Don’t let out-of-control cloud spend turn you into a punchline

TV shows can often be unrelatable—how often do you meet a teenage werewolf, or fight off a horde of immortal ice zombies? But every once in a while, a TV show may throw you something so familiar you wonder if they’ve taken it from your own life. Maybe it’s a particularly complicated breakup, or a conversation with a teacher that really resonated with you. Or maybe it’s overspending on your allotted cloud budget, and scrambling to figure out what to do next.

That last one was a recent storyline on HBO’s “Silicon Valley,” one apparently familiar to enough viewers to warrant airtime. Just like the characters on the show, many companies struggle to control their cloud spend, and often aren’t aware of runaway costs until it’s too late. Unlike the characters on that show, you now have this blog post to help you figure out what to do about it. (more…)

5 tips to secure your Azure environment

Most of you are thinking about security. Many of you are using the cloud. And because many of you are Microsoft shops, you’re probably using – or likely to choose – Azure.

For those of you on Azure looking at cloud security, the first thing to understand is that, similar to other cloud platforms, Azure involves a shared security model. While Azure and Microsoft are responsible for securing its infrastructure, you remain responsible for securing your applications running in Azure.

As you move from Infrastructure as a Service (IaaS) to Platform as a Service (PaaS) to Software as a Service (SaaS) on the cloud continuum, you are responsible for more and more of your individual security controls. Therefore, you will need to follow cloud security best practices, including essential monitoring, scanning, and access control.

These five best practices will help you conquer security in Azure. (more…)

3 risks you take when your cloud app security is lacking

Cloud apps have added a new world of possibilities and scalability to business operations. Data is more accessible, distributed teams can work from anywhere, and collaboration is easier than ever.

But there is one thing to keep in mind: Your data is not necessarily more secure. Cloud apps are still vulnerable to attack and human error, and data can be lost forever if you’re not careful. Many apps don’t come with sufficient security and data protection capabilities, and recovering data—when it’s possible—often comes with a hefty price tag.

Even if you think that such an attack or mistake could never happen to you—a risky gamble—there are other reasons to worry: Can you hedge off a legal inquiry or compliance issue? (more…)

Stop cloud sprawl: How schools can take control of their AWS usage

The school year ends with the same routines: end-of-year grades, final projects, and the tantalizing thought of summer vacation. But in the rush of the final days of school, some things can go overlooked, and some can cost you money all summer long.

The cloud is one. Due to its pay-what-you-use model, Amazon Web Services (AWS) has become a major cloud provider to schools across the country, offering an affordable way for school districts to introduce labs, sandboxes, and over 500 other services into the classroom.

But if you don’t keep a close eye on who’s using what, instances can run all summer—or longer—leading to a phenomenon known as “cloud sprawl.” If you don’t get it under control, it can compound itself with every semester and school year, ballooning your cloud spend on resources no one is using.

How does cloud sprawl begin and what can you do about it? Read on. (more…)

Is your enterprise cloud ready for the big leagues? Start with Triple A.

So your organization wants to be more agile—aspiring to spin up new test environments in minutes, speed development processes, and scale infrastructure with ease. Your reflex is to move applications to public cloud to gain agility, but that isn’t always the right option. Sure, some cloud-native applications are well suited to public cloud, but other enterprise applications are not. The cost of recoding, refactoring, and building resiliency into those applications before migration can be prohibitive. (more…)

2 things you need to know when switching to Office 365

Switching from Office on premises to Office 365 (O365) seems like a natural step—it’s the future of Microsoft, comes with tons of great benefits, and it allows you to work from a user-based system, rather than a device-based system. In most cases, you get more overall value out of the program.

However, switching from a device-based program to a user-based program, and from an ownersiteseekerp model to a subscription one, doesn’t always go smoothly. Processes like installation, true up, and licensing often look similar to what you’re used to, but need to be handled differently with O365.

To help you escape these mistakes—or recognize that you might be making them—here are two of the most common differences users face when switching to O365. (more…)

3 highlights from Google Next ’17

Google Cloud Platform (GCP) is the clear number three player in public cloud behind Amazon Web Services (AWS) and Microsoft Azure. But it’s standing on a tripod of data, machine learning, and cost advantages, and is counting on those three areas to help them build market share and scale.

At the annual Google Cloud Next ’17 conference, Google did an impressive job of combining those three areas into a message around a fully managed platform that makes each one more accessible and easier to manage than its competitors. The conference was a blend of new product announcements (more than 100 of them), education, networking, customer testimonials, and sales pitches.

Here are the three things that stood out the most at Google Next. (more…)

AWS outage: Who’s really to blame?

Amazon’s S3 service outage in the US-East-1 Region yesterday shed light on just how much of the internet depends on that single service in a single region. Dozens of sites that stored assets there failed; sites that stored snapshots of volumes they used to launch instances failed; sites that depended on AWS S3 services in that region failed. Organizations across the internet suddenly learned they had a single point of failure they didn’t previously realize existed.

As the dust clears, users are looking for ways to mitigate that vulnerability. Unfortunately, much of the chatter on Twitter and other online venues indicates that many people are missing the point: They’re treating this as a case of having chosen the wrong service or service provider, rather than understanding that the underlying problem was that they have a single point of failure. (more…)

6 facts that will clear up any confusion about containers and virtual machines

vms-containersIf we created a list of top IT trends of 2016, what would be at the top? Big data tools replacing your doctor? Machine learning and AI’s new levels of sophistication? The rise of adaptive security architectures?

How about the growing popularity of containers? Over the past few years, this old technology has become a beloved tool for software engineers siteseekerrking monolithic development. Containers are small and fast, and enable rapid development and improved productivity without consuming many resources. (more…)

Pump up productivity with these Office 365 add-ons

improve performanceNo doubt, Office 365 (O365) is a powerful productivity suite. O365 turned five years old in June, and it has become the cloud service of choice for enterprise users.

Still, some organizations have more specialized needs that fall outside the scope of O365. There’s an entire marketplace of add-ons and extensions that take the already powerful set of cloud applications to a higher elevation for individual needs.

Some of the more common areas where we see organizations looking to customize are single sign-on tools, security and compliance, and email support. There are a lot of options that build on the cloud suite’s offerings, so let’s break down what these add-ons can do and which ones might be best for your O365 environment. (more…)

Test de Penetrare, Scanare de Vulnerabilitati, MoldovaTeste de Penetrare, Scanari de Vulnerabilitati, MoldovaPenetration Testing Moldova, Penetration Test Moldova, LogicalPoint