Ten years ago, Nicholas Carr wrote a paper entitled “IT Doesn’t Matter” published in the Harvard Business Review. He might not have realized the far-reaching effects but in many IT shops, and with many senior executives, it signaled a shift from focusing on compute, storage, data centers and networks to applications. This also coincided with the rise of enterprise applications and, as a result, CIOs spend a lot of time discussing packaged applications, integration, and implementations, resulting in the treatment of the fundamental engine of their business as a commodity. But in most companies, packaged applications represent less than 20% of the overall footprint.
Archive for the 'Compliant Hosting' Category
Page 3 of 3
Recent changes to the HIPAA Rules through the HIPAA Omnibus Final Rule, may affect the way healthcare professionals do business. The changes, which became effective March 26, 2013, now apply the Security Rule not only to covered entities but also to business associates of covered entities and subcontractors of business associates. This means that any organization involved with electronic protected health information (EPHI) must have and follow a well-written information security policy with established practices and guidelines that protect this EPHI from falling into the wrong hands. Failure to comply with the HIPAA Rules could result in fines up to $1.5 million for all violations of an identical provision in a calendar year.
Continue reading ‘HIPAA Security Rule Controls: Do You Have Them?’
The First Annual Big Cloud Event took place in Minneapolis, MN in June. Layered Tech was a sponsor of this event, and I delivered a presentation on Big Cloud Adoption. This event was billed as the first annual; the second event is already scheduled for March of 2014 in Las Vegas, NV. Although many cloud-related topics were discussed at the event, many discussions focused on cloud adoption, or the lack thereof, for Fortune 1000 companies.
Continue reading ‘Are Security Fears Keeping You Out of the Cloud?’
With the prevalence of cybercrime, governments have enacted laws; organizations have established standards; and companies such as Layered Tech have implemented considerable administrative, technical, and physical controls on information security to protect the confidentiality, integrity, and availability of data.
At the 2013 Electronic Transactions Association (ETA) Annual Meeting and Expo in New Orleans recently, I had the opportunity to give a presentation on Hacktivism titled Managing Risk for Online Threats and Hacktivism Actions. Attending these shows allows me to experience a little bit of local culture (the food and the venue were awesome), network with colleagues and learn about what is trending in the cloud space. I’m not surprised that the trending theme this year revolved around mobile technology.
Continue reading ‘ETA Eye Openers’
I have spent the last 12 years working in sales in the hosting industry, and I must say that the last 4+ have been the most interesting with the emergence of cloud hosting in the market. I spend my days working with current and future cloud users, and from what I have gathered over the past few years, new cloud adopters usually have three major concerns when it comes to hosting their applications in the cloud:
Continue reading ‘Take the Plunge Into the Cloud’
Gartner recently published the 2013 edition of the Magic Quadrant for Managed Hosting which included Layered Tech. Since our first inclusion in 2010, Layered Tech has significantly increased our ranking and position with respect to completeness of vision and ability to execute. We have consistently moved up and to the right.
One component of selling Layered Tech’s managed services is dealing with the competitive comparison issue, as prospective clients attempt to determine which service provider is the best fit for their IT management needs. The need to compare Layered Tech to our competition is understandable, but the breadth of our available capabilities makes direct comparisons difficult.
We will be announcing a next generation secure cloud platform shortly. I want to give you some insight of our thoughts around cloud and security.
Customers are often faced with choosing between greater business agility or highly secure and compliant-ready environments. We do not think this is a fair trade-off. No customer should be forced to forgo the full promise of cloud to achieve running in a secure and compliant environment. Nor should a client need to sort through piles of log data to keep themselves compliant when outsourcing to a cloud service provider. We are addressing this very quandary.