Insights



Latest Provider Insights

Top 5 Cloud Security Predictions for 2016

Top 5 Cloud Security Predictions for 2016


According to the 2015 Alert Logic Cloud Security Report, an increase in cloud migration has positioned cloud environments as mainstream deployments. What does this mean for the security of your cloud environment? And how will an uptick in cloud adoption affect the 2016 threat landscape?   READ MORE +
A Better Approach to Security

A Better Approach to Security


Think there is only one choice when it comes to securing your business? Think again.   READ MORE +
Datapipe wins Cloud Security Product of the Year

Datapipe wins Cloud Security Product of the Year


Datapipe was named the winner in the Security Project of the Year category for our Datapipe Access Control Model for Amazon Web Services (DACMA), which brings deeper and more secure AWS adoption to enterprises.   READ MORE +
White Paper: The Shared Responsibility of Cloud Security

White Paper: The Shared Responsibility of Cloud Security


Although the public cloud comes with great financial and technical benefits, like any other infrastructure, it also has its share of threats.  Over the years, we have seen a rise in both attack frequency and diversity of malicious software used.   READ MORE +
Security Systems

Security Systems


Traditional IT security measures, such as firewalls or antivirus software, can be vulnerable to more modern and constantly evolving threats.    READ MORE +
Why You Should Plan Now for SDN-Enabled Network Security

Why You Should Plan Now for SDN-Enabled Network Security


The key is to implement a network security solution that can take advantage of SDN's dynamic nature.   READ MORE +
Cloud Security Can be a Challenge, But it Doesn't Have to Be

Cloud Security Can be a Challenge, But it Doesn't Have to Be


As the cloud rapidly gains acceptance and approaches universal adoption, firms will need to more fully implement cloud solutions in order to retain a technology advantage, or even to remain competitive at all. Yet as companies' use of cloud services increases, so, too, do worries about cloud security.   READ MORE +
Four Clues That Show a Web Service Doesn't Understand Security

Four Clues That Show a Web Service Doesn't Understand Security


Users have a responsibility to look after themselves on the Internet. It's their job to make sure they use long and random passwords, don't write them down where just anyone can see them, and don't use their dog's name as a password on their favorite Manga forum and their main email account.   READ MORE +
IT Security Dos & Don’ts from Eze Castle Integration

IT Security Dos & Don’ts from Eze Castle Integration


At Eze Castle Integration (www.eci.com) we spend a lot of time educating our clients about security best practices and encouraging them to implement comprehensive security policies and procedures to mitigate risk and protect both the firm and its employees. This video outlines top IT security dos and don'ts.   READ MORE +
Options CAO Nick Bryant Talks Cybersecurity

Options CAO Nick Bryant Talks Cybersecurity


We have been delivering financial technology as a service for over 20 years. No one understands the needs of the financial services industry better, and this is especially true when it comes to security. In our latest video, Options CAO Nick Bryant details how we manage cyber threats for client...   READ MORE +
Cybersecurity Q&A With Options CTO John Bryant

Cybersecurity Q&A With Options CTO John Bryant


John Bryant, Options CTO, recently spoke to Hedgeweek on how the company is constantly working to stay ahead of the risks posed to the hedge fund industry by cybersecurity issues. Read the full interview below:   READ MORE +
White Paper: Security Benefits of Outsourcing your DNS

White Paper: Security Benefits of Outsourcing your DNS


Organizations using in house DNS infrastructures will spend thousands on expensive firewalls to protect their servers. However what most don't realize is no matter how large the firewall is, if their incoming connections into their network aren't large enough, then Game Over...   READ MORE +
Google Bucks Security Trends In Using .XYZ Domain

Google Bucks Security Trends In Using .XYZ Domain


Google recently chose to use abc.xyz as its registered domain name for its new holding company, ‘Alphabet’. Apparently it did so due to the limited choice of traditional domain names, with abc.net and abc.com already off limits, with one registered by the eponymous American broadcaster, the other by a domain registrar looking to make a tidy return...   READ MORE +
Cybersecurity and the Role of Global Wholesale IP Providers

Cybersecurity and the Role of Global Wholesale IP Providers


Michael Wheeler, Executive VP of NTT Communications Global IP Network at NTT America, discusses cybersecurity and the role of global wholesale IP providers in helping companies protect their networks and data.   READ MORE +
SAP and Security in the Cloud

SAP and Security in the Cloud


The increased agility that comes with moving to the cloud solves many current technology challenges, but the journey to cloud computing can also accelerate the erosion of perimeter enforcement and trust boundaries. Many companies have been reluctant to deploy mission-critical applications, such as SAP HANA, in hosted cloud environments, due...   READ MORE +
Case Study: Geo-Redundant Data Centre Brings Security at Lower Costs for Phonak

Case Study: Geo-Redundant Data Centre Brings Security at Lower Costs for Phonak


Listen up: Together with nexellent, Swiss hearing care specialist Sonova has outsourced its data centre structure, which was prone to downtime, to two geo-redundant locations. This has improved internal and external quality processes, while reducing maintenance costs.   READ MORE +
Estimate Your Organization's Risk with This DDoS Attack Calculator

Estimate Your Organization's Risk with This DDoS Attack Calculator


According to our DDoS Impact Survey, 45% of organizations were attacked at least once in the past year, at an average cost of $40,000 per hour. Use this online DDoS calculator to assess the likelihood of your company experiencing a DDoS attack and its potential costs.   READ MORE +
Why the Cloud Could Be Your Best Bet for Security

Why the Cloud Could Be Your Best Bet for Security


Conventional IT wisdom says that your data is safer and more secure when you have it in your own on-premises data centre. However, if you think about the major high-profile data breaches over the last two years, whether Sony, JP Morgan etc. all involved on-presmises data centres, not the cloud.   READ MORE +
Approaching Cloud Security Concerns

Approaching Cloud Security Concerns


Despite an ever-growing menu of cloud solutions available and its constant development, the cloud in its essence is still mainly about trust.   READ MORE +
Cloud Security Principles: The Growing Importance of Physical Location in a Virtualized World

Cloud Security Principles: The Growing Importance of Physical Location in a Virtualized World


Legal requirements arise every day while the question of where to store one's data is left without a real useful explanation. The following post adds a new perspective to those considering the data treatment rules “bowl”, and offers a relevant solution.   READ MORE +