• Taking Applications Virtual: Virtualization Revamps IT Landscape

    Published: November 11, 2011
    Author: Christian Perry of PC Today

    The relationship between the applications and the operating system, and also with other applications is often tenous enough to justify the presence of a digital marriage counselor.

  • Mobile Cloud: The Cloud’s Second Act

    Published: November 2, 2011
    Author: Andrew Hickey of CRN

    If cloud computing is the new frontier, and mobility is the next big thing, then it stands to reason that the mobile cloud is the next big new frontier. A great deal of lip service has been played to the mobile cloud. With massive proliferation of tablets and smartphones, the bring-your-own-device (BYOD) revolution and the explosion of apps, it's become a mobile world. And according to a number of solution providers and cloud providers, the cloud and mobility go hand-in-hand. They're the current chocolate and peanut butter of IT. "No, they're not ready. But, yes, it's happening," said Jim Damoulakis, CTO for GlassHouse Technologies, a Framingham, Mass.-based cloud provider.

  • They are the 11 Percent (or less) Who Really Get Security

    Published: November 1, 2011
    Author: George Hulme

    We find exactly that to be the case very often," says Robbie Higgins, VP of security services at IT solution provider GlassHouse Technologies. "Enterprises can easily justify buying hardware and software. When you take a look at everything, they have all the right technologies, all those things that Gartner would say is that upper right-hand quadrant. Yet, in many cases, they've actually put weak security controls in place."

  • A Penny Saved?

    Published: October 13, 2011
    Author: George Hulme

    It's been a tumultuous decade for IT spending. In the recession that started in late 2000, many enterprises slashed IT investments wherever they could, except for IT security, which saw many businesses increase investments. Then, following the financial and mortgage meltdown, after a few years of growth, IT budgets remained flat, while investments in security and regulatory compliance initiatives still managed to remain strong. Today, the relative strength of IT security spending compared to other aspects of IT is starting to show its age. According to the responses to this year's CSO/CIO/PwC Global Information Security Survey, more enterprises are deferring IT security spending and cutting costs where possible. In fact, nearly half of all of those surveyed said they trimmed security costs last year. While only a slim majority, 51%, said they will increase security spending next year. "There is certainly a correlation between times of high unemployment and fragile relations with employees, and an increase in people doing bad things," says Robbie Higgins, VP of security services at IT solution provider GlassHouse Technologies. "But does that make companies spend any more money on information security? Not that I've seen so far. It makes them aware of it. It's not necessarily a catalyst for more the investment," he says.

  • Enterprise Security Spending Up, but Data Protection Overlooked

    Published: October 13, 2011
    Author: George Hulme

    It's no big secret. Contemporary attacks are levied over the web, attackers will craft custom malware to slither past anti-malware defences and any business on any given day can be compromised. That's the reality of where information security stands today. Clearly, enterprises are aware of this as investments in many defensive technologies moved up significantly year over year, according to the ninth annual Global Information Security Survey CSO conducted along with PwC, which questioned more than 9600 business and technology executives from around the world. Robbie Higgins, VP of security services at IT solution provider GlassHouse Technologies, isn't surprised. "One of the challenges a lot of security groups face is, still, justifying what they're doing. The problem is, a lot of the measures in security are qualitative more than they are quantitative, because there is that element of risk and probability," he says.

  • Compliance Outside Corporate Walls

    Published: October 12, 2011
    Author: Ericka Chickowski

    Instituting a security-compliance program is hard enough for most enterprises. But when you're also dealing with a whole mess of business partners, vendors, and even customers who must touch and manipulate your critical data, ensuring compliance often becomes a total minefield. When third parties use your IT assets, their security controls become as important to the regulators as yours are. "A business is responsible and liable for all elements of their service offering, whether it is fulfilled internally or subcontracted to vendors," says Dr. Frank Gozzo, president and CEO of Noverant. "So once an end client imposes certain IT security requirements, it’s critical to ensure the requirements are passed down to all vendors and business partners. At the end of the day, you’re on the hook." "We are beginning to see both internal and external auditors pay far more attention to partners’ environments," says Robbie Higgins, vice president of security and mobile services for GlassHouse Technologies. "Specifically with the pervasiveness of IT outsourcing in addition to the new IT service offerings via virtualization and cloud-based offerings, more comprehensive reviews are being conducted."

  • VDI Planning Guide: Highly Available Desktops

    Published: October 5, 2011
    Author: Andy Paul, GlassHouse Principal Consultant

    A key advantage of virtualization is the ability to decouple an operating system from its hardware layer. This improves flexibility and maximizes uptime. Virtual server infrastructure commonly utilizes this flexibility to provide high availability, moving virtual servers between hosts. When planning and deploying a virtual desktop infrastructure (VDI) solution, the question you must ask is: "How do we design the desktops to be highly available?"

  • Backup vs replication: Comparing reliability

    Published: September 27, 2011
    Author: Hywel Matthews, GlassHouse Technologies (UK) senior consultant for SearchStorageUK

    By Backup vs replication: How reliable is replication compared with backup? Data replication and traditional backupboth create a copy of your source data, but what are the key strengths and weaknesses of the two methods?

  • Virtualizing Your Infrastructure? Get Your Numbers Right

    Published: September 26, 2011
    Author: Danny Bradbury of The Register

    Virtualisation can be a powerful tool for your IT department, making your infrastructure far more efficient. But without proper planning it is easy to trip yourself up by not scaling the system properly. How can you plan the capacity needed for a virtualised system so that you don’t end up overspending or under-resourcing? Here are some key points to consider. “Nine out of ten times your customers think they have the numbers, but it’s just the apps installed on a workstation they are looking at and not so much the utilisation of those apps,” warns Erwin Vollering, service director for virtualisation at GlassHouse Technologies.

  • Twitter Chat with RES Software, GlassHouse Technologies, and Douglas Brown

    Published: September 22, 2011
    Author: Doug Brown of DABCC

    The following is the transcript from last month’s Twitter chat hosted by DABCC / PaperShare.com’s Douglas Brown, RES Software and GlassHouse Technologies.

Advanced Search for: