Security and Compliance

Private vs. Public Cloud: It’s All About Control

Jonathan Rosenson
Read Time 4 min.

Private vs. Public Cloud Cloud computing delivers infrastructure as a service (IaaS) that can be consumed as an operating expense rather than acquired as an asset. The flexibility of moving from capital expense to operating expense provides organizations with a choice between public cloud and private cloud environment options. Choosing between the two—or taking a hybrid cloud approach where...

How to Reduce your Risk of a Data Breach

AJ Kuftic
Read Time 2 min.

Reducing your risk of a data breach with next-generation firewall solutions Firewalls act as a secure gateway between a trusted network and other untrusted networks – such as the Internet – and only allows traffic into the network that is approved through the defined firewall policy. Firewalls protect your network and your data. Enhancing your firewall through added security...

How secure is the public cloud?

AJ Kuftic
Read Time 3 min.

Public Cloud Security When deciding between a public, private or hybrid cloud offering, companies often consider the security risks involved. The name alone can make some people think the public cloud is not nearly as secure as a hybrid or private offering but is that really true or is the public cloud secure enough for your company’s data? The simple answer...

6 Questions to Ask a Prospective Colocation Provider

Jonathan Rosenson
Read Time 5 min.

Six Questions to Ask A Prospective Colocation Provider Once you have determined that colocation is the right strategy for your business, choosing the best qualified provider is the necessary next step. While this may seem like a daunting task, conducting preliminary due diligence and knowing what questions to ask during the vetting process will help establish a framework for...

The True Cost of a Data Breach

Jonathan Rosenson
Read Time 5 min.

What do Data Breaches Really Cost? When sensitive or confidential data is lost or stolen and subsequently put at risk, then a data breach has occurred. The consequences are severe to your company’s reputation and bottom line. In 2014, it seemed like every few weeks there was another company that had its network hacked leaving personal information and their...