Cloud migration

Evaluate

  • Why financial organizations need a strong cloud security strategy

    A cloud security strategy is critical for financial organizations, but many in the industry are dragging their feet. Expert Dave Shackleford explains why.Continue Reading

  • What you need to consider before you buy VoIP

    When assessing VoIP systems, first consider VoIP features and functions, then gauge the scope of the service, network needs and plans for expansion.Continue Reading

  • AWS poised to succeed in evolution of IoT

    The Internet of Things and cloud computing are gaining popularity hand in hand. With AWS leading the cloud field, it is a significant player in the future of the IoT.Continue Reading

  • Cloud BI: Work is easy to find for partners, profits less so

    Channel partners report a double-edged sword in cloud-based BI: Consulting projects abound, but the elimination of hardware erodes profits.Continue Reading

  • Is third-party vendor management the next IAM frontier?

    Identity and access management deployments are notoriously complex. And things are getting worse as legacy technology meets next-generation applications. As the traditional network perimeter continues to disappear, robust IAM becomes more important as a layer of defense to protect sensitive corporate data from the threats posed by third-party vendors. In this issue of Information Security magazine, we evaluate the controls that can help protect data as it becomes more widely accessible. Today's IAM programs manage a far wider range of user types and access points. Bring your own device, cloud computing, and the rapid spread of distributed applications and data have all added to the security challenges.

    In this issue, we also look at enterprise mobility strategies. As more companies embrace a mobile-first strategy, security programs increasingly provide some level of support for personally owned devices and apps. But enterprise mobility is a double-edged sword: Providing broad data access and communication capabilities for much of the workforce can introduce challenging security issues. More CIOs and CISOs are recognizing that coherent policies are the key to harnessing the benefits of bring your own device.

    Finally, cybersecurity skills shortages are widespread. The skills to combat advanced threats have outpaced those needed for conventional IT security. We look at strategies that may ease the pain as enterprises compete for a highly sought-after global workforce.Continue Reading

  • Azure ExpressRoute offers new Office 365 connection

    The ExpressRoute feature can benefit organizations that want to maintain a high level of reliability and traffic management. Is it right for you?Continue Reading

  • How difficult is a VM migration to the public cloud?

    Migrating a VM to a public cloud is seldom easy. Cloud migrations are often fraught with unexpected challenges and support or compatibility issues.Continue Reading

  • Lack of secure APIs can create IaaS risks

    IaaS data security risks are a persistent problem for enterprises moving to the cloud, but there are specific issues to keep an eye on.Continue Reading

  • Expert Roberto Medrano reveals tips for sharing data via secure APIs

    Akana's Roberto Medrano discusses how developers' needs expanded from API development tools to platforms for managing, distributing and securing APIs.Continue Reading

  • Lift and shift vs. re-platforming cloud apps

    When evaluating a new technology, some people like to go all in, with gusto, and adopt it hook line and sinker. Then there are folks whose MO is to take baby steps: Dip a toe in the water and do a lengthy proof of concept. What's right for any given organization depends on its temperament, needs, budget, skills -- any number of factors. One thing's for certain, there's no right answer.

    This cover story in this issue of Modern Infrastructure delves into the different ways organizations implement cloud applications, whether replatforming or "lift and shift."

    Sometimes, the question isn't how to implement this new technology, but whether to bother implementing it at all. "I'm a big believer in the natural balance that forms based on how people actually use things versus planning for how people might use things," Brian Madden said. So sit tight. What you need to do will become clear soon enough.

    Continue Reading

  • When to adopt the lift-and-shift cloud migration model

    The lift-and-shift approach is a common cloud migration option, replicating in-house apps in the cloud without re-design. But is it right for you?Continue Reading

  • Data storage online: Tugboat firm partners with Venyu cloud

    E.N. Bisso has migrated most of its IT assets to cloud partner Venyu's environment, a transition that includes running NAS in the cloud.Continue Reading

  • Five critical outsourcing considerations for SaaS and cloud services

    Organizations are increasingly moving towards the use of SaaS and cloud services to meet their needs. But what outsourcing considerations should they be taking before leveraging these services?Continue Reading

  • The public cloud adoption trends sweeping the enterprise

    Citing security and other concerns, many organizations have passed on public cloud. But is the technology finally ready for enterprise prime time?Continue Reading

  • Veritas Technologies focused on transition to hybrid cloud

    Veritas VP Matt Cain talks about the hybrid spinoff's plans for NetBackup, Backup Exec, appliances, the hybrid cloud and data information.Continue Reading

-ADS BY GOOGLE

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

Close