Journey through Enterprise IT Services
In Journey through Enterprise IT Services, Nadhan, HP Distinguished Technologist, explores the IT Services industry, and discusses technology trends in simplified terms.

Protecting your enterprise against “Adversaries ‘R’ Us”

A federal indictment from the United States Attorney's Office charges five men with conspiring in a worldwide hacking and data breach scheme to steal more than 160 million credit card numbers (a scheme akin to a global enterprise) with a strategy to fraudulently get to the most valued asset — information. Legitimate enterprises must stay up-to-date on various concepts, techniques and tools required to proactively safeguard their enterprises against such schemes, which can be loosely labeled as “Adversaries ‘R’ Us.” The sessions at HP Protect 2013 offer a diverse array of topics to that end. Here are some of my picks in the context of this security breach — the largest such scheme ever prosecuted in the United States.

A New Style of IT is securely emerging in government clouds

Civilian agencies, the intelligence community, DoD, and their systems integrators are looking to capitalize on opportunities for efficiencies, reduced costs, and competitive advantage. So says the abstract for “1286 - HP's vision, strategy, and best practices for private, public, and cloud brokering in US federal IT environments,” a session by Henry Fleischmann, Chief Technologist for Federal Cloud Solutions, HP at HP Protect 2013. This session details the cloud journeys taken by enterprises, calling out its application, architecture, and the evolution and deployment of services. Moreover, the session also addresses the shift from a product-centric approach toward a service-centric private and hybrid cloud model. A New Style of IT is emerging in government-based cloud computing.

Search
Showing results for 
Search instead for 
Do you mean 
Follow Us


About the Author(s)
Labels
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation