Cloud and the new rules for the IT department
21 August, 2014 by Bob West, Chief Trust Officer, CipherCloudEnterprise data is travelling beyond network boundaries and outside traditional technology controls, which means that data protection must now extend into the cloud.
Cloud, biometrics to change airport experience
29 May, 2014Report identifies case for cloud technology in common use systems for airports of the future, while nearly 80% of Australians support the use of biometric security to verify passenger identities.
A practical path to unified identity across data centre, cloud and mobile
15 January, 2014This white paper looks at a group of unified identity services that could help leverage your existing Active Directory skill sets and processes while enabling productivity and secure access for a dynamic mobile workforce.
Office 365 Single Sign-On: high availability without high complexity
15 January, 2014This paper explains why Single Sign-On between your on-premise network and O365 is so important and why implementation is surprisingly difficult to achieve using the accessory tools provided. It also looks at a service to leverage your pre-existing infrastructure.
Enforcing enterprise-out security for cloud servers
15 January, 2014This white paper looks at an enterprise-out security enforcement approach to expanding cloud compute capacity while still maintaining a secure environment. Download now to read more.
Snowden, privacy and cloud services
03 October, 2013 by Puneet KukrejaA program like PRISM will have limited impact on organisations looking to onboard cloud services hosted in the US, Australia or Europe, according to Puneet Kukreja.
CSA, BSI launch cloud security cert program
03 October, 2013 by Dylan Bushell-EmblingThe Cloud Security Alliance (CSA) and Australia's BSI have developed a security certification program for cloud service providers.
Staying secure in a cloudy world
30 September, 2013Cloud computing is changing the way businesses deliver IT services to users. It not only provides cost savings and operational efficiencies, it also increases security concerns and compliance challenges. This paper reviews three steps to help maintain control when moving to the cloud.
Identity and access management in the cloud era
10 September, 2013Leveraging the cloud to bring cost-effectiveness and efficiency to a company must always be coupled with advanced security measures. The explosion of mobile devices, fragmented network access and multiple operating systems makes identity management a big challenge.
This paper looks at a new range of products.
Backup for SMBs
08 August, 2013 by Anthony CaruanaWhat would happen to your business if you lost access to critical customer data like orders and invoices? What about that important proposal you’ve been working on for the last three days? How long could your business survive in such a situation?
Dirty disks raise new questions about cloud security
26 April, 2012Research by Context Information Security has identified potentially significant flaws in the implementation of cloud infrastructure services offered by some providers which could be putting their clients’ data at risk. By exploiting the vulnerability, which revolves around data separation, Context consultants were able to gain access to data left on other service users’ ‘dirty disks’, including fragments of customer databases and elements of system information that could, in combination with other data, allow an attacker to take control of other hosted servers.
McAfee Management for Optimised Virtual Environments (MOVE) AV agentless antivirus
12 April, 2012The McAfee Management for Optimised Virtual Environments AV (antivirus) solution is now available in an agentless deployment option.
Is Hyper-V secure enough for the enterprise?
03 August, 2009 by Todd R. WeissVMware is actively raising doubts about the security of Microsoft's Hyper-V. Is there any truth to the claims?
Tracking down your virtual machines
09 July, 2009 by David MortmanBefore you can secure your virtual environments, you must be able track down your machines.
Pay heed to security when going virtual
09 July, 2009 by Ron CondonOrganisations are leaping head first into virtualisation, given the technology's purported benefits. But those that do it without considering security are taking wild risks.