Weighing VMware vSphere Encryption

Written by Joe Kozlowicz on Thursday, March 8th 2018 — Categories: Cloud Hosting, Cloud Storage, Cloud Hosting, Cloud Storage, HIPAA Compliance, Security

VMware vSphere 6.5 introduced policy-based encryption, which simplifies the security management of VMs across large scale infrastructure, as each object no longer requires individual key management.

vSphere VM encryption offers quite a few advantages compared to other encryption methods, but it might not be a great fit for every workload. When weighing whether to encrypt or not, you’ll want to consider a few limitations, caveats, and performance issues first.

Continue Reading...

Are Enterprises Shifting Back to On-Premise Hardware?

Written by Joe Kozlowicz on Thursday, March 1st 2018 — Categories: Cloud Hosting, Colocation, Data Center Design

The past five or ten years have been jam-packed with cloud computing hype. Indeed, the cloud is here to stay, without a doubt. But recent reports show analysts expect hardware sales for on-premise enterprise IT to tick up significantly.

High profile examples like Dropbox show that moving back to a more traditional data center can create efficiencies and free up cash flow. Is the enterprise data center – and by extension, colocation – about to put up a fight against the cloud?

Continue Reading...

Cryptocurrency Mining Malware All the Rage in 2018

Written by Joe Kozlowicz on Thursday, February 15th 2018 — Categories: Security

You’ve probably heard about cryptocurrency — the most famous being Bitcoin — as it soared and crashed in value in the past few months. We have a quick explanation about cryptomining  and its associated environmental costs here on the blog. Many are looking to cash in on “free money” by dedicated expensive hardware setups to mining new coins and processing crypto transactions.

So many, in fact, that a new variety of malware has emerged, infecting PCs, servers, and even smartphones with cryptomining software. Unbeknownst to users, cryptojacking software is using valuable computing power to enrich hackers while dramatically slowing down the infected device.

Will 2018 be the year of cryptojacking? How can you fight or avoid these new flavors of malware?

Continue Reading...

How Does the New CLOUD Act in the Senate Affect Foreign Data Storage?

Written by Joe Kozlowicz on Wednesday, February 7th 2018 — Categories: Cloud Hosting, Cloud Storage, Security

As we’ve mentioned before on the blog, the location of your cloud data matters. Latency, accessibility, and security are all top of mind, but legal concerns should also be considered. Case in point: a new law working its way through the Senate could have major implications for your data storage.

The CLOUD Act (Clarifying Lawful Overseas Use of Data) has recently garnered the support of major tech companies like Apple, Microsoft, and Google, among others. Its stated goal is to clarify a web of different laws relating to data disclosure and privacy so enforcement officers and government officials have well-defined guidelines when it comes to accessing remotely stored data, including information that resides overseas, which is otherwise governed by the host country’s own laws.

So how might the CLOUD Act affect cloud storage and data sovereignty?

Continue Reading...

How Virtualizing Desktops and Apps Leads to Stronger Security

Written by Joe Kozlowicz on Thursday, January 25th 2018 — Categories: Security, Virtual Desktop

Virtualization revolutionized the delivery of IT services by abstracting the computing resources of a server and allowing many “virtual machines” to run on a single box. It is now commonplace and a foundational piece of cloud computing.

One outgrowth of virtualization was virtual desktops, which use a virtualization platform to run instances of desktop operating systems, complete with applications, that are accessed remotely. This means that the end client accessing those virtual desktops doesn’t need to be very powerful, because all the processing happens in the data center. It also means there is less hardware for IT staff to manage and updates are simple to process.

Virtualizing applications — and to an even greater extent, virtualizing desktops — has another hidden benefit, however: stronger data security. But how does remote access and processing add security? Shouldn’t there be more chances for an attacker to intercept data when it is traversing from office or remote work locations to a central data center?

Continue Reading...

Chat Now