Home > Resources > Blog
Jun
Ensuring that Web-based applications are secure requires a number of layers of security, not the least of which is a Web application firewall (WAF). A Web Application Firewall is a critical layer when considering the confidentiality, availability and integrity of Web-accessible data. This guide seeks to help organizations in purchasing a WAF by wading through the key questions and concerns they should consider while investigating the market. The range in […]
Read moreJun
As a midmarket company in the cloud era….do I go with an in-house Security Operations Center or Cloud Managed Security Services? Security analyst David Strom recently analyzed why smaller and mid-sized businesses are moving away from the in-house Security Operation Center to Cloud Managed Services and associated Cloud Security offerings. The primary driver of the migration for smaller-to-mid market business is enhanced cloud security features in the public cloud such as […]
Read moreJan
If you read our 2016 predictions for IT you would have noticed our 2nd prediction was “we’ll all be hacked”. As I mentioned the threat and top of mind placement for Cyber Security is stating the obvious. Cyber Security at top of mind has been a recurring theme over the past 3-5 years culminating with its attention in the C-Suite over the more recent end of that range. Based on […]
Read moreDec
We have spent the past few weeks analyzing the history and more recent trends of IT. Our specific focus is to help IT leaders ride the 3rd platform wave –becoming a disruptive business growth engine rather than the road-block stopping progress. It doesn’t seem like December (still quite warm here in New York City) however the end of the year and holiday season has arrived. So now let’s take a look […]
Read moreDec
Imperva (IMPV) Imperva, Inc (www.imperva.com) is a California-based cyber security firm offering integrated platforms and appliances for web, database and file security. Imperva’s primary application is a Web Application Firewall known as Secure Sphere which was recently rated as the leader in Gartner’s Magic Quadrant. Gartner’s analysis noted Imperva’s lead in several areas High success rate on protection rather than just detection of threats Simple “drop-in install” (alternatively called transparent bridge deployment) Amazon […]
Read moreOct
October is National Cyber Security Awareness Month in the United States. To improve your awareness our security analysts have outlined top threats to keep in mind in order to protect your business. Read below to learn more about the top cyber security business threats today and our recommendations to mitigate threats to your business operations. Internal Threats: By far the #1 cause of cyber attacks and data loss is cause […]
Read moreOct
Customers have been asking what is the cloud broker and why do I need it? The following post will explain the role of the cloud broker and how it fits into the world of Cloud Managed Services. What is a Cloud Broker? Cloud brokers and Cloud Managed Services providers partner with companies such as Amazon Web Services, Microsoft, and Google in order to provider cloud services. The primary value add […]
Read moreOct
Are you thinking of cloud migration, but have your doubts whether cloud security is adequate? You are not alone. Some small and mid-market businesses are hesitant to full embrace cloud migration, fearing that their business sensitive data might get breached when stored in the public cloud. But is the risk really that high or can it be managed? As statistics show, more than half of all enterprises and third of […]
Read moreOct
For mid-sized business the cloud is a necessity for driving business agility, speed-to-market and reducing capital expenses. Despite that many IT leaders remain hesitant to migrate to the public cloud due to ongoing concerns about Cloud Security. There are many misunderstood points about security in the cloud. This post will highlight a few from our experience as a Cloud Managed Services provider in New York. I can stop Shadow IT […]
Read moreOct
At the recent re:Invent conference Amazon announced the launch of their Inspector tool as part of Amazon Web Services (AWS). This has answered many of the compliance and cloud security concerns that customers had with utilizing the public cloud. Amazon Inspector is designed to scan applications launched within Amazon Web Services. It is primarily focused on identifying anomalies introduced during or post-deployment. The application allows Amazon Web Services to meet […]
Read more