January 18, 2013
Offers enterprises a simple way to evaluate IT potential and learn how to adopt cloud services
SEATTLE, Jan. 17 – The Cloud Security Alliance (CSA) recommends the Cloud Security Readiness Tool (CSRT), a free tool from Microsoft designed to help organizations review and understand their IT maturity level and their readiness to consider adopting or growing cloud services. The tool uses the Cloud Control Matrix (CCM) to consider data security, privacy, and reliability factors as well as key compliance and regulatory standards. The tool is a simple way to adopt Security, Trust, and Assurance Registry (STAR) and CCM principles.
The tool helps organizations evaluate their IT potential and learn how they can adopt cloud services to reduce the overall cost of their operation. Organizations that are considering cloud adoption are faced with common decision difficulties, most of which relates to a lack of understanding about cloud computing. Information from more than 800 organizations that have used the CSRT shows that only a few of them are well prepared for cloud adoption. For example, only 25 percent of organizations in the Banking and Financial sector have embraced a formalized security program. A CCM control validates whether an organization has an information security program. A tool like the CSRT helps organizations better understand the full potential of embracing the STAR and the CCM.
"Organizations are often at a loss when it comes to how to go about determining which cloud services may be of value and whether deploying cloud services are appropriate in their environment. We hope this tool becomes every organization's first step into the cloud," says John Howie, COO of the CSA.
The CSRT is an interactive, easy-to-use, 10-to-15 minute survey of 27 questions that draw out information about an organization's industry and the maturity level of the organization's current IT infrastructure. The tool uses this information to provide relevant guidance in a custom report that helps organizations better understand their IT capabilities and more easily evaluate cloud services against critical areas and compliance with common industry standards. The tool considers several security, privacy, and reliability topic areas, including security policies capabilities, personnel capabilities, physical security capabilities, privacy capabilities, asset and risk management capabilities, and reliability capabilities.
"Organizations are in varying degrees of readiness relative to capitalizing on the benefits of Cloud Computing. Anything that can help speed up those internal evaluations is a bonus. Customers have told us that they're easily understanding the state of their current IT environment relative to Cloud through using this Tool and are pleased we found a way to cut through the clutter." says Adrienne Hall, general manager, Trustworthy Computing, Microsoft. In addition to helping organizations understand their own capabilities, the CSRT helps them understand some important considerations of seeking a cloud service provider.
About Cloud Security Alliance
The Cloud Security Alliance is a not-for-profit organization with a mission to promote best practices for providing security assurance within cloud computing, and to provide education on the uses of cloud computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations, and other key stakeholders, including Microsoft. For further information, visit us at http://www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.
Source: Cloud Security Alliance
Frank Ding, engineering analysis & technical computing manager at Simpson Strong-Tie, discussed the advantages of utilizing the cloud for occasional scientific computing, identified the obstacles to doing so, and proposed workarounds to some of those obstacles.
The private industry least likely to adopt public cloud services for data storage are financial institutions. Holding the most sensitive and heavily-regulated of data types, personal financial information, banks and similar institutions are mostly moving towards private cloud services – and doing so at great cost.
In this week's hand-picked assortment, researchers explore the path to more energy-efficient cloud datacenters, investigate new frameworks and runtime environments that are compatible with Windows Azure, and design a uniﬁed programming model for diverse data-intensive cloud computing paradigms.
May 16, 2013 |
When it comes to cloud, long distances mean unacceptably high latencies. Researchers from the University of Bonn in Germany examined those latency issues of doing CFD modeling in the cloud by utilizing a common CFD and its utilization in HPC instance types including both CPU and GPU cores of Amazon EC2.
May 10, 2013 |
Australian visual effects company, Animal Logic, is considering a move to the public cloud.
May 10, 2013 |
Program provides cash awards up to $10,000 for the best open-source end-user applications deployed on 100G network.
May 08, 2013 |
For engineers looking to leverage high-performance computing, the accessibility of a cloud-based approach is a powerful draw, but there are costs that may not be readily apparent.
05/10/2013 | Cleversafe, Cray, DDN, NetApp, & Panasas | From Wall Street to Hollywood, drug discovery to homeland security, companies and organizations of all sizes and stripes are coming face to face with the challenges – and opportunities – afforded by Big Data. Before anyone can utilize these extraordinary data repositories, however, they must first harness and manage their data stores, and do so utilizing technologies that underscore affordability, security, and scalability.
04/02/2012 | AMD | Developers today are just beginning to explore the potential of heterogeneous computing, but the potential for this new paradigm is huge. This brief article reviews how the technology might impact a range of application development areas, including client experiences and cloud-based data management. As platforms like OpenCL continue to evolve, the benefits of heterogeneous computing will become even more accessible. Use this quick article to jump-start your own thinking on heterogeneous computing.