Data Storage Today

CIO Today Network Sites:   Top Tech News  |   CIO Today   |   Mobile Tech Today   |   Data Storage Today
News & Information for Data Storage Professionals
Welcome to the new I.T.
One that streamlines service delivery
Learn how with new I.T. from BMC

Discover it here: www.bmc.com
Wednesday, April 23rd 
24/7/365 Network Uptime!
Trending Topics:   Security Heartbleed Big Data Cloud Computing Windows XP Data Centers OS X Mavericks
Home
Data Centers
Storage Solutions
Storage Networks
Data Storage Issues
Data Security
DST Press Releases
 
Free Newsletters
Top CIO News
 
Mobile Tech Today
 

Cloud Computing

Five IT Myths To Be Debunked in 2013

Five IT Myths To Be Debunked in 2013
December 14, 2012 11:07AM

Bookmark and Share
"It is cloud vendors -- not IT departments -- who are responsible for making the path to the cloud simple, safe and secure," said analyst Andrew Jaquith. "2013 is the year to start demanding more from your potential cloud providers, especially when it comes to convincing your executive team and board that it's time to make the move."

Your Next Generation Data Center Is Here! Vblock™ Systems: the world's most advanced converged infrastructure are built on the Cisco Unified Computing System with Intel® Xeon® processors. Vblock™ Systems deliver extraordinary time to market, ROI and TCO, and flexibility to meet your continually changing demands with 5X faster deployment, 96% less downtime, and 1/2 the cost. Click here to learn more.

With 2012 coming to a close, security analysts are beginning to offer predictions for the New Year. From cloud computing to BYOD, analysts are betting on what 2013 holds in store for IT departments.

Former Forrester analyst Andrew Jaquith, who is now CTO at Perimeter E-Security, talked to us about five myths he believes will be debunked in 2013. Four out of those five myths revolve around the cloud.

Myth One: Cloud Security

First of all, Jaquith points to the myth that security issues will remain the biggest obstacle to cloud adoption. It seems this drum has been beaten to death since the first mention of cloud computing. Jaquith is betting this myth will show itself to be false in 2013. In fact, he says it's simply not true.

"What remains the biggest obstacle to cloud adoption is the 'idea' that the cloud is not as secure as on-premise systems. In reality, the cloud has proven equally to more secure," he said. "It's analogous to keeping your money safely in a bank versus keeping it home under your mattress. Everyone knows a bank is a better, safer option. But when it comes to data, we haven't quite gotten there yet. It's all about perception versus reality."

Myth Two: Cloud Reliability

The second myth Jaquith points out also relates to the cloud. That myth suggests that the cloud is less reliable than on-premise solutions. Jaquith said despite the "fear, uncertainty and doubt" headlines that make their way into technology media, downtime of on-premise solutions continues to outpace the cloud.

"Cloud vendors commit to and generally meet a 99.9 percent uptime threshold as part of their SLA. But this level of service is not easily replicated by on-premise solutions," Jaquith said. "But outages do happen -- things do go wrong. And when they do, what's most important is transparency from the vendor -- in ongoing, truthful communication and in action when downtime occurs. This transparency is absolutely critical in building trust between customer and provider."

Myth Three: The BYOD Drain

"Bring your own device," otherwise known as BYOD, is a trend that consistently made headlines in 2012. One of the running themes is that BYOD is a major drain on IT resources. Jaquith disagrees.

"There's no doubt that BYOD is the hottest thing in IT -- and the revolution's got countless IT departments scrambling to establish corporate policies to keep pace," he said. "But contrary to popular belief -- and many panicky stories in the press -- BYOD management plans are much simpler and less resource-intensive than they're made out to be, if done right. This means applying holistic, yet sensible management and security policies that are grounded in the law and enforced through technology." (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:



 Cloud Computing
1. Microsoft, BMC Targeting VMware
2. High Court To Hear Aereo Dispute
3. IBM Adds Disaster Recovery to SoftLayer
4. VMware Rolls Out DR-as-a-Service
5. Red Hat Unveils OpenShift Marketplace




 Most Popular Articles
1. Intel Bets on Cloudera for Big Data Analytics
2. SAP HANA Data Warehouse App Gets Faster Analytics
3. Fast Seagate 6 TB Drive Offered for Enterprise Data Centers
4. California DMV Investigates Possible Security Breach
5. Resetting All Passwords Now May Be Worst Heartbleed Fix

Have an informed opinion on this story?
Send a Letter to the Editor.
We want to know what you think.
Send us your Feedback.

 Related Topics  Latest News & Special Reports

  Verizon Report Exposes Cyberthreats
  Samsung Data Center Catches Fire
  Heartbleed Exploit Could Cost Millions
  Michaels: Nearly 3M Cards Breached
  Malware Targets Facebook Users

 Technology Marketplace
Business Intelligence
Get real-time, cloud-based information services with Neustar.
 
Cloud Computing
Next Generation Data Center Is Here! Vblock™ Systems from VCE
 
Contact Centers
HP delivers the future of the contact center with HP Qfiniti 10.
 
Data Storage
Next Generation Data Center Is Here! Vblock™ Systems from VCE
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Enterprise Hardware
Barium Ferrite (BaFe) is the future of tape.
2.5" Enterprise-class SATA & SAS SSDs for server & storage applications
 
Hardware
Protect your network with APC Smart-UPS battery backup
 
Network Security
Protect your network with APC Smart-UPS battery backup
 

Network Security Spotlight
Verizon Data Breach Report Exposes Top Threats
Beyond Heartbleed, there are cyberthreats vying to take down enterprise networks, corrupt smartphones, and wreak havoc on businesses. Verizon is exposing these threats in a new report.
 
Where Do Web Sites Stand, Post-Heartbleed?
A security firm says the vast majority of Web sites have patched themselves to protect against the Heartbleed bug, but now there are questions raised on the reliability of open-source programs.
 
White House Updating Online Privacy Policy
A new Obama administration privacy policy explains how the government will gather the user data of online visitors to WhiteHouse.gov, mobile apps and social media sites, saying much is in the public domain.
 
Navigation
Data Storage Today
Home/Top News | Data Centers | Storage Solutions | Storage Networks | Data Storage Issues | Data Security | DST Press Releases
Also visit these Enterprise Technology Sites
Top Tech News | CIO Today | Mobile Tech Today | Data Storage Today

Services:
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About CIO Today Network | How To Contact Us | Article Reprints | Services for PR Pros (In partnership with NewsFactor) | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 Data Storage Today. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.