Showing posts with label Cloud computing. Show all posts
Showing posts with label Cloud computing. Show all posts

Wednesday, 10 August 2011

Organizations should Review the Privacy Policies as soon as possible: Report

Up to half of all facilities according to a new report by Gartner in 2012 to review the privacy policies. The above reasons, the vulnerability in progress, new technologies and the emergence of regulations and changes and challenges in the amount of privacy.

At the same time, privacy is likely to remain low budget. Develop appropriate privacy policies, those responsible for the privacy of open communication within the organization and external regulators. Organizations will be keeping an eye on the future of the Gartner has identified the top five privacy issues:
Security vulnerabilities

There are major privacy issue security breaches are still organizations. Gartner, mobile devices, data encryption, when transmitted over public networks to access, data encryption, restricting the storage of personal information, and advice sections of these organizations to encrypt data to protect users, administrators are given authority by unauthorized hackers. Tools for data loss, tokenization, management tools for masking data and privacy are encouraged to avoid.

Gartner, about 10% of the time, the authorities of privacy, "said the security breaches will be devoted to solving the problems of confidentiality.

Location services

GPS and other positioning tools, cell towers, the spread of wireless access points and IP addresses provides location information is now collected on an unprecedented scale. Large amounts of data collected by different service providers, there are serious privacy risks.

Privacy policies for location-based services, managers of private life of about 5-20% of their time to spend.

Cloud computing

Cloud computing is opening a Pandora's privacy policy. Although privacy laws to change the country aspires to be the same in all countries, public clouds. It is information taken out of the country because of export control and national security laws to prevent complicated.

However, most privacy laws, with some flexibility, and in most cases there are legal means. In addition, respect for confidentiality, privacy violations, except in some well known, does not require storage for the country. Privacy issues in cloud computing is likely to occupy 20-30% of the time an official of the isolation.
Difficult to define or measure the values ​​of privacy

Personal information is used only in the context, it becomes a privacy issue. The laws and regulations tend to lag behind technological change and cultural norms of what is right and wrong can not provide a clear answer.

The research firm for the design of business processes, rather than the privacy of parties after consultation recommends that these agents. The process was created, 10% more than the time should be devoted to monitoring the risks to privacy.
Amendments to Regulation

These smart meters, in a closed, face detection, presence detection of vehicles and equipment, body scanners, etc., and all databases using emerging technologies in tandem. It is a very specific information when a move or two points will be collected. Gartner predicts that the confidentiality rules and new laws are created to meet the new requirements.

However, Gartner also this privacy policy will not only suggest that the effect in the medium to long term. In the short term, businesses can continue to use existing laws to privacy in the development of policies. Monitoring regulatory changes and changes in the privacy policies of the organization, time privacy official is estimated at 50-10% coverage.

Carsten Casper, according to Gartner research director of the Privacy Officer "program when privacy is 15-50%, government relations, privacy, organizational management, comments must be devoted to the development implementation of applications, review of policies, documents, confidentiality agreements, legal advice, answer questions, training, monitoring and privacy surveillance program checks in terms of project. "

Saturday, 6 August 2011

Organized Retail Applications to help IT Professionals Cloud Applications Dispute

For all applications in-house, or even on the corporate network, end users can access from anywhere seems to be equivalent to the cloud. Professional’s in-house control in the same way that enterprise applications need a way to control access to applications in the cloud.

Application management and SaaS companies out there in the yard of the clouds a handful of platforms, applications and access to birth control, and provides a means. These platforms are also suitable for end users, and to all applications in one window and use a single connection to access.

The first version of the application of Horizon VMware IT professionals a way to manage access to applications and cloud-based applications that provide support facilities for future versions. Two small businesses - and the arc Centrix - have the same management portal applications hosted in the cloud.

Practice Manager VMware Horizonte

Northwest Evaluation Association (NWEA), Portland, Oregon, educational services to non-profit Horizon project last year received before MyOnelogin TriCipher using VMware. Now, employees and customers to access applications and services, practice tests, NWEA horizon.

Scott Gwartney, infrastructure architect NWEA, NWEA is proof of concept Horizon Manager Application and plans to begin production shortly. Sign in to the benefit of the organization, said the ability to consolidate a single user session for SaaS applications.

"In addition, the team delivered does not have to go on and on, so I included some of the internal applications," said Gwartney.

Application Manager Horizonte, and professionals considering a service provider platforms, cloud computing, such as for export, must weigh the risk of user names. NWEA is greater than the risk to reward.

"We are ensuring that not too many risks with internal teams to manage everything. Bradley with a leap of faith is still there, but, "Gwartney said." I never accepted names if the passwords required export. 'S and looking just mixed. "

During the test, NWEA uses five applications. Over time, Horizon Manager Application is accessed by 400 users of all applications on the NWEA, VA. Gwartney finally supported application servers, said he wanted.

Horizon Manager Application per user per year for an unlimited number of applications, $ 30.

Arrow to the management application of the clouds

Platform arc Inc. 's SaaS and more than 750 frequently used applications in-house applications that were released before, and so far supported the request Horizon Manager. Identity Management Services allow users to add applications as needed and includes a vehicle. Web-enabled intranet thing a name for the user, wiki, engineering tools, databases, SaaS applications, including testing and through OTKA manageable.

Horizon Manager Application, such as hosted platform bow in the cloud and cloud-based applications to authenticate users in Active Directory uses. VMware bow and say the data and directory services without compromising security or a security hole in the wall of the hook in place for all clients.

Some companies rely on Platform AppDynamics Arrow, WhitePages, and Drobo, Data Robotics Inc. sells storage devices, is a part. Tom EC Drobo Director, Arc offers 24 business applications and are used to provide users with a unique identifier.

"We have become the dominant SaaS business environment, end up with a few clicks and it is difficult to process all applications," said Ta. "We need to connect to consolidate and add a layer of security, and we see the accounts and give a simple way to delete accounts for enterprise applications."

When employees or contractors with access to what applications and established company policies regarding when to cut ties with the portal management application in the cloud and Ta can disable accounts.

Another advantage is that Drobo is a server in Active Directory, the directory of the server-side security of cloud platform uses a bow, so that if, in many places on the identity arrow Directory active support. Ta with the bow and did not experience interruptions do not have to manage the platform is an advantage, he said.

Multi-session version costs per user of $ 5 per month and the standard edition priced at $ 10 per user per month. Identity management services for 30 days access to the bow in line with the Standard Edition offers a free trial.

Centrix

UK Centrix WorkSpace Universal Software in May 2010 launched the so-called application management portal. All access to end users with a single session of physical servers and virtual office services and applications with cloud and provides a Web platform.

Universal work Workspace IQ, how to use the services actually work, which includes an end user computer analysis tool Centrix part of the package. WorkSpace Discovery is also used in the applications installed on PCs and laptops and which includes an analysis tool for companies that want to see.

The company, application management tool for companies with over 500 users and can be expanded to accommodate 50,000, he said. It cost about $ 35 per seat, and volume discounts are available. Centrix was unable to provide a reference customer.

Another option is the deployment of applications for the buyer of Citrix Systems, Inc. self-service platform. Unlike the cloud-based applications, platforms, buyers and IT professionals to manage a network device that supports both applications and cloud systems. Like the others, but also supports single sign-on applications, and provides Internet access to users in different connected devices.