Archive for the ‘Cloud’ Category

CA ERwin solutions enable collaborative modeling for cloud and on-premise data

Monday, February 6th, 2012

Support for SQL Azure, new Web Portal helps stakeholders visualize data assets across the business.

ERwin solutions from CA Technologies

ERwin solutions from CA Technologies

Today’s resource-strapped organizations struggle to manage data complexity and share accurate information as new platforms and increasing volumes of data are added to their IT environments.

With CA ERwin data modeling tools, business and technical users can reap the benefits of a centralized, common view of business data in context.

This enables them to better understand and enforce critical data definitions and more easily leverage information as a strategic asset.

The products are described in more detail below:
(more…)

CA Technologies announces CA Private Cloud Accelerator for Vblock Platforms

Wednesday, February 1st, 2012

The new solution enables enterprises and managed service providers to offer automated self-service delivery of Infrastructure as a Service.

CA Technologies Announces CA Private Cloud Accelerator for Vblock Platforms

CA Technologies Announces CA Private Cloud Accelerator for Vblock Platforms

CA Private Cloud Accelerator for Vblock Platforms drives Business Service Innovation by enabling IT to provide rapid, predictable and secure provisioning and delivery of cloud infrastructure and critical IT and business services.

“We continue to work with VCE to help customers improve business agility, reduce risk and lower the costs of operating private clouds,” said Anna Gong, Vice President, Coud, Virtualization & Service Automation, Asia Pacific, CA Technologies. “CA Private Cloud Accelerator for Vblock Platforms can help enterprises and MSPs rapidly deliver services in a private cloud environment, maximizing their investment in VCE Vblock Platforms and driving Business Service Innovation to deliver speed, performance and improved cost efficiencies.”This is the company’s fifth solution certified for use with VCE Vblock Infrastructure Platforms, all of which are based on CA Technologies Unified Automation solutions.

Enterprises and managed service providers (MSPs) use cloud management software to enable their Infrastructure as a Service (IaaS) offerings.

Many organizations are evaluating and testing converged private cloud architectures, such as Vblock Platforms, that allow IT resources to be dynamically pooled and shared across multiple physical and virtual computing environments.

CA Private Cloud Accelerator for Vblock Platforms promises to offer standardization, a rapid provisioning process and performance predictability.

CA Private Cloud Accelerator for Vblock Platforms leverages CA Process Automation and CA Service Catalog to provide customers with a single, unified view and point of control across virtual and private cloud resources.

CA Technologies Vblock platformsOut-of-the-box standardized processes allow IT organizations to deliver Vblock Infrastructure Platforms as a service.

CA Service Catalog, accessed through a secure, online portal, empowers users to quickly select and provision the resources they need.

“The latest CA Technologies integration with Vblock platforms enables IT to transform its converged infrastructure into a true platform for delivering private cloud services,” said John Ross, CTO, GreenPages. “By combining our Integration and Managed Services with CA Private Cloud Accelerator for Vblock Platforms, customers can enable private cloud capabilities in days versus months, and realize a rapid return on their VCE investment.”CA Process Automation helps ensure that pooled resources are provisioned quickly, with minimal effort.

Service usage is metered and associated to departments, cost centers, or users for billing or chargeback.

Every organization is different when it comes to process.

CA Private Cloud Accelerator for Vblock Platforms is built on top of an extensible platform that allows IT to easily customize the solution to meet its needs and provide the flexibility to respond dynamically to changing business requirements.

CA Private Cloud Accelerator for Vblock Platforms is available today from CA Technologies and its partners, including GreenPages Technology Solutions, a national IT consulting and integration company.

CA Technologies positioned in Leaders Quadrant of two of Gartner’s Magic Quadrants

Wednesday, January 25th, 2012

The two Magic Quadrants are: User Administration/Provisioning and Identity and Access Governance.

Source: Gartner (December 2011)

Source: Gartner (December 2011)

CA Technologies has been positioned by Gartner in the Leaders Quadrant of two Gartner reports: Magic Quadrant for Identity and Access Governance (IAG), and Magic Quadrant for User Administration/Provisioning.

Magic Quadrant for Identity and Access Governance

“As data moves to the cloud, identity and access management grows in importance within organizations. Our team is working to ensure we deliver the functionality, ease of use, and multiple choices of delivery – on premise or cloud – that simplify IAM adoption for our customers,” said Vic Mankotia, VP, Security, Asia Pacific at CA Technologies.According to the report, Magic Quadrant for Identity and Access Governance, “The IAG market addresses customer requirements that are beyond identity administration. IAG tools seek to deliver IAM directly to the business or end user, rather than the operational IT administrator.”

Gartner analysts anticipate, “The growing need for identity and access management governance will cause identity and access governance solutions to become the lead focus of two out of three IAM projects by 2013, up from one in three today.”

CA Role & Compliance Manager was evaluated for this report. Get a complimentary copy of the report here.

Magic Quadrant for User Administration/Provisioning

“We consider our positioning in two IAM-related Leaders quadrants confirmation that we are delivering on our mission to take our rich and broad portfolio of security technologies and deliver unique and transformative IAM capabilities for our customers,” added Mankotia.“User administration solutions manage identities and their attributes across systems, applications and resources. Buyers seek to demonstrate regulatory compliance while reducing project deployment times and costs,” analysts wrote in the Magic Quadrant for User Administration / Provisioning.

“By 2016, user administration solutions will expand functionally to include a subset of identity and access governance (IAG) functionality as well as multiple means of delivery (that is, cloud computing).”

Gartner analysts evaluated the following CA IAM solutions for this report: CA Identity Manager, CA Role & Compliance Manager and CA User Activity Reporting Module for this report.

Get a complimentary copy of the report here.

New online music service: rara.com

Saturday, January 21st, 2012

rara.com has just been launched for Singapore, Australia and Canada. It is an ad-free streaming music service that provides access to more than 10 million tracks at an introductory pricing of S$0.99 per month.

rara.com has been launched for Singapore, Australia and Canada.

rara.com has been launched for Singapore, Australia and Canada.

rara.com is currently live in 20 countries across Asia, Europe and the Americas.

The service was launched a month ago across the USA, UK, Ireland, France, Germany, Italy, Spain, Austria, Belgium, Denmark,Finland, Luxembourg, The Netherlands, Norway, Sweden, Switzerland and New Zealand.

rara.comrara.com’s global footprint is expected to double by the end of 2012.

Grammy award winning Imogen Heap has been named the first Associate Editor of rara.com, which has secured licensing from Universal Music Group, Sony Music Entertainment, EMI Music, Warner Music Group.

“Even if fans want to pay for the artists’ work legally it is often actually very difficult for various reasons. rara.com is a super easy service for everyone to use and I love the information on tracks and artists that rara.com gives you,” said Imogen Heap, Associate Editor on rara.com’s Music Advisory Board.Publishers and collection societies have also licensed the service internationally with Omnifone, whose MusicStation Platform powers rara.com.

HP will pre-load rara.com on HP PCs in Singapore, Australia and Canada.

The service is also available via an app on most Android mobile devices.

The new service was developed following an ICM Research (involving 1,000 adults) commissioned by rara.com which showed that at least 70% of consumers have not bought a digital music track in the past six months; and that 60% had never experienced any form of digital music.

rara.com hopes to attract this group of music consumers who have yet to convert to digital music, rather than wrestle away tech savvy music consumers already using existing online music stores such as Apple’s iTunes and Amazon’s Cloud Player.

rara.com is also available on Android devices via an App.

rara.com is also available on Android devices via an App.

A simple and beautiful user interface on a standard web browser removes the need to navigate or manage lists of digital media files.

rara.com also features a wide selection of curated music channels to suit the listerner’s mood.

Available at the touch of a button, the service makes playing music online as easy as switching on the radio or CDplayer.

rara.com users can also share music through Facebook and other social networks.

Pricing for rara.com

There are two tiers for the monthly pricing – one for basic online access and the other with added mobile access for Android smartphones.

For Singapore, Australia and Canada, there is an introductory pricing for the first three months of subscription.

Users are free to unsubscribe from the service at any time.

Refer to the table below for the details.

(more…)

Akamai to acquire Cotendo

Tuesday, December 27th, 2011

Expected to happen in the first half of 2012, the combined technology and teams from the merger is expected to help accelerate pace of innovation in cloud and mobile optimisation.

Akamai has announced that it has signed an agreement to acquire Cotendo, a company that offers an integrated suite of Web and mobile acceleration services.

“By combining our innovative technology and employees with Akamai, we expect our customers and partners will gain access to a comprehensive, global platform and wider portfolio of leading-edge services supported by some of the most experienced providers in the industry,” said Ronni Zehavi, CEO and co-founder of Cotendo.Helping to mitigate the challenges of operating in a hyperconnected world, Akamai provides a secure platform over which businesses can engage users across the Web, mobile, cloud, or a mix of public and private network environments.

Cotendo, on the other hand, offers an integrated suite of Web and mobile acceleration services.

Founded in 2008, Cotendo is headquartered in Sunnyvale, CA, with a technology center in Israel. Cotendo currently has approximately 100 employees, with over 50 based in Israel.

The combination of the two companies’ technologies and teams is expected to increase the pace of innovation in the areas of cloud and mobile optimization.

Under terms of the agreement, Akamai will acquire all of the outstanding equity of Cotendo in exchange for a net cash payment of approximately $268 million, after expected purchase price adjustments, plus the assumption of outstanding unvested options to purchase Cotendo common stock.

The closing of the transaction, which is subject to customary closing conditions, including regulatory approvals, is expected to occur in the first half of 2012.

Technical specifications: Huawei Honor

Monday, December 12th, 2011

The long-battery-life Huawei Honor smartphone was launched on 7 December 2011 and will be available in Singapore from 16 December at S$528 (incl 7% GST).

Networks WCDMA/HSPA+ 900/2100 MHz; GSM 850/900/1800/1900 MHz
Speed HSPA+ DL 14Mbps/UL 5.76Mbps
Display 4″ FWVGA (854×480 pixels) capacitive touch screen
Operating System Android Gingerbread 2.3
Memory 512MB RAM, 4GB ROM, up to 32GB micro SD
Camera 8 megapixel autofocus HD and 0.3 megapixel
Size/Weight 122mm x 61.5mm x 10.9mm (LxWxT) / 135g
Connectivity WLAN 802.11 b/g/n, Bluetooth 2.1 with A2DP, micro-USB connector, 3.5mm audio jack, DLNA-certified
Processor 1.4 Ghz Qualcomm Snapdragon
Audio FM radio, MP3 ringtones, Dual-MIC
Battery 1900 mAh Lithium-ion
Sensors Accelerometer, proximity, ambient light, Gyro, compass, Assisted GPS
Additional Access to CloudDrive (available end Q1 2012)

 

New smartphone: Huawei Honor

Friday, December 9th, 2011

For business folks who need a long battery life, check out the Huawei Honor (S$528 incl GST), which features a 1,900 mAh battery, a 1.4GHz Qualcomm Snapdragon processor and an 8 megapixel HDR-enabled camera.

Huawei Honor (S$528 incl GST) will be available in Singapore from 16 December.

Huawei Honor (S$528 incl GST) will be available in Singapore from 16 December.

The high capacity battery promises to provide the longest battery life among smartphones in the 4-inch screen range – lasting up to three days on a single charge

“Huawei Honor is a high performance smartphone which is simple-to-use, but also packed with advanced technology that allows people to communicate, connect, entertain and share content easily,” said Alan Wong, Chief Marketing Officer, Huawei Device, South Pacific Region.Huawei Honor runs on Android Gingerbread 2.3 operating system and has a 16M true colour Full Wide VGA capacitive touch screen (854×480 pixels).

Its 10.9 mm thin body weighs 135g and includes a gyroscope, G-sensor, and proximity and light sensors.

The smartphone is DLNA-certified to enable interoperability with other DLNA-certified devices such as digital cameras, game consoles and TVs.

This makes it easier to share digital photos, music and videos between different devices.

Here are the main tech specs for the Huawei Honor.

Huawei Honor smartphoneHonor customers will get access to Huawei’s ClooudDrive, which will be available in Singapore by end Q1 2012.

This frees users from the constraints of on-board storage, by storing their media files in the cloud.

The Huawei Honor will be available in Singapore from 16 December 2011.

Ernst & Young finds security lagging behind business needs in survey

Thursday, November 17th, 2011

In its 14th annual Global Information Security Survey, Ernst & Young found that companies rushing to digitise their businesses with new technologies are increasingly leaving their ability to tackle new and complex security threats behind.

“Information security needs to be more visible in the board room with a clearly defined strategy that will support the business,” said Gerry Chng, IT Risk and Assurance Partner, Ernst & Young Advisory Pte. Ltd.The global survey involved 1,700 organisations in 52 countries and was conducted between June and August 2011.

Although companies are moving into the increasingly borderless world of cloud computing and social media, information security is still not a boardroom priority for most companies and is not a visible agenda for them.

“Security must be carefully planned and take into consideration the practicality of the controls that considers the IT operations. There needs to be buy-in from the business functions, and support needs to come from the top,” Chng added.Only 51% of the survey stated that they have a documented information security strategy. 12% of the respondents present information security topics at each board meeting and fewer than half (49%) of respondents believe that their information security function is meeting the needs of the organization.

With the consumerisation of enterprise IT, organisations have had to allow employees to use personal tablets to access corporate information.

“There are existing solutions in the market that support the secure access of information on personal smartphones and tablets. Organizations should evaluate whether these solutions meet their needs, rather than using traditional channels such as web interfaces and opening up email access via the web as an option.”It was therefore natural that more than half the survey respondents ranked this adoption the second-highest on the list of technology challenges.

Policy adjustments and awareness programs are the top two measures used to address risks posed by this new mobile technology.

The adoption of security techniques and software, however, is still low. For instance, encryption techniques are used by fewer than half (47%) of the global organisations.

The massive popularity and growth of social media has also threatened the IT risk landscape. Social media risks include the introduction of malicious software lurking within social networks, hacked accounts that are used to solicit information, and the release of confidential or negative company information or personal data.

“The traditional paradigm of security within a perimeter is no longer valid.”To address potential risks posed by social media, organizations seem to be adopting a hard-line response. A majority (53%) of the global organizations respond by blocking access to sites rather than embracing the change and adopting enterprise-wide measures.

“With the increased collaboration with upstream and downstream partners, data resides not just within the confines of the organization.”Despite all the hype about cloud computing, many organisations are still unclear of the implications of cloud computing. From the survey, 48% of the global respondents said that the implementation of cloud computing is a difficult challenge, and more than half of them (52%) have not implemented any controls to mitigate the risks associated with cloud adoption.

The most frequently taken measure is stronger oversight on the contract management process with cloud providers, but even this is done by only 22% of respondents.

“Confronted with diminishing borders, cloud services, and increasing support of personal tablets for information mobility, companies are asking themselves how to respond to new and emerging risks and whether their strategy needs to be revisited. The focus must move from short-term fixes to a more holistic approach integrated with long-range strategic corporate goals.”The good thing is that companies are aware of the widening gap between business needs and information security – and are willing to address the situation.

72% of the respondents in the survey see a rising level of risk due to increased external threats.

At the same time, more than half (59%) of them plan to increase their information security budgets in the coming 12 months, focusing on areas including business continuity capabilities (47%), data leakage and data loss prevention (28%), compliance monitoring (21%), and identity and access management (21%).

Gerry Chng observes that “there is generally a slow uptake of public cloud services for larger enterprises due to risk concerns. Such services may make sense for a small company as the utility model of the cloud means that these companies do not need to have the capital and operational expenses to maintain their own infrastructure and applications.”

“For larger organizations, the risks of compromising the integrity of sensitive data far outweighs the benefits they may reap from cloud computing. The concept of cloud computing is centered around easy access to data, without the need for knowledge on where the data is stored and how the cloud works,” Chng added

“This lack of specific details makes it difficult for organizations to assess the risks to their data residing in the cloud. In the absence of clear guidance, many organizations seem to be making ill-informed decisions, either moving to the cloud prematurely and without appropriately considering the associated risks, or avoiding it altogether,” concluded Chng.

Akamai and TM Establish Strategic Partnership for NetStorage Deployment

Tuesday, November 8th, 2011

The partnership will see TM hosting Akamai NetStorage  – a secure managed service for the storage of large volume of data – via its Internet Protocol-based (IP-based) network to customers in South Asia.

Akamai is the leading global service provider for accelerating content and business processes online.Akamai Technologies is a leading cloud platform provider while Telekom Malaysia Berhad (TM) is a New Generation Network service provider in Malaysia.

TM’s IP network is delivered over its diverse international network infrastructure with worldwide Point of Presence (POPs) connectivity.

“The Akamai NetStorage will attract a high voume of Internet traffic to TM’s network, and definitely strengthen Malaysia’s position as a regional Internet hub,” said Rozaimy Abd Rahman, Executive Vice President of TM Global.Akamai NetStorage will be deployed in TM’s Data Center in Cyberjaya, Malaysia, which is targeted for completion by end of 2011. This will be Akamai’s only such storage facility in South Asia.

Historically, Internet users in Asia used to receive large amounts of content such as websites and videos from North America only.

The partnership with TM will allow Akamai to gain storage and co-location capacity in South Asia, and will serve to increase the transit bandwidth on the Akamai Intelligent Platform, Akamai’s cloud-based platform with global reach and local delivery capabilities.

Akamai Intelligent Platform delivers astronomical amounts of Web content on its infrastructure:

  • 1M mobile apps delivered day
  • Over 1 trillion Internet interactions daily
  • 85% of Internet users are a single network hop away
  • More than $200B in online commerce enabled annually
  • Scalable and 100% available

Akamai NetStorage service offers multiple terabytes of storage capacity on demand, automatic failover capability, content replication and connectivity to multiple Internet service providers. It also intelligently monitors network traffic and automatically avoids congestion and overloads for better overall user experience.

“With the collaboration, TM’s customers will be able to enjoy excellent internet connectivity and enhanced surfing experience as the source of content is stored locally here, which will result in seamless network performance,” Rozaimy added.TM has aggressively enhanced, improved and upgraded its IP service platform to further meet the ever demanding customers’ expectations. Earlier this year, the company has embarked into IPv6 capability to address the exhaustion of IPv4 in the region.

TM IP service is equipped with the latest security features such as black hole and clean pipe to secure its IP network against any unwanted threats.

VADS Berhad, a subsidiary of TM, provides global storage and serves as a major hub for data in the region.

As the largest Data Centre provider in the country, TM leverages on its 14 carrier-neutral data centres nationwide which are ISO 27001 certified and which fulfill all Tier 3 standards and Tier 4 ready.

Telekom Malaysia Berhad (TM), Malaysia’s broadband and integrated information and communications group.This is backed by its extensive nationwide and global high-speed IP network, and its existing vast customer base to offer high Service Level Assurance, superlative levels of availability, security with high redundancy for its clients.

It will enable companies to have an IT infrastructure without the complexity of procurement and capital investment.

CA Access Control for Virtual Environments

Wednesday, October 26th, 2011

CA Technologies promises to improve Virtualisation security with a new securty solution that enforces end-to-end privileged user management suport for VMware vSphere Environments.

CA Technologies is an IT management software and solutions company.CA Technologies is leveraging on CA Access Control for Virtual Environments to extend its identity and access management (IAM) security expertise. The new solution complements and protects VMware virtual environments.

“We see CA Access Control for Virtual Environments as a key solution that will meet our needs in virtualization security and help us to comply with PCI-DSS requirements,” said Arieh Berger, manager, Operating Systems and Information Security, EL AL Airlines. “By complementing and extending the security that comes with VMware, CA Access Control for Virtual Environments will allow us to enact segregation of duties and control privileged user access – all automatically.”The solution helps customers confidently virtualize critical applications by addressing security and compliance concerns, and helping control privileged user access to the virtual environment.

Virtualization management tools provide IT administrators with tremendous flexibility and power to make significant, rapid changes to their virtual environments.

This authority increases the insider threat and raises the need to protect virtual environments from user mistakes, misuse or blatant, malicious actions by those users with the most privilege.

CA Access Control for Virtual Environments is available direct from CA Technologies or through a growing global partner channel.

CA Access Control for Virtual Environments helps customers:

  • Achieve compliance for their virtual data center through privileged user management for the hypervisor and guest virtual machines;
  • Gain visibility and control over virtual environments with activity logging and privileged user password vaulting;
  • Automate security operations and reduce security costs by applying security controls according to pre-set policies;
  • Expedite adoption of virtualization technology for critical applications by improving security controls; and
  • Create a secure, multi-tenant environment by isolating virtual machines through network zoning.