Page 2-3 - Magazine.indt

Basic HTML Version

The Art of Service Magazine
10
12
WilliamManning
Page 2
Page 3
Issue 24
Founders and Publishers
Editors
Contributors
Subscribe/Contact
/Advertise with us
June 2012
Ivanka Menken and Gerard Blokdijk
Owen Corby
William Manning, Kevin Plankey,
Lionel Nowspeed, Mike Klein,
Christopher Nurse
editor@artofservice.com.au
Contents
Security in a
Virtualized
Environment
Principles That
Meet Customer
Expectations
5 Tips for Cloud
Computing
Security
Cloud Platforms
vs Cloud
Infrastructure
Effective
Performance
Reviews
Data Disasters and
How to Recover
9
3
5
8
Welcome
to the June edition of The Art of Service magazine. We can’t
believe half the year is over already! We’re really looking forward to what the
next six months brings for us, and wish all our readers the best for theirs.
This month is all about the cloud: how to keep you and your data safe! Our
feature article on Page 3 is about the security in a virtualized environment,
filling you in on all the ‘need to knows’. On page 5, we’ve got a great article
on meeting customer expectations and Page 10 will fill you in on how to
conduct successful performance reviews..
So enjoy reading, and if you have any questions regarding this month’s issue,
don’t be afraid to send us an email.
Enjoy reading, and, if you have any questions regarding this
month’s edition, send us an email at:
editor@artofservice.com.au
“Identify your problems but give your power and energy to
solutions.”
Tony Robbins
I
n a virtualized environment, security will be
handled differently from a traditional IT environment,
where security is primarily established within the
IT infrastructure impacting the layers on top. While
infrastructure-based security is still present in cloud
computing services, more attention to security at the
application or platform layers must be given.
In cloud computing, the application of traditional
defense-in-depth security models will be near
impossible; especially when using public cloud
solutions outside of the business’ security perimeter.
The privatization of the cloud should not dismiss
the need to apply the same security consciousness
required when using public resources. An IT
organization will have to re-evaluate its current
security policies to ensure they can be applied to
cloud solutions, both public and private.
Security in
a Virtualized
Environment