Cloud migration


  • August 26, 2015 26 Aug'15

    Containers and integration on VMware cloud wish list

    VMware's cloud strategy has its fair share of critics, but the company could change perceptions on hybrid cloud during VMworld with key improvements.

  • August 26, 2015 26 Aug'15

    Hosted IP telephony market reaching mass adoption

    More organizations are deploying hosted IP telephony and UCC services to reap the benefits of the cloud, according to a report from Frost & Sullivan.

  • August 18, 2015 18 Aug'15

    Office 365 roadmap signs point to collaboration

    Office 365's new features encourage workplace collaboration with upgrades to file sharing in email and telephony services.

  • August 17, 2015 17 Aug'15

    Hybrid cloud management tool uses vCenter as a door to AWS, Azure

    A new hybrid cloud management tool offers a single vCenter access point to administer and manage workloads between AWS, Azure and other clouds.

  • August 17, 2015 17 Aug'15

    Gartner Catalyst: Discussing cloud-first, legacy apps, cloud costs

    At Gartner Catalyst, Kyle Hilgendorf discusses why cloud-first doesn't mean cloud forever and how to best estimate monthly cloud expenses.

  • August 14, 2015 14 Aug'15

    Infor says GT Nexus acquisition positions it for next-generation ERP

    Analysts give Infor the thumbs-up on its acquisition of the cloud commerce vendor GT Nexus, saying it helps it compete with SAP and Oracle.

  • August 06, 2015 06 Aug'15

    Cloud encryption key management becomes table stakes

    Encryption key management has become table stakes for cloud vendors, but bringing your own key isn't always the right move.

  • August 04, 2015 04 Aug'15

    CompTIA ChannelCon 2015: Transform customer tech slowly

    At CompTIA ChannelCon, partners reflected on how to best transition their customers to cloud, mobile and social. Are partners standing in the way?

  • August 04, 2015 04 Aug'15

    Is third-party vendor management the next IAM frontier?

    Identity and access management deployments are notoriously complex. And things are getting worse as legacy technology meets next-generation applications. As the traditional network perimeter continues to disappear, robust IAM becomes more important as a layer of defense to protect sensitive corporate data from the threats posed by third-party vendors. In this issue of Information Security magazine, we evaluate the controls that can help protect data as it becomes more widely accessible. Today's IAM programs manage a far wider range of user types and access points. Bring your own device, cloud computing, and the rapid spread of distributed applications and data have all added to the security challenges.

    In this issue, we also look at enterprise mobility strategies. As more companies embrace a mobile-first strategy, security programs increasingly provide some level of support for personally owned devices and apps. But enterprise mobility is a double-edged sword: Providing broad data access and communication capabilities for much of the workforce can introduce challenging security issues. More CIOs and CISOs are recognizing that coherent policies are the key to harnessing the benefits of bring your own device.

    Finally, cybersecurity skills shortages are widespread. The skills to combat advanced threats have outpaced those needed for conventional IT security. We look at strategies that may ease the pain as enterprises compete for a highly sought-after global workforce.

  • July 31, 2015 31 Jul'15

    Taking a multivendor approach to an OpenStack project

    Enterprises building an OpenStack private cloud often rely on a managed service provider for implementation. But sometimes, a single provider won't do.