Enterprises choosing to remain with legacy data centers won’t be able to take advantage of the Internet of Things. Database administration professionals would agree that the large amount of information being generated by Web-connected devices, ranging from smartphones to automobiles, cannot be contained or properly analyzed in a traditional system.
According to CIO, experts at EMC have stated that cloud computing offers solace to those aggregating large troves of intelligence. The scalable storage volume offered by the technology allows IT departments to collect diverse data sets and run analysis programs to translate the ones and zeroes into actionable information.
EMC executives assembled at the company’s world conference in Las Vegas earlier in May, claiming that the “2nd platform,” which consists of client-server technology, will be superseded by a “3rd platform” of computing spearheaded by big data, cloud deployments, mobile devices and social networking. EMC has combined its storage business with VMware, RSA Security and its own Pivotal division to help businesses make the transition.
EMC President Jeremy Burton referred to this cohesion as a “federation,” claiming that the face of IT is changing rapidly to adapt to new data collection techniques. What it foreshadows is an environment of outsourcing, in which businesses hire entities providing database support services and other forms of IT backing.
Can they defend the hub?
It seems that whenever cloud computing is mentioned in a conversation, ruminations regarding protection are expected to transpire. Though any IT department is bound to be apprehensive of transition to an environment that bypasses traditional platforms, it should be noted that how secure a cloud server is largely depends on the priorities of the company using it.
ITProPortal referenced a survey of 250 enterprises conducted by SkyHigh, which found that 3,571 different kinds of cloud services were being used among the study’s participants. Of those products, a mere 16 percent possessed multi-factor authentication and 11 percent had data encryption features. Nearly 30 percent of respondents encountered hacking attempts from outsiders.
From what can be gathered from this study, it’s not cloud computing that poses a threat, but the priorities set by the businesses leveraging it. Though database administrator services can provide enterprises with adequate protection, benefiting from their support depends on whether or not companies are willing to outsource to them. In addition, concern regarding cloud defense has spawned a new branch of IT that specializes in cloud security techniques – another option enterprises could capitalize on.