Cloud Security Certification Guide What certification is right for you?
|
|
|
- Damian Baker
- 10 years ago
- Views:
Transcription
1 What certification is right for you?
2 This exclusive guide examines the available cloud security certifications that can translate to better career opportunities -- and a higher salary -- for you as cloud security best practices and certifications continue to expand and mature. Ed Tittel and Earl Follis, SearchCloudSecurity.com contributors Cloud computing continues to be a hot-button topic for companies looking to reduce the total cost of ownership for server and end-user computers while offering automated expansion of computing capacity and better management of virtualized environments. Information security is equally a hot topic, what with numerous well-publicized security breaches among corporations, universities and government agencies weighing on IT professionals and C-level executives alike nowadays. At the intersection of these two popular IT topics lies the emerging field of cloud computing security certifications. As an increasing number of information security and IT operations professionals shift their careers toward cloud computing security, a small but growing number of certifications have emerged in the cloud computing area of infosec, divided between vendor-specific certifications and vendor-neutral certifications. This guide, an addendum to SearchSecurity's IT security certifications guide, examines the available cloud security certifications that can translate to better career opportunities -- and a higher salary -- for you as cloud security best practices and certifications continue to expand and mature. Cloud security certifications (sorted alphabetically) Page 1 of 11
3 CA AppLogic Certified Cloud Architect (CA-ACCA) Certification level: Advanced Certification type: Vendor-specific The CA-ACCA is targeted at system architects and cloud administrator s who want to learn in-depth topics related to configuring and managing the CA AppLogic cloud platform. Though cloud security is a significant portion of the material covered by this certification, the CA-ACCA offers a comprehensive look at all aspects of cloud infrastructure and architecture. If your company uses or is considering use of the AppLogic cloud platform, the CA-ACCA certification is considered a must-have advanced certification for those responsible for architecting cloud implementations using AppLogic. CA's AppLogic group, formed in 2010 following CA's acquisition of 3Tera, also offers self-paced online training as well as instructor-led training via CA education partners or on-site training conducted by CA engineers and instructors. Source: Certification from CA Technologies for CA AppLogic Page 2 of 11
4 Certificate of Knowledge (CCSK) Certification level: Foundational Certification type: Vendor-neutral The CCSK certification was established by the Alliance as a foundation of cloud security knowledge for newcomers to the cloud computing arena. The CCSK provides a solid foundation of cloud security essential knowledge as well as best practices gleaned from those who have blazed this trail before you. What better way to learn what to do than by learning what you should NOT do in the cloud? All kidding aside, the specificity of the exam and that it is designed and taught by some of the industry's leading cloud security experts indicates that the CCSK is the already becoming the industry's foremost vendor-neutral cloud security certification. Note that the CCSK certification is available in both English and Spanish. Editor's note: SearchCloudSecurity has partnered with the Cloud Security Alliance to offer our members nine free online classes to prepare for the CCSK exam. Source: CSA Education CCSK Certified Specialist (CCSS) Certification level: Foundational Certification type: Vendor-neutral The CCSS certification offered by Arcitura subsidiary CloudSchool.com includes excellent foundational knowledge of cloud technologies as well as three modules specifically covering cloud security content. Arcitura/CloudSchool.com offers self-study kits through its website as well as instructor-led training classes for most of the required CCSS modules. In order to successfully acquire the CCSS certification, each candidate must successfully pass five exams: Fundamental Cloud Computing Cloud Technology Concepts Page 3 of 11
5 Fundamental Advanced Lab The required CCSS training courses are available now, but testing for the CCSS is still under development. When finalized and commercially available (a new exam is expected in fall 2013), CCSS testing will be conducted by Prometric. Source: CloudSchool.com Certified Specialist EXIN Certified Integrator Secure Cloud Services (CISCS) Certification level: Foundational Certification type: Vendor-neutral CISCS certification from EXIN is not purely dedicated to cloud security, though it does offer a well-rounded foundational overview of cloud concepts and relevant infosec topics. The advantage to this approach is that participants learn not only cloud security concepts and best practices, but they also learn how cloud security fits into an overall cloud strategy. CISCS certification consists of three modules that must be mastered in order to pass the certification exam: IT Service Management and ITIL Information Security Cloud Computing EXIN offers CISCS testing through both Prometric and Pearson VUE exam centers. Source: EXIN Certified Integrator Secure Cloud Services IBM Certified Solution Architect-Cloud Computing Infrastructure (CSA-CCI) Certification level: Advanced Certification type: Vendor-specific Page 4 of 11
6 The IBM CSA-CCI certification track requires mastery of the following cloud-related principles: Cloud computing basics IBM Cloud Computing principles IBM Cloud Computing design concepts Implementing IBM Cloud Computing Types of clouds and as-a-service offerings Cloud infrastructure technologies, including cloud security Addressing security in a cloud computing environment Knowledge of the IBM Cloud Computing offerings, including provisioning, storage, security, monitoring and hypervisors Not surprisingly, this certification makes the most sense for security pros who are (or need to be) versed in cloud security built on IBM infrastructure. Those seeking this certification must be adequately versed in how products from Big Blue's Tivoli, Websphere and CloudBurst brands work to not only facilitate enterprise cloud computing, but can also be used to secure it. Source: IBM Professional Certification Program Salesforce.com Certified Technical Architect (SCTA) Certification level: Advanced Certification type: Vendor-specific Salesforce.com is one of the pioneers of cloud computing, specifically the Software as a Service (SaaS) movement. The SCTA certification is geared toward architects and designers who want to certify their knowledge and expertise for designing scalable and secure applications on the Salesforce.com cloud platform. In order to pass the SCTA exam, participants must demonstrate mastery of cloud application design principles, application-level security considerations (to ensure secure communications between Salesforce.com and thirdparty apps) and best practices for deploying applications via Page 5 of 11
7 Salesforce.com. Obviously, this is a highly specific certification and best for individuals whose organizations either have invested heavily in Salesforce.com, or those who intend to specialize in implementing and securing Salesforce.com infrastructures. Source: Salesforce.com Certification Architects Track Symantec Certified Professional- (SCP-CS) Certification level: Intermediate Certification type: Vendor-specific Symantec Corp. has always offered standalone, product-centric certifications, but several years ago Symantec recognized the market need for a multidiscipline certification track. As a result, the SCP certification program was established in July 2012 to offer certifications that span multiple Symantec products across an expanded area of expertise that now includes cloud concepts. The SCP-CS certification was developed in a partnership between Symantec and the Cloud Security Alliance as an intermediate-level certification that concentrates on security concerns within cloud computing environments. Symantec has been around for more than two decades and today engages in a number of IT security disciplines. Cloud security topics covered by this certification include design, deployment and management of cloud computing resources. Symantec stresses in this certification that cloud security is an important aspect of cloud computing that must be included as a discussion point in every step of the cloud migration or integration process. It is not acceptable, according to Symantec, to wait until deploying a cloud environment to start thinking about cloud security; security should be the overriding concern from the beginning of the cloud planning process, and that emphasis should carry through to the implementation and management phases of all cloud computing projects. To achieve this level of certification, candidates must provide proof of passing the CCSK exam Page 6 of 11
8 mentioned above, pass the SCP technical exam and accept the Symantec Certification Agreement. Contents Source: Symantec Certified Professional (SCP) Exam : Cloud Security 1.0 VMware Certified Advanced Professional-Cloud Infrastructure Design (VCAP-CID) Certification level: Intermediate Certification type: Vendor-specific VMware has become a leading provider of software for cloud computing infrastructure, virtual desktops and cloud management. Its early entry into cloud computing software gives VMware a corresponding head start in the vendor-specific cloud certification market. The VCAP-CID certification includes best practices for cloud design considerations, security, metering, compliance and availability. Note that there are other variants of the VMware Certified Advanced Professional certification that might also be beneficial to the aspiring -- or even the experienced -- cloud computing professional. Source: VMware Certified Advanced Professional-Cloud Infrastructure Design (VCAP-CID) Coming attractions Considering the growing emphasis on the security aspects of public and private cloud computing, there are several cloud-security-related certifications that are currently under development that I want to mention here so you can keep your eyes peeled as these certifications and exams become available in the coming months. Foremost among these future certifications is the (ISC)2 and CSA cloud security certification. This yet-to-be-named certification is expected to build off of the industry-leading CISSP certification of (ISC)2and the CSA's CCSK certification. At this time, few specifics are available, but Page 7 of 11
9 comments from CSA leadership indicate that the global credential will encompass both technical and strategic issues related to cloud security. The new certification, and its examination, are expected to debut in Other certifications worthy of note include: VMware Certified Advanced Professional-Cloud Governance (VCAP-CG) Cloud Certified Virtualization Specialist (CCVS) Certified Cloud Governance Specialist (CCGS) There's no doubt that we are in the very early days of cloud computing security certifications. As the adoption of various types of cloud computing grows and evolves, there will be an increasing need for information security professionals to ensure those implementations are secure, and in turn a need for the best and most capable of those infosec pros to identify and attain certifications that demonstrate their expertise. It will be an exciting field to watch in the months and years to come. Page 8 of 11
10 About the authors: Contents Ed Tittel is a 30-plus-year IT veteran who's worked as a software developer, networking consultant, technical trainer, writer and expert witness. Perhaps best known for creating the Exam Cram series in the late 1990s, Ed has contributed to over 100 books on a variety of computing topics, including numerous titles on information security and HTML. Ed also blogs regularly for Tech Target (IT Career Jump Start, Windows Enterprise Desktop) and other publications. Earl Follis is a long-time IT professional who's worked as a technical trainer, a technical evangelist, a network administrator and in other positions for a variety of companies that include Thomas-Conrad, Tivoli/IBM, Nimsoft, Dell and more. He's also contributed to numerous books, including For Dummiestitles on Windows Server and NetWare, and written for many print and Web publications. His primary areas of technical interest include networking, operating systems and unified monitoring. Page 9 of 11
11 Free resources for technology professionals TechTarget publishes targeted technology media that address your need for information and resources for researching products, developing strategy and making cost-effective purchase decisions. Our network of technology-specific Web sites gives you access to industry experts, independent content and analysis and the Web s largest library of vendor-provided white papers, webcasts, podcasts, videos, virtual trade shows, research reports and more drawing on the rich R&D resources of technology providers to address market trends, challenges and solutions. Our live events and virtual seminars give you access to vendor neutral, expert commentary and advice on the issues and challenges you face daily. Our social community IT Knowledge Exchange allows you to share real world information in real time with peers and experts. What makes TechTarget unique? TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals and management. We leverage the immediacy of the Web, the networking and face-to-face opportunities of events and virtual events, and the ability to interact with peers all to create compelling and actionable information for enterprise IT professionals across all industries and markets. Related TechTarget Websites Page 10 of 11
Hybrid cloud computing explained
computing explained A few years ago, the IT industry was focused on public cloud computing. Then after facing public cloud security issues, the focus shifted to private clouds. And now the focus has shifted
E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE
E-Guide HOW THE VMWARE SOFTWARE DEFINED DATA CENTER WORKS: AN IAAS EXAMPLE T he VMware software-defined data center turns virtualization into Infrastructure as a Service with automation and self-service.
Benefits of virtualizing your network
While server virtulization can improve your infrastructure as a whole, it can affect. Extending virtualization to can eliminate any unnecessary impacts and allow you to maximize your virtual investment.
HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT
E-Guide HOW TO SELECT THE BEST SOLID- STATE STORAGE ARRAY FOR YOUR ENVIRONMENT SearchSolidState Storage P erformance is the driving factor for the vast majority of companies considering a solid-state storage
Skills shortage, training present pitfalls for big data analytics
present pitfalls for big The biggest challenges related to big data analytics, according to consultants and IT managers, boil down to a simple one-two punch: The technology is still fairly raw and user-unfriendly,
Managing Data Center Growth Explore Your Options
Managing Growth Explore Your Options Managing Growth: Managing The increasing demand on data centers has forced many IT managers to look for new ways to manage data center growth, either by consolidating,
E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT
E-Guide CONSIDERATIONS FOR EFFECTIVE SOFTWARE LICENSE MANAGEMENT F or many reasons, has become a critical issue for many IT organizations and enterprise s alike. With many licensing options, hurdles and
E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD
E-Guide CLOUD COMPUTING FACTS MAY UNCLENCH SERVER HUGGERS HOLD T o d ay, n e a r ly e v e r y IT function is available as a cloud-based service: email, payroll, HR, analytics, and on and on. While higher-level
Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends
A Podcast Briefing produced by Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends Sponsored By: Key Trends in the Identity and Access Management Market
Hyper-V 3.0: Creating new virtual data center design options Top four methods for deployment
Creating new virtual data center design options Top four for deployment New features of Hyper-V provide IT pros with new options for designing virtual data centers. Inside this e-guide, our experts take
Preparing for the cloud: Understanding the infrastructure impacts Eight essential tips for a successful cloud migration
Eight essential tips for a successful How a The move to the cloud is happening and it s happening now. But before you jump start your cloud migration project, be sure you understand how to adequately prepare
GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE
Solution Spotlight GUIDELINES FOR EVALUATING PROCUREMENT SOFTWARE SearchFinancial Applications selection C hoosing the right can be challenging, especially as purchasing has evolved to encompass the basics
HOW MICROSOFT AZURE AD USERS CAN EMPLOY SSO
E-Guide HOW MICROSOFT AZURE AD USERS CAN EMPLOY SearchSecurity HOW MICROSOFT AZURE AD USERS CAN EMPLOY T echnology journalist David Strom explaims how to use Azure Active Directory and Azure Multifactor
Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED
Solution Spotlight BEST PRACTICES FOR DEVELOPING MOBILE CLOUD APPS REVEALED T here s two ways you can build your mobile applications: native applications, or mobile cloud applications. Which option is
MDM features vs. native mobile security
vs. : Mobile device management or MDM plays a critical role in, but should always trump native security features of mobile devices? Lisa Phifer weighs in on how to choose the best approach for your workforce.
How to Define SIEM Strategy, Management and Success in the Enterprise
How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have
5 ways to leverage the free VMware hypervisor Key tips for working around the VMware cost barrier
5 ways to leverage the free VMware Key tips for working around the VMware cost barrier While a free VMware virtualization setup only provides a limited list of features and functionalities, the shortcomings
Is Your Data Safe in the Cloud?
Is Your Data Safe in the? Is Your Data Safe in the? : Tactics and Any organization likely to be using public cloud computing are also likely to be storing data in the cloud. Yet storing data in the cloud
E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE
E-Guide MANAGING AND MONITORING HYBRID CLOUD RESOURCE POOLS: 3 STEPS TO ENSURE OPTIMUM APPLICATION PERFORMANCE W orking with individual in hybrid cloud can be complex, but Quality of Experience can be
Securing the SIEM system: Control access, prioritize availability
The prospect of a SIEM system crash or compromise should scare any enterprise given the role it plays in an organization s security infrastructure. This expert E-Guide discusses the implications of a compromised
Virtualization backup tools: How the field stacks up
tools: How the field Searching for the right virtual backup tools can be a grueling process. While there are plenty of available options, you must make sure to select the most effective products for a
BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS
E-Guide BUYING PROCESS FOR ALL-FLASH SOLID-STATE STORAGE ARRAYS SearchSolidState Storage A ll-flash storage arrays are becoming Tier-1 storage for mission-critical data. This e-guide showcases the progression
E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE
E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE W hy the need for a baseline? A baseline is a set of metrics used in network performance monitoring to define the normal
WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS
E-Guide WHAT S INSIDE NEW HYPER- CONVERGED SYSTEMS SearchDataCenter D ata center managers have a handful of new converged and hyper-converged infrastructure to choose from, and though there are components
Software Defined Networking Goes Well Beyond the Data Center
Software Defined Goes Well Software Defined Goes Well Software-defined networking (SDN) is already changing the data center network, but now the technology could redefine other parts of the network, as
Evaluating SaaS vs. on premise for ERP systems
Evaluating SaaS vs. on premise Increasingly organizations are given more options and evaluating SaaS vs. on premise options can be challenging for organizations. In this expert E-Guide, readers will learn
The skinny on storage clusters
The skinny on storage clusters Storage clustering can mean different things based on the vendor and the architecture which the technology is built on, but the features or benefits are usually similar across
E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER
E-Guide SIX ENTERPRISE CLOUD STORAGE AND FILE-SHARING SERVICES TO CONSIDER E ach enterprise cloud service has different capabilities. This expert E-Guide deep dives into how to know what you re getting
Expert guide to achieving data center efficiency How to build an optimal data center cooling system
achieving data center How to build an optimal data center cooling system Businesses can slash data center energy consumption and significantly reduce costs by utilizing a combination of updated technologies
3 common cloud challenges eradicated with hybrid cloud
3 common cloud eradicated 3 common cloud eradicated Cloud storage may provide flexibility and capacityon-demand benefits but it also poses some difficult that have limited its widespread adoption. Consequently,
The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals
The Do s and Don ts of Server Virtualization Back to basics tips for Australian IT professionals Virtualization is a well-established in today s IT environments, but it still remains a top priority among
E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING
E-Guide WHAT IT MANAGERS NEED TO KNOW ABOUT RISKY FILE-SHARING E mployees are circumventing IT protocols and turning to unsanctioned tools such as file-sharing, messaging, collaboration and social media
Best Practices for Database Security
Database Security Databases contain a large amount of highly sensitive data, making database protection extremely important. But what about the security challenges that can pose a problem when it comes
E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS
E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS B lock-based SANs and file-based networkattached storage are traditional technologies, and new trends and innovations continue to emerge with these age
CLOUD MANAGEMENT GUIDE
CLOUD GUIDE BY CARLOS ESCAPA, MANAGING DIRECTOR, QUMOTECH AUGUST 6, 2010 As organizations push more data into the Cloud, managing these new infrastructures is becoming the major challenge for IT. This
E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES
E-Guide UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES I n this E-Guide, Mike Chapple; a Search- Security.com expert discusses the new PCI Mobile Payment Acceptance Security Guidelines
Exchange Server 2010 backup and recovery tips and tricks
Exchange Server backup and recovery tips and tricks Exchange Server backup and recovery Exchange Server A big part of your job as an Exchange Server administrator involves preparing for and recovering
Managing the supply chain for SAP
Managing the supply chain for SAP Supply chain projects around collaboration with suppliers, contract lifecycle management and transportation management can provide a quick return on investment (ROI) for
Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY
Solution Spotlight KEY OPPORTUNITIES AND PITFALLS ON THE ROAD TO CONTINUOUS DELIVERY C ontinuous delivery offers a number of opportunities and for organizations. By automating the software buildtest-deployment
E-Guide HOW A TOP E-COMMERCE STRATEGY LEADS TO STRONG SALES
E-Guide HOW A TOP E-COMMERCE STRATEGY LEADS TO STRONG SALES A ccording to Forrester Research, e-commerce efforts will bring in $280 million in 2015. Companies who want a part of this growing market will
Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS
Essentials Guide CONSIDERATIONS FOR SELECTING ALL-FLASH STORAGE ARRAYS M ost storage vendors now offer all-flash storage arrays, and many modern organizations recognize the need for these highperformance
BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS
E-Guide BEST PRACTICES FOR MANAGING THE EVOLUTION OF EHRS SearchHealthIT W ith a focus on, the next wave of EHRs will incorporate powers of big data, speech recognition and new database models. This eguide
IBM 000-281 EXAM QUESTIONS & ANSWERS
IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of
How To Protect Your Online Backup From Being Hacked
Cloud Backup: Pros, Cons, and Cloud backup has taken the storage world by storm, and most IT professionals have given some serious thought to implementing it. But before you get started on your cloud backup
The Service, The Cloud & The Method: The Connection Points
The Service, The Cloud & The Method: The Connection Points Thomas Erl SOA Systems Inc. Prentice Hall Service-Oriented Computing Series Started in 2003 Text Books are an Official Part of the SOACP Curriculum
Moving to the Cloud: A guide for Southeast Asian IT and Business Managers
Moving to the Cloud: A guide for Southeast Asian IT and Business Managers Prepare for with these key strategies on cutting costs and managing risk Realizing true value from the cloud requires strong planning
5 free Exchange add-ons you should consider Eliminating administration pain points on a budget
5 free Exchange add-ons you should Eliminating administration pain points on a budget There are countless cost-free ways to supplement the basic features that come with Exchange and that help to streamline
Social media driving CRM strategies
Rapid changes in social computing, mobile and customer analytics are driving shifts in. In a recent survey, IT identified establishing a CRM strategy as the second greatest challenge, behind instituting
Novell Certified Training Salesperson Course. 2006 edition
Novell Certified Training Salesperson Course 2006 edition I N T R O D U C T I O N Welcome to the Novell Certified Training Salesperson course. In it, you will learn about the Novell training and certification
IBM Software Services for Lotus Lotus Professional Certification Programs
IBM Software Services for Lotus Lotus Professional Certification Programs Put your IT career into overdrive. The ladder to success just got easier to climb. If youõre a system administrator or application
Oracle Unified Method 5 Essentials (1Z0-568) Exam Study Guide. Kim Miller WWA&C Partner Enablement
Oracle Unified Method 5 Essentials (1Z0-568) Exam Study Guide Kim Miller WWA&C Partner Enablement Objective & Audience Objective To help you prepare to take the Oracle Unified Method 5 Essentials (1Z0-568)
HP Master ASE Data Center and Cloud Architect
HP ExpertOne Frequently Asked Questions (FAQ) HP Master ASE Data Center and Cloud Architect certification FAQ December 2014 What are the steps to certification? Why is the application the first step of
Optimizing Data Efficiency with Windows File Server and Storage Consolidation
An IT Briefing produced by Optimizing Data Efficiency with Windows File Server and Storage Consolidation By Pete Brey 2008 TechTarget BIO Pete Brey is the Technical Marketing Director for HP s Enterprise
Adding value as a Cloud Broker. Nick Hyner Director Cloud Services EMEA Twitter - @nickhyner. Dell.com/Cloud
Adding value as a Cloud Broker Nick Hyner Director Cloud Services EMEA Twitter - @nickhyner Dell.com/Cloud Overview A. Added Value Brokers in all industries in Digital Era B. Experience of Cloud Marketplace
Preparing for the Software-Defined Data Center A TECH TARGET WHITE PAPER FOR AVNET TECHNOLOGY SOLUTIONS
Preparing for the Software-Defined Data Center A TECH TARGET WHITE PAPER FOR AVNET TECHNOLOGY SOLUTIONS Opportunity and Market Size In IT today, anything even loosely characterized as softwaredefined is
