More article analytics
Application integration has always been a thorny problem. Add in the inherent design restrictions of software as a service--think islands, not exactly designed to exchange data--and things get even trickier.
Guidelines for evaluating SaaS and the public cloud, including a total cost of ownership calculator, to help you choose the best services for your organization.
Our 2011 cloud computing survey shows healthy growth in use of these services. But are IT teams neglecting their bread-and-butter fundamentals? In many cases, yes, and as services move from add-ons to part of the fabric of IT, that will cost us.
Information stored in SaaS apps is subject to e-discovery requirements. We help you prepare now—before a lawsuit hits—to ensure you can meet your legal obligations for data that lives off-premises.
Our 2011 respondents report a big jump in the number of agencies tapping into the cloud or planning to within 12 months. And their expanding options are no longer limited to public and private clouds.
Look for tension between customization and mass appeal as SaaS providers try to keep large customers happy while staying true to the multitenant model.
Infrastructure changes, customer satisfaction, process improvement, service-level achievement, performance management, cost reduction, security… Historically, these topics have dominated IT support managers’ day-to-day routines. Traditional IT service and technical support responsibilities and methodologies are on the edge of obsolescence.
We see security as a major stumbling block in enterprise migrations from IPv4 to IPv6. For starters, the code is mostly untested, and too few of our current network security products support IPv6, something the black hat community is banking on.
Data breaches cost U.S. companies $214 per compromised customer record last year, according to the Ponemon Institute. The average total per-incident cost in 2010 was $7.2 million. Beyond the tangible costs, brand damage can be significant as well, though it is hard to quantify.
Free Research and Reports
- Forrester Study: The Total Economic Impact of VMware View
- Securing Executives and Highly Sensitive Documents of Corporations Globally
- Operating in the Cloud with Confidence
- HP Datacenter Care: Enterprise-Wide Support For Business-Critical IT
- The BYOD Opportunity: Say "Yes" to Device Diversity and Enable New Ways to Drive Productivity
Dark Reading Digital Magazine
Quick Wins For Strengthening SMB Security
Time To Set Up That Honeypot
Securing Cisco IP Telephony
Attribution Is Much More Than A Source IP
New CA Group Has Big Names, Small Impact
How To Build An IT Security Budget
5 Approaches To Decaffeinating Java Exploits
Enterprise Vulnerabilities From DHS/US-CERT's National Vulnerability Database
Cross-site scripting (XSS) vulnerability in the Spacewalk service in SUSE Manager 1.2 for SUSE Linux Enterprise (SLE) 11 SP1 allows remote attackers to inject arbitrary web script or HTML via an image name.
zypp-refresh-wrapper in SUSE Zypper before 1.3.20 and 1.6.x before 1.6.166 allows local users to create files in arbitrary directories, or possibly have unspecified other impact, via a pathname in the ZYPP_LOCKFILE_ROOT environment variable.
LanItems.ycp in save_y2logs in yast2-network before 2.24.4 in SUSE YaST writes cleartext Wi-Fi credentials to the y2log log file, which allows context-dependent attackers to obtain sensitive information by reading the (1) WIRELESS_WPA_PASSWORD or (2) WIRELESS_CLIENT_KEY_PASSWORD field.
Race condition in sap_suse_cluster_connector before 1.0.0-0.8.1 in SUSE Linux Enterprise for SAP Applications 11 SP2 allows local users to have an unspecified impact via vectors related to a tmp/ directory.
yast2-add-on-creator in SUSE inst-source-utils 2008.11.26 before 2008.11.26-0.9.1 and 2012.9.13 before 2012.9.13-0.8.1 allows local users to gain privileges via a crafted (1) file name or (2) directory name.