loader image
Multi-Factor-Authentification in Cloud Environments

Multi-Factor-Authentification in Cloud Environments

One of the biggest security threats today comes from compromised credentials and privileged account abuse. Accordingly, securing privileged access to applications, servers and infrastructure is the foundation of an effective security strategy. Source:...
How to make Data theft-proof

How to make Data theft-proof

When a company moves its #data and workloads to the #cloud, it opens up significantly more access points through which #hackers can enter. The challenge of protecting these is therefore greater than ever: in the latest “Cloud Security Report”, 76% of...
The Digital Workplace and its Support

The Digital Workplace and its Support

The pandemic has pushed many companies to move workplace processes to the #Cloud. However, in the case of a problem, there is often no optimal support from the large service providers. That’s why it can pay off, especially for SMBs with busy IT departments, to...
Cloud Computing as a Key Technology of Digitalization

Cloud Computing as a Key Technology of Digitalization

A hybrid cloud is a proven way for companies and organizations to drive digitization. But to make building a hybrid IT environment work, users need to consider several factors, from data management to porting workloads and outsourcing operations to a service provider....
International Data Transfers – is this the Solution?

International Data Transfers – is this the Solution?

At no time should unauthorized third parties be able to access #data in the #cloud, not even the cloud provider or intelligence services in third countries. #ConfidentialComputing promises to close the necessary gap in cloud data protection. There are still concerns...

Pin It on Pinterest