Adopting an application-centric approach to security management: getting business leaders interested
In my previous blogs I’ve looked at two of the myths that prevent organizations moving to an application-centric approach to security policy management.
A 3 Layered Approach to Application Migration
There are many processes involved in migrating applications to the cloud, however network security is often neglected. When this happens, applications are deployed in the cloud with inadequate security and compliance measures in place, or conversely the security team steps in and halts the migration process. This white paper presents a structural approach for bridging this network security gap before and during the process of migrating applications, that gives security team the essential groundwork needed to prepare for a secure migration process to the cloud.
Cloud atlas: how to accelerate application migrations to the cloud
It’s common for people to imagine that business applications can be beamed up, Star Trek style, into the cloud – the IT team just needs to press a few buttons and whoosh, the migration is done. If only it were that easy: In this post, I’m going to cover some of the obstacles that need to be overcome when migrating applications to the cloud.
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
Presented by AlgoSec and Rich Mogull, Analyst at Securosis, this webinar explains how cloud network security is different, and how to pragmatically manage it for both pure cloud and hybrid cloud networks.