Expedient, a leading provider of cloud and data center infrastructure as a service (IaaS) solutions, recently announced that it has become RPKI compliant. RPKI, or Resource Public Key Infrastructure, is a security framework used to validate the ownership of IP address space and to verify that internet routing information is correct. In this blog post, we’ll explore what RPKI is,...
We’re happy to introduce Rajesh Khazanchi, CEO of ColorTokens, Expedient’s newest technology partner. He’ll be outlining how Xshield, their ML-powered micro-segmentation solution, helps Expedient clients secure their workloads. At ColorTokens, our goal is to make micro-segmentation and Zero Trust security a reality for enterprises. That’s why we’re proud that Expedient has chosen to integrate our award-winning, ML-powered micro-segmentation solution, Xshield,...
Security is top of mind these days. Every few weeks we hear about another new incident that has ended up costing millions and forever damaging a company’s reputation. Data breaches, ransomware, DDoS attacks, and ongoing cybersecurity threats are not only escalating but also becoming more costly. A recent report from the Ponemon Institute has the average...
Security is not for the faint of heart. It is estimated that a business will fall victim to a ransomware attack every 11 seconds by 2021 (Herjavec Group). Cybercrime is estimated to cost the world $6 trillion annually by 2021 (Cybersecurity Ventures) up from $2 trillion in 2019 (Juniper). The universe of tools needed to keep your organization safe is...
For a second consecutive year, I attended the Juniper NXTWORK 2019 conference in Las Vegas, NV, along with more than 1,000 other participants to discuss our business relationship with Juniper and learn about new technologies on the horizon. The convergence of security with the entire network infrastructure is a key focus of Juniper Networks’ forward-looking...
Is your organization facing a server or data center hardware refresh in the next 18 months? If so, you may be considering purchasing replacement equipment to put in your primary internal data center or colocation facility. You may also be considering enterprise cloud infrastructure as an alternative. The most common reasons that organizations choose cloud may appeal to you: ...
The Cloud Security Alliance (CSA) Security, Trust, Assurance and Risk (STAR) registry publicly increases trust among cloud service providers (CSPs). The CSA STAR Program encompasses key principles of transparency, rigorous auditing, and harmonization of standards. Expedient now demonstrates its adherence to security and privacy best practices through its registration with CSA STAR. CSPs registered with the CSA STAR Program...
Gartner is a leading research and advisory company, equipping leaders and their teams in major business functions with the insights, advice and tools to achieve their mission-critical priorities today and tomorrow. Gartner IT Symposium / XPo™ 2019 highlights the breadth of advisory services the company offers. Gartner bills its IT Symposium/XPo™ 2019 as the world’s...
The Business Case for Organizational Resilience More than 3,500 IT risk and security professionals congregated outside of Washington, D.C., recently to attend the 2019 Gartner Security and Risk Management Summit to gain the latest insights on evolving security trends and the ever-changing threat landscape. I was among the team from Expedient who were there to meet with vendors,...
Last month, I traveled to San Francisco for one of the largest Information Security exhibitions of the year – the RSA Conference (RSAC). As a technologist, I always look forward to attending events like RSAC because they provide me with the opportunity to learn about hundreds of emerging technology solutions and gain an updated perspective on the trends driving...
Service Organization Control (SOC) reports for the time period between October 31, 2107 and September 30, 2018 are now available for interested clients. SOC reports act as an attest standard to provide clear evidence to Expedient clients that a third-party has verified that our business processes are being followed. All our current SOC reports are considered to be “Type II,”...
As data growth accelerates, finding smart and efficient ways to store, manage, access, and secure business-critical data becomes increasingly important. While keeping pace with constant data growth, a file storage solution must support the evolving needs of your business while meeting the rising expectations of your enterprise users who expect powerful search functionality delivered through an easy-to-use, web-based...
How to Mitigate Cybersecurity Risk As part of cybersecurity awareness month, IDG recently released its 2018 U.S. State of Cybercrime Study. The study underscored the reality that businesses of all sizes still struggle to effectively protect data and critical IT infrastructure from various cybersecurity threats – both external and internal. While most companies are steadily increasing the amount...
WHAT IS GDPR? The General Data Protection Regulation (effective May 2018) is a law designed to strengthen the data protection rights of individuals within the European Union (EU). GDPR applies not only to businesses located in the EU, but also to businesses that offer goods and services to individuals located in the EU. The expansive purview of the law...
The European Union’s (EU) General Data Protection Regulation (GDPR) became effective May 25, 2018, and with it came a flurry of privacy policy notification updates from websites, other digital publishers, and more, all of whom are tasked with ensuring that any sensitive user data collected on EU residents – even as a sub-processor – is handled and processed according to...
The Healthcare Industry’s Requirements for a Cloud Service Provider While data security and availability is imperative for any organization, it is especially true for those in the healthcare industry, whose access to personally identifiable information (PII) such as birth dates and social security numbers requires strong data security measures – and can present security concerns and complexities as these...
DDoS Mitigation DDoS mitigation a focus of recent 451 Research analysis at 2017 RSA conference A March 2017 report published by 451 Research found that distributed denial of service (DDoS) attacks evolved in 2016, requiring security vendors addressing such threats to take proactive measures to increase their capabilities and capacities. The research cites Arbor Networks, an industry leading...
Healthcare in the Cloud: Is Patient Data Safe? The continuous evolution of the healthcare industry presents unique information technology challenges. Cloud computing is desirable to the healthcare industry because of its cost and strategic benefits, including scalability with reduced capital expenses and more efficient use of IT resources. As a result, protecting the privacy of ePHI is a priority...
Cybercrime When it comes to data unavailability, loss of data or the need for disaster recovery, companies and even third-party hosting providers often think first of natural disasters like hurricanes, tornadoes or wildfires, but in reality, the biggest threat to an organization’s data is human-induced – accidental or purposeful. According to the study “2016 Cost of Data Center Outages”...
Private vs. Public Cloud Cloud computing delivers infrastructure as a service (IaaS) that can be consumed as an operating expense rather than acquired as an asset. The flexibility of moving from capital expense to operating expense provides organizations with a choice between public cloud and private cloud environment options. Choosing between the two—or taking a hybrid cloud approach where...
Reducing your risk of a data breach with next-generation firewall solutions Firewalls act as a secure gateway between a trusted network and other untrusted networks – such as the Internet – and only allows traffic into the network that is approved through the defined firewall policy. Firewalls protect your network and your data. Enhancing your firewall through added security...
Public Cloud Security When deciding between a public, private or hybrid cloud offering, companies often consider the security risks involved. The name alone can make some people think the public cloud is not nearly as secure as a hybrid or private offering but is that really true or is the public cloud secure enough for your company’s data? The simple answer...
Six Questions to Ask A Prospective Colocation Provider Once you have determined that colocation is the right strategy for your business, choosing the best qualified provider is the necessary next step. While this may seem like a daunting task, conducting preliminary due diligence and knowing what questions to ask during the vetting process will help establish a framework for...
What do Data Breaches Really Cost? When sensitive or confidential data is lost or stolen and subsequently put at risk, then a data breach has occurred. The consequences are severe to your company’s reputation and bottom line. In 2014, it seemed like every few weeks there was another company that had its network hacked leaving personal information and their...
Enhancing Data Center Security Standards When looking at the recent news surrounding technology vulnerabilities, you’ll notice the headlines are mired with announcements ranging from intrusions, to data breaches as well as an increase in cyber-crime-related incidents. The future of IT is extremely promising but it is also rife with hazards and the increasing threat of fraud and crime. To...
Demand Drivers for a Cloud-based Data Center Managing a data center is a constant race to keep pace with various elements including, new technology, new security issues, requirements of new applications, power and cooling systems, ensure there is enough infrastructure to support the data that comes with a growing business. It’s also a constant race to maintain or minimize...
Disaster Recovery: The Technology & Strategy You Trust You’ve most likely heard the adage; it’s not a matter of if IT systems will fail–but when. So even if you are confident that your organization is equipped to handle failure, or perhaps has even recovered successfully from an outage in the past, having the right recovery strategy in place is...
Do you have industry or government compliance requirements such as HIPAA, PCI DSS, GLB, SOX or others? Ensuring proper security measures and adhering to regulatory compliance requirements can be a difficult undertaking for a company running an internal data center. Understanding the challenges of security and compliance are paramount in following industry and government standards. Finding a qualified hosting...
Choosing a Cloud Provider: the Importance of Compliance Transparency Looking beyond HIPAA, SOX or PCI-DSS compliance claims The alarming aspect of searching for a cloud hosting solution is that, despite claims to the contrary, your hosting provider may not actually be able to support your direct compliance needs. In truth, your provider is probably not trying to be...
Learn what Expedient is doing to ensure security and eliminate compliance concerns In a recent blog post, we mentioned that the rate of cloud adoption can vary from one industry to the next. And according to a Gartner research report, this has led some companies in regulatory industries (e.g. banking, insurance, healthcare)...
According to a recent Gartner research report, cloud computing is gaining popularity across a variety of industries for basic business support functions. The research shows that cloud computing is being used for more than just IT functions. In fact, many industries are now viewing cloud computing in the context of how it can help them succeed in an evolving...
Cloud Computing: Key Considerations The benefits of a private or hybrid cloud are certainly intriguing. You receive the full access and capabilities of a private computing environment, just without the expense, hassle or maintenance responsibilities tied to owning a physical infrastructure. This, however, certainly does not mean that you can just choose any available cloud computing solution. There...