top of page

Welcome to our official blog

Rechercher


Le vilain petit secret du Cloud public : le coût du déchiffrement !
Le chiffrement est par nature une opération coûteuse en puissance de calcul. Ce coût est généralement accepté, en fonction des scénarios
-
6 mars 20194 min de lecture
34 vues


Software-defined connectivity planned for colocation data centers
Gartner predicts that by 2025, 80 percent of enterprises will migrate entirely away from their on-premises data centers.
-
21 févr. 20194 min de lecture
28 vues


Pour un business model Cloud différenciant en terme de sécurité
Dans un futur proche, un fossé pourrait se creuser entre fournisseurs Cloud traditionnels, et ceux ayant miser sur l'innovation.
-
18 janv. 20193 min de lecture
57 vues


Rethinking disaster recovery for the Cloud
You haven't already revised your DR plan for cloud-based computing, you need do it now to avoid CSPs outages that may affect your business
-
5 janv. 20196 min de lecture
30 vues


The future of cloud interconnects
There are multiple ways to connect to the cloud. Each way has its pros and cons in terms of speed, cloud ecosystem, price, security
-
26 nov. 20188 min de lecture
46 vues


The battle of the health clouds
Large CSPs have launched health clouds to tap into the burgeoning digital health ecosystem. However, the cloud value proposal is not clear
-
26 nov. 20184 min de lecture
31 vues


Why cloud visibility matters: Gaining insights for performance and compliance
Use these recommendations as a guide for beginning your own cloud monitoring program and for unlock the way users are using sensitive data
-
7 nov. 20183 min de lecture
27 vues


Public Vs Privé ou Hybride:Le Cloud est sensible à l’usage.
Public, vs Privé ou hybride: Le Cloud computing est sensible aux usages
-
6 nov. 20184 min de lecture
83 vues


How identities are the new security perimeter
Privileged access credentials are a best-seller because they provide the intruder with the keys to the kingdom.
-
15 oct. 20184 min de lecture
34 vues


How multi-cloud business models will shape the future
Achieving a consistent security posture, including user authentication and policy controls, is a complex task amplified across multi-cloud
-
10 oct. 20183 min de lecture
35 vues
bottom of page