Product and service reviews are conducted independently by our editorial team, but we sometimes make money when you click on links. Learn more.

The Cloud: Its Links to Convergence and Mobile Security

By - Source: Toms IT Pro

Today on Tom's IT Pro: Convergence Reshaping the Private Cloud and Mobile Device Security and the Cloud.

Tom's IT ProTom's IT Pro

Today on Tom's IT Pro:Convergence Reshaping the Private Cloud and Mobile Device Security and the Cloud.

Senior Tom's IT Pro contributor William Van Winkle examines converged architecture’s influence on private cloud computing. The article is an extension of our recent series on the rise and applications of converged architecture and storage.

As William writes, "With the advent of converged architecture, it’s become easier and more affordable to bring private cloud services back into the data center. IT can deliver the same applications, storage, and services to users, but the remote provider is removed from the equation. The simplicity of converged architecture management also helps make this possible, whereas the job of managing multiple systems and cloud platforms was previously too convoluted for most IT shops."

See here for the full story about converged architecture's effect on the private cloud.

Yesterday, security expert Mikhael Felker examined some of the major third-party vendors who have raced to provide security and privacy capabilities to help IT pros and users manage Android smartphones. Today, GreenPages Technology's Senior Security Solutions Architect Ken Smith highlights how the securing the endpoint, the mobile device, is still important for enterprises in the world of cloud computing—especially with the reality of BYOD (bring your own device) movement starting to take off.

You see, there are those that argue that sensitive data will no longer be stored on mobile devices, thanks to speedy cellular-wireless networking and The Cloud. Hence, on-device security should no longer be a priority for IT. As Ken points out in his article, those who make this argument are misguided. 

He writes, for example, that "most mobile applications store credential information on the mobile device. That, coupled with the often weak user authentication requirements of the typical mobile device is all that separates the bad guys from your data. Even if the data is primarily accessed only using a mobile web browser, it’s highly likely that data is cached on the device for performance purposes."

See here for Ken's full Tech Brief regarding endpoint security and cloud computing.

Some additional articles from Tom's IT Pro's series on Convergence: 

Converged Architecture: When Big Data Meets Better Infrastructure

Federated Storage: The Next Step in Efficiency

POD People: HP’s Pinnacle of Converged Architecture

Best Practices for Flawless Converged Infrastructure

When Virtual Servers and Old Storage Collide

Unified Vs. Converged Storage

Planning and Paying for Cloud Infrastructures

What Is Converged Infrastructure

A few additional mobile security and mobile device management articles on Tom's IT Pro: 

iOS Mobile Device Management Secures

LogMeIn Defines Itself in an MDM World

Android Security: Worry, But Don't Panic, Yet

Survey: Most Lax About Mobile Device Security

BlackBerry OS 7 Earns High-Level Security Certification

Video: How To Make iPads And iPhones Secure

Managing Android Tablets, Smartphones

Businesses Face Influx of Cheaper iOS Hardware

Effectively Securing Mobile Devices

James Alan Miller is Managing Editor of Tom's IT Pro. He is a veteran technology journalist with over seventeen years of experience creating and developing magazine and online content. Founding editor of numerous business and enterprise computing sites at the network, James headed up the After Hours section at PC Magazine, as well as hardware and software sections of various Windows publications.