Cloud Services Brokerage: Five Security Questions to Ask

Cloud Services Brokerage: Five Security Questions to Ask

Moving business applications and data to the cloud doesn’t shift the ultimate responsibility organizations have for protecting sensitive customer, patient and corporate data. Before partnering with a cloud services brokerage (CSB) — or any cloud service provider — it is important to know what measures it takes to ensure the data entrusted to it will be appropriately safeguarded.

Single standard for cloud-computing services

Single standard for cloud-computing services

The Federal Risk and Authorization Management Program, also known as FedRAMP, is adopting a “cloud-first” policy that will standardize the basic security requirements that cloud-computing providers, such as Google and Microsoft, will have to meet before receiving government contracts.

8 Features Your Spam Filtering Service Must Include

8 Features Your Spam Filtering Service Must Include

When it comes to selecting the best spam filtering service for your business, there are several critical features your chosen vendor must offer for you to get the best value for money and the maximum protection for your users. In this post I outline the eight features your spam filtering service must have.

Top threats for cloud computing

Top threats for cloud computing

Cloud computing reached the point where computing functions as a utility. Here are the the top cloud computing threats to help organizations better understand them and make the best choices for their businesses.

Translating a Vision for IT Amid a “Severe Storm Watch”

Translating a Vision for IT Amid a “Severe Storm Watch”

IT departments adopt technology from two perspectives: from a directive by the CIO to a “rogue IT” suggestion or project from an individual user. This article suggests a framework to implement a vision from strategy, policy, process, and ultimately tools.

Outsourcing data center infrastructure

Outsourcing data center infrastructure

Setting up your own data center is expensive in terms of money, time and deployment of human resources but it is more efficient to outsource this service, which will save your company costs and allow the business to focus on core competencies.

Multi–tenancy in the cloud: Understanding its benefits

Multi–tenancy in the cloud: Understanding its benefits

Multi–tenancy refers to a principle in software architecture where a single instance of a software application serves multiple customers, also known as tenants and is regarded as one of the essential attributes of Cloud Computing.

Working on a cloud software Service Level Agreement

Working on a cloud software Service Level Agreement

As more and more consumers outsource their infrastructure to cloud providers, Service Level Agreements between consumers and providers is a key topic. According to IBM a Service Level Agreement „defines how the consumer will use the services and how the provider will deliver them”.

How to find IT specialists for the cloud – CISCO implementation for ConnectEDU

How to find IT specialists for the cloud – CISCO implementation for ConnectEDU

One of the challenges I had to face was migrating from all of my physical infrastructure to Navisite’s Managed Cloud Sevices for ConnectEDU. Today I would like to talk about the process of hiring IT specialists based on my experience with the CISCO implementation for ConnectEDU.

What are the most common cloud outages and how to prevent them?

What are the most common cloud outages and how to prevent them?

A service disruption is a technical perfect storm. Initial mistakes made by engineers can cause the appearance of several other bugs and glitches. The fact with the cloud is that “a host can and will fail”. What are the most common cloud outages and how to prevent them?

Make Cloud Security a Shared Responsibility

Make Cloud Security a Shared Responsibility

Despite the business and technical advantages of cloud computing, many potential customers have yet to join in, and those that have implemented it still have reservations about moving all their valuable data to the cloud. As we all know, one of the top issues for organizations when it comes to handing over some of their IT capabilities to a third party is security.