How to Secure the Cloud with Symantec O3

How to Secure the Cloud with Symantec O3

A recent blog post by Softchoice security expert Stephen Perciballi outlines the challenges faced by organizations that use third-party services to store their data. He points out that while it’s not unusual for companies to spend thousands, or even millions of dollars securing their corporate data center, a single critical file saved by an employee to a less-than-secure consumer Cloud solution circumvents it all.

IT managers are well aware of this risk and worry about hackers getting hold of user login credentials, and the potential for viruses, Trojans and malware to infiltrate sensitive corporate information. In the worst-case scenario, these propagate right up to the server level in a DDoS attack – to bring it all down.

The fact is users enjoy the collaboration and productivity third-party Cloud SaaS apps provide. And all they need is a credit card to access an app like Yammer from the office, cottage, or coffee shop. This puts IT Managers in a bit of a quandary. Do they take the unpopular but safe approach and block Cloud SaaS apps altogether? And is that even possible? Or, do they accept these changing times – and a changing workforce – and work with users to make access to third party Cloud SaaS apps secure?

[Read more…]

IBM’s Frank Morassutti on Server Virtualization’s Spread into the Data Center

IBM’s Frank Morassutti On Sever Virtualization’s Spread Into The Data Center

IBM’s Top Gun Frank Morassutti recently visited Softchoice, and we had a chance to sit down with him and discuss the data center trends, server commoditization, server virtualization and how IBM’s System X solution fits into the picture.

[Read more…]

Cloud-Based Security (SaaS) Is The Next Generation of Defense [McAfee]

 It’s such a familiar story these days. Businesses facing budget tradeoffs find themselves looking for ways to defer costs, cut costs and squeeze value wherever they can. And when they do, they often risk creating greater headaches down the road.

While it may sound cliché, it’s also the reality we live in. And nowhere is that reality confronting decision makers and raising more red flags than on the security front. Whether you’re an IT manager or security specialist, you’re likely evaluating what security solutions to buy, how to implement them and how to manage them, all while the black cloud of malware, spyware, spam and other intrusions and vulnerabilities hangs over your head.

[Read more…]