Key Considerations for a Secure Cloud Migration

This is a summary of an article, “6 Considerations for Secure Cloud Migration,” written by Fortinet’s Lior Cohen that appeared on the DevOps website on April 11, 2019. According to a 2018 Cloud Computing Survey by IDG, 73% of organizations already have at least one application or some portion of their Continue Reading

Introducing Zero Round Trip Time Resumption (0-RTT)

Cloudflare’s mission is to help build a faster and more secure Internet. Over the last several years, the Internet Engineering Task Force (IETF) has been working on a new version of TLS, the protocol that powers the secure web. Last September, Cloudflare was the first service provider to enable people Continue Reading

Managed Security Service Providers, Choosing the Right Security Vendor

Businesses struggling to secure their networks against determined cyber attackers are facing a perfect storm of challenges: most networks are in the midst of a dramatic transformation, including IoT, virtualization, and the cloud, the number and sophistication of network attacks is increasing, the cost of being breached continues to rise, Continue Reading

Cloud Drive – Secure File-Sharing on the Cloud

Hi there! Are you looking around for a secure solution for sharing files and documents to you staff, associates and clients? If you are … ReadySpace Cloud Drive is for you! – Encrypted data – Access rights control – Access from anywhere via web client or mapped drive – Unlimited Continue Reading

Our Millionth Certificate

Let’s Encrypt has issued its millionth certificate. Our first million certificates are helping to secure approximately 2.4 million domains. This milestone means a lot to a team that started building a CA from scratch 16 months ago with an aim to have a real impact on the security of the Continue Reading

Today’s Retail Network and Security Requirements

For retailers with many geographically dispersed shops or stores, having secure network connectivity and linking all sites to the head office has become the glue of critical operating processes, such as the Point of Sale (PoS), accounting, inventory control, pricing, customer relationship management applications, and other business services. The in-store Continue Reading

Q&A with Andy Travers on the Unique Security Requirements of Government Agencies 

The Government of Canada selected Fortinet to secure its IT infrastructure. Fortinet’s Andy Travers shares some perspective on the unique security requirements of government agencies.  Fortinet has a longstanding history of working with the Canadian market. What is unique about Fortinet’s approach that has made it become a security partner of choice Continue Reading

Partner Spotlight – LANCOM ePaper room allocation with Zimbra

Zimbra Collaboration is Private, Secure and Open, and we are thrilled to present our new Blog Spotlights to show all the creations and projects, which our Partners has been developed around Zimbra Collaboration, on this first Blog Post, let me introduce LANCOM ePaper Room allocation. Partner Spotlight – LANCOM ePaper Continue Reading

Securing privileged access: Preventing and detecting attacks

This post was authored by Nir Ben Zvi, Principal Program Manager, Windows Server. Introduction: Why is it important to secure privileged access? The threat environment has continued to reinforce that identity is a primary security boundary. When examining major cyber-attacks that occurred over the last several years, one can notice Continue Reading

How we built Origin CA: Web Crypto

At CloudFlare we strive to combine features that are simple, secure, and backed by solid technology. The Origin CA is a great example of this. You no longer need to go to a third-party certificate authority to protect the connection between CloudFlare and your origin server. You can now get Continue Reading

>