Agentless vs. agent-based cloud architectures: Why does it matter?

(c)iStock.com/TERADAT SANTIVIVUT

In the world of security, monitoring and analytics solutions for IaaS cloud, there’s a lot of discussion and debate about agent-based vs. agentless service architectures. Your choice of agentless vs. agent-based cloud security can have a big impact on the efficiency of your day-to-day operations for security and compliance as well as your ability to protect your cloud environment in the future. It’s important to understand what the difference is, and be fully aware...

By Zohar Alon, 31 October 2016, 1 comment. Categories: Amazon, Architecture, Platform, Security.

Advanced cloud security: Standards and automation in a multi-vendor world

(c)iStock.com/maxkabakov

Enterprise IT has long struggled to develop common standards for the security of cloud deployments. With multiple cloud vendors, fast-moving product teams, and a changing security landscape, it is perhaps no wonder that enterprises are left asking:

  • What is the right cloud security standard?
  • What level of security is “good enough”?
  • And most importantly — how do we apply these standards in a consistent way to existing and new cloud environments?

In July 2016, the Ponemon Institute published 

By Logicworks, 27 October 2016, 1 comment. Categories: DevOps, Security, Vendors, Vulnerabilities.

Why it’s time to take new strategies for beating ransomware

(c)iStock.com/Leonardo Patrizi

The sad facts of ransomware are that no-one is immune and attacks are impacting hospitals, schools, government, law enforcement agencies and businesses of all sizes. The increased frequency – and scale – of attacks has organisations thinking differently about their approach to ransomware. According to the FBI, ransomware attacks have increased 35-fold in 2016, resulting in an estimated $209 million paid out every quarter.

In addition, there has recently been a string...

By Jeff Denworth, 26 October 2016, 0 comments. Categories: Privacy, Security, Vulnerabilities.

Box and Skyhigh Networks come together for greater cloud security and governance

(c)iStock.com/LeoWolfert

Cloud security services provider Skyhigh Networks and enterprise cloud storage firm Box have announced a partnership designed to enable greater data governance for Box customers.

Users can identify sensitive data, automatically classify it, and enforce collaboration control policies through Skyhigh and Box Security Classification, all without requiring any change in customer behaviour.

To put the partnership into context, take a situation where an employee uploads a document with...

By James Bourne, 21 October 2016, 0 comments. Categories: Security, Software, Storage.

How cloud storage became a target for hackers – and what can be done about it

(c)iStock.com/4774344sean

With the recent revelations that Yahoo! experienced a hack in 2014 where the accounts of around 500 million users were compromised, it brings back into focus the importance of businesses ensuring their customers’ data is always protected.

More and more businesses are now using the cloud to store their data. As with all new technologies though, hackers will look to exploit any security vulnerabilities they can find. While it is not yet clear whether the attack on Yahoo! was on a...

By David Midgley, 20 October 2016, 0 comments. Categories: Security, Software, Storage.

Microsoft launches cloud services due diligence checklist

(c)iStock.com/cruphoto

Microsoft has launched a cloud services due diligence checklist aimed at providing organisations with more standardised procedures for their potential cloud push.

The checklist is based on the emerging ISO/IEC 19086 standard which focuses on cloud service level agreements, and gives structure to organisations of all sizes and sectors to identify their objectives and requirements, before comparing the offerings of different cloud service providers.

“Cloud adoption is no longer simply a...

By James Bourne, 17 October 2016, 1 comment. Categories: Microsoft, Privacy, Security, SLA.

Recovering from disaster: Develop, test, and assess

(c)iStock.com/natasaadzic

Disaster recovery (DR) forms a critical part of a comprehensive business continuity plan and can often be the difference between the success and failure of an organisation. After all, disasters do happen — whether that’s a DDoS attack, data breach, network failure, human error, or by a natural event like a flood.

While the importance of having such a strategy is well recognised, how many organisations actually have the right plan in place? Not many, according to the 2014

By Stuart Nielsen-Marsh, 17 October 2016, 0 comments. Categories: Data & Analytics, Data Management, Disaster Recovery, Security.

More apps are being stored in the cloud – but are we putting too much faith there?

(c)iStock.com/mushakesa

While two thirds of organisations polled by cloud storage and data protection provider CTERA Networks deploys more than a quarter of its applications in the cloud, protecting them is a different story altogether.

The findings appear in a report entitled ‘Game of Clouds’ – no prizes for guessing the theme – which makes the research concept clear.

“The emergence and tremendous growth of cloud computing in the enterprise is taking IT environments to uncharted...

By James Bourne, 12 October 2016, 0 comments. Categories: Applications, Migration, Security, Storage.

How cloud and IoT services are driving deployment of public key infrastructures

(c)iStock.com/cherezoff

A new study from Thales and the Ponemon Institute has found that, for more than three in five businesses polled, cloud-based services were the biggest trend driving the deployment of applications using public key infrastructures (PKI).

PKI refers to the ability for users and organisations to send secure data over networks; as defined by TechTarget, it “supports the distribution and identification of public encryption...

By James Bourne, 11 October 2016, 0 comments. Categories: Applications, Data Management, Security, Vulnerabilities.

The hidden dangers of legacy technology – and how to resolve them

(c)iStock.com/TiSanti

Every business has that one legacy system they can’t seem to let go of. You know you’ve got one - a relic hidden away in some dusty server room. But are you aware of the damage these outdated systems can, will and may already be having on your organisation?

The damage inflicted by legacy technology can range from minor systems issues through to major events that could put your organisation out of business – and it’s important to know the hidden dangers.

Increased downtime...

By Ed Jones, 10 October 2016, 0 comments. Categories: Compliance, Data & Analytics, Data Management, Security.