Welcome!

Gerry Grealish

Subscribe to Gerry Grealish: eMailAlertsEmail Alerts
Get Gerry Grealish via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gerry Grealish

New reports show that when the NSA was conducting its surveillance programs, perhaps including XKeyscore and PRISM, the agency was not following its own legal guidelines. These reports, based on internal NSA audit reports leaked via the "Snowden leak", showing the NSA violated its own privacy rules and overstepped its authority thousands of times in the past few years, will serve to further unsettle many enterprises abroad, even leading some to conclude that utilizing U.S. cloud applications is not worth risking unauthorized data access by the government and others. Recent reports estimate this new hesitation to use U.S. cloud applications may cost providers more than $35 billion in the coming years. With new revelations that the NSA broke its own privacy rules, enterprises globally may find even more reason to hold back from U.S. cloud providers, potentially maki... (more)

From the Stone Age to Today – History of Security Infographic

When you think of security do you think of locks, guards or even your home security alarm? At the moment security is more likely to bring up thoughts of hackers, PRISM and well-publicized data breaches. Of course I think of the cloud when discussing security. In the contemporary world of information security, enterprises and institutions are increasingly acknowledging the need to find new ways to protect their most sensitive information when using cloud applications. Given the speed of advancements in the technology world, enterprises need to be constantly changing, adapting and ... (more)

Gartner Highlights the Importance of Third-Party Validation

By Gerry Grealish PerspecSys Vice President of Marketing & Products Gartner recently published a report that highlights the growing importance of Cloud Access Security Brokers - solution providers that offer unified cloud computing security platforms. This solution category includes a new class of products that Gartner terms Cloud Encryption Gateways, which encrypt or tokenize sensitive information before it leaves an organization's firewall. These solutions, if designed properly, allow organizations to maintain control of sensitive data since they replace the original "clear-text... (more)

Study Finds Cloud Security Is the Biggest Barrier to Cloud Adoption

By Gerry Grealish PerspecSys Vice President of Marketing & Products Another month brings another new study highlighting security concerns as the leading barrier to cloud uptake in the enterprise. Rather than decreasing, it seems like the concerns are going in the other direction. Security breaches (such as those at iCloud and DropBox) continue to make headline news and add fuel to the fire. The winner in this situation? On-premise solutions. Who pays? The enterprise. Actually, it pays through the nose, since expenditures for on-premise solutions can be anywhere from 3-7 times more... (more)

Gartner Highlights Cloud Data Encryption Gateways

By Gerry Grealish PerspecSys Vice President of Marketing & Products Last month Gartner Analyst Jay Heiser conducted an extremely informative and thought-provoking webinar entitled "The Current and Future State of Cloud Security, Risk and Privacy." During the presentation, Mr. Heiser highlighted what he called the "Public Cloud Risk Gap," characterized in part by inadequate processes and technologies by the cloud service providers and in part by a lack of diligence and planning by enterprises using public cloud applications. In many ways, it was a call to arms to ensure that adequa... (more)