Today’s my first day at the Enterprise 2.0 Conference in Boston. I’ve listened to a couple keynotes and attended a couple sessions. What struck me most was the hostility being paraded toward IT departments. I caught the first half of Kevin Jones’s Enterprise 2.0 Failures session, where he stressed that in order to learn, we must fail. More trust means more room to fail which means more learning, innovation, and progress. After twenty minutes of fluff, I decided to head to the panel discussion on realtime collaboration across the firewall.
After less than a minute of sitting in the session, Brandon Savage of Box.net was in the middle of addressing the point of “IT as a bottleneck.” IT causes reluctance to move despite the opportunity for improvement. A woman in the audience who works for a pharmaceutical company on the IT side, asked about building solutions rather than buying a massive, large-scale solution. Her company, she said, prefers to implement bit by bit, testing and measuring (and beating dead horses) along the way. The panel’s treatment of IT departments was suddenly proven correct.
But not all IT departments want to throw a wrench in the productivity wheel. Another man in the audience questioned what to do when faced with end users who couldn’t care less about major systems like SharePoint. “When they’re outside the firewall, they just want the simplest option,” he said. Google Docs was named as the main rogue weapon of choice for those in no-firewall’s-land, but Savage dropped DropBox’s name as another form of employees going rogue. Savage took his opportunity to explain how Box.net is a better option than DropBox, with its ability to track files once they’re out in the wild, whether it’s who’s looking at what, how many times, and from what IP address.
Is IT fighting a losing battle?
Capabilities such as Box.net’s tracking features provide some hope that IT isn’t on its own. The search for a simple, user- and IT-friendly solution isn’t completely in vain, as long as IT departments keep some tips in mind.
- Don’t just say “no.” Just because you know all of the reasons that sending the clients’ account information via Google Docs doesn’t mean that Bill from sales will know. One of the audience’s voiced complaints about IT departments is that they’re not helpful enough. Explaining why the extra steps to access SharePoint instead can save you headaches now and later.
- Be proactive. Savage says that the majority of sales leads at Box.net are incoming from IT departments. While it may be a thorn in your foot that consumer applications are shiny, attracting every Joe Schmo at your company, they are necessary for pushing enterprise vendors. Savage pointed out that as long as there are consumer application start-ups with fewer obstacles for their end-users, they will outpace enterprise solutions. “As consumer applications become more accessible and used, it opens the end users’ eyes to the ease that’s possible, but also opens IT’s eyes to the vulnerabilities.”
What are your concerns when it comes to outside perceptions of IT? How does your company keep communications open amongst departments?
We cast the net, asking where IT Knowledge Exchange members get their latest technology news. Whether you prefer Twitter updates or your RSS feed is packed with tech blog posts, we wanted to hear from you. Add your own picks in the discussion area here, or in the comments section below.
Whether you’re looking for a top of the line security podcast, job listings, or opinions of like-minded tech folks, ErroneousGiant recommends you pay a visit to Risky Biz. With over 170 podcasts published since February 2007, Risky Business has quite the archive, as well as forums and a second podcast, RB2. Looking for some reading material? ErroneousGiant also keeps up with Sophos’s Naked Security blog, where you can find updates on the latest Facebook phishing scam (probably updated hourly) and hacking or security issues from courtrooms all over the world.
Carlosdl suggested a couple Twitter accounts whose shortened URLs it’s probably safe to click: @helpnetsecurity and @FSecure. Help Net Security’s Twitter stream is managed by Mirko Zorz, editor in chief of Help Net Security and (IN)SECURE Magazine. F-Secure’s Twitter stream highlights the latest headlines in security.
There is an impressive array of Twitter accounts and blogs to follow, no matter what area of IT your focus is.
Windows 7: Blogs
Did we miss anyone? Let us know in the comments section or in the forums.
My friends sometimes tease me about having to enter a passcode just to play games on my iPhone. But the truth is, Angry Birds isn’t the only thing hanging out on my home screen, so I need to be extra careful with who can access that information. Granted, a measly little four-digit passcode won’t stop even most amateur hackers, but it can buy a little time for me to report my phone missing or to wipe the sensitive information from my phone.
I was vindicated yesterday when Daniel Amitay, an Apple iPhone developer, published his research into passcode security. Amitay pays homage to past articles about the most common passwords on the Internet, creating a list of the ten most common iPhone passcodes. Here they are, in all their glory, from Amitay’s blog:
After years of waiting, the Associated Press (and other media outlets) finally received the results of their freedom of information request to the state of Alaska: A massive trove of former Governor and Vice Presidential Candidate Sarah Palin’s e-mails from when she was in office.
And so far, love her or hate her, the results are pretty tame: Mother Jones, which has had some of the most aggressive coverage of the e-mails, reported that she did, indeed, regularly use the folksisms she’s become famous for, from “unflippinbelievable,” “what a goof” and “holy flippin A“to “we love the mobster in ya.” Indeed.
Here at the Enterprise IT Watch blog, we try to up with the latest news in enterprise IT to keep you updated on the goings-on in your neck of the woods. Usually our posts focus on our theme month topics, but not everything new in IT follows our schedule (despite our many efforts). To make up for that, I’m going to start compiling the top stories in enterprise tech, to make sure that you know what’s happening (and so that we know what’s happening as well). So even next month, when we’ll be tackling Cloud Storage, you can get a balanced dose of enterprise IT right here. Your one-stop shop, if you will.
So here goes:
Hey, Google! It’s rude to point.
It seems the latest trend of enterprise IT is to adopt whatever’s hot in consumer tech, although usually because of necessity and security rather than by choice. The latest spinoff of the should-we/shouldn’t-we debate over mobile gadgets is the question of online or cloud storage. Google made it a household name with Google Docs and its array of Office-like applications, and more recently pushing it further with Google Music. With similar offerings from Amazon and Apple, the idea of the public cloud is losing its mystery and gaining a more everyday reputation.
Companies such as Dropbox, Box.net, and Mozy are getting in on the online storage trend, gaining attention from the New York Times Technology section, highlighted for their successful foray into the storage industry. As Verne G. Kopytoff reports, “Aaron Levie, chief executive of Box.net, an early online storage company based in Palo Alto, Calif., said that the increased adoption of mobile devices and ubiquity of online connections had created a bigger need for companies like this.” The article cites the decrease in cost of hardware such as servers and data storage devices as one of the main benefits these companies have experienced in the past years. Box.net’s server space leasing cost has decreased about five to eight times since 2005 when the company started.
But these online storage companies are no strangers to the number one deterrent for all things “cloud”: Security concerns. Even casual consumers understand that their photos of last week’s BBQ are at risk, let alone images of their passport or social security card. With the recent horrible stretch for cloud computing, it’s not hard to see why experts urge users to only store non-sensitive information to these platforms. Newer companies are using this skepticism to their advantage. Chief executive of Cx.com Brad Richardson told the New York Times he “was not intimidated by all the competition. Focusing on security will help set his company apart from rivals.” Aside from being a thorn in the IT department’s side, consumer cloud services often serve as a catalyst for innovation in enterprise IT. With Amazon’s Cloud Drive and Apple’s iCloud (announced today and compared here), it definitely seems that further improvements could be headed for enterprise data storage.
The next step up from consumer acceptance? Small- and medium-sized businesses. And as Ron Miller points out, cloud storage seems the most obvious option for SMBs:
Small businesses today are being built for a fraction of the cost of even 5 years ago precisely because these businesses don’t have to make huge investments in hardware infrastructure. By passing off these costs to infrastructure providers, small businesses can concentrate on building the business and not worrying about keeping the Exchange server up and running or adding a new drive to the network to handle increased usage.
So it seems the dividing line between trusting your data to online storage and not falls right where most other IT concerns do: Budget. The bottom line for now seems to be, if you’re just starting your business, taking advantage of cloud storage can diminish your costs and keep you afloat. If you’re a company with enough to invest in the hardware (or something to hide) to host your own data storage, use that to your advantage and keep track of your most sensitive data that way. Unless you’re Sony, then you might just want to bury your head in the sand.
After the RSA breach, there was a fair amount of debate over how much security fallout there would be, if any. As one security analyst told SearchSecurity at the time, “Good crypto works even if an attacker knows how it works.”
Now, however, it looks like the breach has claimed its first major victim: Lockheed Martin, one of the largest defense contractors in America. As Reuters reported, the company “is grappling with ‘major internal computer network problems,’ said one of the sources who was not authorized to publicly discuss the matter.” While not explicitly stated, it sounds like normal e-mail access is restricted among other disruptions.
Robert X. Cringely reported on the attack early on, without naming the specific company, and wrote that countermeasures were taken, namely in requiring another level of authentication:
It seems likely that whoever hacked the RSA network got the algorithm for the current tokens and then managed to get a key-logger installed on one or more computers used to access the intranet at this company. With those two pieces of information they were then able to get access to the internal network.
The contractor’s data security folks saw this coming, though not well enough to stop it. Shortly after the RSA breach they began requiring a second password for remote logins. But that wouldn’t help against a key-logger attack.
The good news here is that the contractor was able to detect an intrusion then did the right things to deal with it. A breach like this is very subtle and not easy to spot. There will be many aftershocks in the IT world from this incident.
A month ago, as SearchSecurity’s Rob Westervelt reported, that added layer of security was already of renewed interest, despite being a traditionally hard sell to security-stingy executives. Now with Lockheed’s surprisingly public example, it might just be a much easier upgrade to get approved.
When I first started out as a beat reporter covering mobile for SearchMobileComputing, it was an interesting time: The iPhone was relatively new, BlackBerry was the only true “corporate” phone, there were serious questions between whether Android or LiMo would win out, and Palm was still a decrepit if beloved classic OS.
I even wrote a gem called Six simple steps to killing the iPhone (ignore reg link and keep scrolling down), advice that’s not too embarrassing until the last one:
Step 6: Take a deep breath
Others disagree, but both Hughes and Gold say the iPhone hysteria is no different in principle from other phone crazes before it — the Sidekick or the Motorola RAZR, which was at one point ranked #12 in the greatest gadgets of the past 50 years but is now regarded as a mid-tier feature phone at best.
“Somebody needs to come up with something that’s really innovative, and then you’ll see loyalties switch in a second,” Gold said. “I think it’s probably going to be folks in the Far East: LG or Samsung, or maybe a Chinese company we don’t even know about yet.”
The point is, at the time, iPhones were just a flash in the pan. They’ve now thoroughly invaded the enterprise; early IT resistance has softened, to the point that it’s hard to find an IT vendor who doesn’t offer some sort of server management tools for the iPhone (I’ll give Gold some points for his “company we don’t even know about yet,” as Taiwan’s HTC has come from underground white labeled device maker to very public contender).
That’s the background I come from when I read Preston Gralla’s predictions that Apple’s enterprise growth isn’t sustainable, and why I think he looks at the right data, but draws all the wrong conclusions:
As you probably know, May was Networking Month at IT Knowledge Exchange. We’ve been busy covering Interop 2011 and all of the latest happenings in the networking world. So if you’ve found yourself as confused about your network as those wires over there, check out some of what we’ve been doing and what we think you shouldn’t miss compiled below for your easy digestion.
In Seattle, an upgraded 802.11n mesh network means the police department can keep a watchful eye on more of the city than ever before, without the need to deploy costly new fiber lines. And if things go well, the pilot project will be expanded from a few wireless routers powering six cameras placed on Columbia Center, Seattle’s tallest building, to a broad mesh network powering 180 wireless routers covering about two-thirds of Seattle’s downtown area.
As SearchNetworking’s Shamus McGillicuddy reports, this proposed network, which is contingent upon further grant funding, would not only drive networked video but also a host of other potential emergency services:
In that scenario, the Seattle PD would use the group of APs downtown to create a mesh network, so first responders from multiple agencies could access the cameras. The first mission of this expanded network will be to deliver IP video surveillance along the waterfront, but Moss said the network will eventually deliver a variety of wireless services for multiple government agencies.
“We’ll be deploying cameras along the waterfront, and those will have to be accessed with the MSR4000 units because we will have harbor units or fire department or Port of Seattle police accessing those feeds from the water. So we need something with a strong signal on the waterfront,” he said.
It’s important to note that the “two-thirds coverage” is wireless coverage, not video coverage. Currently, Seattle police have to daisy-chain two trucks within wireless hopping distance of each other, making coverage possible at “major events” where there’s some planned coordination involved, particularly when the police can tap into surveillance cameras of nearby parking garages and restaurants. The new network, however, would allow continuous video coverage, keeping a watchful eye on Seattle’s waterfront even when the foot patrol isn’t on the prowl.