How to Secure the Cloud with Symantec O3

How to Secure the Cloud with Symantec O3

A recent blog post by Softchoice security expert Stephen Perciballi outlines the challenges faced by organizations that use third-party services to store their data. He points out that while it’s not unusual for companies to spend thousands, or even millions of dollars securing their corporate data center, a single critical file saved by an employee to a less-than-secure consumer Cloud solution circumvents it all.

IT managers are well aware of this risk and worry about hackers getting hold of user login credentials, and the potential for viruses, Trojans and malware to infiltrate sensitive corporate information. In the worst-case scenario, these propagate right up to the server level in a DDoS attack – to bring it all down.

The fact is users enjoy the collaboration and productivity third-party Cloud SaaS apps provide. And all they need is a credit card to access an app like Yammer from the office, cottage, or coffee shop. This puts IT Managers in a bit of a quandary. Do they take the unpopular but safe approach and block Cloud SaaS apps altogether? And is that even possible? Or, do they accept these changing times – and a changing workforce – and work with users to make access to third party Cloud SaaS apps secure?

[Read more...]

Four Things You Need to Do to Protect your VMs

Four Things You Need to Do to Protect your VMs

According to Frank Gens, IDC Senior VP & Chief Analyst at Trend Micro, the number one concern about cloud services is security.

As you know, physical firewalls don’t inspect or filter the vast amount of traffic that originates from a hypervisor running several virtualized servers. It turns out that this is a significant vulnerability when you consider that VMs start, stop, and move from one hypervisor to another at the click of a button.

Additionally, few hypervisors have the access controls that even the most basic file server has, and once someone gains access to the hypervisor, they could potentially access and control all of the VMs housed there.

Finally, protective features have to handle all these movements and activities, and agent backups are complex to manage — with one agent required per VM.

Even with the vulnerabilities clearly spelled out, many IT managers may still have “secure the hypervisor” way down on their to-do list – there are just so many priorities. That’s fine, of course – until the unthinkable happens.

So how should IT Managers protect VMs? Here are the four key things to consider:

[Read more...]

Blackberry 10: Unboxing, First Impressions & Technical Review (Video)

BlackBerry Unboxing

The new BlackBerry 10 has arrived!

Because Softchoice is part of the BlackBerry Technical Preview Program, we had exclusive access to the technology (handset and server software) before its official release, and I was able to spend a couple of weeks using the device. During that time, I had a chance to form some pretty strong impressions about the new smartphone.

Read on for my thoughts, as well as a bit of a technical deep-dive into the latest offering from Research In Motion. Watch my exclusive unboxing and hands-on review, and then read on for a bit of a deep dive into technical details that business users in particular will care about.

[Read more...]