Beyond Virtualization: Security within the Guest

The October 12, 2017 virtualization and cloud security podcast moved up the stack. In it, we discussed security within the guest operating system. This approach to security applies to clouds, virtualization, and physical systems. Unlike Software as a Service (SaaS), all other forms of infrastructure or platform involve an operating system you can control. That is …

Keeping Up with the Joneses: A Cloud Story

Many companies go to the cloud to keep up with the Joneses or others. Some go to the cloud to keep up with their own needs. Others set impossible requirements that preclude the cloud. Yet others set goals that make creating on-site difficult. Many who go to the cloud, however, go without thought. There are …

Serverless: A Silent Revolution

If there is one trend that permeates all of industry, it is the drive to move forward. All processes evolve to become more efficient. New things are built on the old. Things get smaller, simpler, cheaper. IT is no exception. The technology industry has progressed from the room-sized computers of the 1950s (for which it is …

Microsoft Has Expanded Its Global Presence

On September 22, Microsoft made some major availability announcements. The first was its announcement that the Marea subsea cable has been completed. This is a joint Microsoft, Facebook, and Telefónica project that will deliver 160 terabits of data per second across the Atlantic. To put that in perspective, the eight pairs of fiber optic cables that make …

Data Protection Coverage: Anti-Ransomware

Since ransomware is a crucial topic, phase 3 of our Data Protection Coverage report delves into anti-ransomware technologies. The disaster recovery and business continuity software used within an enterprise is in a unique position, one that allows easy detection of ransomware. There are several approaches to detection, and often more than one approach needs to be …