Home Application Delivery Cloud Computing

Cloud Computing

Mitigating Cloud Attacks With Configuration Hardening

For attackers, misconfigurations in the public cloud can be exploited for a number of reasons. Typical attack scenarios include several kill chain steps, such as...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world...

Ensuring Data Privacy in Public Clouds

Most enterprises spread data and applications across multiple cloud providers, typically referred to as a multicloud approach. While it is in the best interest of public...

Now or Never: Financial Services and the Cloud

I will get straight to the point: The time is right for the financial services (FS) industry to leverage the power of the cloud....

Ensuring a Secure Cloud Journey in a World of Containers

As organizations transition to the cloud, many are adopting microservice architecture to implement business applications as a collection of loosely coupled services, in order...

Embarking on a Cloud Journey: Expect More from Your Load Balancer

Many enterprises are in transition to the cloud, either building their own private cloud, managing a hybrid environment – both physical and virtualized—or deploying...

Digital Transformation – Take Advantage of Application Delivery in Your Journey

The adoption of new technologies is accelerating business transformation. In its essence, the digital transformation of businesses uses technologies to drive significant improvement in...

LBaaS: Load Balancing for the Age of Cloud

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger. As organizations embrace the cloud,...

Load balancing and application delivery in VMware vCloud. How to best serve your applications?

Whether you are building a private cloud or deploying applications over a public cloud infrastructure, you will be using application delivery functionality such...

The “As-a-Service” Revolution: How Cloud-based Services are Reshaping the Enterprise

The growth of cloud-based services is challenging customers to second-guess their brick and mortar investments. From price and performance to state of the art...

Mobile and Cloud: The Growing Importance of Controlling Traffic

There are three main factors that impact the reality of data communications: where data is stored, how and from what device data is accessed...

SDN Focus Shifts to Network Services

Brad Casemore is Research Director for IDC’s Datacenter Networks practice and is a featured guest blogger. Cloud computing requires a datacenter network and corresponding network...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

New DemonBot Discovered

Are you using Hadoop for data analytics? If so, know that a new bot is targeting Hadoop clusters with the intention of performing DDoS...

IDBA: A Patented Bot Detection Technology

Over half of all internet traffic is generated by bots — some legitimate, some malicious. Competitors and adversaries alike deploy “bad” bots that leverage different methods to achieve nefarious objectives. This includes account takeover, scraping data, denying available inventory and launching denial-of-service attacks with the intent of stealing data or causing service disruptions.