Secure Cloud

BAE Systems and Dell EMC collaborate to offer mission-ready cloud solution for the U.S. Government

Grazed from BAE Systems and Dell EMC

BAE Systems and Dell EMC today announced a collaboration to offer the first scalable, hybrid cloud solution of its kind for the U.S. government. The federated secure cloud is flexible enough to power agency-level IT modernization or support smaller, forward-operating units.

The solution empowers users to collaborate securely through common business applications while also providing users with common access to mission-essential tools. Its environment includes zero-anonymity security features for security administrators to monitor, track, and control in real time all software, hardware, and user access to their respective clouds.

iland launches Secure Cloud Services from new location in Amsterdam to service EMEA customers

Grazed from iland

iland, an award-winning global cloud service provider of secure and compliant Infrastructure as a Service (IaaS), Disaster Recovery as a Service (DRaaS) and cloud backup services, today announced the availability of their Secure Cloud Services from a new data center location in Amsterdam, the Netherlands. 

This expansion positions iland, which was established in 1995 and has been delivering cloud services globally for over 11 years, to continue to service customers across EMEA with a new focus on the Benelux region and further supports iland's global growth. With the General Data Protection Regulation (GDPR) deadline also looming in May 2018, as well as Brexit negotiations underway, the opening of this new data center means that iland will continue to meet the data privacy requirements of customers in the EU.

The announcement comes hot on the heels of the relaunch of iland's channel program last month which has been revamped to enable channel partners to easily build a cloud business and serve both new and existing customers in the Netherlands and the wider EU region. iland sees a huge market opportunity for channel partners who are already well versed with VMware, Veeam, Zerto and other virtualization products to diversify their businesses into Infrastructure as a Service (IaaS), Cloud Backup and Disaster Recovery as a Service (DRaaS) and is actively recruiting channel partners in the Netherlands. 
 

Armor Cloud Security Helps Baxter Credit Union (BCU) Fulfill Shared Responsibility within Microsoft Azure

Grazed from Armor

Cloud adoption is gaining momentum among financial institutions, and BCU is at the forefront of this emerging trend for online services. BCU is now working with Armor, The First Totally Secure Cloud Company, to provide data protection and compliance for Microsoft Azure instances with Armor Anywhere. This managed security solution aligns with PCI 3.2 compliance standards and is designed for hybrid cloud environments to help address shared responsibility for public cloud workloads.

"While the financial sector has among the most stringent compliance and regulatory standards, it remains under constant assault by sophisticated cyber attacks," said Jared Day, president, Armor. "BCU is a trailblazer in cloud adoption and will be able to extend IT resources while applying the latest security and compliance controls to keep members safe. Aligning with a visionary organization that realizes the benefits of the cloud, but understands that security requires specialized expertise and solutions, presents an exciting opportunity for Armor."

 

DSM Offers New Secure Managed Hybrid and Private Cloud Solutions

Grazed from DSM Technology Consultants

DSM Technology Consultants (DSM), a leading provider of fully managed private cloud and IT infrastructure services based in Florida, today announced the availability of managed cloud solutions for Hewlett Packard Enterprise (HPE) clients including HPE StoreOnce customers.

DSM Cloud lets businesses move their critical business applications to the DSM cloud. The DSM Cloud architecture provides a highly resilient and cost-effective environment to run business applications, while dramatically reducing downtime and the risk of service interruption due to natural disasters, accidents, and criminal damage.

"We are proud to be one of the first Service Providers to implement the HPE Helion CloudSystem as a cloud service provider.   We are extremely excited to partner with HPE to help our customers drive cloud adoption and allow them to focus on their business challenges." 
John "JT" Tomljanovic, DSM SVP of Solution Development and Cloud

The Sixth Flag Introduces Cell Structure Security to Secure Cloud

Grazed from Sixth Flag.

The Sixth Flag, Inc. today revealed its model of Cell Structure Security to secure its Workspace-as-a-Service in the Cloud. Recognizing traditional approaches to securing the cloud and enterprise networks are still falling short, Pete Kofod, founder and CEO of The Sixth Flag, has found that this concept, which he developed from experience in the military, to be highly effective in securing his Workspace-as-a-Service. 

"A cell structure is a system that is highly resilient to external compromise and severely limits the ability of an attacker to further exploit the organization beyond the cell. Should the cell be compromised, the parent organization immediately isolates and collapses it. This is a concept regularly employed in clandestine warfare, which we have adapted to the securing of our virtual workspace," says Pete Kofod, Founder of The Sixth Flag, Inc.

Secure cloud networking

Grazed from ZDNet. Author: Manek Dubash.

Security continues to top the list of concerns cited by cloud computing users, so you can be sure that cloud service providers also place a high priority on ensuring that your data is neither compromised nor corrupted. Below are some of the key points you should check that your provider has implemented.

The service provider should embed security into the fabric of the infrastructure, test for vulnerabilities and respond quickly to any that may be discovered. They need to operate a rigorous set of operational security controls, including tight control over authentication and high levels of monitoring, logging and reporting...

Secure Cloud Transitions Start with Infrastructure Reviews

Grazed from EnterpriseTech.  Author: Alison Diana.
 

There’s a temptation to view the many flavors of cloud as the solution to all an enterprise’s network, storage, and infrastructure challenges. But simply transitioning existing processes to the cloud without scrutinizing every element from a security perspective compounds current vulnerabilities and creates new problems.

Despite the risks, between 40 percent and 60 percent of enterprises today do not always review these processes before moving to cloud, according to CompTIA’sTrends in Information Security Study, published March 2015. Risks include security gaps; moving some processes back to on-premise systems, or switching cloud providers – time-consuming, expensive, and sometimes risky...

Cirrity Launches Desktops as a Service (DaaS) With Secure, Compliant Cloud

Grazed from MarketWire.  Author: PR Announcement.

Cirrity, the secure and compliant cloud services provider, has added Desktops as a Service (DaaS) to its cloud-based solutions.  Cirrity's DaaS solution provides a complete virtual workspace from the cloud, delivering Windows desktops and applications as an easily managed, unified cloud service. Powered by industry-leading Desktone technology -- a multi-tenant, grid-based platform purpose-built for cloud-hosted desktops -- Cirrity's DaaS solution eradicates the barriers to virtual desktop adoption and enables a risk-free, incremental evolution of the next-generation workspace.

"Cirrity's DaaS solution improves desktop accessibility and security while also supporting disaster recovery strategies," says Andrew Albrecht, COO of Cirrity. "If employees rely on desktops located in the office but physically can't get to their computers, the disruption to business operations is immediate. With Cirrity's DaaS solution, the desktop resides in Cirrity's secure, compliant cloud infrastructure built on enterprise-class hardware. Employees can access their desktop from any device, anywhere, anytime."...