetheless, “it was easy to see the vision if you laid it all out.”

The CIA’s contract with Amazon was signed in 2013, behind closed doors. IBM and an additional vendor were swept to the side. IBM essentially claimed it was a no-bid contract masquerading as an RFP. When IBM contacted the Government Accountability Office to complain, they were the third company to do so behind AT&T and Microsoft (both of those two in 2012, in response to the strict parameters of the RFP).

Is Amazon “Morally Irresponsible”?

In a story in the Washington Post, which is (humorously enough) owned by Amazon CEO Jeff Bezos, Edward Snowden (appearing live via streaming video at the Cato Institute on December 13) argued that the Amazon website should be standardly encrypted so that the NSA cannot see the books that people are searching and putting into their shopping carts. He said that Amazon is “morally irresponsible” for not involving encryption until it’s time for the transaction.

Partnering with a Company You Can Trust

Why not use an alternative to creepy, crawly, Halloweeny AWS, with guaranteed performance and guaranteed resources: Superb Internet.

Don’t take our word for it. Here is our customer Jacob Pozderac:

“You guys were on top of things. Quick replies and easy solutions.”

Get started now!

By Kent Roberts

Big Brother Down Under Demands Cloud

  • Cloud
  • General
  • What's New?

Big Brother

This report discusses the Australian federal government’s adoption of the cloud, as detailed by a December 9 article in The Australian (see source below). The Department of Education seems to be ahead of other governmental branches with cloudification: its entire ecosystem should be “cloud-ready” by 2019. Other government departments with huge IT budgets, including Health and Immigration, are progressively shifting to the cloud as well.

We will cover these topics:

  • Australia – 5-year Cloud-Readiness Plan
  • Department of Education
  • Department of Health
  • Immigration and Border Protection
  • Australian Taxation Office (ATO)
  • Are You Cloud-Ready?

Australia – 5-year Cloud-Readiness Plan

Fran Foo of The Australian spoke with directors of major federal government agencies to determine the extent of their cloud adoption, essentially getting the answers to two questions:

  1. What portion of their systems were currently prepared for cloud migration?
  2. What portion of their systems would be cloud-ready by 2019?

Most of the departments said that they were getting as much of their technology as possible ready for migration to cloud virtual machines and securely accessible on the web.

The Australian government’s move to the cloud provides an opportunity for tech contractors to get agencies prepared for on-demand computing, moving IT systems from the capex to the opex model.

The government spends a whopping $6 billion each year on computing, but only $5 million is presently spent on cloud (i.e., systems based on distributed virtual architecture that accesses a vast array of machines). One IT service provider told Foo that he thinks the tiny sliver of the government market controlled by cloud will “easily double” over the next year and a half in response to a statement by the government that cloud would henceforth be treated as the priority technology.

Department of Education

The Department of Education is in the process of pushing the bulk of its applications and services to the public cloud. A spokeswoman said that the department was using the cloud for development of various applications via a Sydney-based third-party datacenter.

The transition won’t occur overnight. The spokeswoman projects that within six months, 50% of development servers will have been traded in for public virtual machines.

The Education Department’s migration to the cloud is simplified through use of a shared services center, a project it operates in tandem with the Employment Department.

The spokeswoman also remarked that “the majority of [our] current application systems are capable of being hosted within appropriately secure cloud facilities,” and all the department’s IT ecosystem would be prepared for cloud migration by 2019.

Department of Health

Most of the Health Department’s infrastructure has been virtualized, meaning that it is run on virtual machines, and hence, it is in a format that can easily be transferred to the cloud. (Although left unsaid, my guess is that the department is currently running virtual private servers on dedicated machines either at its own datacenter or in a colocation facility.)

The spokesman for Health said that an announcement from the department on May 30 urged vendors to present whatever cloud options they had available.

Understandably based on the extreme needs for privacy and security with sensitive patient health data (as demonstrated by HIPAA regulations in the US), the department has many applications hosted on traditional physical servers. The spokeswoman said that those applications are not cloud-ready, but assumedly part of what she meant is that security parameters defined in healthcare law would require a private cloud on dedicated machines rather than the public cloud.

Nonetheless, the legacy applications will either be taken out of service or “re-platformed into key off-the-shelf enterprise systems” by 2019.

Immigration and Border Protection

The main Australian immigration agency has a few apps that are served from the public cloud. For example, the agency uses SuccessFactors, software-as-a-service for HR to monitor employee output (although many enterprises have found that electric dog collars are more effective at controlling personnel behavior).

A spokesman for Immigration said that most of the agency’s ecosystem is built on numerous platforms, so it’s not easy to transition it to the cloud. Regardless, the agency will “continue to explore opportunities to leverage cloud for our online systems, application development and testing requirements.”

The agency expects to have several mission-critical environments prepared for cloudification by 2019.

Australian Taxation Office (ATO)

A spokeswoman for the ATO (Australian’s counterpart to the United States’ Internal Revenue Service) said that 16 of the agency’s applications were delivered through the cloud. Disconcertingly given the need for security of sensitive data, the spokeswoman noted that the data had “an information security rating of public” (Foo).

However, the ATO will transition to new hosting scenarios on the basis of data privacy concerns. Many of the office’s applications are virtual and prepared for private cloud migration.

Are You Cloud-Ready?

Now obviously, you want to look before you leap with any technological decision. Simon Eid, a GM for Massachusetts-based IT storage hardware firm EMC’s Australian branch, said that anyone looking into cloud plans should find out “if I want to leave in 12 months’ time,” how data retrieval would occur and associated cost.

We are fully transparent at Superb Internet. As our customer Diane Secor said, “I would not even consider another web hosting company as my experiences with you are always so positive.” Get started today!

By Kent Roberts

Source: The Australian, December 9, 2014

 

2015 Cloud Forecast – The Thrill is Gone

  • Cloud
  • General
  • What's New?

BB King

This report, which looks at the cloud computing industry via an Information Age list of annual projections, includes the following sections:

  • Overview – The Thrill is Gone
  • Trend #1: SDN/NSV Adoption
  • Trend #2: Location, Location, Location
  • Trend #3: Platforms on the Rise
  • Trend #4: Container Obsession
  • Trend #5: Internet of Things & Widespread Hair-Pulling
  • Key Takeaways – Speed and Security

Overview – The Thrill is Gone

Chloe Green reports in Information Age that location is becoming a major factor for the development of IT infrastructures. Cloud meets the obvious need of speed at a low cost, but Green sees the cloud becoming less nebulous as the way in which “it is tethered to the ground will matter more than ever.”

In other words, the thrill is gone. Cloud isn’t fluffy anymore. It’s functional.

Here are Green’s five specific trends:

Trend #1: SDN/NSV Adoption

Over the past few years, the telecommunications industry has increasingly used software defined networking (SDN) and network functions virtualization (NSV) to automate the delivery of their services. In the typical large company, though, traditional networking hardware such as switches, routers, and firewalls are commonplace. The game changer is that SDN and NSV are now being built in at the hardware level, which means that cloud-style automation will become possible for any enterprise system.

Trend #2: Location, Location, Location

It has been almost 2 years since Edward Snowden became a whistleblower against the federal government for international cyber-spying. Control of data continues to be a major issue in 2015, says Green, for a couple of reasons. One is that governments want information about customers hosted on servers located within that country (as exhibited by Germany and as projected for Russia in 2016). Additionally, data regulations have been bolstered, so those concerned with compliance often prioritize location as well.

The other reason is that speed is critical for a large number of businesses, and shortening distance reduces response lag (latency). High-speed trading now makes up almost 2/3 of daily stock market trading volumes, and investors want data centers that are physically located close to stock exchanges.

Trend #3: Platforms, Anyone?

Last year many trend list creators thought that 2014 would be the year of platform-as-a-service (PaaS). However, Green thinks that 2015 will be the year it really starts to get traction.

The reason is that the climate is changing. Cloud platform providers were primarily interested in engaging the development community in the past, and platforms haven’t been compatible with one another. Enterprises need to be able to integrate their systems to enhance data analytics and mobile capabilities, so the market is adapting to meet that need. Plus, cloud platform companies “are adding databases, metering and data integration capabilities” so that scaling with a platform is user-friendly.

Trend #4: Container Obsession

Working with containers used to be a small open-source concern, but now it is quickly becoming a major piece of virtualization. Containers improve the speed when you are using more than one platform on a single server. The time needed to run tasks on virtual machines has dropped dramatically: “We’re talking milliseconds versus minutes or hours in the case of conventional virtual machines (VM).”

There are other strong suits of containers that keep virtual systems as streamlined as possible. Containers each have their own OS, prevent end-users from cross-contamination, and put less strain on RAM. Developers have become particularly sold on containers, and they’re gradually becoming prevalent throughout major companies.

The one negative aspect about container tech is that the admin systems are not yet mature. However, the Kubernetes project by Google and other high-profile efforts will further improve container automation. In brief, the container market will develop rapidly.

Trend #5: Internet of Things & Widespread Hair-Pulling

The Internet of Things (IoT) is growing within homes around the world as companies such as Samsung, Apple, Logitech, and Belkin develop solutions that automate household tasks. This field is thrilling in many ways: it could improve sustainability, make it easier for us to gauge exercise and diet patterns, and give us remote access to all of our residential ecosystems.

And then there’s the issue of the 500-pound gorilla. Security of sensitive consumer data has become a hot-button issue not just in IT but in media, marketing, and politics. The public cloud is currently used to run many IoT applications. Why do we not want anyone accessing our information? As Green points out, “Not many people will be happy with health insurers looking at data on their diet or fitness regime.”

One answer for the Internet of Things is simple, actually, as Green suggests: the use of private rather than public clouds. However, there is still the basic issue that many devices are not built for sophisticated security, and no one wants the shame of losing their identity through their smart coffee pot or smart cookie jar.

Key takeaways – Speed and Security

Speed and security remain the dual paramount concerns of consumers and businesses as the cloud develops. As always, agile organizations will craft solutions that marry performance to protection for success in the modern age. Superb Internet offers cloud solutions that both guarantee performance and are backed by recognized industry standards.

We love our customers too, which is why Mike Belton reported, “I have never been disappointed by the technical services staff.” Learn more now!

By Kent Roberts

Survey: Running for Our Lives from Content Marketing

  • Cloud
  • Marketing and PR

Limelight

This report will look at how content marketing is changing the landscape within the content delivery network (CDN) industry. Our overview will contain the following components:

  • Limelight: Content is King
  • Kapost: No, Content is an Avalanche (help!)
  • Forbes: 2014 State of the User Experience
  • Limelight: Launching Products with Content
  • Superb Internet: The Customers Are Right

Limelight: Content is King

We all know that content marketing is huge, but sometimes it helps to see things on the ground. 5000-foot views provide general illumination, but first-person accounts and examples serve as spotlights.

To better understand the CDN market, Columbia University Professor Ava Seave conducted a couple of interviews of Limelight CMO Kirby Wadsworth for Forbes, one on driving sales and the other on the power of content marketing. The content marketing article is of particular interest since it is a relatively new and evolving concept that is making such a sweeping impact on business.

Essentially, Wadsworth argues that the incorporation of content marketing into a CDN business (as in many other fields) allows “customers to be more successful,” which in turn improves the end-user experience.

Below is a broad overview of content marketing, followed by an in-depth look at the role of content marketing in business from Wadsworth’s discussion with Forbes – which we will make fun of as much as we can, since Limelight is one of our CDN competitors.

Kapost: No, Content is an Avalanche (help!)

Here are several statistics from content marketing software-as-a-service (SaaS) company Kapost that suggest the content marketing impact, the extent to which it is disrupting industries globally, is on the scale of a natural disaster (but yet is not a danger to coastal humans, marine mammals, or seaside villas):

  • 44% of business-to-business content marketers work off of established comprehensive game plans that are in writing. Does that sound like a lot?
  • It shouldn’t, because 86% of business-to-consumer companies are running organized content marketing campaigns.
  • Since content represents an inbound marketing strategy, the typical amount spent on each sales lead is 13% lower than with outbound methods.
  • The typical business does not hire a full-time content expert, with 62% of firms using third parties for content generation and distribution.

Forbes: 2014 State of the User Experience

Okay, so that further establishes how content marketing is all the rage in business. Let’s look at this recent survey from Limelight, the State of the User Experience, for a direct user perspective. The survey collected responses from 1013 Internet consumers.

Every website owner or manager is aware that speed and reliability are paramount online. This study drilled that truism in with hard numbers:

  • Half of people – 52% – said that performance was the most crucial factor to them when they visited a website.
  • If your website doesn’t load in 5 seconds, three out of five people – 60% – are gone. They are headed to a competitor site to do business.
  • It’s not about just not losing people but building relationships with brand ambassadors: four out of five – 82% – said that they would refer friends and family to a website if the overall user experience was strong.

Here are the crucial criteria for how to keep customers happy on your site, straight from the customers:

Average rank among users Portion of users who listed it as the #1 priority (or tied for #1)
Performance and speed 1.84 52%
Original creative & informational content 2.04 39%
Seamlessness between PC and mobile 2.50 20%
Customization of content or content filtering personalized to user 3.03 12%

Wadsworth says that the real eye-opener from the responses was the user perspectives toward content personalization. Everyone wants to use big data to better target customers with specific messages. However, “what we got back from the survey is that just as many people found it kind of creepy as found it useful,” notes Wadsworth. People may be skeptical of personalization just as they are of the self-driving car, but that doesn’t mean that either industry is showing any signs of slowing. Wadsworth expects that users will be less suspicious and more appreciative of personalization as they continue to see its value, just as we do on Netflix with intelligent, algorithmic movie suggestions.

In other words, creepy robots suck… unless they are highly intelligent, and it’s a bonus if they own a boat.

Limelight: Launching Products with Content

We want content. We get it. How do we do it?

Wadsworth describes a September product launch at Limelight as an example of content marketing in action. Their content approach was massive and time-consuming to prepare, encompassing 60 pieces and 60 days:

  • The launch included more than 60 separate content elements (primarily online material but also extending to sales literature, brochures, and tradeshow designs).
  • A full 60 days was used to prepare for the content and product launch, conducting extensive testing with consultants to determine if the content made sense and properly conveyed the Limelight message.
  • Press release and conversations followed the initial launch.
  • Case studies with customers satisfied by the service were completed.
  • Creation of new press releases based on the case studies enabled what Wadsworth calls “a rolling thunder kind of approach.”
  • Official launch at the International Broadcasting Conference (IBC) fulfilled the three rules of real estate: location, location, and I forget the third one.

Superb Internet: The customers are Right

Well, that doesn’t make any sense at all. That Limelight is obviously a terrible content delivery network company. No, they are certainly adding interesting and compelling data to the conversation. Why choose Superb for your CDN, then?

  • 172 points of presence in 113 cities across the globe
  • 100% network uptime SLA and 24/7 expert monitoring
  • Customers love us: “As always, you folks are the best!!!” – Ken Webster.

Check out the world’s best CDN today!

By Kent Roberts

Despite Considerable Kool-Aid Consumption, Security Heads for the Cloud

  • Cloud
  • General
  • Security
  • Software

Kool Aid Man

This article looks at cloud as the final frontier for security, exploring the topic as follows:

  • CSO: 5 Ways Security Solutions Will Change
  • Change #1 – Web as Network Perimeter
  • Change #2 – SaaS Beats Out Endpoint Solutions: Swig of Kool-Aid
  • Change #3 – Integration of Network and Endpoint Protection
  • Change #4 – Transition from Alerts to Smart Use of Data
  • Change #5 – Internet of Things Will Use Cloud Protections as Its Basis
  • Superb Internet: Audited and Certified

CSO: 5 Ways Security Solutions Will Change

Security isn’t running away from the cloud but moving toward it. After all, the third platform (cloud, social, big data, and mobile) is where the action is.

That’s the thrust of a message by Paul Lipman of iSheriff, who wrote in CSO magazine last week that the standard methods businesses have used for security in the past are “insufficient for modern businesses.” While the third platform continues to build and overtake the second platform (personal computers) as the primary means through which the Internet is used, across-the-board security systems can help companies to streamline their operations and scale effectively.

Lipman argues that the current, highly disruptive state of technology – led by red-hot segments such as cloud computing, the Internet of Things, and data analytics – is prompting security professionals to come up with innovative means to protect the enterprise. Whitman argues that five major shifts will occur in the security world in response to the turbulently competitive, increasingly virtualized environment:

Change #1 – Web as Network Perimeter

Even just in the recent past, security officials at companies were concerned with preventing unauthorized intrusion into the network, accomplishing that goal through a variety of in-house applications and hardware. That worked fine when everything was contained within the enterprise’s firewall – which of course is not the case anymore.

Now, the chief information security officer (CISO) grapples with a bring-your-own-device (BYOB) environment in which employees tap into corporate apps based in the public cloud through their cell phones and tablets. The result? Says Lipman, “The potential attack surface has expanded from the corporate network perimeter – which was challenging enough to protect – to encompassing a completely unbounded environment.”

One area that has been growing as a result is cloud-based security, Security-as-a-Service. Three critical notes related to that approach:

  • It means the company no longer needs to backhaul traffic.
  • It creates a consistent umbrella of security that is ultimately managed by the CISO and adapts reasonably to the parameters of user privileges, network of access, and applications.
  • It positions the organization on “high ground,” with lightning-fast real-time monitoring.

Change #2 – SaaS Beats Out Endpoint Solutions

Okay, so let’s get real here. This article is written by a guy who is the CEO of a cloud security company, so it’s not all that surprising that he projects a bright future for his business. Yummy, that Kool-Aid is good! What is it, grape? Well, you call it cherry. I call it grape. We agree to disagree. Life isn’t about getting it right.

Nonetheless, Lipman does have a strong argument in terms of the challenge of integration of multiple endpoint products. The differentiation of security applications throughout the enterprise creates gaps, which means that the CISO’s experience becomes foggy: they can’t see everything. Cloud security could better fuse together the system and, surprisingly, improve clarity.

Change #3 – Integration of Network and EndpointProtection

Up to this point, security companies have created two different types of products for two different audiences: network solutions and endpoint solutions. That approach doesn’t cut it in the current threat environment: “The network layer [needs] to become aware of, and responsive to, endpoint device activity both on-network and off-network.”

What if a handful of PCs at one of your company’s locations start shooting out packets of information to a possibly criminal IP address in Russia? You can stop it immediately if your system is properly integrated, forming a web of protection that Lipman compares to the body’s connective tissue, fascia.

Change #4 – Transition from Alerts to Smart Use of Data

You don’t want to rely on fire alarms. You want predictive analysis that can prevent fires before they start. Hence, we move from alert systems to intelligent security.

When we pull all the elements of security together into one unified front, we can look at interactions and potential aberrations within the intranet, endpoint hardware, SaaS and cloud virtual machine environments, and the overall Web – creating a comprehensive strategy that is “impossible with today’s organizationally silo’d, event-driven approaches.”

Change #5 – Internet of Things Will Use Cloud Protections as Its Basis

The advancement of the Internet of Things is unlikely without security organized and delivered through the cloud. Whether iSheriff represents the best possible platform or not, many commentators have noted that the Internet of Things is at this point highly questionable due to the ridiculous lack of security exhibited by many devices. Along those lines, Lipman makes a sound point: many connected appliances have low processing capabilities, so it would be “impossible or prohibitively expensive” to enable security at the level of the device.

Superb Internet: Audited and Certified

Everyone knows that you need to set up your public cloud environment to optimize your security. That should be a no-brainer. It’s the reason why private and hybrid clouds are becoming so popular: speed, reliability, and enhanced protection as needed.

Still, don’t trust anyone with your cloud infrastructure. Superb Internet is audited and certified to meet three internationally recognized standards. Plus, we won’t waste your time. As our customer Howard Barr said, “I use three other hosting companies, and none of them are as efficient as Superb.”

Try out our Cost Estimator today.

By Kent Roberts

Image Credit: Licensed for Free Use via Flickr