There is an old saying, “the definition of insanity is to repeat the same thing over and over and expect a different result.” The way many enterprises are approaching the cloud, insanity would be a great way of classifying it. When we look across most enterprises, we see a collection of technologies from every era of computing. We have just about every vendor solution imaginable—often multiple versions of products from the same vendor—and a hodgepodge of architectures that makes spaghetti look organized.
It appears that VMware has been on quite the acquisition kick lately, first with the $1.3 billion acquisition of its Palo Alto neighbor Nicira in 2012, and now with its largest acquisition in company history: the $1.54 billion purchase of mobile management and security firm AirWatch. The AirWatch acquisition is aimed at tightening companies’ security and peace of mind, particularly with regard to the growing use of mobile devices for work, referred to as “bring your own device” (BYOD).
Tal Klein of Adallom joined us on the January 16 Virtualization Security Podcast to discuss Adallom’s approach to logging, auditing, and generally gaining visibility within most SaaS applications. Adallom solves two longstanding problems: how can we as tenants obtain appropriate tenant-only logs of actions within a SaaS application, and how do we determine abnormal behavior within a SaaS application? Before Adallom, we had to ask the SaaS provider for log information, and this process would take quite a while, or, if it was readily available, it was not in real-time. Continue reading Adallom: Visibility into Your SaaS Provider Instance
For over a year now, a large number of industry experts have been asking questions like “is PaaS becoming just a feature of IaaS?,” “is PaaS dying?,” “do you really need a PaaS?,” and “is PaaS dead?” This has raised great deal of passionate debate in Twitter-land and other social media outlets, although supporters of stand-alone PaaS solutions are mostly those who are employed by vendors of those solutions. Continue reading The War on PaaS
Privacy is defined many different ways, but however you define it, when it comes to how corporations use data your privacy becomes very important. What companies do with your data may at times seem like an invasion of your privacy, but in these cases, privacy has well-defined limitations in the eyes of the law. Will the Internet of Things (IoT) change the definition of privacy in the context of computing? Let us consider Google’s purchase of Nest. What could it have gained by this, other than to have one more IoT device within its family of products? Continue reading Privacy and the IoT
Over the holidays, I found myself facing a situation that is a microcosm of one that will confront many IT departments in the coming year. I was trying to decide whether to continue hosting my home lab on my own physical machines or to take the plunge and move to one of the big cloud-based providers, probably Microsoft Azure or Amazon Web Services.