Office 365 Single Sign-On: high availability without high complexity
15 January, 2014This paper explains why Single Sign-On between your on-premise network and O365 is so important and why implementation is surprisingly difficult to achieve using the accessory tools provided. It also looks at a service to leverage your pre-existing infrastructure.
Enforcing enterprise-out security for cloud servers
15 January, 2014This white paper looks at an enterprise-out security enforcement approach to expanding cloud compute capacity while still maintaining a secure environment. Download now to read more.
Snowden, privacy and cloud services
03 October, 2013 by Puneet KukrejaA program like PRISM will have limited impact on organisations looking to onboard cloud services hosted in the US, Australia or Europe, according to Puneet Kukreja.
CSA, BSI launch cloud security cert program
03 October, 2013 by Dylan Bushell-EmblingThe Cloud Security Alliance (CSA) and Australia's BSI have developed a security certification program for cloud service providers.
Staying secure in a cloudy world
30 September, 2013Cloud computing is changing the way businesses deliver IT services to users. It not only provides cost savings and operational efficiencies, it also increases security concerns and compliance challenges. This paper reviews three steps to help maintain control when moving to the cloud.
Identity and access management in the cloud era
10 September, 2013Leveraging the cloud to bring cost-effectiveness and efficiency to a company must always be coupled with advanced security measures. The explosion of mobile devices, fragmented network access and multiple operating systems makes identity management a big challenge.
This paper looks at a new range of products.
Backup for SMBs
08 August, 2013 by Anthony CaruanaWhat would happen to your business if you lost access to critical customer data like orders and invoices? What about that important proposal you’ve been working on for the last three days? How long could your business survive in such a situation?
Dirty disks raise new questions about cloud security
26 April, 2012Research by Context Information Security has identified potentially significant flaws in the implementation of cloud infrastructure services offered by some providers which could be putting their clients’ data at risk. By exploiting the vulnerability, which revolves around data separation, Context consultants were able to gain access to data left on other service users’ ‘dirty disks’, including fragments of customer databases and elements of system information that could, in combination with other data, allow an attacker to take control of other hosted servers.
McAfee Management for Optimised Virtual Environments (MOVE) AV agentless antivirus
12 April, 2012The McAfee Management for Optimised Virtual Environments AV (antivirus) solution is now available in an agentless deployment option.
Is Hyper-V secure enough for the enterprise?
03 August, 2009 by Todd R. WeissVMware is actively raising doubts about the security of Microsoft's Hyper-V. Is there any truth to the claims?
Pay heed to security when going virtual
09 July, 2009 by Ron CondonOrganisations are leaping head first into virtualisation, given the technology's purported benefits. But those that do it without considering security are taking wild risks.
Tracking down your virtual machines
09 July, 2009 by David MortmanBefore you can secure your virtual environments, you must be able track down your machines.
Sourcefire has plans for virtual security
06 July, 2009 by Ron CondonThe company behind the intrusion prevention tool, Snort, will soon launch a virtualisation security product.
Virtualise your security tools for greater flexibility
19 June, 2009 by Eric OgrenA new approach of treating network security as a software application has produced better flexibility in deployment.
Property developer builds security infrastructure
18 June, 2009Brookfield Multiplex has standardised on Websense web security software and cloud-based email security services to provide safe and secure internet and email access for its 2000-strong workforce.