Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite!
  Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
  Learn More
 
 
  Network Security Software
Network Bandwidth Monitor Network Bandwidth Monitor
NBMonitor tracks Internet bandwidth usage (upload and downloads) and shows process names initiated network connections...
Network Hardware Inventory Software Network Hardware Inventory Software
Nsasoft Hardware Software Inventory is a powerful network inventory software for home, office and enterprise networks...
BlueAuditor Monitors Mobile Devices in Wireless Network BlueAuditor Monitors Mobile Devices in Wireless Network
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring mobile devices in a wireless network...
Network Access Monitoring Network Access Monitoring
ShareAlarmPro allows easily perform network shares and folder monitoring, block unwanted users attempting to access secured shares...
Network Shares Monitoring Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy...
NetworkSleuth Network File Search Utili NetworkSleuth Network File Search Utiliy
NetworkSleuth is a network file searching utility, that allows you to quickly locate files across a network....
Product Key Finder Product Key Finder
Product Key Explorer enables you to quickly recover over 3000 popular software product keys from network computers...
Backup Key Recovery Crashed Drive Keys Recovery Backup Key Recovery Crashed Drive Keys Recovery
Backup Key Recovery retrieves product keys for Windows, MS Office, SQL Server, Adobe products and more than 2500 popular software products...
 
 

Network Security News

Data center group issues cloud usage guidelines

June 7 2011

Users and vendors this week got a framework for implementing virtual data center and cloud computing environments from a group formed eight months ago to define such requirements.

The Open Data Center Alliance, an organization formed by large IT organizations late last year, unveiled its first deliverable: user-driven cloud usage "models" and data center requirements for use in RFIs and RFPs. The documents include eight usage models or guidelines that address what the organization believes are the most urgent issues involving cloud adoption today.

They also represent the first documented customer requirements for cloud, ODCA officials say. But those officials stressed that the models are also a guideline, not a mandate.

"It's a framework to see what's going on, not a 'you have to do it this way,'" says Andrew Feig, executive director on the technology advisory group with UBS' Global Technology Infrastructure Services, and an ODCA board member. "Without that transparency, we can't move forward."

The models address security, automation, management and policies, and transparency, or the ability to compare cloud offerings and standards-compliance.

Security includes two models: Provider Assurance and Compliance Monitoring. Provider Assurance helps ensure industry standard security levels across all cloud provider offerings. Compliance Monitoring recommends ways in which users can confirm standards compliance for security at any time, for any cloud.

The challenge in cloud security, according to the ODCA, is that there's a lack of consistent security delivery and management across enterprise and cloud services. New threats are emerging that target cloud transport, and more than 75% of respondents to a KPMG survey of IT professionals listed security as the chief concern for cloud computing, ODCA says.

Automation deals with Virtual Machine Interoperability and I/O Control models. It defines consistent VM deployment and management across any virtual environment - VMware, Microsoft, Citrix - and QoS guarantees across systems and networks in the data center and clouds.

The goal with these models is to simplify the delivery of dynamic and scalable cloud services and reduce the cost of deploying and operating a virtual machine (VM) infrastructure. Without this simplification, the cost of implementing VMs would be $2 billion between 2010 and 2014, according to ODCA, citing research from Intel and Bain Capital.

"There's not a lot of value to the different vendors' ways of managing VMs," Feig says.

Common Management and Policy includes one model called Regulatory Framework. It is intended as a guide for requirements and compliance management best practices for operational regulations the data centers and clouds may have to adhere to.

The challenge today is a lack of common management between cloud services and providers, and a complex regulatory environment that precludes consistent and uncomplicated management of regulatory compliance, ODCA officials say. And again citing data from KPMG, ODCA officials say most IT practitioners cite regulation as a primary obstacle to cloud deployment.

Transparency includes three models: Service Catalog, Standard Unit of Measurement and Carbon Footprint. Service Catalog enables users to compare cloud service features and price across clouds.

Standard Unit of Measurement allows users to measure cloud services based on industry standards; and Carbon Footprint recommends how cloud services can become "CO2 Aware."

Again, the rationale for these modes is the lack of a consistent standard framework for comparison of cloud service features, pricing and performance metrics.

The ODCA hopes that adoption of these models will ignite a potential $50 billion market in cloud services while saving IT $25 billion in spending over five years. The ODCA members represent $100 billion in IT spending, officials say.

"Our expectation is that you'll see the acceleration of cloud services as these models are adopted," says Marvin Wheeler, chief strategy officer at service provider Terremark, and chairman and secretary of the ODCA.

The alliance expects initial industry integration of the models within six months and initial deployments in 18 months. The group is collaborating with standards bodies such as the TM Forum and the DMTF, as well as recommending specifications from other bodies like the IEEE, IETF and ITU.

Membership in the ODCA has quadrupled since its debut last November, alliance officials say. It now includes over 280 companies and its steering committee includes big names like Lockheed Martin, BMW, China Life, Deutsche Bank, JPMorgan Chase, Marriott, the National Australia Bank, Shell and UBS.

Sours From

View more news

 
  Most Popular Articles
 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software Information Security
 
 
  Partner Sites
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

Product Key Explorer
Product Key Explorer quickly recovers and displays product key, including Windows 7 keys, Windows Vista key, Windows XP product key, Microsoft Office 7 product key, MS office 2010 key, Adobe Photoshop, Adobe CS5, CS4, CS3, SQL Server, Electronic Arts games and more than 3000 popular software products:
www.product-key-explorer.com/