Page 19«..10..18192021..3040..»

Data Encryption: Hardware & Software Security: Online …

Data can be encrypted two ways: at rest and in transit.

Please note: employing these two types of encryption safeguards must occur in tandem; it’s not automatic. Data encrypted at rest does not guarantee it remains encrypted as it traverses a network. Conversely, data encrypted “over the wire” does not offer any safeguard that the content remains encrypted after it has reached its destination.

Refers to data storage either in a database, on a disk, or on some other form of media.

Note: Indiana law recognizes the value of disk encryption such that a lost/stolen laptop or storage media is not considered a breach if that media was encrypted (and the encryption key was notavailable with the device).

Refers to data that is encrypted as it traverses a network including via web applications, smart phone apps, chats, etc. In-transit basically refers to the point at which the data leaves the storage drive or database until it’s re-saved or delivered to its destination. Protecting information in transit essentially ensures protection from others attempting to snoop or eavesdrop on information as it traverses the network.

Symmetric key algorithms use related, often identical keys to both encrypt and then decrypt information. In practice, this is known mostly as a shared secret between two or more parties.

Asymmetric key algorithms, however, use different keys to encrypt and decrypt information; one key encrypts (or locks) while the other decrypts (or unlocks). In practice, this is known mostly as a public/private key; the public key can be shared openly, the private key should not. In mostcryptographic systems, it is extremely difficult to determine the private key values based on the public key.

Excerpt from:
Data Encryption: Hardware & Software Security: Online …

Read More..

PGP Encryption Tool – iGolder

This tool is simple to use: enter a public PGP key and the message you wish to encrypt, and click on the Encrypt Message button. If you do not have a public PGP key, simply use our PGP Key Generator to generate your own public/private key pair. You are also welcome to use the iGolder public PGP key to contact us or just to test our PGP-encryption tool.

iGolder respects your privacy and does not log nor monitors any activity (encryption) done on this web page.

PGP Public Key (paste the public key of the recipient you are about to send a message)

Message to Encrypt (enter the message text you wish encrypt)

Encrypted Message

Copy & paste this encrypted message and sent it by email to owner of the public PGP key you encrypted the message. Your friend is welcome to use the PGP Decrypt Tool to decrypt the message you sent him.

Visit link:
PGP Encryption Tool – iGolder

Read More..

encryption – How to encrypt String in Java – Stack Overflow

This is the first page that shows up via google, and the security vulnerabilities in all the implementations make me cringe so I’m posting this to add information regarding encryption for others as it has been 7 Years from the orignal post. I hold a Masters Degree in Computer Engineering and spent a lot of time studying and learning Cryptography so I’m throwing my 2 cents in to make the internet a safer place.

Also, do note that a lot of implementation might be secure for a given situation, but why use those and potentially accidentally make a mistake? Use the strongest tools you have available unless you have a specific reason not to. Overall I highly advise using a library and staying away from the nitty gritty details if you can. I recommend Jasypt.

I will outline the basics of secure symmetric cryptography below and point out common mistakes I see online.

First thing first you need to pick a symmetric key Block Cipher. A Block Cipher is a tool used to create Pseudo-Randomness. Make sure to NEVER, I repeat NEVER use DES, I would even say NEVER use 3DES. The only Block Cipher that even Snowden’s NSA release was able to verify being truly as close to Pseudo-Random as possible is AES 256.

Now let’s talk about encryption modes. Never Use ECB this is bad at hiding repeating data as shown by the famous Linux penguin.

When implementing in Java note that if you use the following code, ECB mode is set by default:

… AVOID THIS! Which is seen in a a lot of examples online

If you have no Idea what you are doing I would strictly stick to GCM, and as said before if you really have no idea just use Jasypt. The only other modes that I would even mention are decent as well are CBC and CTR mode, but unlike GCM an attacker could modify the encrypted message in these modes and that is why they are not entirely secure.

So in the typical java implementation this is the setup you want:

GCM is built upon CTR mode and doesn’t require padding. but if for whatever reason you choose to use for example CBC Mode do so with PKCS7Padding as follows:

Another very important note, is that when it comes to cryptography a Key and a Password are not the same things. A Key in cryptography needs to have a certain amount of entropy and randomness to be considered secure. This is why you need to make sure to use the Cryptography libraries Key generating algorithm to pick a key.

Along with a Key we also have a thing called an IV. While a key is a secret and you should only share it with people you want to be able to decrypt the message, the IV is public. It’s used to make sure that if you encrypt two messages that are the same, the encryption looks different. Now what most people are not aware of is that IV’s can not repeat for the same key. The moment you repeat an IV in modes like GCM, CBC, CTR you actually compromise the entire security of the system. This is why you need to make sure first your IV is not static and that you are using the proper Cryptography library to generate a random IV with a really low probability of accidentally creating two of the same.

I have by now hopefully gone through all other posts and edited them to take out vulnerabilities. But to make your life easy with Jasypt here is how you use it!





For more security use the StrongTextEncryptor util class provided below but it is slower. (you may need to download and install the Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files to use it):




Isn’t this just so much cleaner? 🙂

Note that when using Jasypt you don’t have to worry about the key being truly random as discussed above just use a strong password, their library converts your strong password into a proper crypto key. But remember a weak password is still a weak password

Android Developers

One important point to point out here is know that your android code is reverse engineer able. That means if you store the password in plain text in your code. A hacker can easily retrieve it. Usually for these type of encryption you want to use Asymmetric Cryptography and so on. This is outside the scope of this post so I will avoid diving into it.

An interesting reading from 2013: Points out that 88% of Crypto implementations in android were done improperly and this is really the basis of me coming here and ranting so much.

Original post:
encryption – How to encrypt String in Java – Stack Overflow

Read More..

Encryption Software Market, Size, Trends and Forecast 2020

Select CountryAfghanistan (+93)Albania (+355)Algeria (+213)American Samoa (+1684)Andorra (+376)Angola (+244)Anguilla (+1264)Antarctica (+0)Antigua and Barbuda (+1268)Argentina (+54)Armenia (+374)Aruba (+297)Australia (+61)Austria (+43)Azerbaijan (+994)Bahamas (+1242)Bahrain (+973)Bangladesh (+880)Barbados (+1246)Belarus (+375)Belgium (+32)Belize (+501)Benin (+229)Bermuda (+1441)Bhutan (+975)Bolivia (+591)Bosnia and Herzegovina (+387)Botswana (+267)Bouvet Island (+0)Brazil (+55)British Indian Ocean Territory (+246)Brunei Darussalam (+673)Bulgaria (+359)Burkina Faso (+226)Burundi (+257)Cambodia (+855)Cameroon (+237)Canada (+1)Cape Verde (+238)Cayman Islands (+1345)Central African Republic (+236)Chad (+235)Chile (+56)China (+86)Christmas Island (+61)Cocos (Keeling) Islands (+672)Colombia (+57)Comoros (+269)Congo (+242)Congo, the Democratic Republic of the (+242)Cook Islands (+682)Costa Rica (+506)Cote D’Ivoire (+225)Croatia (+385)Cuba (+53)Cyprus (+357)Czech Republic (+420)Denmark (+45)Djibouti (+253)Dominica (+1767)Dominican Republic (+1809)Ecuador (+593)Egypt (+20)El Salvador (+503)Equatorial Guinea (+240)Eritrea (+291)Estonia (+372)Ethiopia (+251)Falkland Islands (Malvinas) (+500)Faroe Islands (+298)Fiji (+679)Finland (+358)France (+33)French Guiana (+594)French Polynesia (+689)French Southern Territories (+0)Gabon (+241)Gambia (+220)Georgia (+995)Germany (+49)Ghana (+233)Gibraltar (+350)Greece (+30)Greenland (+299)Grenada (+1473)Guadeloupe (+590)Guam (+1671)Guatemala (+502)Guinea (+224)Guinea-Bissau (+245)Guyana (+592)Haiti (+509)Heard Island and Mcdonald Islands (+0)Holy See (Vatican City State) (+39)Honduras (+504)Hong Kong (+852)Hungary (+36)Iceland (+354)India (+91)Indonesia (+62)Iran, Islamic Republic of (+98)Iraq (+964)Ireland (+353)Israel (+972)Italy (+39)Jamaica (+1876)Japan (+81)Jordan (+962)Kazakhstan (+7)Kenya (+254)Kiribati (+686)Korea, Democratic People’s Republic of (+850)Korea, Republic of (+82)Kuwait (+965)Kyrgyzstan (+996)Lao People’s Democratic Republic (+856)Latvia (+371)Lebanon (+961)Lesotho (+266)Liberia (+231)Libyan Arab Jamahiriya (+218)Liechtenstein (+423)Lithuania (+370)Luxembourg (+352)Macao (+853)Macedonia, the Former Yugoslav Republic of (+389)Madagascar (+261)Malawi (+265)Malaysia (+60)Maldives (+960)Mali (+223)Malta (+356)Marshall Islands (+692)Martinique (+596)Mauritania (+222)Mauritius (+230)Mayotte (+269)Mexico (+52)Micronesia, Federated States of (+691)Moldova, Republic of (+373)Monaco (+377)Mongolia (+976)Montserrat (+1664)Morocco (+212)Mozambique (+258)Myanmar (+95)Namibia (+264)Nauru (+674)Nepal (+977)Netherlands (+31)Netherlands Antilles (+599)New Caledonia (+687)New Zealand (+64)Nicaragua (+505)Niger (+227)Nigeria (+234)Niue (+683)Norfolk Island (+672)Northern Mariana Islands (+1670)Norway (+47)Oman (+968)Pakistan (+92)Palau (+680)Palestinian Territory, Occupied (+970)Panama (+507)Papua New Guinea (+675)Paraguay (+595)Peru (+51)Philippines (+63)Pitcairn (+0)Poland (+48)Portugal (+351)Puerto Rico (+1787)Qatar (+974)Reunion (+262)Romania (+40)Russian Federation (+70)Rwanda (+250)Saint Helena (+290)Saint Kitts and Nevis (+1869)Saint Lucia (+1758)Saint Pierre and Miquelon (+508)Saint Vincent and the Grenadines (+1784)Samoa (+684)San Marino (+378)Sao Tome and Principe (+239)Saudi Arabia (+966)Senegal (+221)Serbia and Montenegro (+688)Seychelles (+248)Sierra Leone (+232)Singapore (+65)Slovakia (+421)Slovenia (+386)Solomon Islands (+677)Somalia (+252)South Africa (+27)South Georgia and the South Sandwich Islands (+0)Spain (+34)Sri Lanka (+94)Sudan (+249)Suriname (+597)Svalbard and Jan Mayen (+47)Swaziland (+268)Sweden (+46)Switzerland (+41)Syrian Arab Republic (+963)Taiwan, Province of China (+886)Tajikistan (+992)Tanzania, United Republic of (+255)Thailand (+66)Timor-Leste (+670)Togo (+228)Tokelau (+690)Tonga (+676)Trinidad and Tobago (+1868)Tunisia (+216)Turkey (+90)Turkmenistan (+7370)Turks and Caicos Islands (+1649)Tuvalu (+688)Uganda (+256)Ukraine (+380)United Arab Emirates (+971)United Kingdom (+44)United States (+1)United States Minor Outlying Islands (+1)Uruguay (+598)Uzbekistan (+998)Vanuatu (+678)Venezuela (+58)Viet Nam (+84)Virgin Islands, British (+1284)Virgin Islands, U.S. (+1340)Wallis and Futuna (+681)Western Sahara (+212)Yemen (+967)Zambia (+260)Zimbabwe (+263)

The rest is here:
Encryption Software Market, Size, Trends and Forecast 2020

Read More..

Encryption Definition – Tech Terms

Encryption is the process of converting data to an unrecognizable or “encrypted” form. It is commonly used to protect sensitive information so that only authorized parties can view it. This includes files and storage devices, as well as data transferred over wireless networks and the Internet.

You can encrypt a file, folder, or an entire volume using a file encryption utility such as GnuPG or AxCrypt. Some file compression programs like Stuffit Deluxe and 7-Zip can also encrypt files. Even common programs like Adobe Acrobat and Intuit TurboTax allow you to save password-protected files, which are saved in an encrypted format.

Encryption is also used to secure data sent over wireless networks and the Internet. For example, many Wi-Fi networks are secured using WEP or the much stronger WPA encryption. You must enter a password (and sometimes a username) connect to a secure Wi-Fi network, but once you are connected, all the data sent between your device and the wireless router will be encrypted.

Many websites and other online services encrypt data transmissions using SSL. Any website that begins with “https://,” for example, uses the HTTPS protocol, which encrypts all data sent between the web server and your browser. SFTP, which is a secure version of FTP, encrypts all data transfers.

There are many different types of encryption algorithms, but some of the most common ones include AES (Advanced Encryption Standard), DES (Data Encryption Standard), Blowfish, RSA, and DSA (Digital Signature Algorithm). While most encryption methods are sufficient for securing your personal data, if security is extremely important, it is best to use a modern algorithm like AES with 256-bit encryption.

Updated: November 11, 2014

This page contains a technical definiton of Encryption. It explains in computing terminology what Encryption means and is one of many technical terms in the TechTerms dictionary.

All definitions on the TechTerms website are written to be technically accurate but also easy to understand. If you find this Encryption definition to be helpful, you can reference it using the citation links above. If you think a term should be updated or added to the TechTerms dictionary, please email TechTerms!

See more here:
Encryption Definition – Tech Terms

Read More..

18 free cloud storage options | Network World

The cloud is full of free storage, if you know where to look.

From Box to DropBox, Google to Apple, theres plenty of free storage to be had in the cloud. Many companies use free cloud storage as a way to entice users into their clouds in hopes that they will pay more for additional storage.

Below, in alphabetical order, are 18 free cloud services but a word of warning: The market for free cloud storage is volatile and offers from these vendors can change frequently, including being eliminated with little or no warning.

+ ALSO ON NETWORK WORLD: 7 ways to supercharge your personal cloud storage+

The deal: 5GB free in S3; free unlimited photo storage for Amazon Prime customers.

Details: Amazon Web Services business-oriented cloud storage service named Simple Storage Service (S3) has a tier of up to 5GB of free storage. On the consumer side, Amazon Prime members get free unlimited cloud storage for photos in Amazon Cloud Drive with their subscription, which costs $99 per year and includes free two-day shipping on eligible products. For non Amazon-prime members, unlimited photos can be stored for $11.99 per year after a three-month free trial. For $59.99 per year Amazon offers an Unlimited Everything plan, which allows any file or document to be stored.

More information: Amazon Cloud Drive and Amazon S3

The deal: 5GB of free cloud storage

Details: Apple iCloud Drive comes with 5GB of free cloud storage. Users looking to bump up their storage can do so for $0.99/month for 50GBs; $2.99/month for 200GB; $9.99/month for 1TB and $19.99 for 2TB. ICloud is meant for Apple users, but there is an iCloud app for Windows. A third-party app is needed to access iCloud storage from Android devices.

More information: Apple iCloud

The deal: 10GB free cloud storage

Details: Backblaze offers personal computer backup and business cloud storage services. But it also has an offer for 10GB of free cloud storage. Additional storage is $0.005/GB/month. There is a limit in the free version of 1GB downloaded per day. Mac and PC backups are $5 per computer per month, or $50 per year. Business plans start at $5 per computer per month, or $5 per month per TB.

More information: Backblaze pricing

Read more from the original source:
18 free cloud storage options | Network World

Read More..

What is cloud computing? Everything you need to know now …

The cloud in cloud computing originated from the habit of drawing the internet as a fluffy cloud in network diagrams. No wonder the most popular meaning of cloud computing refers to running workloads over the internet remotely in a commercial providers data centerthe so-called public cloud model. AWS (Amazon Web Services), Salesforces CRM system, and Google Cloud Platform all exemplify this popular notion of cloud computing.

But theres another, more precise meaning of cloud computing: the virtualization and central management of data center resources as software-defined pools. This technical definition of cloud computing describes how public cloud service providers run their operations. The key advantage is agility: the ability to apply abstracted compute, storage, and network resources to workloads as needed and tap into an abundance of pre-built services.

From a customer perspective, the public cloud offers a way to gain new capabilities on demand without investing in new hardware or software. Instead, customers pay their cloud provider a subscription fee or pay for only the resources they use. Simply by filling in web forms, users can set up accounts and spin up virtual machines or provision new applications. More users or computing resources can be added on the flythe latter in real time as workloads demand those resources thanks to a feature known as auto-scaling.

The array of available cloud computing services is vast, but most fall into one of the following categories:

This type of public cloud computing delivers applications over the internet through the browser. The most popular SaaS applications for business can be found in Googles G Suite and Microsofts Office 365; among enterprise applications, Salesforce leads the pack. But virtually all enterprise applications, including ERP suites from Oracle and SAP, have adopted the SaaS model. Typically, SaaS applications offer extensive configuration options as well as development environments that enable customers to code their own modifications and additions.

At a basic level, IaaS public cloud providers offer storage and compute services on a pay-per-use basis. But the full array of services offered by all major public cloud providers is staggering: highly scalable databases, virtual private networks, big data analytics, developer tools, machine learning, application monitoring, and so on. Amazon Web Services was the first IaaS provider and remains the leader, followed by Microsoft Azure, Google Cloud Platform, and IBM Cloud.

PaaS provides sets of services and workflows that specifically target developers, who can use shared tools, processes, and APIs to accelerate the development, test, and deployment of applications. Salesforces Heroku and are popular public cloud PaaS offerings; Pivotals Cloud Foundry and Red Hats OpenShift can be deployed on premises or accessed through the major public clouds. For enterprises, PaaS can ensure that developers have ready access to resources, follow certain processes, and use only a specific array of services, while operators maintain the underlying infrastructure.

Note that a variety of PaaS tailored for developers of mobile applications generally goes by the name of MBaaS (mobile back end as a service), or sometimes just BaaS (back end as a service).

FaaS, the cloud instantiation of serverless computing, adds another layer of abstraction to PaaS, so that developers are completely insulated from everything in the stack below their code. Instead of futzing with virtual servers, containers, and application runtimes, they upload narrowly functional blocks of code, and set them to be triggered by a certain event (e.g. a form submission or uploaded file). All the major clouds offer FaaS on top of IaaS: AWS Lambda, Azure Functions, Google Cloud Functions, and IBM OpenWhisk. A special benefit of FaaS applications is that they consume no IaaS resources until an event occurs, reducing pay-per-use fees.

The private cloud downsizes the technologies used to run IaaS public clouds into software that can be deployed and operated in a customers data center. As with a public cloud, internal customers can provision their own virtual resources in order to build, test, and run applications, with metering to charge back departments for resource consumption. For administrators, the private cloud amounts to the ultimate in data center automation, minimizing manual provisioning and management. VMwares Software Defined Data Center stack is the most popular commercial private cloud software, while OpenStack is the open source leader.

A hybrid cloud is the integration of a private cloud with a public cloud. At its most developed, the hybrid cloud involves creating parallel environments in which applications can move easily between private and public clouds. In other instances, databases may stay in the customer data center and integrate with public cloud applicationsor virtualized data center workloads may be replicated to the cloud during times of peak demand. The types of integrations between private and public cloud vary widely, but they must be extensive to earn a hybrid clouddesignation.

Just as SaaS delivers applications to users over the internet, public APIs offer developers application functionality that can be accessed programmatically. For example, in building web applications, developers often tap into Google Maps API to provide driving directions; to integrate with social media, developers may call upon APIs maintained by Twitter, Facebook, or LinkedIn. Twilio has built a successful business dedicated to delivering telephony and messaging services via public APIs. Ultimately, any business can provision its own public APIs to enable customers to consume data or access application functionality.

Data integration is a key issue for any sizeable company, but particularly for those that adopt SaaS at scale. iPaaS providers typically offer prebuilt connectors for sharing data among popular SaaS applications and on-premises enterprise applications, though providers may focus more or less on B-to-B and ecommerce integrations, cloud integrations, or traditional SOA-style integrations. iPaaS offerings in the cloud from such providers as Dell Boomi, Informatica, MuleSoft, and SnapLogic also enable users to implement data mapping, transformations, and workflows as part of the integration-building process.

The most difficult security issue related to cloud computing is the management of user identity and its associated rights and permissions across private data centers and pubic cloud sites. IDaaS providers maintain cloud-based user profiles that authenticate users and enable access to resources or applications based on security policies, user groups, and individual privileges. The ability to integrate with various directory services (Active Directory, LDAP, etc.) and provide is essential. Okta is the clear leader in cloud-based IDaaS; CA, Centrify, IBM, Microsoft, Oracle, and Ping provide both on-premises and cloud solutions.

Collaboration solutions such as Slack, Microsoft Teams, and HipChat have become vital messaging platforms that enable groups to communicate and work together effectively. Basically, these solutions are relatively simple SaaS applications that support chat-style messaging along with file sharing and audio or video communication. Most offer APIs to facilitate integrations with other systems and enable third-party developers to create and share add-ins that augment functionality.

Key players in such industries as financial services, healthcare, retail, life sciences, and manufacturing provide PaaS clouds to enable customers to build vertical applications that tap into industry-specific, API-accessible services. Vertical clouds can dramatically reduce the time to market for vertical applications and accelerate domain-specific B-to-B integrations. Most vertical clouds are built with the intent of nurturing partner ecosystems.

The clouds main appeal is to reduce the time to market of applications that need to scale dynamically. Increasingly, however, developers are drawn to the cloud by the abundance of advanced new services that can be incorporated into applications, from machine learning to internet-of-things connectivity.

Although businesses sometimes migrate legacy applications to the cloud to reduce data center resource requirements, the real benefits accrue to new applications that take advantage of cloud services and cloud native attributes. The latter include microservices architecture, Linux containers to enhance application portability, and container management solutions such as Kubernetes that orchestrate container-based services. Cloud-native approaches and solutions can be part of either public or private clouds and help enable highly efficient devops-style workflows.

Objections to the public cloud generally begin with cloud security, although the major public clouds have proven themselves much less susceptible to attack than the average enterprise data center. Of greater concern is the integration of security policy and identity management between customers and public cloud providers. In addition, government regulation may forbid customers from allowing sensitive data off premises. Other concerns include the risk of outages and the long-term operational costs of public cloud services.

Yet cloud computing, public or private, has become the platform of choice for large applications, particularly customer-facing ones that need to change frequently or scale dynamically. More significantly, the major public clouds now lead the way in enterprise technology development, debuting new advances before they appear anywhere else. Workload by workload, enterprises are opting for the cloud, where an endless parade of exciting new technologies invite innovative use.

Read more from the original source:
What is cloud computing? Everything you need to know now …

Read More..

Get to know Linode, the new (big) kid in town –

Youre likely familiar with Linode, the open-source cloud hosting company headquartered across the Ben Franklin Bridge in Haddonfield, N.J.

Get ready to become a little bit more familiar soon, though. Come 2018, the company will be moving into its new home in Philadelphia at the corner of 3rd and Arch.

And theyre hiring.

Linodes growth has been organic since its founding in 2003, but its values have not changed. Folks at the company say there arent many layers between engineers and C-level executives. Employee feedback is always taken seriously, and the impact employees have on the company, its customers (nearly half a million, by the way) and the Linode community is visible on a day-to-day basis.

Fostering a supportive environment is a big part of Linodes company culture and the backbone of the work the company does.Check out their culture page, brought to you by Talent, below.

Here is the original post:
Get to know Linode, the new (big) kid in town –

Read More..

500 Cloud Operators, Managed Service Companies and Hosters to Gather at the 13th Annual Hosting & Cloud … – Benzinga

451 Research analysts and industry experts to tackle the digital future powered by cloud

New York, NY (PRWEB) September 07, 2017

451 Research will host the 13th annual Hosting & Cloud Transformation Summit (HCTS) at the Bellagio Resort & Hotel in Las Vegas, September 18-20. HCTS is the premier forum for executives in the hosting, cloud computing, datacenter and internet infrastructure sectors. The agenda is carefully crafted by 451 Research analysts and industry experts to provide timely insight into the competitive dynamics of innovation, and offers practical guidance on designing and implementing effective IT strategies in a power-packed three-day format.

Knowing that existing and future advancements are only made possible by leveraging the cloud, managed services and datacenters, this year’s Summit will uncover what’s next when it comes to enabling digital transformation. The program is designed to help attendees face the opportunities and challenges of the rapidly changing IT landscape head-on, and leave with actionable outcomes to seize market opportunity, particularly when it comes to innovative technologies like IoT and advanced analytics.

Sessions focused on identifying new opportunities and mapping strategies that enable the digital future include:

Melanie Posey Research Vice President and General Manager, Voice of the Enterprise, 451 Research

Eric Hanselman Chief Analyst, 451 Research

Andy Lawrence Research Vice President, Datacenters and Critical Infrastructure, 451 Research

Christian Renaud Research Director, Internet of Things, 451 Research

William Fellows Founder & Research Vice President, 451 Research

Rory Duncan Research Director, 451 Research

Kelly Morgan Research Vice President, Services, 451 Research

Al Sadowski Research Vice President, Voice of the Service Provider, 451 Research

The industry’s top thought leaders and their peers will present fresh perspectives on the cloud and hosting industry, including guest speaker Nicholas Thompson, Editor in Chief of Wired, who will discuss how the digital world is changing and how we’re changing and responding to it. Additionally, attendees will be among the first to hear key announcements regarding product releases and have the opportunity to meet with industry leaders.

To attend HCTS, or to learn more, please visit:

For media inquiries please contact:Kaitlin BuckleyMarketing Coordinatorkaitlin.buckley(at)451research(dot)com T: 617.598.7212

For the original version on PRWeb visit:

Read the original post:
500 Cloud Operators, Managed Service Companies and Hosters to Gather at the 13th Annual Hosting & Cloud … – Benzinga

Read More..

Cloud ERP: The rising alternative to hosting your own – Networks Asia

One of the first tasks Tom Doria was charged with when he was brought on board as CIO of SeneGence International late last year was to evaluate cloud services for ERP. The global manufacturer and multilevel marketing company for womens cosmetics is experiencing tremendous growth and its platform couldnt match the pace needed for the company to remain competitive, says Doria.

We have been using an ERP package that was designed more for a small or medium business market and didnt have the extensibility and scalability capabilities that we were looking for to run a Fortune 500 company, he says.

Doria is in the throes of evaluating all the major players in the ERP space, but has no doubt the cloud is the future home for SeneGences core business apps.

In fact, while he continues his research, as an interim step, Doria has already moved all the companys Acumatica ERP processes into Microsoft Azure to take advantage of what he calls scalability and survivability.

He has no illusions that a full-blown migration will be a quick or easy process. Implementing an ERP package is not an instantaneous journey; it takes 12 months or potentially longer. But Doria is convinced it will be well worth it and be a panacea for helping SeneGence address the needs of a high-volume business that operates 24/7/365.

Momentum for cloud ERP growing

SeneGence is by no means alone. By 2020, the organizational norm will be hybrid ERP environments, where a combination of on-premises and cloud-based models will be deployed, according to PwC.

Gartner projects at least half of large enterprises will successfully implement a software-as-a-service strategy by 2025 and run their core ERP systems in the cloud. The reasons mirror why other workloads and apps are steadily being moved to the cloud: scalability, reliability, elasticity and cost savings, to name a few. IT leaders also say maintaining hardware, software and infrastructure is no longer a core part of their business, and freeing up IT resources enables staff to play a more strategic role in helping their organizations be innovative and competitive.

Businesses need to think differently than they did 20 years ago, explains Michael Guay, research director of ERP strategy at Gartner. When it comes to deciding whether to move an ERP system to the cloud or keep it on-premises, Guay tells clients they need to strike a balance between the functionality I get and how much of a good fit is it, versus going with best of breed, which will make my life more complicated because it means more vendors and more products in the mix.

Its not an either-or proposition, he adds. The reason a lot of people were dissatisfied with their ERP system [was because] the decision was not Should I buy from one or two vendors if you were an Oracle shop you bought from Oracle. Often, that meant you had a functional app that didnt suit the needs of the business, so you had to customize a solution and that leads you down a very bad path.

By contrast, most cloud vendors allow you to extend a suite without having to modify the code, Guay adds.

Human resources systems, for example, are a natural fit for the cloud because there is not a tremendous amount of integration required for them to work with other systems, he says. In that case, an organization might opt to buy its financials and HR systems from the same vendor. Its important to look at the functionality the systems provide and determine whether they have so much data flowing between the two that it makes sense to get the components from the same vendor, or if they can buy standalone systems, he says.

See the article here:
Cloud ERP: The rising alternative to hosting your own – Networks Asia

Read More..