Welcome!

Gerry Grealish

Subscribe to Gerry Grealish: eMailAlertsEmail Alerts
Get Gerry Grealish via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gerry Grealish

One challenge more and more enterprises are grappling with as they plan to adopt the cloud is data residency & sovereignty. They are finding that if they want to use a cloud service hosted outside of their borders, life can become quite complex. Perhaps it is a result of the often discussed "Snowden Effect," but no one can deny that countries and regions are putting some strict guidelines in place to ensure privacy of sensitive data that is moving outside of their borders. These three examples are indicative of what I foresee we will be seeing much more of: Australia: The Privacy Amendment Act The Privacy Amendment Act introduced many changes to the original Privacy Act and just recently went into effect. The Act includes a set of new privacy principles that cover the processing of personal information by government agencies and businesses. The new principles are ca... (more)

How to Store and Protect Big Data on the Cloud

While Big Data and the cloud are often thought of as going hand in hand, some enterprises still hesitate to place large amounts of proprietary data online. Enterprises decide to keep their large data sets stored locally for a variety of reasons including the possibility of security breaches, data processing errors, access issues and difficulty of meeting corporate or industry compliance / privacy requirements. Enterprises with a global presence are also finding they need to operate in an increasingly stricter data sharing environment. In fact, data residency policies from countri... (more)

Gartner Highlights Cloud Data Encryption Gateways

By Gerry Grealish PerspecSys Vice President of Marketing & Products Last month Gartner Analyst Jay Heiser conducted an extremely informative and thought-provoking webinar entitled "The Current and Future State of Cloud Security, Risk and Privacy." During the presentation, Mr. Heiser highlighted what he called the "Public Cloud Risk Gap," characterized in part by inadequate processes and technologies by the cloud service providers and in part by a lack of diligence and planning by enterprises using public cloud applications. In many ways, it was a call to arms to ensure that adequa... (more)

How to Get the Security of a Private Cloud Via a Public Cloud Deployment

Recently, McKinsey & Company released an article entitled Protecting information in the cloud which discussed the increased use of cloud computing by enterprises of a variety of sizes and industries and the benefits and risks cloud usage entails. The article recognizes that many organizations are already using cloud applications and realizing the efficiency and cost benefits and, in fact, most are looking to increase their usage of the cloud in 2013 and beyond in both private and public environments. But there are issues that are inhibiting adoption, such as risks associated with... (more)

The Security of Popular Cloud Storage Sites

For enterprises moving more business and customer data to the cloud, investigating and selecting an online storage solution can be a challenging task. A primary concern is the level of data security offered by the sites being considered. While the theme holds true across all of the major providers (Box, DropBox, SkyDrive), for the purpose of illustration I'll focus on DropBox since it is arguably the most popular site boasting over 100 million users. Here is where some of the concerns begin; DropBox experienced a major security breach in July 2012, specifically involving user pa... (more)