Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity
    • Mobile
    • Storage

    Design for Your Fears

    By
    Chris Preimesberger
    -
    June 27, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Design for Your Fears

      1

      Embrace, do not fear, rapidly evolving computing realities. The typical IT design for the cloud considers that the exceptions of yesterday’s business world have become the assumptions of today’s world. Personal productivity devices in the workplace, combined with the security threats and attack tactics associated with them, must be balanced with the business imperatives for agility, compliance and innovation. By designing for your fears, bring your own computing (BYO) and the cloud achieve the synergistic goal of optimizing productivity and security while empowering both workers and IT. One of the first fears to get over is consumerization.

      2Embrace Consumerization

      2

      Remember that consumer technologies gave us our first real glimpse of computing’s future. Furthermore, social media, when used effectively, leads to a higher level of collaboration. Gesturing and kinetics lead to “immersive computing.” And we’re seeing early signs of this megatrend leading to the eventual “humanization of computing.”

      3Make IT Personal

      3

      Remember that BYO is more than a device; BYO embodies personal choice over the entire computing environment. The computing experience for the cloud era is custom-tailored to the individual. It is no longer one-size-fits-all. By making IT personal, the use of devices, applications, data and even the security experience can be fit-to-purpose and therefore be more relevant to business. Keep BYO personal by keeping sensitive enterprise data off unmanaged consumer-grade BYO devices.

      4Refocus on Networking

      4

      With services moving to the cloud and people connecting to applications and data, networking infrastructure is more important than ever. Today’s networks are required to be high-speed, highly redundant, resilient and secured against compromise. Cloud computing and virtualization requirements also demand that networks are portable. To maximize this portability, take the network out of the guests and hosts using network isolation through virtual services.

      5Refactor Access

      5

      To advance security for the cloud era, it is imperative to refactor access to more than a simple yes/no and who/what is banned from the network. These effective access decisions must be made using the 5 W’s of access: Who, what, when, where and why. Or, in other words: Identities + Devices + Situations + Locations + Usage Cases. Systems, networks, applications and services must integrate the expression of user, device, session and data control attributes to effect the proper access decisions. Using who, what, when, where and why for access allows more control over complex data relationships.

      6Define Relationships

      6

      By viewing networking as relationships, networks can evolve to meet the demands of the cloud era. Cloud era networks are social, federated and service-enabled. Granular access is integrated. BYO is a given. Single sign on, security optimization, branch services and follow-me-data are essential for optimal productivity. Thinking in terms of relationships is also transformational for security.

      7Virtualize to Secure

      7

      Virtualization is a tailoring of computing to business needs, opportunities and innovations. This evolution is driving slow incremental changes to existing applications and processes while enabling wild innovation for those who start anew—especially for those who transform security through virtualization. Effective virtualization security protects mobility, collaboration and social computing through isolation of sensitive resources. BYO cannot be effectively secured without virtualization.

      8Presume Multitenancy

      8

      Multitenant is an ownership, management and security model, and it’s the new reality in the world of cloud computing and BYO. A proven multitenant design is essential to proving compliance and privacy in clouds and other shared-ownership models. Designing for multitenancy to protect administrative, tenant and external services from each other is a must today. Good fences make for good neighbors.

      9Own Your Own

      9

      The need to manage the device is one of the first requests from IT, but it is no longer always desirable or necessary. With BYO, the worker owns the device. The organization needs to manage BYO access to sensitive data—and not manage the BYO device itself. Own what you manage, manage what you own. Own your own data. Own your own encryption. Today the question is, Do I really need to own devices, or just the sessions and data that will be utilized on them?

      10In Cloud We Trust

      10

      More than the simple measures of security, the ultimate goal of the cloud is trust. Cloud trust is built on the principles of security, privacy, transparency and accountability. From architecture to audit, as the cloud is increasingly used for identity, trust services, trusted collaboration and other innovations— people, process and technology must support these core principles of trust.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×