Posts Tagged ‘ AFORE ’

Security Wrapped Data

July 10, 2014
By
VirtualizationSecurity

On the July third Virtualization Security Podcast, we discussed mobile security with Harry Labana, CPO of CloudVolumes, and Ben Goodman of VMware. Actually, it was not necessarily about mobile security as much as it was about security in accessing corporate data from mobile devices, regardless of device and location of data. What came out of…

Read more »

News: AFORE Adds SecureVM and SecureFile to Cloudlink

February 24, 2014
By
AFORE logo 120_36_

AFORE Solutions’ goal has been to provide not only data at rest encryption but also data in motion encryption at all levels of the cloud stack, such that not even the cloud providers can see or change your data. This level of confidentiality does not exist within existing public or private clouds without a little…

Read more »

Picking a Secure Hybrid Cloud Security Solution

October 29, 2013
By
Picking a Secure Hybrid Cloud Security Solution

In the past we have discussed the various aspects of the secure hybrid cloud, ranging from the data center through a transition stage and finally to and from the cloud. Unfortunately, picking just one security solution, or even one family of solutions, does not work, so we need to start thinking outside the box and…

Read more »

Validate throughout the Stack: AFORE CypherX

August 26, 2013
By
Validate throughout the Stack: AFORE CypherX

When we look at the secure hybrid cloud, there seems to be a missing piece, a piece that is used to validate identity via the role based access control assigned to applications, data, and systems allowed to access that is dynamic instead of normal static firewall rules that are either port or vm-centric. The software…

Read more »

Securing the Hybrid Cloud

July 10, 2013
By
Securing the Hybrid Cloud

The secure hybrid cloud encompasses a complex environment with a complex set of security requirements spanning the data center (or data closet), end user computing devices, and various cloud services. The entry point to the entire hybrid cloud is some form of End User Computing device whether that is a smart phone, tablet, laptop, or…

Read more »

Public Cloud Reality: Application Security is in your Hands

February 18, 2013
By
VirtualizationSecurity

We recently moved workloads to the public cloud and the public cloud reality does not match the hype, nor does it match the application security requirements of a small or even large organization.

Read more »

Virtualizing Business Critical Applications – Integrity & Confidentiality

January 14, 2013
By
VirtualizationSecurity

Recently I discussed Virtualizing Business Critical Applications and security, which includes availability, confidentiality, and integrity. However, that discussion was more about visibility into the environment for security operations. I purposely left off the discussion of gaining integrity and confidentiality of the data housed within those business critical applications.

Read more »

Defense in Depth: Storage Security in a Hybrid Cloud

July 11, 2012
By
StorageNetworking

Storage Security is not only about Encryption, which is just one aspect of Storage Security requirements for the virtual and cloud environments. It is also about increasing defense in depth and knowledge of what is touching your storage environment. As well as providing security around those touch points and to a great extent auditing and…

Read more »

Virtualization Security is NOT Cloud Security!

January 31, 2012
By

I and others look at Virtualization Security constructs with an eye towards Cloud Security, but they are not necessarily the same. Granted for some clouds, virtualization security can lead to cloud security but this really depends on how the cloud's architecture. Even so, what we know from Virtualization Security WILL apply to Cloud Security and…

Read more »

Featured Solutions