November 03, 2015
The first hurdle of hybrid cloud migration is tricky enough -- then the rest of the hybrid cloud picture comes into focus.
September 28, 2015
Apple has unseated BlackBerry at the top of the enterprise mobility market and made Windows an afterthought. Android is making efforts to gain ground.
August 12, 2015
The Darkhotel advanced persistent threat group used an Adobe Flash zero-day vulnerability from the Hacking Team data leak, according to Kaspersky research.
August 07, 2015
News roundup: ICANN confirmed its members' credentials were stolen Wednesday, forcing the nonprofit to enforce a site-wide password reset. Plus: VPN provider being used for APTs; Thunderstrike strikes again; Windows 10 security in its first week.
VPN Get Started
Bring yourself up to speed with our introductory content
Running Exchange in Azure doesn't compare favorably to Office 365, but it has valid instances where it might be useful. Consider costs and competitors first. Continue Reading
With the right network as a service (NaaS) offering, enterprises can boost the availability and performance of their cloud applications. Continue Reading
Expert Ed Tittel examines the top unified threat management (UTM) appliances to determine which one could be the best for your organization. Continue Reading
Evaluate VPN Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
WAN connection types have evolved from T-1s and ISDN links to dynamic pipes capable of supporting bandwidth-intensive applications. What's next? Continue Reading
Adopting a service-level agreement is an important part of the software-buying process. Agreements help ensure users get what they expect and consequently help vendors that are able to uphold their end of the bargain retain customers. But service-level agreements for the cloud aren't easy to pin down. Customers need to set up rules for many different circumstances.
This handbook lays out the steps to crafting a successful cloud service-level agreement. First, consultant Tom Nolle writes about the need to know who's responsible for a cloud service or application and when they're in charge. This will help track future issues to their root cause. Second, freelancer Crystal Bedell talks to industry experts about how to create a successful service agreement for the hybrid cloud. The discussion continues with the idea of responsibility, which is especially acute in the hybrid cloud where public and private clouds meet. Third, Nolle returns and gets into the details of writing a cloud service-level agreement and the myriad details that need to be covered to ensure users adopt one that will be effective. He covers how application workflows, multiple players, network connections, border crossings and potential violations should be addressed in a cloud service-level agreement. Continue Reading
Microsoft is adding new features to accommodate hybrid SharePoint users, but challenges remain, and the SharePoint roadmap likely still leads to the cloud, says an expert. Continue Reading
Learn to apply best practices and optimize your operations.
Centrally managing system logs is an important practice for enterprise security. Expert Dejan Lukan explains how to set up cloud servers, such as ELK stack, for this purpose. Continue Reading
How can enterprises enable mobility while insulating corporate networks from mobile malware? Per-app VPN tunnels offer secure remote access when combined with other measures. Continue Reading
Our latest firewall/VPN firmware upgrade left CPU usage at 100%. A malfunctioning DHCP-Server means people aren't getting IPs. I have to pull the plug to restart the firewall. What size switched PDU do I get? Continue Reading
Problem Solve VPN Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Industrial control systems should be securely managed by the enterprise, specifically when vendors need access to them. Here are some ways to handle industrial control systems security. Continue Reading
Hosting apps in the cloud does not necessarily create a cloud malware risk. By focusing on new interfaces a cloud migration creates, you can make the cloud as secure as your data center. Continue Reading
According to recent research, mobile certificate usage is riddled with security issues. Expert Michael Cobb explains how to best control and secure mobile certificates in the enterprise. Continue Reading