Matt Sarrel, Author at Gigaom Your industry partner in emerging technology research Wed, 14 Oct 2020 00:35:44 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 Data privacy and security in the post-Snowden era https://gigaom.com/report/data-privacy-and-security-in-the-post-snowden-era/ Mon, 22 Sep 2014 16:00:30 +0000 http://research.gigaom.com/?post_type=go-report&p=237490/ Strict E.U. regulations on data privacy have left Iceland as a key location for corporate cloud-hosting providers.

The post Data privacy and security in the post-Snowden era appeared first on Gigaom.

]]>
Recent revelations of spying by the U.S. National Security Agency (N.S.A.) as well as by the U.K. and French governments indicate that not every cloud is safe and secure. As companies consider shifting data to the cloud, especially those from countries with strict regulations governing sensitive data, this is not just a security issue. They must find a geographic location that is legally viable for compliance within their country’s data protection laws. Iceland, through the combination of the Icelandic Modern Media Initiative (IMMI) regulations and status as an European Economic Area (E.E.A.) state, is uniquely positioned as a data privacy haven. E.U. companies that are serious about protecting corporate intellectual property and customer data should evaluate cloud-hosting providers located there.

Key findings in this report include:

  • Legal data exposure as a result of the U.S. Patriot Act combined with illegal data exposure as a result of N.S.A. spying has created a legal environment in which E.U. companies can no longer consider hosting customer data and corporate intellectual property at U.S. cloud providers that are located within the U.S. or in other geographies with weak user privacy laws beyond U.S. borders.
  • Countries within the E.U., such as the U.K. and France, are also guilty of unauthorized data access and spying and are therefore inappropriate countries to host data.
  • Companies headquartered in the E.U. are required under Directive 95/46/EU to protect sensitive customer data, which they cannot accomplish in the environments created by the U.S. Patriot Act and government spying.
  • Iceland, with its IMMI regulations and status as an E.E.A. state, is one of the few choices for hosting cloud-based data in compliance with Directive 95/46/EU.

 

 

Thumbnail image courtesy of: iStock/Thinkstock.

The post Data privacy and security in the post-Snowden era appeared first on Gigaom.

]]>
Application awareness: using data inspection to create context-sensitive security policies https://gigaom.com/report/application-awareness-using-data-inspection-to-create-context-sensitive-security-policies/ Thu, 20 Feb 2014 19:44:55 +0000 http://research.gigaom.com/?post_type=go-report&p=218700/ A deep, thorough inspection of real-time network data can help provide the kind of IT security that the modern enterprise requires.

The post Application awareness: using data inspection to create context-sensitive security policies appeared first on Gigaom.

]]>
The modern enterprise presents numerous challenges to IT security leaders, as it requires a diverse array of applications, websites, protocols, and platforms. Mobile devices are changing the fundamental composition of network traffic and introducing new types of malware, while consumerization trends such as BYOD are introducing new devices over which IT has little control.

To organize the chaos, IT must look beyond a network packet’s site, port, or IP address and determine a security posture that relies on the complete context of data usage. A deep, thorough inspection of real-time network data can help provide the content awareness required for the granular management that a flexible, modern enterprise requires.

This report examines the shortcomings of traditional security and management processes exposed by device proliferation, an increasingly mobile workforce, and a movement toward cloud applications. It also demonstrates how a deeper understanding of application data in transit can help IT build more-flexible, business-friendly management procedures that continue to provide security and efficiency without disrupting productivity. The report concludes with best practices for testing application-aware network-security devices to gain a greater understanding of the value they will provide when deployed onto the enterprise network.

Consider the following:

  • Traditional security and access controls are no longer capable of protecting enterprise networks yet continue to serve a purpose within a defense-in-depth strategy.
  • BYOD and other consumerization trends bring new threats to the enterprise that must be addressed by innovating network-security and policy management.
  • IT security leaders must validate and test these new application-aware network-security devices and identity-based policy-management systems.

Thumbnail image courtesy of opera3d/Thinkstock

The post Application awareness: using data inspection to create context-sensitive security policies appeared first on Gigaom.

]]>
Report: NoSQL Databases – Providing Extreme Scale and Flexibility https://gigaom.com/report/report-nosql-databases-providing-extreme-scale-and-flexibility/ Tue, 06 Jul 2010 07:00:58 +0000 http://pro.gigaom.com/?post_type=go-report&p=190405/ The goal of this report is to explain the role of NoSQL databases within the context of the database market in general, to provide information regarding primary vendors and projects, to illustrate how NoSQL databases provide the most benefit to enterprise and web information systems architects, and to provide recommendations for evaluation, implementation and development.

The post Report: NoSQL Databases – Providing Extreme Scale and Flexibility appeared first on Gigaom.

]]>
As the data landscape changes, so must the databases used to gather, store and analyze the rich information within them. The emergence of web 2.0, social networking and user-contributed content have pushed traditional relational database management system (RDBMS) architectures to the limit. Consumer-facing Internet companies such as Google, Amazon, Yahoo! and LinkedIn are able to scale by using NoSQL (Not Only SQL)* data stores. Sites like these have realized that the controls of an RDBMS limit performance and lack the ability to conduct massive numbers of concurrent reads and writes. In cases where data must be stored and analyzed — and doesn’t require the controls and rigidity of RDBMS — CIOs can learn from what’s worked for hugely successful web sites, and therefore create architectures that promote flexibility and speed.

There is no reason to consider unseating RDBMS as the guardian of transactional data and its integrity, but organizations struggling to cope with the recent explosion of unstructured data must consider separate non-relational database solutions where warranted in order to enhance the data ecosystem with performance and scale.

The goal of this report is to explain the role of NoSQL databases within the context of the database market in general, to provide information regarding primary vendors and projects, to illustrate how NoSQL databases provide the most benefit to enterprise and web information systems architects, and to provide recommendations for evaluation, implementation and development.

Table 1: Overview of Relational and Non-Relational Data Stores

Screen Shot 2014-01-09 at 7.58.09 PM

* We prefer to use this version of the term, rather than No SQL, as we believe that defining these solutions as simply “they don’t do SQL,” is outdated and, frankly, no longer accurate.

The post Report: NoSQL Databases – Providing Extreme Scale and Flexibility appeared first on Gigaom.

]]>