Tag: Public Cloud

  • Microsoft: Azure Recovery Services Vault Management – performing a vault swap

    In this blog post I will address some of the questions we’re receiving from customers regarding Azure Backup and Recovery Services vaults. Read full news article on DABCC  

  • Citrix Receiver Updates Made Easy

    Keeping your employee’s Citrix Receiver up-to-date is critical for ensuring that every user of your XenApp and XenDesktop sites is getting the best possible app and desktop performance, end user experience, and security benefits. Read full news article on DABCC  

  • Citrix: Enterprise Architect TechTalk: Citrix App Layering FAQ

    As my colleague, Dan Morgan, announced a few weeks ago, Citrix Consulting hosted a webinar on Citrix App Layering on July 19 that included a live Q&A portion with experts Rob Zylowski and Spencer Sun from Unidesk to help address your questions. Read full news article on DABCC  

  • Lazy Days in the Cloud

    The cloud brings scalability, reliability and security features that allow companies of all sizes to run their online business efficiently. These powerful capabilities often bring a false sense of a “security is already done” mentality and organizations are prone to take a more relaxed approach to their security efforts. Read full news article on Dzone…

  • ‘Microsoft Encryption of Data-at-Rest’ White Paper

    There are essentially 3 types of encryption you want to think about when working with a cloud service provider: Encryption in Flight (network encryption) Encryption in processing (application data encryption) Encryption at rest is about protecting data on disk. Read full news article on DABCC  

  • VMware: The Top 10 vSAN Sessions You Don’t Want to Miss at VMworld

    With VMworld 2017 quickly approaching, it’s time to find sessions you want to attend and build your schedule – popular sessions are already filling up. Although you have many vSAN sessions to choose from, (122 to be exact!) we’ve identified 10 sessions you should prioritize during your VMworld experience. Read full news article on DABCC  

  • VMware: IBM Cloud Secure Virtualization built on VMware Cloud Foundation on IBM Cloud addresses new GDPR requirements

    On 25 May, 2018, the new General Data Protection Regulation (GDPR) goes into effect in the European Union (EU), with sharper teeth than any other compliance regulation to date. With tighter controls and higher penalties, the new law enforces data sovereignty like never before, forever impacting the way EU and multinational organizations handle private data.…

  • Cohesity DataProtect 5.0 Multi-Hypervisor Support: Microsoft Hyper-V

    This is an exciting week for everyone at Cohesity, we have officially announced our Orion 5.0 release which is filled with new features, capabilities as well as expanded support for new hardware, applications and virtualization platforms including Microsoft’s Hyper-V. It is gratifying to know that our sophisticated and modern architecture and the capabilities of our…

  • Entisys360 CEO Mike Strohl Weighs in on Successful Partnership with IGEL for CRN

    Our CEO, Mike Strohl, recently shared his insights on Entisys360’s successful partnership with IGEL Technology during an interview with CRN’s Steve Burke. He told CRN, “IGEL is now going after the software business first and offering hardware as an option. Read full news article on DABCC  

  • Citrix: Securing Collaboration for G Suite Customers

    Google and Citrix have announced a partnership to support customers with their secure cloud transformation, which spans multiple products and services from both companies. One key area of that partnership that I’d like to discuss in more detail is the G Suite integration. Read full news article on DABCC  

  • Virtualization-based security helps security pros relax

    Virtualization’s continued journey across the enterprise led inevitably to security Enhanced security benefits using virtualization are powerful and compelling Virtualization takes the security responsibility off users and delivers control to IT Detection-based security doesn’t work. It’s an exhausted concept. Read full news article on DABCC  

  • Whose Fault Is That? How Not to Be a Cloud Security Statistic

    Focus on understanding and upholding the shared responsibility model, taking advantage of the security tools available to you, and continuously monitoring activity in your cloud environments, and you’ll be well on your way to beating the odds. Read full news article on DZone – Cloud Zone