There are many things that are easier to do in the cloud, but is security one of them? Proponents argue that basing security tools in the cloud provide all the benefits of any cloud-based resource, including low cost of entry, simplicity of maintenance/upgrades, etc. But critics say not so fast. Getting security is hard enough when you control all the resources. Moving them to the cloud just further complicates the job.
, Network World Editor in Chief, sets up the debates and recruits the experts. Contact him with thoughts and ideas,says some security function may be fine to shift to the cloud, but the core stuff is best done on premise.
argues that if the future includes cloud-based computing resources, than the tools used to secure them will need to be just as dynamic, and that means shifting them to the cloud.
Age vs. experience? The argument dates back years and will likely never be resolved, but in the world of high tech, where firms are clamoring for IT skills and yet there are displaced workers looking for jobs, the debate rages on. Do you go with the veteran whose wisdom has been refined by years of experience, or the young hot shot that has the latest tech chops?
View Debate »go to commentsThe explosion of smart mobile devices brings with it unparalleled enterprise risk. It is hard enough to secure corporate resources when they are in IT’s glass house, or at least on the company grounds. What to do when suddenly the tools, data and applications go wandering? The most fundamental question: Do you secure the device, or put your trust in network defenses?
View Debate »go to commentsFabric is one of the hottest topics in the data center, and with good reason. Virtualization of data center resources, an explosion of server-to-server traffic, and ever increasing application demands are stressing traditional infrastructures. But there are different ways to approach fabrics, all of which seem to have merit. What are the most important things to look for?
View Debate »go to commentsThe list of benefits for the Bring Your Own Device movement is long, but so is the list of associated risks. Is the time right to connect employee gadgets to the company network, or should we be more circumspect?
View Debate »go to commentsApple iOS and Google Android have emerged as the two most popular operating system platforms for mobile devices, both smartphones and tablets. They are also both backed by rich development and application ecosystems. There are, however, pluses and minuses when it comes to enterprise adoption. Which one has the leg up? We went to a company, MEDL Mobile, that develops for both to give us the opposing views.
View Debate »go to commentsProponents say government funding of broadband build out will help the US stay relevant in this online world, and ultimately benefit small business and translate into jobs. Critics say the private sector is doing just fine, thank you, and that the monies could be put to better use.
View Debate »go to commentsPersonal computing as we know it is changing as hordes of workers arrive with their favorite new tech tools and demand access to corporate resources. We ask two companies likely to play key roles in the flexible new world of end user computing – VMware and Citrix -- to spell out the future as they see it. Who do you think is better positioned to deliver on the promise? Cast your vote.
View Debate »go to commentsIn the cat and mouse game that is enterprise security, it is hard to determine who has the upper hand, so we put the question to two experts. Give their arguments a read, vote on the position you most agree with and add your thoughts in the forum below.
View Debate »go to commentsThe age old question about whether to go with best-of-breed products or integrated solutions is particularly salient when it comes to intrusion-prevention systems. Security is an area where you need the best possible point product, the best of breed folks argue. But the evolved threats require a more holistic view that can only be achieved by taking more factors into account, the integrated solution suppliers counter. Who is right? You decide.
View Debate »go to commentsWhen companies suffer a security breach today they face that core dilemma: Tell the world and hope the honesty helps others, or keep it under wraps to avoid tarnishing the brand and duck possible lawsuits? One thing is clear from the arguments below: It is time for the government to take the guesswork out of the equation.
View Debate »go to commentsMPLS is the Cadillac of enterprise WAN services, having earned its stripes as the link option of choice because of its reliability, flexibility and controls. But upstarts are saying that, with a little ingenuity, they can use Internet pipes to achieve the same ends at a better price.
View Debate »go to commentsThere is little argument that a defense in depth model is the best way to safeguard the enterprise, but which layer is most critical? Some would say the application layer will ultimately emerge as the Holy Grail, and that may prove true down the pike (a future debate?), but here we examine two of the more common approaches, the network layer vs. the endpoint.
View Debate »go to commentsDesktop virtualization promises to simplify management, increase efficiency and improve security, but it doesn’t come cheap and requires a big rethink. Will the latter forever relegate desktop virtualization to a few corners of the enterprise, or will the allure of the former convince corporations it is time to start from scratch?
View Debate »go to commentsThe iPad has taken the world by storm, but RIM hopes to parlay its dominant Blackberry enterprise presence into a meaningful tablet advantage with the new PlayBook. Which tablet wins?
View Debate »go to commentsNow that we've officially run out of IPv4 Internet address blocks, the calls to migrate to IPv6 are getting louder and more desperate, especially among ISPs who say companies that dally risk losing network visibility. Not so fast, say proponents of a more measured approach to migration. Get it wrong and you risk more than that.
View Debate »go to commentsNetwork neutrality regulation is necessary, proponents say, to ensure that ISPs treat all traffic in a neutral fashion and don't try to enrich themselves by meddling with the bits. Poppycock, naysayers respond. Service providers have always behaved and there is no reason to introduce regulations that could slow down this critical engine of commerce.
View Debate »go to commentsCloud service providers, the theory goes, will be able to provide better security than enterprises can muster because their scale will enable them to hire the best experts and employ the latest technology. But others say if you’re really concerned you’ll keep it in house, that cloud represents a fundamental risk.
View Debate »go to commentsApple and Google are two of the hottest companies in Silicon Valley, but who is doing a better job of positioning their company for the future, Apple's Steve Jobs or Google's Eric Schmidt?
View Debate »go to commentsSmartphones are essentially computers, capable of accessing the core corporate resources mobile workers need on the go, but laptops are still best for heavy lifting. So which platform is best for mobile workers?
View Debate »go to commentsUnified communications requires integrating multiple tools, and there are many ways to skin a cat. But is it better to come at the opportunity using integrated tools from Microsoft or try to stitch something together using open tools?
View Debate »go to commentsThere no longer seems to be much argument about the need to optimize the performance of applications over wide area networks – the business requires service level guarantees and you’re going to save money in the process. A win/win. The only question now is, do you buy and install the optimization gear yourself or put the responsibility in the lap of a service provider?
View Debate »go to commentsWith so much progress made virtualizing servers, many observers say it's time to turn our attention to the desktop. But is it better to use client-side or server-side hypervisors?
View Debate »go to comments