Skip to main content

'Pinnacle Belief' in the cloud only 12-18 months away with slump to follow, warns 6point6 Cloud Gateway| -CyberLuC

'Pinnacle Belief' in the cloud only 12-18 months away with slump to follow, warns 6point6 Cloud Gateway

6point6 Cloud Gateway warned today of faith in “the cloud” peaking in 2019 before collapsing in 2020, then recovering from 2022 with better business analysis, more realistic expectations and a greater appreciation of hybrid cloud environments.


“I’m expecting that within 12-18 months CEOs will start to feel the heat from their boards, having bet the farm on digital transformations that have then failed to deliver on the promise.  CFOs will be reporting that the cost savings they were expecting have failed to materialise – or, worse, that costs are higher because of the unexpected and to some extent uncontrollable costs.  And, at some point between now and peak cloud, there will be a monstrous data loss of such epic proportions that it will force CISOs to concede that full cloud environments provide insufficient security, governance and control.  There will be an overwhelming, crushing weight of doubt at senior levels.

Day stressed that any collapse in faith will not mean that organisations will return to pre-cloud environments, only that they will rein in sharply and take stock before adjusting their infrastructures and applications to meet better-analysed needs.  “It’ll be an awkward and uncomfortable trough for those who advocated ‘full cloud’,” he said.  “But, because every organisation will then adjust on its own timescale, it will constitute an opportunity for the likes of 6point6, which can help them to recover.  Meantime, we’re focused on giving our customers the right, sometimes tough advice now, ensuring they take a steady approach to the cloud with proper analysis and execution.”


Since 2017, 6point6 has offered a portfolio of solutions that turn into reality the much talked about but rarely delivered agile network.  It provides a secure gateway that is entirely vendor- and technology-neutral, connecting organisations to any cloud service provider or legacy infrastructure using any carrier medium, enabling transformation at the pace of change that suits the customer.  Already prized by two major public sector entities, its solutions put organisations back in control of their IT, their data assets and their business, enabling agile transformation without contractual lock-in. Read More--

Comments

Popular posts from this blog

Top 5 Website Vulnerability Scanning Tools [New Listing 2018] -CyberLuC

Top 5 Website Vulnerability Scanning Tools [New Listing 2018] -CyberLuC This is why security testing of web applications is very important because In the past, many popular websites have been hacked. Hackers are now active and always try to hack websites and leak data.   And here comes the role of web application security scanners. Web Application Security Scanner is a software program which performs automatic black box testing on a web application and identifies security vulnerabilities. Scanners do not access the source code, they only perform functional testing and try to find security vulnerabilities. The moment our world went online and enterprises started conducting their businesses using websites, they became the primary targets for hackers. The situation worsened with the  emergence of Content Management System(s) (CMS)  – like WordPress, Joomla, Drupal etc., – which while offering an easy way to build (as well as customize) websites, left...

Top 5 Most Popular and Best Cyber Forensics Tools | -CyberLuC

Top 5 Most Popular and Best Cyber Forensics Tools The art of Cyber forensic investigation is quite complex and requires rigorous precision in following every investigative step from Acquisition to Analysis & Reporting. Experts now face the need for dependable tools that help them to do so, from the beginning. Every investigation requires usage of multiple tools, dependence on a sole tool causes the investigation to lose its flexibility and makes it prone towards ambiguity.   Cyber forensic: As the title says, it is collecting evidence for investigation after an unwanted activity has occurred. Cyber/Computer Forensics is a department that comes under Digital Forensic Science for improving cyber security Here are top 5 cyber forensic tools preferred by specialists and investigators around the world. So what are the tools used by these professionals? Here’s a list of top 5 tools  used with a brief description and key features. #1)Pro Disc...

2018’s Most Dangerous Cyber Threats| -CyberLuC

2018’s Most Dangero us Cyber Threats The year 2017 witnessed some of the biggest cyber attacks of all times. This includes WannaCry Cyber Attack propelled by North Korea targeting more than 250,000 computers worldwide, NotPetya cyber attack on companies operating in Ukraine & Russia and the much-publicized Equifax data breach which even led to the resignation of the CEO after data of more than 143 million US Citizens was found to be compromised. And according to Gartner, Information security spending is said to reach $86.4 billion by the end of 2017 and will probably cross the $110 billion mark by the end of next year. 2018 is a new year, and with it come newer, more advanced cyber threats. A growing set of efforts against individuals, businesses, and international security, cyber-attacks threaten systems and devices that people use every day, from smartphones to the websites you check before bed every night, to your work computer. Cyber threats have a variety of aim...