How to Prepare for the Coming Age of Dynamic Infrastructure

Infrastructure 2.0 Journal

Subscribe to Infrastructure 2.0 Journal: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Infrastructure 2.0 Journal: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Infrastructure 2.0 Authors: Pat Romanski, Liz McMillan, Ravi Rajamiyer, Derek Weeks, PagerDuty Blog

Related Topics: Cloud Computing, Infrastructure 2.0 Journal, Cloud Security Journal , Secure Cloud Computing, Social Media Check-Ins

Article

Enterprises Secure Cloud Infrastructure and Social Networking Investments

Using Strong Two-Factor Authentication

According to "The State of Adoption of Cloud Applications" a recent survey from Tata Consultancy Services (TCS) determined that overcoming the fear of security risks remains the key to adopting and benefiting from cloud applications. In addition it found that while companies globally admitted this is the biggest challenge to leveraging cloud today, those in the US and Europe remain especially conservative in their approach to cloud adoption for the fear of data security breaches.

Dome9 Security Provides Enhanced Cloud Server Security Management
Dome9 makes the cloud security stack manageable, securing cloud servers and making them virtually invisible to hackers. Using a patent-pending policy automation and security centralization, Dome9 makes it easy to create a simple and scalable front-line defense to secure any server in any cloud. And they have incorporated into the company's service new strong, two-factor authentication.

According to Dome9's Vice President of Marketing and Business Development Dave Meizlik, "We secure any server in any cloud and both centralize and automate cloud server security. Security in the cloud does not scale if it is not simple and automated. At Dome9, we make cloud security as elastic as cloud infrastructure. By partnering with MYDIGIPASS.COM, we can add an enhanced layer of protection for our Business Cloud customers that provides the same level of security and simplicity that our customers have come to expect."

Social iQ Networks Increases Level of Security for Social Infrastructures
As discussed in a May 10, 2012 "Startup Social iQ Networks targets enterprise social media sprawl"[1] write-up by IDC, "Enterprises and SMBs want to use sites such as Facebook, Twitter and other platforms to generate revenue, connect with customers, or attract potential talent. However, the ease of use and access to social media has lowered the barrier for individual employees in an enterprise to affect how the company is perceived online through the lens of social media. Poor management of a company's social media presence from a security and access control standpoint can introduce risks which could affect a firm's reputation, revenue and security overall. According to IDC's 2011 Cloud Security Survey[2)], nearly half of respondents - IT security professionals in enterprises - said that the use of commercial cloud/SaaS services by individual business units in their organization posed a threat to their respective organizations."

Social iQ Networks is dedicated to protecting an organizations social infrastructure and works with leading enterprises in the financial services, Internet security, manufacturing, media & entertainment, and retail industries to discover, optimize and protect their infrastructure of social accounts and applications. They also knew that their customers needed an additional level of security.

"Our SaaS solution helps to discover, optimize and protect infrastructures of social accounts for some of the world's leading enterprises," says Devin Redmond, CEO at Social iQ Networks. "As more and more existing and new infrastructures become external and cloud-based, it is important that enterprises look for solutions that incorporate real enterprise security needs like strong authentication. We pride ourselves on setting an example of providing an enterprise grade solution with best-in-class security and having two-factor authentication built-in with MYDIGIPASS.COM is a key part of that."

Now organizations like Dome9 Security and Social iQ Networks use the MYDIGIPASS.COM strong authentication platform products and services to provide unparalleled security and login services. MYDIGIPASS.COM let's them use strong two-factor authentication to secure their cloud infrastructure and social networking investments.

References

  1. IDC, Startup Social iQ Networks targets enterprise social media sprawl, May 10, 2012
  2. IDC, 2011 Cloud Security Survey: Trends in Security for, and from, the Cloud, Doc # IDC_P23208, July 19, 2011

More Stories By T. Kendall Hunt

T. Kendall Hunt is Chairman and CEO of VASCO Data Security International. He has served as Chairman of the Board since the Company's incorporation in 1997, and currently serves a one-year term. He was Chief Executive Officer from 1997 through 1999 and returned as CEO in November 2002. He is affiliated with several high-tech early-stage companies, and served as a member of the Board of Directors of Global Med Technologies, Inc. (Nasdaq: glob) from March 2006 until April 2010, and has also been a member of the Advisory Board (which has no decision-making authority) of Victory Park Capital Advisors LLC since June 2007.

Mr. Hunt is Chairman of the Midwest Council of TechAmerica (formerly The AeA), the nation's largest high-tech trade association, former President of the Belgian Business Club of Chicago, and a member of The Economic Club of Chicago. He is a member of The President’s Council and on The Board of Overseers for the School of Business at the University of Miami (Florida), his alma mater, and on the Board of Advisors for Northwestern University’s Kellogg School of Business, MMM Program. He holds an MBA from Pepperdine University, Malibu, California, and a BBA from the University of Miami, Florida, where he attended on a full football scholarship.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.