Blog Banner

23 Cloud Security Best Practices

1. Establish SLAs in the Contract, Including in the Cases of Security Incidents

2. Provide the Security Architecture Drawing

3. Have Specialized Protections for the Perimeter

Which Cisco Certifications Should You Earn?

IT certifications are important credentials in a job market that emphasizes proficiency in the specific hardware and software - everything from Cisco switches to myriad JavaScript frameworks - that underpin today's enterprise architectures, cloud computing platforms and mobile applications. In particular, knowledge of the vast Cisco ecosystem can serve as both a starting point for the understanding of modern concepts such as software-defined networking and an additional source of insight for standard network management.

Understanding the Complex Relationship Between Cisco and SDN

According to IT research firm Gartner, SDN hit the peak of its public popularity in 2013 and has since gone under the radar.

Software-defined networking has been one of the most hyped technologies of the 2010s to date. According to IT research firm Gartner, SDN hit the peak of its public popularity in 2013 and has since gone under the radar, although development of enterprise-grade solutions continues and it may transform SDN into a long-term fixture of business wide area networks.

Why the Software-Defined Data Center is Here to Stay

Software-defined solutions - for networking, storage and entire data centers - have become much more prominent over the last decade, as the essential technology underpinning them (virtualization) has gone from the fringes to the forefront of IT. Enterprise vendors such as VMware as well as cloud giants like Google, Amazon and Microsoft pioneered the concept of separating various IT components from the actual hardware that supports them.

What to Know Before Deploying a Citrix XenMobile Enterprise Solution

Citrix XenMobile Enterprise is currently one of the most prominent solutions for mobile device management, also known as enterprise mobility management. At its core, MDM/EMM is about enabling organizations to secure and oversee the many mobile devices (mainly smartphones and to a lesser extent tablets) in use by their employees. But in order to be effective, MDM/EMM requires striking a delicate balance between, on the one hand, the convenience and familiarity provided by modern mobile hardware and, on the other, the ever-evolving set of corporate cybersecurity requirements designed to ward off a broad spectrum of threats.

Contact author


Subscribe for Future Blog Notifications