By now you have likely heard about, or worse yet, been impacted by the glitch that crippled Delta Airline’s network and reservations system on Monday that forced them to cancel about 1,000 flights worldwide. Delta has stated that a power control module malfunctioned, causing a surge that cut off power to their main computer network. Normally, the systems would switch to backup computer systems almost instantaneously, however in this case something didn’t go right. Confidentiality, Integrity, and Availability (CIA) are the foundational cornerstones of information security, and in this case, availability was on the wrong flight path. It is safe to say that this problem, which will ultimately cost the airline millions of dollars, could have been avoided through scenario planning.
Data is the lifeblood of most modern businesses. One of the key benefits we often mention about the Cloud is that the data is not tied to hardware that could fail – your data is simultaneously everywhere and nowhere. Things become a bit more complicated if you are in a regulated industry that dictates controls and conditions around where your sensitive data is allowed to live. Data Sovereignty refers to the concept that data is subject to rules and regulations of the country where the data resides; it is an important consideration in your Cloud planning.
Topics: Cloud Computing
Technology is always changing, but it is safe to say that few technological advancements have had as big an impact on organizations as the Cloud. So, what exactly is the Cloud and what services does it provide? Well, it is a little bit marketing and a lot technology.
If you’ve ever gone through the process of building a new home, or know someone who has, you know that it’s a major process. It’s something that you hope to live with (and in!) for a long time. And in the case of application development, you might even have possibly millions of visitors!
Today’s Microsoft Office 365 platform is one of the most sophisticated and comprehensive Cloud computing Software as a Service (SaaS) offerings in the world. It offers significant advantages and benefits to its users: low-cost, increased collaboration; security; and dependability. As Cloud adoption rates continue to rise (just ask Google), more and more companies are looking for ways to take advantage of the Cloud.
Businesses around the world are making the move to the Cloud in record numbers. If this is an accurate indicator, then it’s clear that the Cloud is here to stay.
Topics: Cloud Computing
Any time the Payment Card Industry (PCI) Security Standards Council releases an update to its Data Security Standard (DSS), it raises a new set of questions and concerns. The latest update, PCI DSS v3.2, came out on 4/28/16. It primarily impacts service providers and is focused on the implementation of best practices into the Standard. (For a detailed breakdown of the changes, check out Steve Levinson’s blog on the release.) One of the biggest changes in this update is the requirement to have penetration testing on the segmentation (if used) at least twice a year – this will have a significant impact on service providers and is something you need to understand and prepare for.
Lower capital expenses, access to the newest technology, and operational efficiency are among some of the most documented benefits of moving to the Cloud. The conversation gets a bit complicated when somebody invariably asks: Is the Cloud secure? Can you trust a platform with limited security controls, new security paradigms, and unfamiliar management techniques?
Service Management projects can have great results when the solution is defined parallel to the process implementation plan. At Online, we believe there are many factors that can influence how successful a project will be. Here are the top three factors for implementing a successful Service Management solution.