Displaying articles for: 08-05-2012 - 08-11-2012
Centralized virtual desktops can help companies improve security and agility and tackle the bring-your-own-device challenge head on. But they can be tricky to deploy.
Part 5/Secure Federated Identity Management: Enable 5 Key Security Processes to Protect a Conv Cloud
Secure federated identity and access management is a fifth key process you should focus on to protect a converged cloud. In part six of a six-part blog series, an HP security and cloud computing expert describes the last step you can take in adapting your security approach for the cloud.
Most IT organizations have taken the first steps in the journey to cloud computing, but virtualization alone is not enough. The technology path is clear, but you’ll also need to pay close attention to people and processes to reach your cloud destination.
When it comes to consumerization of cloud services, the traditional service catalogs look nowhere near what a consumer would expect when buying a product or service. What does it take for a cloud consumer to press the “Buy Now” button and purchase your cloud services?
The ease, convenience and performance on the front end of a cloud solution require expertise and mature processes behind the scenes. Martin Yates shares his insights and experience on how to successfully manage a hybrid cloud engagement. (more…)