Secure SaaS: Cloud services and systems News
October 07, 2014
Sophos looks to strengthen its cloud security offerings for mobile security with the acquisition of Mojave Networks, a mobile security startup.
September 02, 2014
Following the iCloud hack and resulting leak of celebrity photos, experts say many enterprises 'don't have a clue' that corporate data could also be at risk.
August 06, 2014
At Black Hat 2014, a researcher showed how AWS cloud security flaws and misconfigurations can have devastating consequences for AWS customers that don't take security seriously.
July 15, 2014
Exclusive: The co-founder of One More Cloud explains how an old AWS API key was used to take down the company's services, and the hard lessons learned.
Secure SaaS: Cloud services and systems Get Started
Bring yourself up to speed with our introductory content
Securing approved cloud applications is hard enough, but what about the apps it can't see? Expert Ed Moyle discusses three strategies for finding enterprise shadow cloud usage. Continue Reading
So, what is cloud computing anyway? The definition isn't always clear. Ravila Helen White helps enterprise security professionals figure it out. Continue Reading
Video: Securosis CEO Rich Mogull details cloud security basics, including how the cloud affects enterprises today and the joys of security automation. Continue Reading
Evaluate Secure SaaS: Cloud services and systems Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Software-defined security is becoming an IT buzzword, but does it live up to the hype? Expert Kevin Beaver takes a look at the benefits and pitfalls of the technology in the enterprise. Continue Reading
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP. Continue Reading
While cloud-based identity and access management services offer numerous benefits to enterprises, there are also a number of drawbacks. Learn the risks and rewards of cloud IAM. Continue Reading
Product ReviewsPowered by IT Central Station
The FortiGate security appliances. UTM security in a single device, good administrative interface and performances.Powered by IT Central Station
First things first Talking about FortiGate from Fortinet we are talking about a family of UTM (Unified Threat Management) appliances. This...Continue Reading
For price criteria, Fortinet wins over competitors. That being said, certain areas of the product need improvementPowered by IT Central Station
Valuable Features: <ul> <li>Performances</li> <li>VDOM</li> <li>UTM</li> <li>Consolidated...Continue Reading
Powered by IT Central Station
Cisco ASA has better application granularity, a more flexible means of policy creation, and easier to use controls and more powerful reports ...Continue Reading
Manage Secure SaaS: Cloud services and systems
Learn to apply best practices and optimize your operations.
Video: Voodoo Security Founder Dave Shackleford details some of the most worrisome cloud security risks, and how to take advantage of cloud security automation. Continue Reading
FedRAMP raises the bar for security among applicable cloud providers, but can it influence broader cloud computing contracts and standards? Continue Reading
Following the collapse of an AWS-based cloud hosting provider, experts say enterprises should prioritize use of multifactor authentication. Continue Reading
Problem Solve Secure SaaS: Cloud services and systems Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Adopting cloud-based applications can be a security headache. Michael Cobb explains how to perform tests that validate cloud app security. Continue Reading
Should enterprises deploy cloud-based UTM when it's billed by the hour? Brad Casey discusses the pros and cons of the offering. Continue Reading
Cloud-based application security is becoming an increasingly prevalent concern. Uncover three key best practices for preventing security breaches. Continue Reading