The Randstad Group is currently in the process of consolidating and centralizing its IT infrastructure across 30 IT departments, and will be providing service to more than 40 operating countries across four continents. To ensure the new infrastructure will have optimal security the company selected Trend Micro as its cloud security solution partner for the next five years. Continue reading
Tag Archives: cloud
VMworld Europe 2015: Bridging the Gap between Infrastructure and Security
As IT-savvy readers surely have noticed already: VMworld Europe starts today! From 12 to 15 October, Barcelona will be buzzing with animated conversations around virtualization, cloud, software-defined datacenter and related topics. Continue reading
Security can make or break your Azure project
All or nothing is a really bad strategy for securing your Microsoft Azure workloads. Security in Azure is very much a shared responsibility. You need to know exactly what it is that you must secure, and what is covered by Microsoft.
Microsoft provides robust physical security, network infrastructure, and virtualization layer. Ideally, you will match their excellence with equally robust security for your workloads, including operating system, applications, and data.
But there’s a small catch. If you try to use traditional security to protect your applications and data in the cloud, you risk slowing your Azure project with needless complexity. There’s a simpler and more effective solution. Continue reading
Moving to Office 365?
Be aware of your security responsibility !
An increasing number of companies has decided to host their office applications such as Microsoft Word, Excel and Powerpoint in the cloud. Also core services like mail, datastorage and sharepoint are hosted these days. No wonder really, because the underlying principle is very appealing: you no longer need to install software yourself, and the central storage in the cloud allows you to access your data anywhere and from any device. Highly convenient, isn’t it? But beware: switching from onsite applications to their hosted online equivalents also entails a certain degree of risk, particularly when it comes to data security. Continue reading