CORONAVIRUS BUSINESS CONTINUITY ALERT Expedient is operating with modified business continuity processes to continuously deliver essential utility computing services. Relevant client-specific notifications can be found in the Support Management Console (login required).

Archive of posts from

Game-changing Security Solutions Highlighted at Juniper Networks’ NXTWORK 2019

Game-changing Security Solutions Highlighted at Juniper Networks’ NXTWORK 2019

Jonathan Rosenson
Read Time 4 min.

For a second consecutive year, I attended the Juniper NXTWORK 2019 conference in Las Vegas, NV, along with more than 1,000 other participants to discuss our business relationship with Juniper and learn about new technologies on the horizon. The convergence of security with the entire network infrastructure is a key focus of Juniper Networks’ forward-looking...

Reduce Cybersecurity Risk with a Secure-by-Default Enterprise Cloud

Reduce Cybersecurity Risk with a Secure-by-Default Enterprise Cloud

Doug Theis
Read Time 5 min.

Is your organization facing a server or data center hardware refresh in the next 18 months? If so, you may be considering purchasing replacement equipment to put in your primary internal data center or colocation facility. You may also be considering enterprise cloud infrastructure as an alternative. The most common reasons that organizations choose cloud may appeal to you: ...

Expedient Registers with Cloud Security Alliance (CSA) Assessment

Expedient Registers with Cloud Security Alliance (CSA) Assessment

Jonathan Rosenson
Read Time 2 min.

The Cloud Security Alliance (CSA) Security, Trust, Assurance and Risk (STAR) registry publicly increases trust among cloud service providers (CSPs). The CSA STAR Program encompasses key principles of transparency, rigorous auditing, and harmonization of standards. Expedient now demonstrates its adherence to security and privacy best practices through its registration with CSA STAR. CSPs registered with the CSA STAR Program...

Achieving TechQuilibrium at Gartner IT Symposium/XPo

Achieving TechQuilibrium at Gartner IT Symposium/XPo

Jonathan Rosenson
Read Time 6 min.

Gartner is a leading research and advisory company, equipping leaders and their teams in major business functions with the insights, advice and tools to achieve their mission-critical priorities today and tomorrow. Gartner IT Symposium / XPo™ 2019 highlights the breadth of advisory services the company offers. Gartner bills its IT Symposium/XPo™ 2019 as the world’s...

Key Takeaways from Gartner's 2019 Security and Risk Management Summit

Key Takeaways from Gartner's 2019 Security and Risk Management Summit

Jonathan Rosenson
Read Time 3 min.

The Business Case for Organizational Resilience More than 3,500 IT risk and security professionals congregated outside of Washington, D.C., recently to attend the 2019 Gartner Security and Risk Management Summit to gain the latest insights on evolving security trends and the ever-changing threat landscape. I was among the team from Expedient who were there to meet with vendors,...

The State of InfoSec - A Change is Gonna Come

The State of InfoSec - A Change is Gonna Come

AJ Kuftic
Read Time 5 min.

Last month, I traveled to San Francisco for one of the largest Information Security exhibitions of the year – the RSA Conference (RSAC). As a technologist, I always look forward to attending events like RSAC because they provide me with the opportunity to learn about hundreds of emerging technology solutions and gain an updated perspective on the trends driving...

Most Recent SOC Reports Available for Expedient Clients

Most Recent SOC Reports Available for Expedient Clients

Jonathan Rosenson
Read Time 2 min.

Service Organization Control (SOC) reports for the time period between October 31, 2107 and September 30, 2018 are now available for interested clients. SOC reports act as an attest standard to provide clear evidence to Expedient clients that a third-party has verified that our business processes are being followed. All our current SOC reports are considered to be “Type II,”...

Expedient Expands Managed Service Portfolio, Unveils Cloud File Storage

Expedient Expands Managed Service Portfolio, Unveils Cloud File Storage

AJ Kuftic
Read Time 2 min.

As data growth accelerates, finding smart and efficient ways to store, manage, access, and secure business-critical data becomes increasingly important. While keeping pace with constant data growth, a file storage solution must support the evolving needs of your business while meeting the rising expectations of your enterprise users who expect powerful search functionality delivered through an easy-to-use, web-based...

Six Strategies to Reduce Cybersecurity Risk

Six Strategies to Reduce Cybersecurity Risk

Jonathan Rosenson
Read Time 5 min.

How to Mitigate Cybersecurity Risk As part of cybersecurity awareness month, IDG recently released its 2018 U.S. State of Cybercrime Study. The study underscored the reality that businesses of all sizes still struggle to effectively protect data and critical IT infrastructure from various cybersecurity threats – both external and internal. While most companies are steadily increasing the amount...

Support GDPR Compliance with Expedient

Support GDPR Compliance with Expedient

Jonathan Rosenson
Read Time 4 min.

WHAT IS GDPR? The General Data Protection Regulation (effective May 2018) is a law designed to strengthen the data protection rights of individuals within the European Union (EU). GDPR applies not only to businesses located in the EU, but also to businesses that offer goods and services to individuals located in the EU. The expansive purview of the law...

Expedient's Support for GDPR Compliance

Expedient's Support for GDPR Compliance

Jonathan Rosenson
Read Time 2 min.

The European Union’s (EU) General Data Protection Regulation (GDPR) became effective May 25, 2018, and with it came a flurry of privacy policy notification updates from websites, other digital publishers, and more, all of whom are tasked with ensuring that any sensitive user data collected on EU residents – even as a sub-processor – is handled and processed according to...

Healthcare's Requirements for a Cloud Services Provider

Healthcare's Requirements for a Cloud Services Provider

Jonathan Rosenson
Read Time 2 min.

The Healthcare Industry’s Requirements for a Cloud Service Provider While data security and availability is imperative for any organization, it is especially true for those in the healthcare industry, whose access to personally identifiable information (PII) such as birth dates and social security numbers requires strong data security measures – and can present security concerns and complexities as these...

DDoS mitigation a focus of recent 451 Research analysis at 2017 RSA conference

DDoS mitigation a focus of recent 451 Research analysis at 2017 RSA conference

Jonathan Rosenson
Read Time 2 min.

DDoS Mitigation DDoS mitigation a focus of recent 451 Research analysis at 2017 RSA conference A March 2017 report published by 451 Research found that distributed denial of service (DDoS) attacks evolved in 2016, requiring security vendors addressing such threats to take proactive measures to increase their capabilities and capacities. The research cites Arbor Networks, an industry leading...

Healthcare in the Cloud: Is Patient Data Safe?

Healthcare in the Cloud: Is Patient Data Safe?

Kristin Puzon
Read Time 2 min.

Healthcare in the Cloud: Is Patient Data Safe? The continuous evolution of the healthcare industry presents unique information technology challenges. Cloud computing is desirable to the healthcare industry because of its cost and strategic benefits, including scalability with reduced capital expenses and more efficient use of IT resources. As a result, protecting the privacy of ePHI is a priority...

Cybercrime: Is your data center safe?

Cybercrime: Is your data center safe?

Anthony Estelle
Read Time 3 min.

Cybercrime When it comes to data unavailability, loss of data or the need for disaster recovery, companies and even third-party hosting providers often think first of natural disasters like hurricanes, tornadoes or wildfires, but in reality, the biggest threat to an organization’s data is human-induced – accidental or purposeful. According to the study “2016 Cost of Data Center Outages”...

Private vs. Public Cloud: It’s All About Control

Private vs. Public Cloud: It’s All About Control

Jonathan Rosenson
Read Time 4 min.

Private vs. Public Cloud Cloud computing delivers infrastructure as a service (IaaS) that can be consumed as an operating expense rather than acquired as an asset. The flexibility of moving from capital expense to operating expense provides organizations with a choice between public cloud and private cloud environment options. Choosing between the two—or taking a hybrid cloud approach where...

How to Reduce your Risk of a Data Breach

How to Reduce your Risk of a Data Breach

AJ Kuftic
Read Time 2 min.

Reducing your risk of a data breach with next-generation firewall solutions Firewalls act as a secure gateway between a trusted network and other untrusted networks – such as the Internet – and only allows traffic into the network that is approved through the defined firewall policy. Firewalls protect your network and your data. Enhancing your firewall through added security...

How secure is the public cloud?

How secure is the public cloud?

AJ Kuftic
Read Time 3 min.

Public Cloud Security When deciding between a public, private or hybrid cloud offering, companies often consider the security risks involved. The name alone can make some people think the public cloud is not nearly as secure as a hybrid or private offering but is that really true or is the public cloud secure enough for your company’s data? The simple answer...

6 Questions to Ask a Prospective Colocation Provider

6 Questions to Ask a Prospective Colocation Provider

Jonathan Rosenson
Read Time 5 min.

Six Questions to Ask A Prospective Colocation Provider Once you have determined that colocation is the right strategy for your business, choosing the best qualified provider is the necessary next step. While this may seem like a daunting task, conducting preliminary due diligence and knowing what questions to ask during the vetting process will help establish a framework for...

The True Cost of a Data Breach

The True Cost of a Data Breach

Jonathan Rosenson
Read Time 5 min.

What do Data Breaches Really Cost? When sensitive or confidential data is lost or stolen and subsequently put at risk, then a data breach has occurred. The consequences are severe to your company’s reputation and bottom line. In 2014, it seemed like every few weeks there was another company that had its network hacked leaving personal information and their...

Enhancing Data Center Security Standards

Enhancing Data Center Security Standards

Jonathan Rosenson
Read Time 3 min.

Enhancing Data Center Security Standards When looking at the recent news surrounding technology vulnerabilities, you’ll notice the headlines are mired with announcements ranging from intrusions, to data breaches as well as an increase in cyber-crime-related incidents. The future of IT is extremely promising but it is also rife with hazards and the increasing threat of fraud and crime. To...

Demand Drivers for Data Center Services

Demand Drivers for Data Center Services

AJ Kuftic
Read Time 3 min.

Demand Drivers for a Cloud-based Data Center Managing a data center is a constant race to keep pace with various elements including, new technology, new security issues, requirements of new applications, power and cooling systems, ensure there is enough infrastructure to support the data that comes with a growing business. It’s also a constant race to maintain or minimize...

Data Backup Technology and Strategy

Data Backup Technology and Strategy

Read Time 3 min.

Disaster Recovery: The Technology & Strategy You Trust You’ve most likely heard the adage; it’s not a matter of if IT systems will fail–but when. So even if you are confident that your organization is equipped to handle failure, or perhaps has even recovered successfully from an outage in the past, having the right recovery strategy in place is...

Common Reasons to Transition Away From the Internal Data Center, Vol. I: Compliance Requirements

Common Reasons to Transition Away From the Internal Data Center, Vol. I: Compliance Requirements

Bryan Smith
Read Time 2 min.

Do you have industry or government compliance requirements such as HIPAA, PCI DSS, GLB, SOX or others? Ensuring proper security measures and adhering to regulatory compliance requirements can be a difficult undertaking for a company running an internal data center. Understanding the challenges of security and compliance are paramount in following industry and government standards. Finding a qualified hosting...

Your Cloud Hosting Provider and the Importance of Transparency

Your Cloud Hosting Provider and the Importance of Transparency

AJ Kuftic
Read Time 3 min.

Choosing a Cloud Provider: the Importance of Compliance Transparency Looking beyond HIPAA, SOX or PCI-DSS compliance claims The alarming aspect of searching for a cloud hosting solution is that, despite claims to the contrary, your hosting provider may not actually be able to support your direct compliance needs. In truth, your provider is probably not trying to be...

Shopping for a Regulatory Compliant Cloud Computing Solution?

Shopping for a Regulatory Compliant Cloud Computing Solution?

Jonathan Rosenson
Read Time 3 min.

Learn what Expedient is doing to ensure security and eliminate compliance concerns In a recent blog post, we mentioned that the rate of cloud adoption can vary from one industry to the next. And according to a Gartner research report, this has led some companies in regulatory industries (e.g. banking, insurance, healthcare)...

How Cloud Computing Adoption Varies Across Industries

How Cloud Computing Adoption Varies Across Industries

Jonathan Rosenson
Read Time 2 min.

According to a recent Gartner research report, cloud computing is gaining popularity across a variety of industries for basic business support functions. The research shows that cloud computing is being used for more than just IT functions. In fact, many industries are now viewing cloud computing in the context of how it can help them succeed in an evolving...

Cloud Computing: Key Considerations

Cloud Computing: Key Considerations

Bryan Smith
Read Time 3 min.

Cloud Computing: Key Considerations The benefits of a private or hybrid cloud  are certainly intriguing. You receive the full access and capabilities of a private computing environment, just without the expense, hassle or maintenance responsibilities tied to owning a physical infrastructure. This, however, certainly does not mean that you can just choose any available cloud computing solution. There...