| Featured Articles In a world where Microsoft is the dominate player in the software space, it's hard to believe the company would think about a different approach to the market. While software licensing is where the profit dollars exist, the cloud is where opportunities lie in the future. As such, the software giant is transitioning to the cloud in a big way. AgilData CEO Dan Lynn's presentation on the main stage of Cloud Expo NYC starts off with a black and white video clip of Bruce Lee explaining the agility of water. He says with his indelible charm, "Water can flow or it can crash. Be water my friend." Ask any IT director what one of his or her biggest headaches is, and that individual will probably tell you that it's keeping track of software licenses. Vendors today license in a variety of different ways, so a single organization may be trying to keep track of licenses that are per user, per device, per core, per memory or even unlimited. Vendors say the complexity is necessary if they're to provide users with the flexibility they want. Just as the French discipline of parkour identifies the most efficient route from point A to point B, Tel Aviv based network security company Tufin automates secure application connectivity over an enterprise network. And like parkour-the subject of viral Internet videos of athletes scaling skyscraper facades and hopping between rooftops-the idea, in theory at least, is to do this as safely as possible. For most of us, threats to our computer systems come from the outside in. We're concerned about viruses, about malware, about distributed denial of service (DDoS) attacks that can cripple our systems without proper vigilance. But what we don't commonly consider is the attack that comes from the inside, and a new report from Crowd Research Partners suggests that this may actually be an even bigger threat to our systems' way of life. Face the facts: at some point, sooner or later, your system will be breached. It's no longer a question of "if", but rather "when". Why? It has to do with the very nature of the Internet itself, the increasing complexity of our connections, and a growing web of software and hardware that daily adds openings into the silos we expect to be interconnected and secured all at once. Top Stories TMCnet Free Premium Content | | | Advertise With Us | | Become a TMCnet columnist! Become a TMCnet columnist! Want to contribute your expertise to a growing audience of technology professionals? Become a writer, blogger or columnist for the TMCnet Web site and this newsletter. Contact TMCnet Group Editorial Director, Erik Linask, at elinask@tmcnet.com for details. | | |
Tidak ada komentar:
Posting Komentar