A Briefing on Cloud Security Challenges and Opportunities

Cloud computing has emerged as a major shift in how computing resources are deployed and consumed, both by individuals and enterprises. However, despite benefits such as reduced up-front investment, lower costs and more eco-friendly operation, a large proportion of potential cloud customers are voicing misgivings with respect to how security and privacy are handled in the cloud. This distrust has been further fueled by media events, such as the PRISM scandal, which really shows how difficult it can be to know to what extent our data is being monitored for legitimate or illegitimate purposes.

Spotlight

Tekscape, Inc

Tekscape is an industry leader in advanced technology services, focusing on a results-oriented, business-minded approach to incorporating all of your technology solutions and management needs. Rising above the competition, the engineers at Tekscape have a unique ability to map business processes and technology in order to maximize your company's return on IT investment.

OTHER WHITEPAPERS
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | October 12, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

ScaleN: Elastic Infrastructure

whitePaper | July 4, 2022

Emerging data center models are based on flexibility and non-disruptive, on-demand scalability. Infrastructure must not only support these capabilities, but be able itself to provide these same benefits and capabilities. F5 ScaleN is a breakthrough in high availability and scalability, offering the robust capabilities required to enable multi-tenant solutions, elastic applications, and infrastructure for any environment.

Read More
news image

Intel Page Modification Logging, a hardware virtualization feature: study and improvement for virtual machine working set estimation

whitePaper | January 7, 2020

Intel Page Modification Logging (PML) is a novel hardware feature for tracking virtual machine (VM) accessed memory pages. This task is essential in today’s data centers since it allows, among others, checkpointing, live migration and working set size (WSS) estimation. Relying on the Xen hypervisor, this paper studies PML from three angles: power consumption, efficiency, and performance impact on user applications. Our findings are as follows. First, PML does not incur any power consumption overhead. Second, PML reduces by up to 10.18% both VM live migration and checkpointing time. Third, PML slightly reduces by up to 0.95% the performance degradation on applications incurred by live migration and checkpointing.

Read More
news image

Why improved VDI UX makes good business sense

whitePaper | May 31, 2021

Read this paper for three ways that GPUs can add value to your virtualized as well as stories from customers about how their businesses have benefited from GPUs.

Read More
news image

Software-Defined Data Center – infrastructure for enterprise digital transformation

whitePaper | November 14, 2022

Over the years the trend toward virtualization revolutionized data centers, but it did not change the hardwarecentric architecture that still serves as the basis for most data centers today. This could radically change in light of the latest software-defined approaches. Strategy, organization, technology: This white paper serves as a source of orientation for IT managers confronted with software-defined data center concepts.

Read More
news image

The Right Approach to Zero Trust for IoT Devices

whitePaper | May 3, 2022

Networking and security teams have historically relied on protections at the network perimeter to secure the entire enterprise. The internal network was deemed trusted and secure. While everything outside was considered “dirty,” everything on the internal network was considered “clean,” and application traffic would flow unrestricted. However, recent and developing shifts in enterprise working models are having a far-reaching effect on the traditionally managed network perimeter for security. The following trends are making organizations reassess their approach to security:

Read More

Spotlight

Tekscape, Inc

Tekscape is an industry leader in advanced technology services, focusing on a results-oriented, business-minded approach to incorporating all of your technology solutions and management needs. Rising above the competition, the engineers at Tekscape have a unique ability to map business processes and technology in order to maximize your company's return on IT investment.

Events