CloudPassage
8 ways to achieve agile security
This post was originally published here by gregg rodriguez. Between 2017 and 2021, worldwide spending on cybersecurity will top $1 trillion, according to predictions from Cybersecurity Ventures. The barrage of cyberattacks on enterprises and new threat vectors within networks due to the move to Infrastructure as a Service (IaaS), or public cloud, makes the need for agile […]
Securing Azure Application Gateway
This post was originally published here by gregg rodriguez. Web applications are becoming frequent targets of malicious attacks that exploit common vulnerabilities, such as SQL injection attacks or cross site scripting attacks, which makes securing your Azure Application Gateway more critical than ever. Preventing such attacks in application code can be a sizeable challenge, as […]
Adding Continuous Security to your CI/CD pipeline
This post was originally published here by gregg rodriguez. This is Part 1 of a two-part post on ensuring your applications are secure by adding continuous security to your CI/CD pipeline. Today, more enterprises are looking to public cloud, or Infrastructure-as-a-Service (IaaS), to enable the speed and agility they need in their Continuous Integration/Continuous Delivery (CI/CD) pipeline to stay […]
Adding Continuous Security to Your CI Pipeline
This post was originally published here by gregg rodriguez. This is Part 1 of a two-part post on ensuring your applications are secure by adding continuous security to your CI pipeline. Today, more enterprises are looking to public cloud, or Infrastructure-as-a-Service (IaaS), to enable the speed and agility they need in their Continuous Integration (CI) pipeline to stay competitive. […]
Securing Azure Virtual Network
This post was originally published here by Edward Smith. Many enterprises are already reaping the exponential rewards delivered by using Infrastructure as a Service (IaaS), in the form of increased efficiency and decreased costs. By combining its reach and scope with the power of virtualization services, such as Azure Virtual Network and Virtual Machines (VMs), Azure is delivering a number of […]
Best Practices for Securing Azure Compute
This post was originally published here by gregg rodriguez. Cloud computing delivered through services like Microsoft Azure, and AWS, have delivered a bevy of benefits for enterprise IT. Among the most significant is the ability to quickly provision computing resources without major upfront investment or need for building on-premise data centers. On-demand cloud computing resources have also given […]
Test Drive CloudPassage Halo Cloud Security Platform
This post was originally published here by gregg rodriguez. Evaluating a new cloud security solution can take a lot of time and effort, including the hassle of setting up a test environment. Our CloudPassage Halo sandbox makes it easy, by letting you test our solution in a pre-built environment so you can quickly understand how […]
Secure Your Azure Deployments With Cloud Secure
This post was originally published here by Edward Smith. Consumption of public cloud infrastructure services continues to increase, requiring security teams to maintain a comprehensive and up-to-date inventory of cloud assets in-use across multiple environments, such as Azure and AWS, throughout their enterprise. According to 451 Group, 69 percent of organizations plan to be running a multi-cloud […]
Top 5 Benefits of Public Cloud Computing Versus Traditional IT
This post was originally published here by gregg rodriguez. Long before cloud computing, traditional IT infrastructure was great for enterprises that needed to run many different types of applications, because it gave them full control of their applications and data on their local servers. It also made security less complex. Back then you only had […]
Harness the Power of IaaS Without Compromising Security
This post was originally published here by gregg rodriguez. This is the first of a two part series on the benefits of infrastructure-as-a-service (IaaS). Enterprises struggle to control costs and stay competitive – they face increasing demands to keep pace with requirements for data storage and protection, ever-changing regulations, and the daily threat of security […]