Evaluating Cloud ERP
Will be speaking Thursday, July 21, at a Netsuite panel as part of the webinar titled “Keys to Evaluating Cloud ERP.” At Splunk we graduated from our initial accounting package to Netsuite a couple of years ago, and are now expanding our implementation to establish legal entities globally, after completing a second study this year to determine that we are on the right platform for the company. ERP to us encompasses Financial business applications including core accounting modules, plus order entry. For these applications our primary concern was to select and implement comprehensive, secure, flexible, solid software that would last us 3-5 years and beyond as we grow rapidly, worldwide. Netsuite fit that profile and was…
SplunkLive on our home turf with Salesforce.com and Cisco TelePresence
In 2010, more than 68 customers shared their stories of success with more than 2600 Splunk initiates at 33 SplunkLive events in 13 countries. That’s a lot of IT folks using Splunk in a myriad of ways. From network troubleshooting at Visa, to recovering stolen laptops at large universities, to diagnosing flash crashes at a large financial organizations to providing deep intelligence and operational visibility at a large media provider–our customers are finding ever increasing ways to use Splunk.
Security and Compliance in the Cloud
I recently returned from ISACA’s Information Security and Risk Management Conference in Las Vegas and of the 36 sessions offered on security and compliance, seven were on the topic security and compliance for cloud services. There were several key take-aways that I found interesting:
- Cloud computing is analogous to the 1800s when every factory had to generate it’s own electrical power for manufacturing. Once electricity generation was moved to a utility (in the cloud), economies of scale drove generation costs out of the business and gave the business on-demand elasticity for electricity.
- Gartner is predicting that (due to the spread of cloud computing) 25% of companies will no longer have IT departments in 2012.
- Cloud security will be baked
I recently attended a local ISACA event here in San Francisco and was blown away by a presentation by Ali Golshan with PWC. The name of the presentation was Advanced Cyber Threats. In it he provided a deep dive into the new types of malware being developed and used the Aurora incident in 2009 as an example. He went on to say that Aurora utilized social engineering, a Zero-day vulnerability, and gaps in traditional IPS, firewall, and web proxy security solutions. It targeted email archives and other confidential data.
What I was most impressed and amazed by was his description of the modular nature of the malware. It could accept new payloads for further compromises, had a mechanism for…
Savio Rodrigues: Open Source Won’t Prevent Cloud Lock-in
One of open source’s promises is to minimize vendor lock-in. However, it’s not so apparent that this value proposition holds when using software as a service (SaaS) or cloud-based platform services.
This is a great point and one we discussed at great length at last night’s Open Cloud Meetup here at Splunk HQ. One of the topics we covered was how open source seems less relevant in a cloud-y, saas-y world. Sure, everyone loves to participate in Open Source communities. While Splunk has never defined itself as an Open Source company or released…