Story image

EBOOK: The most effective way to protect data in the cloud

09 Apr 18

As a business scales, one of the decisions you need to make is where you should store their data – on-prem, in the cloud, or a mix of both.

For many CIOs, moving company data to the cloud becomes inevitable when the status quo is no longer sustainable.

Legacy infrastructure mires the enterprise in spiralling costs, security vulnerabilities, and archaic IT processes.

Having a mix of both on-prem and cloud infrastructure provides more options for backup, but it introduces complexity in data storage and can be difficult to secure.

It’s important when designing your ideal cloud architecture to put a security operations centre in place.

Rackspace managed security vice president Brannon Lacey says that depending on a company’s maturity and business goals, a managed service or hosted toolset may be the right fit.

However, at the top of the best practices spectrum is having a managed security service provider (MSSP).

This approach gives your organisation a network of people, process and technology that works together to protect your data.

Still unsure of how a security strategy will work for you?

Rackspace vice president and chief information security officer David Neuman and Rackspace operations director Daniel Clayton have teamed up to create a resource to answer your questions.

The ebook will help you evaluate your security posture, determine the right approach for you, and understand the opportunities available through partnering with an MSSP.

Rackspace has a history of helping businesses to tap the power of cloud computing without the complexity and cost of managing it on their own.

The e-book will help your organisation

  • Move up from “do-it-yourself” security methods
  • Understand modern security challenges
  • Devise a plan for security in the cloud
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t. 
Pitfalls to avoid when configuring cloud firewalls
Flexibility and granularity of security controls is good but can still represent a risk for new cloud adopters that don’t recognise some of the configuration pitfalls.
CERT NZ highlights rise of unauthorised access incidents
“In one case, the attacker gained access and tracked the business’s emails for at least six months. They gathered extensive knowledge of the business’s billing cycles."
Report finds GCSB in compliance with NZ rights
The Inspector-General has given the GCSB its compliance tick of approval for the fourth year in a row.
Securing hotel technology to protect customer information
Network security risks increase exponentially as hotels look to incorporate newer technologies to support a range of IoT devices, including smart door locks.
Why total visibility is the key to zero trust
Over time, the basic zero trust model has evolved and matured into what Forrester calls the Zero Trust eXtended (ZTX) Ecosystem.
Gartner names Proofpoint Leader in enterprise information archiving
The report provides a detailed overview of the enterprise information archiving market and evaluates vendors based on completeness of vision and ability to execute.
WatchGuard appoints new channel distributors in A/NZ
The appointments will enable WatchGuard to expand its regional channel reseller footprint.