Enforcing enterprise-out security for cloud servers
Supplied by Centrify Asia Pacific on Wednesday, 15 January, 2014
Cloud-based computing models offer the promise of a highly scalable compute infrastructure without having to acquire, install and maintain any additional hardware. However, implementing this new compute model using even the most trusted service providers requires a security solution that empowers IT to maintain control over user and network access to those hosted virtual machines.
This white paper looks at an enterprise-out security enforcement approach to solve these problems.
Psychology of passwords — password behaviour and best practices
With personal and professional lives merging at...
New KVM technology for control rooms and operations centres
KVM systems have long been one of the hidden foundations of a control room. They have...
The radical strategy transforming cyber risk management
The 9 Box of Controls is an innovative framework that helps model where an enterprise is...
