Whitelisting is the art of running just what you need, and no more.
TVP Strategy Archives
Beyond Virtualization: Security within the Guest
The October 12, 2017 virtualization and cloud security podcast moved up the stack. In it, we discussed security within the guest operating system. This approach to security applies to clouds, virtualization, and physical systems. Unlike Software as a Service (SaaS), all other forms of infrastructure or platform involve an operating system you can control. That is …
Continue reading “Beyond Virtualization: Security within the Guest”
Keeping Up with the Joneses: A Cloud Story
Many companies go to the cloud to keep up with the Joneses or others. Some go to the cloud to keep up with their own needs. Others set impossible requirements that preclude the cloud. Yet others set goals that make creating on-site difficult. Many who go to the cloud, however, go without thought. There are …
Continue reading “Keeping Up with the Joneses: A Cloud Story”
Serverless: A Silent Revolution
If there is one trend that permeates all of industry, it is the drive to move forward. All processes evolve to become more efficient. New things are built on the old. Things get smaller, simpler, cheaper. IT is no exception. The technology industry has progressed from the room-sized computers of the 1950s (for which it is …
Microsoft Has Expanded Its Global Presence
On September 22, Microsoft made some major availability announcements. The first was its announcement that the Marea subsea cable has been completed. This is a joint Microsoft, Facebook, and Telefónica project that will deliver 160 terabits of data per second across the Atlantic. To put that in perspective, the eight pairs of fiber optic cables that make …
Continue reading “Microsoft Has Expanded Its Global Presence”
Data Protection Coverage: Anti-Ransomware
Since ransomware is a crucial topic, phase 3 of our Data Protection Coverage report delves into anti-ransomware technologies. The disaster recovery and business continuity software used within an enterprise is in a unique position, one that allows easy detection of ransomware. There are several approaches to detection, and often more than one approach needs to be …
Continue reading “Data Protection Coverage: Anti-Ransomware”