DDoS

Disaster Recovery Strategies for Cloud Network Outages

By Jennifer Klostermann | April 3, 2017

Cloud Network Outages Today, many organizations rely on the cloud for database and application services, a safe, cost-effective, and operationally advantageous strategy. However, when a widespread network outage hits, the necessary recovery mechanisms aren’t always in place. According to a

4 Tips for Secure Video Conferencing

By Vineet Misra | March 30, 2017

Securing Video Conferencing Today, cybersecurity dominates headlines as businesses of all sizes and across multiple industries are falling victim to data breaches and distributed denial of service (DDOS) attacks. Yet unified communications technologies have gained less attention in the security

what is edge computing

Computing on The Edge – Mobile Data Centers

By Josh Hamilton | March 20, 2017

Computing on The Edge Every single day more and more data is produced, exchanged, processed, and transmitted around the world. The sheer amount of data processed every day is growing exponentially and by 2020 Intel has estimated that the average

Downtime recovery: Stats show what every enterprise should be doing

By Cloud Syndicate | March 17, 2017

Downtime Recovery Most business owners expect to face an IT failure at some point in their enterprise career. But, while these dreaded spells of down time have come to be considered an inevitability since the invention of the internet, that’s

PODCAST – EPISODE 1: Most Efficient Way To Transport Mega-petabytes Of Data

By Steve Prentice | March 12, 2017

CloudTweaks Podcast Discussing Cloud Security with Zohar Alon, CEO of Dome9. Also what is the fastest and most efficient way to transport mega-petabytes of data? Hint: it has 18 wheels. And our outsider’s perspective from Jeremy Daniel. Contact us for

5 Recommendations for Effective Governance, Risk and Compliance Management

By Vibhav Agarwal | February 20, 2017

Effective Governance, Risk and Compliance Cloud adoption continues to grow, which is evident from the fact that annual 2016 revenues for cloud vendors were “within touching distance” of $150 billion. Gartner also predicts that, a corporate ‘no-cloud’ policy will be

ThreatMetrix Quarterly Fintech Cybercrime Report 2017

By Jennifer Klostermann | February 8, 2017

Fintech Cybercrime Report 2017 ThreatMetrix has released its latest quarterly cybercrime report based on cybercrime attacks from October to December 2016, detailing trends across financial services and eCommerce, with a global study of traffic patterns and emerging threats. Financial Services

How Printers Help Hackers Hide In Plain Sight

By Steve Prentice | January 26, 2017

Printers and Hackers Spies and thieves often do their best work by hiding in plain sight. No one suspects the person sipping coffee at the table across from you in the coffee shop – the one who happens to be

Four Cloud Security Mega Trends

By Roy Feintuch | January 19, 2017

Cloud Security Trends Last year was a big year for the cloud. Cloud adoption continued to grow at a rapid clip, even as executives from companies such as McDonald’s and ENEL talked about how their organizations are embracing a cloud-first

Smarter Homes Through Technology

By Jennifer Klostermann | January 12, 2017

Smarter Homes Rumour has it that 2017 will be the year of the smart home; not a new prediction, smart homes have been trending for a while, but an exciting possibility nonetheless. It’s possible that, as ever, given a little

THOUGHT LEADERSHIP ARCHIVE

Demand For Cloud Skills Increases Around The World

By CloudTweaks

Demand for Cloud Skills Increases Thinking about adding more cloud skills to your repertoire? Stop thinking. The time to do it is now. For IT professionals, cloud computing skills are becoming an essential resume item. Companies are actively – and

The Economics, Concepts and Fundamentals of Cloud Computing

By Gopan Joshi

Fundamentals of Cloud Computing Addressing security concerns of the Public Cloud Enthusiasm for cloud computing has as much to do with economics as technology. Growth in the number of applications and the volume of data that must be managed have

Enterprise Adoption

What The Egg McMuffin Teaches Us About Enterprise Adoption

By Bret Clement

Enterprise Adoption On one hand, cloud computing has unleashed a new degree of innovation, enabling line-of-business users to become incredibly nimble. Gartner last year famously predicted that CMOs would spend more on IT than CIOs within the next five years.

Best Practices for Implementing Cloud Collaboration

5 Best Practices For Implementing Cloud Collaboration

By Christian Buckley

Best Practices for Implementing Cloud Collaboration Over the past decade, the momentum for enterprise collaboration has shifted from the building of massive intranet solutions, usually developed and maintained by internal IT organizations, toward more flexible and cost-effective cloud-based collaboration platforms.

The Paradigm Shift In Enterprise IT Operations Management

By Sheetal Kale

IT Operations Management Rapid change is the new constant with today’s Enterprises. There is a continuous shift in the technology landscape and the demands of the customers coupled with Enterprises wanting to stay competitive. This changing, fluid environment results in

3 Challenges of Network Deployment in Hyperconverged Infrastructure

By Ariel Maislos

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of

Mitigating the Downtime Risks of Virtualization

By Paul Mercina

Mitigating the Downtime Risks Nearly every IT professional dreads unplanned downtime. Depending on which systems are hit, it can mean angry communications from employees and the C-suite and often a Twitterstorm of customer ire. See the recent Samsung SmartThings dustup

Online File Sharing And The Importance Of Security

By Charles Mount

Online File Sharing Security Do you have confidential business files stored on your work computer? Maybe it’s a spreadsheet for a report that must be delivered to management tomorrow. If you don’t work on it from home, you’ll be at

Collaboration in 2018 and Beyond: Four Technology Trends That Will Have Maximum Impact

By Bobby Beckmann

Collaboration in 2018 Four Technology Trends 2017 is coming to an end, which marks the time of year when we take a look into the crystal ball and share predictions on how emerging technologies will change the way we work.

Putting The Service Back In “as-a-Service”

By CloudTweaks

“as-a-Service” The future of cloud computing has often been framed as being a debate between private vs. public clouds, with each model having its own strengths and weaknesses in terms of cost-effectiveness, control and security. The debate should instead focus

SD Wan Speeds

Debunking some common SD WAN myths

Common SD WAN Myths There are few buzzwords in the networking world as current as ‘SD WAN’ – and depending ...
Small Businesses CAN Compete Using The Cloud

Small Businesses CAN Compete Using The Cloud

Small Businesses Cloud In the past, small business owners had to either run applications or software that was downloaded physically ...
What Is Net Neutrality And Why Is It So Important?

What Is Net Neutrality And Why Is It So Important?

What Is Net Neutrality? Net neutrality is a concept that has been the centre of a lot of debates recently, ...
5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based ...
How Security Certification Helps Cloud Service Providers Stay Transparent and Credible

How Security Certification Helps Cloud Service Providers Stay Transparent and Credible

Security Certification Helps Cloud Service Providers If you are a cloud service provider (CSP), you know your customers have a ...
Cybersecurity Data Breaches: Incident Response Planning

Cybersecurity Data Breaches: Incident Response Planning

Incident Response Planning The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, ...