Is It Safe to Store Your Data in the Cloud?

first_imgIn the late ‘90s, when consumer internet was relatively new, there was a controversy swirling around online commerce: is it safe to use your credit card online? Fast forward to today. Online commerce is ubiquitous, and one of the largest credit card breaches to date recently occurred in Target’s brick and mortar stores. Now with enterprise cloud computing, there’s another controversy swirling: is it safe to store your data in the cloud?As a provider of EMC cloud services—including Mozy and Spanning—and in working to tier our on-premises storage products to an EMC object service, I’m often asked this question. The answer depends upon the level of security deployed by the cloud service.By federating identity and authentication with employees’ corporate authentication service, IT can make access to these services more convenient and more secure. Data should be encrypted in transit and at rest, and customers should have an option to use their own encryption keys. To validate that the data arriving in the cloud is exactly the same as from the point of origin, the service should apply a payload integrity validation check, which safeguards against corruption in transit. And a solid role-based access schema will ensure authorized users can only perform their intended duties. Finally, to respect data sovereignty laws, the service should provide geographical data residency options.Physical access to the data center must be strictly controlled at building entrances by a professional security staff who enforce visitor policies. But even more important is cyber hardening of the perimeter, hosts, and applications. Even one security hole in the perimeter could be exploited to gain access through the intended boundary, allowing access to the high-value servers and data. Steps like ongoing vulnerability monitoring and solid patching practices are essential. Access management is also crucial, and increased security measures for legitimate administrators go a long way in preventing password hacks.The next step in prevention is early detection. Active monitoring provides an ideal air cushion in the event a flaw is exploited. Tools, such as RSA Security Analytics, provide alerts from both unexpected log activity and indicators of compromise within the active network traffic flow. And, in case the worst happens, the service needs an incident response and containment team available 24/7.How does one know that a service is taking these measures? There are self-certification attestations, such as assuming responsibility as a Business Associate under HIPAA. There are also independently certified attestations, such as SOC I or 2 Type 2, ISO 27001:2013, just to name a couple.When it comes to security there are no absolutes, but with the right features, operations and compliance in place, a cloud service can provide the same or even better protection than some on-premises data protection options.last_img read more

#82: Dell EMC World 2017 Preview

first_imgDell EMC The Source Podcast Episode #82: Dell EMC World PreviewIt is time to realize your digital future; Dell EMC World is only 10 days away, May 8-11th, Las Vegas. This is the first-time Dell Technologies family of brands will be in one place, at the same conference. This is your opportunity to discover the products, strategies and insights you need to transform your business: drive IT innovation, enhance workforce mobility and reduce risk in the digital era.Be sure to follow #DellEMCWorld and catch the Keynote sessions live at Keynotes include: Michael Dell: Realize your Digital Future. Jeff Clarke & Pat Gelsinger: Realize Transformation and Episode 2 of The Dark IT Knight Rises: Realize the Power of Transformation with Jeremy Burton.Over 350 Technology Breakout Sessions, including Code/Modern Ops, Technology and IT Leadership all focused on helping you on your transformational journey.   Not to mention the Global Partner Summit, vLabs, Certification and much, much more.   Dell EMC World 2017 has it all.I sat down with Greg McCarthy (@GMcCarthy24), part of the Dell Social Business Team to preview all the details.   See you at DEW!The Source Podcast: Episode #82: Dell EMC World 2017 PreviewAudio Player Up/Down Arrow keys to increase or decrease volume.Don’t miss “Dell EMC The Source” app in the App Store. Be sure to subscribe to Dell EMC The Source Podcast on iTunes, Stitcher Radio or Google Play and visit the official blog at thesourceblog.emc.comEMC: The Source Podcast is hosted By Sam Marraccini (@SamMarraccini)last_img read more

Implementing Database-as-a-Service Offering with Microsoft SQL Server

first_imgIn 1988, Microsoft changed the landscape for database implementations through the introduction of the first release of Microsoft SQL Server. This product enabled businesses of all sizes to have access to robust database features fully integrated into a Microsoft ecosystem.MS SQL Server has evolved through the years, with the current SQL Server 2019 as the 15th official major version of the product. The modern Microsoft SQL Server rivals, and in many cases exceeds, the capabilities of even the most advanced versions of Oracle, DB2, and other mainstream enterprise class relational database engines. However, many Cloud Service Providers (CSPs) and their customers have been slow to keep up with the latest versions of Microsoft SQL Server – with over 50 percent still running SQL Server 2008 and below (a 12-year-old product!).For CSPs working with Dell Technologies, there is a massive $3.6B opportunity to help customers with their digital transformation by migrating to the latest version and leveraging some of the next generation capabilities such as AI/ML, Kubernetes, and analytics. When combined with the latest Dell Technologies platforms, such as VxRail, PowerStore, PowerFlex or PowerOne, the benefits of scalability, performance, reduced TCO, and reliability of SQL Server implementations become even easier when implemented through a CSP.Dell Technologies has a robust relationship with CSPs and continues to work with Microsoft and our partners to design and build solutions specifically to drive enterprise business and support the workloads which the market demands. Dell Technologies provides the optimal platform to host SQL Server 2019, and we are committed to supporting our CSP partners by providing the validated designs necessary to accelerate the adoption and implementation of the latest version of SQL Server.Through our Database-as-a-Service Validated Design, we provide the blueprint and enablement artifacts to drive rapid implementation of a new Database-as-a-Service offering by a CSP, or an upgrade to the current version. Through this upgrade path, a CSP can address significant market drivers including:Security: SQL 2019 is much more secure than 2008 and Microsoft no longer sends out security updates leaving customers and the CSP environment vulnerable to malware unless they pay for extended supportCompliance: Failure to keep SQL Server up to date can be a violation of regulatory compliance which can result in fines, penalties and leave the CSP and customer open to litigation in the event of an incidentAging Platform: Many customers are running SQL on older hardware platforms that can’t full exploit the power of SQL Server 2019Microsoft Support: Extended Security Updates support plan is very expensive (75%), making a move to SQL 2019 financially attractiveEmbrace Hybrid/Private Cloud: For many customers, this architecture is preferred to control costs and improve agilityLower costs through consolidation: On average, customers will see a 3:1 reductionGlobally, demand for CSP hosted SQL Server through Database-as-a-Service will continue to grow – and CSPs which implement these updated capabilities will benefit from this market opportunity.Dell Technologies Service Provider and Telco Transformation Team is here to help co-develop and implement a Database-as-a-Service offering with our CSP partners based on this Validated Design and customized for the specific needs of each CSP. This solution includes the essential information and documentation to accelerate Go-To-Market across all customer segments include partner and customer ready materials, battlecards, technical overviews and training.Contact Dell Technologies today for more information ([email protected])Visit Database as a Service Microsoft SQL Server Solution Knowledge Centerlast_img read more

Lawmakers debate bill to rout out radical Islam in France

first_imgPARIS (AP) — French lawmakers are tackling a bill they hope will uproot radical Islam in France. Authorities say such beliefs are creeping into public services, associations, some schools and online with the goal of undermining national values. The interior minister said the measures are aimed at stopping a ‘hostile takeover’ of Islam. The controversial bill is guaranteed heated debate. It reflects a priority for President Emmanuel Macron, who in an October speech painted a dark picture of a perverse version of Islam, France’s No. 2 religion, quietly creating a “counter society.”  Some Muslims feel stigmatized by the bill. Other religions have also been critical of the proposed law.last_img

Pivotal election figure leaving job under an unrelated cloud

first_imgHARRISBURG, Pa. (AP) — Pennsylvania’s elections chief isn’t saying whether Gov. Tom Wolf asked for her resignation, but she says the buck stops with her. Secretary of State Kathy Boockvar is leaving this week after it surfaced that her agency failed to properly handle an advertising requirement for a proposed constitutional amendment. That mistake means a delay of two years for victims of childhood sexual abuse who want to file otherwise outdated civil lawsuits. Boockvar spent the past year helping counties implement a new law that let anyone vote by mail, along with other changes. She also certified the election results that helped Joe Biden defeat Donald Trump in the presidential contest.last_img