📜 ⬆️ ⬇️

IaaS-digest: 30 materials on the topic of information security



We in IT-GRAD try to tell in our blog about Habré about cloud technologies and IT infrastructure. We are very interested in the attempt of one of the users to gather materials on similar topics in the " cloud digest ".

We offered our alternative in the form of an IaaS digest , which is based on our own content.
')
Recovery as a service: features of the RaaS service
How does the RaaS service meet the stated specifications? The article describes the key components of the RaaS service and the dangers that await the client who decided to use it.

Cloud data center: how to check the reliability of the data center when choosing an IaaS provider
When you choose a cloud provider for an IaaS project, the focus is on the characteristics of the cloud itself. But behind any virtual cloud lies the real equipment, the reliability of which largely determines the reliability of the new service deployed in the cloud.

Pitfalls for PCI DSS certification: CVV and telephone recording
Any organization that uses its own card processing, sooner or later faces the need for certification according to the PCI DSS standard. If you sell goods or services online and offer your customers to pay with bank cards - this article may be useful to you.

Processing and protection of personal data: frequently asked questions
Recently, the issue of personal data protection has been raised more and more often. Federal laws require the protection of information of limited access, and in the case of non-compliance with these requirements - to hold organizations accountable with all the ensuing consequences. For those who are interested in the topic of personal data protection, we have prepared answers to frequently asked questions.

Data replication to the NetApp service provider cloud
What are the advantages of replication performed by the client to the cloud NetApp hosting provider? This article talks about NetApp SnapMirror replication technology, which is not only easy and convenient to use, but also useful.

Cloud (IaaS / SaaS) service provider and security issues: three steps to preventing threats
Today, IT companies around the world are faced with a huge number of security threats, regardless of the infrastructure used. The question remains: how does a cloud service provider protect itself and its customers from all sorts of threats and attacks at the time of using innovative technologies, remote access solutions, as well as the ever-growing requirements for performance, scalability, flexibility and elasticity?

DPI on cloud service
When it is worth using the technology of deep research packages DPI (Deep Packet Inspection). What it is good for and what its capabilities are in the cloud of an IaaS provider will be discussed in this article.

PCI DSS Certification: Frequently Asked Questions
The issue of compliance with the PCI DSS standard is becoming important not only for major players in the payment card industry, but also for small trade and service enterprises. In this article, we will answer the main questions that concern organizations faced with the challenge of PCI DSS certification.

Disaster-resistant solution using IaaS
In our era of rapid growth in information and the desire of business, the approach to data integrity also requires a change. If earlier small and medium-sized companies relied on chance, then today the growth in popularity of virtualization and cloud computing actually equated the company's capabilities with any budgets. Let's see what are the options for organizing a disaster-proof solution using clouds.

Veeam Cloud Connect: Backup to the Cloud
Every year the amount of data stored on both physical and cloud platforms of various companies is constantly increasing. In this regard, the question of the protection of information is acute. This article describes a tool for quickly transferring backups to remote cloud sites, as well as data recovery.

What is the cloud scaring business? Top 5 concerns about cloud migration prospects
Myths that continue to mislead company executives. In this article we tried to debunk them.

Cloud security: the most interesting thing about the Spotlight Report
In this article, we shared the most interesting, in our opinion, results of the 2015 survey, which was attended by over 250,000 representatives of the information security community on LinkedIn.

Why BaaS is sure to become a standard in a corporate environment
The use of a cloud by the company to store backups is increasingly becoming an important criterion when a client assesses the reliability of a future partner. Cloud backup offers a number of significant benefits.

Cloud Risk Insurance with IT-GRAD and AIG
Cloud Risk Insurance - Is It Necessary? If you asked a similar question and still do not know the exact answer, we have prepared a material that will help you figure it out.

Business cloud services and DDoS protection
Cloud services, aimed at both small and medium-sized businesses, are increasingly becoming the target of various attacks, including the notorious DDoS. About how things are going to be protected from threats at home and abroad.

How to protect cloud data center with virtual firewalls Palo Alto Networks VM-Series
How to speed up the deployment of mission-critical business applications without compromising security? How to determine the security policy for protection against modern threats, following in step with the virtualization of data centers? About the features of the new generation Palo Alto Networks VM series firewall, used in conjunction with the Palo Alto Networks Panorama and VMware NSX solutions.

Disaster recovery and storage of backups in the cloud: new features of Veeam Cloud Connect
The new solution Veeam Availability Suite v9, which went on sale and became available for download, implemented many new and long-awaited features. It's time to meet them.

Palo Alto Networks VM Series and VMware NSX: Dynamic Security Policy Configuration Case
A practical example that demonstrates the capabilities of the Palo Alto Networks VM series firewall, working in conjunction with Panorama and VMware NSX, with particular attention to the configuration features of dynamic security policies.

Commvault v11: features of backup to the cloud
About Commvault v11 is a solution that allows you to flexibly manage integrated data and information, provide backup management and disaster recovery to the cloud of an IaaS provider, guarantee the protection of the cloud platform, and monitor workflows.

How do federation services solve the problems of identifying and accessing web applications in the IaaS cloud
The road to the cloud for many companies is often associated with the use of federated services and security tools, but not every organization equally uses existing capabilities. On the classic problems of identification and access and federated clouds.

Disaster-resistant IaaS, as well as replication and backups
The growth of the popularity of virtualization and cloud computing has leveled off in the capabilities of both small and large companies, therefore it has become necessary to change the approaches to data integrity. This article discusses synchronous and asynchronous replication technology, as well as backup.

IaaS provider and security issues
According to statistics, about 400,000 malicious objects are recorded every day: both small and large companies suffer, and the attack vector is often directed at public clouds and the infrastructure of IaaS providers. How can a cloud provider protect itself and its customers from all sorts of threats in the face of increasing performance and scalability requirements?

Data Center Experience and Problems: How to Verify Data Center Reliability
Nowadays, designing and creating data centers is a fairly well-studied area. Standards have been developed and established that specify the mandatory and recommended requirements for the infrastructure of the machine rooms. About the facts from the life of the data center and the challenges facing data centers.

How IaaS provider to choose a data center to host the cloud: IT-GRAD Experience
The topic of building the infrastructure of an IaaS provider and a story about the criteria that guided us in choosing a data center, plus a little about the data center, where the IT-GRAD cloud is now located.

How to keep secret correspondence in a world where you are constantly monitored: the methods of Edward Snowden. Part 1
When you pick up a phone and make a call, send an SMS, email, post to Facebook or Google Hangouts, other people can track what you are talking about, who you are talking to and where you are. About security and what tools help to organize secure communication in the network.

How to keep secret correspondence in a world where you are constantly monitored: the methods of Edward Snowden. Part 2
In the first part, we figured out the current capabilities of anonymous encrypted messaging, accessible to the common user, and disassembled the practical application of technologies popular in this area using Mac OS X. The next step is how to set up anonymous encrypted communication on Windows, Linux and Android.

The backdoor SYNful knock allows you to replace the operating system of Cisco routers
Mandiant security researchers have discovered previously unknown attacks on Cisco routers that allow attackers to collect large amounts of data while remaining imperceptible to popular protection tools.

Cloud provider crashes: how to treat this
Problems happen. They happened before, and will certainly take place in the future. A little about the reliability of the providers of cloud services and how to respond to customers in case of failures.

Crash test for high-availability cloud platform
How to make sure that the cloud provider infrastructure really does not have a single point of failure? The story of how the company "IT-GRAD" conducted acceptance tests of a new cloud platform.

Interview with Grigori Kornilov (Kaspersky Lab)
We interview Grigory Kornilov, senior service manager at Kaspersky Lab. Gregory spoke about the two-year experience of using IaaS and how they came to the decision to use external cloud resources.

Source: https://habr.com/ru/post/281803/


All Articles