HPE has identified the five key capabilities necessary for securing a hybrid cloud environment: Data-centric security: Protecting data is the core of security and compliance controls. Data needs to be secured at rest, in motion and while in use. It should maintain an index with a searchable data format after it is protected and the encryption should be multi-layered. Dynamic infrastructure hardening: Just like on-premises machines, the cloud infrastructure needs to be updated and hardened […]
security strategy
One of the main reasons for deploying desktop virtualization is the security advantages it can provide, such as keeping sensitive data off the endpoint, according to Citrix. And Citrix is practicing what it preaches at its Ft. Lauderdale, Fla., headquarters where employees, for example, use the Citrix virtualization product Citrix Receiver for smartphones and tablets. Citrix Receiver brings full-fledged desktop apps to smartphones and tablets “It’s required to access some systems such as SAP,” says […]
More and more enterprise IT shops – as they get comfortable with virtualization practices in their own private clouds – are considering a jump to the public cloud. But before making that leap, consider these pieces of advice from those that have already jumped. 1. Make sure your provider has VM-specific security “Hypervisors were never really designed to be running in a public environment,” says Beth Cohen, senior cloud architect for Cloud Technology Partners, a […]