The Endless Debate: Is the Cloud Secure? – Part 1 of “Moving to the Cloud”

Credit to Author: Steven Turney| Date: Tue, 11 Jul 2017 13:39:56 +0000

This is the first blog in a series of three on why and how companies are moving their building security management to the cloud. I can’t tell you how many… Read more »

The post The Endless Debate: Is the Cloud Secure? – Part 1 of “Moving to the Cloud” appeared first on Schneider Electric Blog.

Read more

Bringing Data Center Security to Cloud Speed

Credit to Author: Justin Foster| Date: Thu, 22 Jun 2017 12:00:21 +0000

Last week, while visiting the product management team for Deep Security, I asked about their latest release. They surprised me by saying the big news is that there IS a release. Confused, I asked them to elaborate… You see, when you develop software, you’re faced with many choices, one of which is deciding whether to…

Read more

4 ways blockchain is the new business collaboration tool

Credit to Author: Lucas Mearian| Date: Tue, 23 May 2017 03:01:00 -0700

While blockchain may have cut its teeth on the cryptocurrency Bitcoin, the distributed electronic ledger technology is quickly making inroads across a variety of industries.

That’s mainly because of its innate security and its potential for improving systems  operations all while reducing costs and creating new revenue streams.

David Schatsky, a managing director at consultancy Deloitte LLP, believes blockchain’s diversity speaks to its versatility in addressing business needs, but “the impact that blockchain will have on businesses in various industries is not yet fully understood.”

To read this article in full or to leave a comment, please click here

Read more

Randstad Group Selects Trend Micro to Protect its Public Cloud Infrastructure

Credit to Author: Trend Micro| Date: Wed, 10 May 2017 12:00:48 +0000

The Randstad Group is currently in the process of consolidating and centralizing its IT infrastructure across 30 IT departments, and will be providing service to more than 40 operating countries across four continents. To ensure the new infrastructure will have optimal security the company selected Trend Micro as its cloud security solution partner for the…

Read more

The Unified Cloud

Credit to Author: Justin Foster| Date: Mon, 08 May 2017 12:00:42 +0000

Throughout the history of cloud computing, 2006 was a momentous year. In 2006 Amazon Web Services released S3, the first pay per GB storage service. By August, they released  EC2, allowing you to spin up a server and pay by the hour in the cloud. In the decade that has followed, AWS has emerged as…

Read more

Trend Micro Smart Protection Complete Receives 5-Star Review from SC Magazine

Credit to Author: Andrew Stevens| Date: Thu, 04 May 2017 12:00:37 +0000

Cloud security is critical, because hackers have set their sights on the virtual realm.The best days are the ones you wake up to good news you weren’t expecting, right? Well, earlier this month we woke up to find out the Trend Micro Smart Protection Complete had received a five-star rating and “Best Buy” recommendation from one of the security industries leading publications at SC Magazine. “This is absolutely…

Read more

FBI director floats international framework on encrypted data access

Credit to Author: Michael Kan| Date: Thu, 23 Mar 2017 15:21:00 -0700

FBI director James Comey has suggested that an international agreement between governments could ease fears about IT products with government-mandated backdoors, but privacy advocates are doubtful.

Speaking on Thursday, Comey suggested that the U.S. might work with other countries on a “framework” for creating legal access to encrypted tech devices.

“I could imagine a community of nations committed to the rule of law developing a set of norms, a framework, for when government access is appropriate,” he said on Thursday.

Comey made his comments at the University of Texas at Austin, when trying to address a key concern facing U.S. tech firms in the encryption debate: the fear that providing government access to their products might dampen their business abroad.

To read this article in full or to leave a comment, please click here

Read more

Deep Security 10: Customer Driven Development with TRC

Credit to Author: Justin Foster| Date: Wed, 08 Mar 2017 13:00:53 +0000

At least that used to be the standard software development process. Customers were involved in feedback quite late in the development process, often after the release has been mostly formed. We recently shared how Deep Security 10 is an example of server security standing the test of time but it was also the first release…

Read more