Cloud Infrastructure Management

Cloud Security Survey 2023: Infrastructure Protection Best Practices

September 29, 2022

phoenixNAP
In the post-pandemic world, we spread data everywhere. As remote and hybrid workforce models become the norm, multi-cloud deployments evolve into the de facto computing standard for distributed workloads. This expands the attack surface well beyond the walls of a traditional data center and overextends already understaffed security teams. As a result, organizations struggle to combat the growing number of insider and outsider threats targeting their invaluable digital assets.

Spotlight

Independent Oracle Users Group (IOUG)

The Independent Oracle Users Group (IOUG) represents the voice of Oracle technology and database professionals and empowers them to be more productive in their business and careers by delivering education, sharing best practices and providing technology direction and networking opportunities.

OTHER WHITEPAPERS
news image

Who Owns Security in the Cloud?

whitePaper | September 27, 2022

Businesses once doubted the long-term benefits of moving their traditional, on-premises workloads to the cloud. But those doubts didn’t last long. The ROI of cloud migration was realized quickly and decisively. Businesses eagerly shifted their workloads to the cloud and realized the financial benefits of doing so. However, in the rush to the cloud, clarity on security — and who is responsible for it — is often lost.

Read More
news image

Cloud Native Data Plane

whitePaper | June 7, 2022

It is no secret that mainstream Data Center applications are migrating to cloud. Similarly in the Security and Wireless Communications industry, this trend is emerging as well. Security applications such as Firewall, DDoS prevention, WAF, etc., have a natural affinity since the business logic has already moved in this direction and requires protection and portability.

Read More
news image

Open Radio Access Network Architecture on AWS

whitePaper | December 11, 2022

Amazon's trademarks and trade dress may not be used in connection with any product or service that is not Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may or may not be affiliated with, connected to, or sponsored by Amazon.

Read More
news image

Artificial Intelligence and Cloud Computing

whitePaper | November 26, 2019

The buzz surrounding artificial intelligence (AI) is hard to ignore. Huge data sets and large amounts of compute are the perfect match for deep learning, astonishing us with algorithms that have beaten grandmasters at games of chess and Go. Today, with access to no more than a web browser, the benefits enabled by breakthroughs in image and speech recognition not to mention machine translation and more are just a few clicks away. There’s the growth of the cloud to consider too. We’re depositing more and more of our data on virtual drives that make it easier to share, back-up and transfer information providing us with new opportunities both in the office and at home. But what do machine learning and cloud computing mean for scientific research? How can these tools help researchers to manage and navigate the vast datasets generated by increasingly sophisticated detectors and experiments? At big science facilities, data streams that used to be megabits per second are now hundreds of times faster, sometimes even more, as detector upgrades come online and new instruments are installed. That’s a lot of data to analyse and verify.

Read More
news image

Cisco Cloud ACI Hybrid Multi Cloud Design Guide

whitePaper | May 10, 2022

The main goal of this document is to provide design guidelines for Cisco Cloud ACI Hybrid Multi-Cloud use cases. ACI Multi-Cloud is the solution used to interconnect multiple cloud environments such as on-premises Cisco ACI, site, Amazon Public Cloud (AWS) and Microsoft Azure (Azure).

Read More
news image

Cloud Native Security Model

whitePaper | September 21, 2022

Cloud native Security is the practice of securing cloud-based platforms, infrastructure and applications. Security is built in from the start of the development.

Read More

Spotlight

Independent Oracle Users Group (IOUG)

The Independent Oracle Users Group (IOUG) represents the voice of Oracle technology and database professionals and empowers them to be more productive in their business and careers by delivering education, sharing best practices and providing technology direction and networking opportunities.

Events