Casting Light on Shadow IT and ID

Watching vulnerability cracks in your network widen via unauthorized application usage. It happens every day. It’s not a new term or concept. You probably recognize that it’s happening within your own organization. Someone in sales or research or HR or some other department finds an application they think might help with their goals–and they download it without any approval from IT. Seems harmless enough, but the creation of this Shadow IT actually creates more problems and its up to the IT pro to wrangle them all in.

READ THE ENTIRE ARTICLE AT CLOUD ACCESS’ NEW BLOG SITE: HERE

The Genie, The Bottle and BYOD

Mobile and other personal devices further erasing network security perimeter…what’s an IT Guy to do?

Smartphones, tablets and other communication devices are becoming more and more prolific for a company to use. They’re easy, fast and convenient. But sometimes these devices pose unintentional threats to the overall security of an enterprise network. What steps can be taken to ensure a more secure platform and still let users use their BYOD tools?

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

 

In Cloud We Trust

It wasn’t too long ago the very thought of security in the cloud was a challenging barrier to adoption. How can you secure a thing so vaporous and intangible? It scared off a lot of companies (especially SMBs and midsized) that would have felt the immediate financial savings and productivity gains from the various applications and solutions that were deployed from this nebulous place called the cloud. That barrier is cracking.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

 

The Challenge of Herding Cats: Your SaaS Portfolio and Security

As SaaS portfolios grow, the cloud-based SSO offers a centralizing option

It’s obvious the rise of SaaS (software-as-a-service) has changed the game. The benefits of subscribing to a cloud-based application service are already well-known and documented: cost-efficiencies, speed, hands-off maintenance, etc… It’s no longer an emerging practice and, for most IT managers, has become an inextricable component of any go-forward IT network strategy. What this means is now there are dozens of new sign-ons per user from a variety of endpoints (including mobile and tablet). And if we are talking enterprise-wide deployments, this is can be as challenging as herding cats.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

Identity Management in the Cloud: A Matter of Function, Control, Cost

User identities are at the core of your business. Organizations need to manage access to corporate resources and systems to an ever changing flux of employees, consultants, partners, vendors, suppliers, and customers. And each has their own agenda in terms of the information they wish to access. Without an identity management framework, all any of these people need to do is knock on the door and the doorman will let them in. This issue is what is the best way to deploy and manage such and initiative. In that respect there are three points of comparison of whether the cloud or a more traditional deployment is best suited for an enterprise: functionality, control, and cost.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

If a tree falls in your network, does anybody hear?

Listening through white noise: separating log data from actionable events. The ability to employ situational awareness across all the silos of an enterprise creates the necessary context to break through the white noise of network traffic. The issue at hand is a network is pinged potentially millions of times a day. Most of it innocuous-the legitimate log on and off of employees, genuine transactions of data, etc… But what gets lost amidst all this “white noise,” are the red flags that indicate breaches or worse malicious activities.

READ THE ENTIRE ARTICLE AT THE NEW CLOUD ACCESS BLOG SITE: HERE

The Challenge of BYOD

Managing security in a mobile universe: Many organizations are now allowing employees to use their personally-owned devices for work purposes with the goal of achieving improved employee satisfaction and productivity. However, this comes at an IT price and can pose several challenges with ensuring security.  Users love the mobility and the immediacy of smart phones and tablets, but forget these devices are just hand-held computers prone to the same intrusions, attacks, viruses and risks as the computers used in the office.

READ THE ENTIRE ARTICLE ON THE NEW CLOUD ACCESS BLOG SITE: HERE