cloud security

08.03.15

It’s Virtually Impossible to Write a $100 Check

by

Stop and think what it takes at your company for someone to write a $100 check from the company checkbook. It doesn’t seem like a lot but there are controls in place to make sure that it is not easy to write that $100 check, controls meant to protect the company from fraud, theft and […]

Read More

07.20.15

Virtualized Infrastructure Protection: “Last Mile”

by

Protecting the “Last Mile” of Virtualized Infrastructure The telecommunications network operators refer to the final leg of the connection to end-users as the “last mile”. While fiber may run close by, completing that last mile has been a challenge and elusive. The same can be said for organizations leveraging virtualization. Those “last mile” goals, or […]

Read More

06.15.15

Protecting Your Hypervisor: When the Enemy Breaks Through the Line, Command and Control Is the New Soft Underbelly

by

The foundation of modern day cloud security completely depends on the security of your hypervisor. It’s the hypervisor that controls and coordinates the functioning of virtual machines running on a server. With the shift to virtualization, the hypervisor becomes your most vulnerable point. In order to increase efficiency, organizations are condensing multiple virtual machines into […]

Read More

05.06.15

Continuous Monitoring Offers Sustainable Compliance

by

Verizon’s 2015 PCI report is out, offering some reassurance to those worried about the state of security in point of sale systems. But compliance rates continue to be low. The report notes that the number of organizations meeting full compliance nearly doubled from 2013. But only about a quarter of those organizations managed to remain […]

Read More

05.04.15

Addressing IT’s Biggest Security Concerns

by

Security has become the biggest worry the IT world faces. With a growing number of high-profile breaches and no end in sight, we thought it wise to examine the security issues that concern IT professionals most, ensuring our products are still addressing the security and compliance needs of businesses using virtual systems.

Read More

04.30.15

The Modern Virtual Data Center: Availability with Security and Compliance

by

Today’s enterprise IT professionals are fighting for their jobs. Who’s stealing them? AWS, that’s who. As businesses reach for the immediate gratification of Infrastructure as a Service – instant scale up, agility, no waiting for hardware provisioning – they aren’t thinking about security. They’re thinking about business benefits first, leaving security for someone else to […]

Read More

04.10.15

FDA Guidelines for Medical Device Security Offer Wise Approach to PHI Security

by

New voluntary guidance from the FDA tells medical device managers to address security before submitting devices for pre-market review. This approach underscores the importance of security integration in product design (not just for the device, but for the firmware and systems that host the data) rather than the add-on approach that has failed so many […]

Read More

03.27.15

Encryption Key Management vs. Cloud-Based Encryption: Protecting Data from Governments (and Hackers)

by

The Snowden scandal did more than alert businesses to the increasing dangers of system intrusion. It also made us realize that part of our national defense system includes keeping tabs on data in the cloud. With so much information stored in the cloud, how can we be sure those hosting our data aren’t obligated to […]

Read More

03.20.15

When Consumer Privacy Is a Competitive Advantage, Security Can Be a Marketing Tool

by

New research from Forrester predicts that strong privacy policies will give businesses a competitive edge in 2015. We think Forrester has a good point. Research shows that privacy is a major concern for consumers, so companies with strong security will be able to leverage their strength and enjoy the marketing benefits. When faced with the […]

Read More