Total Members: 4898

This community is proudly sponsored by :

Cloud Service Community Blogs

Let's hear what you have to say...

Fighting Back Against Shadow IT: Part 3

Help your customers embrace cloud services to serve business stakeholders In Parts 1 and 2, we outlined the steps involved for you to help customers reduce their shadow IT and position yourself as a cloud services thought leader. In part 3, we discuss how you can work with the business units to understand their unique needs as well as empower development within both IT teams and business units. Work with Business Units to Understand Unique Needs In fighting back against shadow IT, it is vital that you create a process where the IT organization remains aware of applications and the handling...
Continue reading
1888 Hits

Fighting Back Against Shadow IT: Part 2

Help your customers embrace cloud services to serve business stakeholders In Part 1 we outlined how the rise of shadow IT affects both your customer’s and your business. You can help customers assess the situation to determine the extent of its use inside their companies and position yourself as a trusted cloud advisor. In Part 2 we will examine how to help customers identify mission-critical applications and which to host in the cloud. Identify Your Customer’s Mission-Critical Applications The second step in controlling this cloud-driven onslaught of shadow IT starts with helping your customer identify and acknowledge those applications and processes...
Continue reading
418 Hits

Fighting Back Against Shadow IT: Part 1

Help your customers embrace cloud services to serve business stakeholders Introduction The term Shadow IT describes the use of IT systems, software or other solutions used inside an organization without knowledge or approval by the IT organization1[CG1]  This situation is arising because of the changing technology and services landscape. Business users are avoiding formal IT processes and procedures because their demand for technology to achieve business outcomes is outstripping an IT organization’s capacity to supply. Today, shadow IT may manifest itself through unauthorized applications, the storing and transferring of sensitive data outside of a secure network, or the spinning up of...
Continue reading
658 Hits

Top Ten Commandments for Disaster Recovery Planning

Sungard Availability Services (Sungard AS) invented the concept of disaster recovery, defining and refining what the industry now knows as IT disaster resilience. After more than 30 years of delivering world-class disaster recovery (DR) services, we’ve boiled down what we’ve learned into 10 clear-cut rules for DR that every one of you should live by to ensure that customers’ have fully-recoverable production environments. Do you follow the 10 laws for disaster recovery when advising customers?  Don’t confuse backups with data recovery. Remind customers that having a copy of their data stored offsite is the only first step to data recovery. They also...
Continue reading
638 Hits

Cyber-threats in 2016: Evolution, Potential & Overcoming Them pt 3

previewThe Dummy Malware Prevention Strategy for Everyone: Stay Awake! Cybercrimes breed when business environments are not prepared for illicit intrusions. Vintage anti-virus versions, unstructured BYOD culture, confusing cyber-security policies, multiple unauthorized users and lack of security training add up to losing critical enterprise data. Latency in preparing for emerging malware threats means a slow response, leveraging malware with more time to make inroads into your data silos. We recommend being proactive: Immediately report any irregularity in your data access paths or sharing platforms. Report any unwarranted network activity like new browsers, new toolbars, or search engines leading to suspicious webpages. Any...
Continue reading
346 Hits