Welcome!

Every Cloud Needs a Silver Lining

Gilad Parann-Nissany

Subscribe to Gilad Parann-Nissany: eMailAlertsEmail Alerts
Get Gilad Parann-Nissany via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Gilad Parann-Nissany

The US Federal Communications Commission has recently reported that "theft of digital information has become the most commonly reported fraud, surpassing physical theft." Businesses can do a lot to protect themselves. The FCC issued a Tip Sheet for small businesses to promote employee security training, firewalls, securing of WiFis, and more. But for business operating in (or migrating to) cloud environments; data security, cloud computing security issues, and challenges take on  new meanings and require new strategies. Security in the Cloud: Unique Challenges In the cloud, data security poses new risks and challenges. We are no longer concerned just with burglars breaking into our offices to steal computers, but rather with the data belonging to complete systems deployed to the cloud. When using public cloud infrastructure like that of AWS, VMware, Microsoft Azure... (more)

Cloud Encryption Deployment for VMware-Based Application Services

As the infrastructure cloud market (IaaS and PaaS) continues to grow rapidly, we are seeing quite a few customers who are delivering an application – whether it is a mission-critical or SaaS application – and basing their solution on VMware. Some of these are deploying VMware in their private data center, while others are leveraging the cloud model and “renting” capacity from a public VMware-based cloud provider. In a way, both of these scenarios are public: in many of the cases the “private cloud” scenario serves users who belong to different organizations, so from the user poi... (more)

Cloud Security – Implementing a Secure Cloud Backup Case Study

Secure cloud backup is a scenario which increasingly gains traction. It allows organizations to implement an off-site backup while maintaining costs at a minimum. In this blog post I would like to focus on a specific use case of secure cloud backup. The system we describe is comprised of an on-premise replication server, Porticor Cloud Security, and Amazon S3 as the final backup destination, all integrated by one of our fine cloud integrators. Secure Cloud Backup – The Business Need In this use case, an enterprise organization was struggling with an inefficient and costly offsite... (more)

Top Cloud Security Threats

To say that cloud security for cloud computing is gaining traction would be the understatement of our era.  Whether in public clouds, private clouds, or hybrid scenarios – it seems like everyone is in the cloud.  Healthcare providers, eCommerce, disaster recovery services, data storage . . . the types of cloud services available seem to cover every base.  What would Darwin think about his “Survival of the Fittest” evolving from animal species to businesses who take advantage of the flexibility, elasticity, and cost-effectiveness of cloud computing? But, there are dangers in the ... (more)

Can You Own Your Public Cloud?

Can You Own Your Public Cloud? Public cloud computing is surging forward into healthcare, finance, and utilities. Popular cloud based implementations run the gamut from big data analysis to customer service applications, and everything in between. As more and more sensitive data processing is done in the cloud, encryption of data has become the obvious best practice. Google Compute Engine has provided data encryption for some time; and in a recent interview, AWS’s CTO said they’d like all data, or at least all sensitive business data, to be always encrypted. Encrypting data imm... (more)