Cloud Security 101 – Part 2 – Key Defensive Strategies

Posted by & filed under List Posts.

cloud security -- locked data and devices

<<< Go to Cloud Security 101 – Part 1 – Key Threats Now that we have looked at critical cloud security threats, we examine key defensive measures to protect yourself from them.These recommendations are by no means exhaustive but represent top points of focus. Secure your client devices. You want to implement firewalls to protect… Read more »

Cloud Security 101 – Part 1 – Key Threats

Posted by & filed under List Posts.

cloud security threats and defenses

Go to Cloud Security 101 – Part 2 – Key Defensive Strategies >>> There are general changes in cloud computing that are of interest, but security is such a fundamental concern for online business that it deserves its own attention. This two-part Cloud Security 101 piece looks essentially at the problem and the solution, answering… Read more »

Quickstart Guide to Multicloud Computing

Posted by & filed under List Posts.

Cloud is dominating. That much is clear. The vast majority of companies are using cloud of some type, according to a study from 451 Research. The same analysis found that by 2019, nearly three-quarters of organizations (69%) will have launched hybrid cloud or multicloud environments. In fact, IDC has noted that multicloud plans are needed… Read more »

Managed Data Protection, Powered by Veeam

Posted by & filed under List Posts.

managed data protection for your IT systems

A 2017 report from IDC found that the data protection and recovery software market was not growing as fast as it had in previous years – dropping to a 2.1% compound annual growth rate (CAGR) from a 6.8% CAGR in 2016. There was much more impressive growth among some players though: smaller providers grew at… Read more »

How to Secure Your Cloud Server

Posted by & filed under List Posts.

How to Secure Your Cloud Server

A few years ago, security was listed as one of the biggest reasons people might not want to entrust their data to the cloud. For good reason, companies have been careful and systematic in figuring out what information systems to use; security challenges on the Internet are by no means a new thing. Even back… Read more »