The 7 Biggest Risks Of Cloud Computing

Cloud computing is rapidly transforming the IT landscape, and the conversation around adopting cloud technology has progressed from “if” to “when.” Enterprises are showing strong interest in outsourced (“public”) cloud offerings that can help them reduce costs and increase business agility. These cloud services offer enormous economic benefits, but they also pose significant potential risks… Continue reading The 7 Biggest Risks Of Cloud Computing

Cloud-based IT security benchmarking solution now supports all vulnerability management products

nCircle, the leader in automated security and compliance auditing solutions, today announced the addition of native support in nCircle Benchmark for Tenable Nessus, a commonly used open source vulnerability assessment product with over five million downloads. With the addition of the Tenable Nessus data adapter, nCircle Benchmark now supports all of the most common vulnerability… Continue reading Cloud-based IT security benchmarking solution now supports all vulnerability management products

PCI DSS 2.0 Compliant Clouds Reference Architecture Updated By Industry Leaders

HyTrust, Inc., the leader in access control and policy management for virtualization infrastructure, today announced the publication of a newly updated reference architecture for Payment Card Industry Data Security Standard (PCI DSS) 2.0 compliant clouds. This based upon new requirements that must be met by a January 1, 2012 deadline. Industry leaders HyTrust, VMware, Savvis,… Continue reading PCI DSS 2.0 Compliant Clouds Reference Architecture Updated By Industry Leaders

Secure Mobile Workstyles Driving Desktop Virtualization Demand, Survey Shows

According to a new global market study commissioned by Citrix, securing the explosive growth of mobile workstyles is on pace to drive a significant spike in demand for desktop virtualization over the next two years. Fifty-five percent of companies surveyed expect to roll out new desktop virtualization deployments for the first time by 2013, with… Continue reading Secure Mobile Workstyles Driving Desktop Virtualization Demand, Survey Shows

Industry’s First Strong Authentication Solution Delivered for PCoIP Zero Clients

Teradici, the developer of the innovative PC-over-IP® (PCoIP®) protocol that enables a true PC experience for desktop virtualization, and Imprivata, the leader in access management for healthcare, today announced the availability of a joint solution that delivers strong authentication as well as single sign-on access from PCoIP zero clients. The solution, which combines Teradici PCoIP®… Continue reading Industry’s First Strong Authentication Solution Delivered for PCoIP Zero Clients

Fabasoft Brings Secure Cloud Identity to Austria

Folio Cloud, Fabasoft’s European business Cloud opens up boundless new possibilities for secure collaboration with business partners in the Cloud via Cloud login using the Austrian citizen card with mobile signature. “Cloud computing represents a challenge for IT security – with the login using mobile signature, users benefit from the most secure identification currently available… Continue reading Fabasoft Brings Secure Cloud Identity to Austria

McAfee Highlights Discrepancy Between Data Center Security Perceptions and Reality

McAfee released the results of a survey conducted by Gabriel Consulting Group (GCG), an independent analyst firm, showing a serious disconnect between security perceptions and reality among IT Enterprise security managers. The 2011 Data Center Security Survey focused on security issues and solutions among 147 enterprise data center mangers responsible for data centers of all… Continue reading McAfee Highlights Discrepancy Between Data Center Security Perceptions and Reality