yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News

2008 West
Data Direct
SOA, WOA and Cloud Computing: The New Frontier for Data Services
Red Hat
The Opening of Virtualization
User Environment Management – The Third Layer of the Desktop
Cloud Computing for Business Agility
CMIS: A Multi-Vendor Proposal for a Service-Based Content Management Interoperability Standard
Freedom OSS
Practical SOA” Max Yankelevich
Architecting an Enterprise Service Router (ESR) – A Cost-Effective Way to Scale SOA Across the Enterprise
Return on Assests: Bringing Visibility to your SOA Strategy
Managing Hybrid Endpoint Environments
Game-Changing Technology for Enterprise Clouds and Applications
Click For 2008 West
Event Webcasts

2008 West
Get ‘Rich’ Quick: Rapid Prototyping for RIA with ZERO Server Code
Keynote Systems
Designing for and Managing Performance in the New Frontier of Rich Internet Applications
How Can AJAX Improve Homeland Security?
Beyond Widgets: What a RIA Platform Should Offer
REAs: Rich Enterprise Applications
Click For 2008 Event Webcasts
A Preposition Makes All the Difference in / of / for / from the Cloud
How a simple preposition alters the scope and meaning from problem to solution

No, this isn't 7th grade English...I promise.

With all the important decisions IT departments make, what’s the big deal whether cloud security means from the cloud, in the cloud, of the cloud or for the cloud. Well, a lot. Among the various media, blogs, professional chatter, webinars, conferences and the like, the concept of cloud security is getting a significant amount of airplay. However, the difference in the application of a simple preposition completely alters the scope and meaning of these conversations to that of a problem or a solution.

Security IN the cloud frames the overarching issue. It is the problems often discussed by IT professionals today. They range from questions about the safety of data held within a virtualized environment to that of cyber hactivism or why do my users keep insisting on using their smartphones to access the network? These issues often point to the cloud as some wide open Wild, Wild West situation. Sorry, but I disagree. I think the cloud as a platform has matured to the point where it is a viable, protective and proactive choice.   These issues would exist on any enterprise’s on-premise set up. Companies like ADP,, Office365, Azure have taken great pains to ensure the data processed or stored on or via their servers have a degree of security equal to or exceeding that of any on premise set-up.

But what about Yahoo? What about LinkedIn? All those passwords breached. But before you set your hair on fire and scream the “cloud is falling,” - for every cloud-centric breach, there are just as many (or more) on-premise breaches. Poor or porous security knows no platform. It favors no deployment scenario and creates no safe haven for users. Security, like any other element of an enterprise is built on smart process, consistent monitoring and effective tools. A substandard, half-hearted approach to any of these three and those unsettling headlines we read about every few months might feature a familiar company name.

In stark contrast, security FROM the cloud is the means to protect IT assets without having the heavy investments in servers, software and a variety of other related costs. But it is much more than cost savings and democratizing access to protection. For some it is the holistic application of best practices, real time visibility and best of breed solutions. “From” the cloud is providing a scalable layer of security that was typically reserved for trillion dollar companies easily deployed for any company of any size.  For others it is the ability to link all the independent silos of information including transactions, proprietary data, applications (legacy and in the cloud) and manage them centrally with a greater degree of focus and accuracy.

Security FROM the cloud answers the questions posed by security IN the cloud. Who has access? Who controls that access? Can we report activity to maintain compliance? What is harmless traffic and what needs to be remediated in real time? Do I have the resources to monitor and react to issues 24/7/365? How do I centralize security analysis so I don’t have to repeat processes system after system? How do I control all those applications the sales team accesses from beyond the so-called network perimeter? What happens when an employee leaves the company or a vendor’s contract expires? Who controls all the passwords? How is data aggregated, stored/destroyed, transited and digested? Is my data safe? So many issues, so little bandwidth…until you apply an answer FROM the cloud.

Now of course, security-as-a-service (aka security FROM the cloud) or cloud-based security is not a panacea. It still depends on workflow process and the expertise to define and apply that process. But the issues surrounding scope, scale, control, capability, centralization, correlation, fast-to-market and cost are answered. The important thing to remember is that FROM the cloud is a holistic (and sometimes automated) set of enterprise controls designed to protect assets. The fact that it is managed and controlled from the cloud is simply a value added advantage. It provides a cost-effective means and accelerated degree of flexibility that can be translated into a redirection of core competency priorities. Simply put…you can worry about one less things and get to work on IT issues that drive your company forward. Of the many hats we often force our IT professionals to wear, here is one they can take off with the confidence that the goals of the enterprise are being met and its assets are properly protected.

So a preposition can make all the difference. Now the next time a blogger or industry pundit explains the wonders or the perils of the cloud…you just have to remember FROM where real solutions come.

About Kevin Nikkhoo
With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.

Latest AJAXWorld RIA Stories
Enterprises are striving to become digital businesses for differentiated innovation and customer-centricity. Traditionally, they focused on digitizing processes and paper workflow. To be a disruptor and compete against new players, they need to gain insight into business data and...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application po...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing sm...
DXWorldEXPO LLC announced today that Ed Featherston has been named the "Tech Chair" of "FinTechEXPO - New York Blockchain Event" of CloudEXPO's 10-Year Anniversary Event which will take place on November 12-13, 2018 in New York City. CloudEXPO | DXWorldEXPO New York will present ...
Chris Matthieu is the President & CEO of Computes, inc. He brings 30 years of experience in development and launches of disruptive technologies to create new market opportunities as well as enhance enterprise product portfolios with emerging technologies. His most recent venture ...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)!

Advertise on this site! Contact advertising(at)! 201 802-3021

SYS-CON Featured Whitepapers