Google Cloud’s Response to APRA Prudential Standard

January 10, 2018

Financial institutions in Australia are increasingly moving to the cloud as a way to effectively manage their digital operations, access new technology, improve security, and achieve cost efficiencies. In order to ensure a high level of information security and management, the Australian Prudential Regulatory Authority (APRA) has released several standards and guidelines that pertain to banks, credit unions, and other financial services institutions (FSIs). The APRA Prudential Standard CPS 231 Outsourcing is one such standard. This white paper provides general information to financial institutions looking to use Google Cloud services. The discussion is limited to the APRA Prudential Standard CPS 231 Outsourcing, and does not consider any other laws that may be applicable.

Spotlight

LogicMonitor

LogicMonitor® is an automated, SaaS-based IT performance monitoring platform that provides the end-to-end visibility and actionable data needed to manage complex and agile IT environments. Our company is headquartered in Santa Barbara, California, with offices in Austin, Texas, London, China, and Singapore.

OTHER WHITEPAPERS
news image

Cisco ACI Multi-Site Architecture

whitePaper | August 3, 2021

With the increasing adoption of Cisco® Application Centric Infrastructure (Cisco ACI®) as a pervasive fabric technology, enterprises and service providers commonly need to interconnect separate Cisco ACI fabrics. Business requirements (business continuance, disaster avoidance, etc.) lead to the deployment of separate data center fabrics, and these need to be interconnected with each other. Depending on the deployment option used (and as explained in this document), these fabrics may be called pods or fabrics and sites.

Read More
news image

vSAN 2-Node Cluster on VxRail Planning Guide

whitePaper | January 15, 2020

VMware vSAN 2-node cluster is a configuration that is implemented in environments where a minimal configuration is a key requirement. VxRail v4.7.100 was the first release to support the vSAN 2-node cluster with direct-connect configuration. Starting with VxRail v4.7.410, vSAN 2-node cluster with switch configuration is also supported.

Read More
news image

Zone-ECU Virtualization Solution Platform

whitePaper | May 26, 2022

The high complexity of future vehicle systems will need to move away from today’s distributed automotive E/E architecture towards a more centralized E/E structure based on less but much more powerful ECUs, instead of many individual control entities

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | October 12, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

SD-WAN Foundations for aSuccessful SASE Implementation

whitePaper | October 31, 2022

Secure access service edge (SASE) is a concept initiated by analyst research firm Gartner Inc. in 2019 as part of the technology “hype cycle.” Recently, SASE has been embraced by the customer and vendor community more readily to solve a variety of modern networking and security challenges.

Read More
news image

Use Intel Virtualization Technologies To Help Protect Endpoint Applications & Data Without Impacting The User Experience

whitePaper | August 6, 2021

Use Intel Virtualization Technologies to help protect Endpoint applications & Data without impacting the User expereince. Hardware- based security capabilities dekiver the performance required to help protect application and data, without adversely impacting the user experience. Impove Endpoint Security for Remote Workers Isolating Employees' personel and work use helps prevent business data from being exfiltrated and helps protect businesses from vulnerabilities due to personel use of social media and browsing, especialyy valuable as the number of remote workers continues to grow, and many organizations expect an increase in personam work. Increase and Accelerate Security Protection with Intel Virtualization technology Form a business client endpoint perspective, virtualization lets organizations re-think productivity and security. Virtualization Solutions allow multiple operating systems (OSs) and applications to run in independent partitions.

Read More

Spotlight

LogicMonitor

LogicMonitor® is an automated, SaaS-based IT performance monitoring platform that provides the end-to-end visibility and actionable data needed to manage complex and agile IT environments. Our company is headquartered in Santa Barbara, California, with offices in Austin, Texas, London, China, and Singapore.

Events