Chat with us, powered by LiveChat

Security and Compliance

DDoS mitigation a focus of recent 451 Research analysis at 2017 RSA conference

Jonathan Rosenson
Read Time 2 min.

DDoS Mitigation DDoS mitigation a focus of recent 451 Research analysis at 2017 RSA conference A March 2017 report published by 451 Research found that distributed denial of service (DDoS) attacks evolved in 2016, requiring security vendors addressing such threats to take proactive measures to increase their capabilities and capacities. The research cites Arbor Networks, an industry leading...

Healthcare in the Cloud: Is Patient Data Safe?

Kristin Puzon
Read Time 2 min.

Healthcare in the Cloud: Is Patient Data Safe? The continuous evolution of the healthcare industry presents unique information technology challenges. Cloud computing is desirable to the healthcare industry because of its cost and strategic benefits, including scalability with reduced capital expenses and more efficient use of IT resources. As a result, protecting the privacy of ePHI is a priority...

Cybercrime: Is your data center safe?

Anthony Estelle
Read Time 3 min.

Cybercrime When it comes to data unavailability, loss of data or the need for disaster recovery, companies and even third-party hosting providers often think first of natural disasters like hurricanes, tornadoes or wildfires, but in reality, the biggest threat to an organization’s data is human-induced – accidental or purposeful. According to the study “2016 Cost of Data Center Outages”...

Private vs. Public Cloud: It’s All About Control

Jonathan Rosenson
Read Time 4 min.

Private vs. Public Cloud Cloud computing delivers infrastructure as a service (IaaS) that can be consumed as an operating expense rather than acquired as an asset. The flexibility of moving from capital expense to operating expense provides organizations with a choice between public cloud and private cloud environment options. Choosing between the two—or taking a hybrid cloud approach where...

How to Reduce your Risk of a Data Breach

AJ Kuftic
Read Time 2 min.

Reducing your risk of a data breach with next-generation firewall solutions Firewalls act as a secure gateway between a trusted network and other untrusted networks – such as the Internet – and only allows traffic into the network that is approved through the defined firewall policy. Firewalls protect your network and your data. Enhancing your firewall through added security...