Items Tagged with "Managed Services"
July 06, 2012 Added by:Rafal Los
Everything in life will fail at some point - it is a smart thing to plan for and architect into your applications or services. Undoubtedly this type of strategy costs more - having multiple providers, more complex software, more data shipping and redundancy isn't cheap - but this is one lesson you must learn...
July 05, 2012 Added by:Jack Daniel
You cannot “stop attacks”, you can only alter the consequences of the attacks. You can stop attacks from succeeding sometimes, and minimize the impact on your organization, but the attacks will come no matter what. Further, the idea that “attacks” only fall into two categories, zero-day and patchable, is more nonsense...
July 04, 2012 Added by:Gregory Hale
The cloud-based control panel uses the secure HTTPS protocol and has a valid certificate. The customer has access to tutorials and a malware engine that generates customized Trojans in real-time. The team behind the service makes sure the created Trojans have a low rate of detection by major antivirus products...
June 27, 2012 Added by:Rafal Los
One cloud does not fit all. Your cloud should be customized to fit your business. I believe that if you're going to have a cloud strategy you need to have a pragmatic approach which has you doing your due diligence, proper risk analysis, and understanding your cloud vendor...
June 25, 2012 Added by:Headlines
“The most disturbing findings were the number of companies that report they have no way to track what data is being stored in the cloud, no process to manage access to that data (or plans to do so), and that management doesn’t know where enterprise data is stored. This should act as a wakeup call for organizations..."
June 24, 2012 Added by:Ben Kepes
I was interested to read recently a survey that was commissioned by the Cloud Alliance. What was key for the respondents? Data security and end-user privacy were paramount. One-quarter of survey respondents in organizations with more than 200 workers listed security and privacy as their primary concerns...
June 11, 2012 Added by:Danny Lieberman
The short answer is that you should not store PHI (protected health information) on Dropbox since they share data with third party applications and service providers - but the real reason is you should not use Dropbox for sharing information with patients is simply that it is not private by design...
June 11, 2012 Added by:Theresa Payton
How should you protect your precious digital files? The good news is there are many services to choose from. Here is just a short list to review so you can pick what is best for you based on storage options, privacy and security features, and budget...
June 11, 2012 Added by:Ben Kepes
Some cloud vendors are engaged with IT and following a top down adoption approach while others are aiming for a more viral bottom up adoption. What issues do these different approaches raise and how do we navigate this path while ensuring agility and compliance?
June 06, 2012 Added by:Neira Jones
There are numerous third parties and cloud providers around. A few have already achieved a dominant position, but a recent article highlighted that "others have opportunities to get into the act by offering more security and protection". So there you are, security can be a unique selling proposition...
June 05, 2012 Added by:Ben Kepes
"Migrating to the cloud is not an easy process but good preparation goes a long way toward making it easier. Many businesses do not have their internal systems in good shape in the first place so migrating them to the cloud in bad condition must be horrendous"...
June 05, 2012
This document reprises the definition of cloud computing, describes cloud computing benefits and open issues, presents an overview of major classes of cloud technology, and provides guidelines and recommendations on how organizations should consider the opportunities and risks of cloud computing...
June 04, 2012 Added by:Bill Gerneglia
Beyond managing regulations and liability, companies outsource their IT functions to third parties create infosec privacy and legal difficulties, including loss of control and challenges with enforcement. Risk and compliance obligations do not disappear when using a third-party service provider...
June 01, 2012 Added by:Electronic Frontier Foundation
EFF’s asked the court to return files lost when Megaupload was seized last January. Since then, we’ve been to court both for a hearing and a mediation and nothing has changed. The key problem: the government has failed to help third parties get access to their data. So we have no choice but to go back to court...
May 24, 2012 Added by:Bill Gerneglia
By allowing test teams to instantly deploy existing performance test scripts to cloud-based load generators, the load is created on pre-configured systems provisioned in the cloud. This eliminates the effort and cost related to extending the on-premise test infrastructure...
May 23, 2012 Added by:Rafal Los
If you've chosen wisely, you environments across your public and private clouds are consistent. The big question is - how do we keep our environments consistent in the face of security requirements to push patches? The answers rely very heavily on automation and policy...