Essential Guide

Essential guide to securing hybrid IT infrastructure

Tackling security challenges when moving to a hybrid cloud architecture

Introduction

Security is a constant for any IT architecture, but when moving to a hybrid IT infrastructure, new challenges open up from extending on-premise systems into the public cloud. The greater the potential attack surface, the higher the risk. In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud. 

Essential guide to securing hybrid IT infrastructure

1Hybrid infrastructure-

Server and datacentre security

Servers and datacentres are prime targets for cyber attacks if not adequately protected. Find out the key challenges when securing hybrid infrastructure

Feature

Hybrid IT environment requires hybrid cybersecurity

As more organizations turn to a combination of cloud-based and on-premises systems, protecting data in a hybrid IT environment requires a fresh look at cybersecurity strategy. Continue Reading

Blog Post

Securing virtual infrastructure

When considering the security of virtual environments, there are two basic levels, the virtual platform itself and the virtual machines (VM) and associated applications deployed on such platforms. ... Continue Reading

News

Security researchers warn of server-attacking ransomware

New strain of ransomware said to be distributed by compromising servers and using them to move through networks to encrypt and hold multiple data sets to ransom Continue Reading

Feature

Datacentre security: Why operators must give cyber and physical threats equal attention

Datacentre operators often talk up the physical security measures they have in place, but are they at risk of overlooking cyber threats? Continue Reading

News

Most businesses vulnerable to cyber attacks through firmware, study shows

Company culture and overall attitude to security is a major contribution to vulnerability to cyber attack through firmware, a study by Isaca has revealed Continue Reading

2Networking-

Network security

The network is at the heart of an effective hybrid IT infrastructure - and securing the network is key to managing risk. Find out about the issues and potential solutions

News

How software-defined networking can secure critical systems

SDN promises to bring the efficiency gains achieved in server virtualisation to networking, while also boosting security Continue Reading

Blog Post

Load Balancing for security?

Load Balancing (LB), is now popping up on the corporate security agenda! LB is no longer just about managing traffic flows across enterprise routers and servers. In the age of the cloud and ... Continue Reading

Feature

How to secure the SDN infrastructure

As more enterprises look to deploy software-defined networking, the need for security from the ground up should not be underestimated Continue Reading

News

Encryption flaw leaves every Wi-Fi network in the world wide open

A Belgian researcher has uncovered a major weakness in the WPA2 Wi-Fi security protocol that is thought to leave every Wi-Fi network in the world open to attack Continue Reading

E-Handbook

Focus: Network security

During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end. All of this adds up to a real problem for hard-worked network managers, who are coming under more and more pressure to maintain the everyday running of the enterprise network while protecting it from multiple different threats to its well-being. One mistake could bring an entire business down for days, and in some cases, this can prove fatal. In this guide we will explore some of the key themes driving enterprise network security initiatives, from how to protect and monitor day-to-day activity on the network, to tips on how to defend it from malicious external attackers, and the effect that emerging networking technologies, such as the Internet of Things (IoT) and software-defined networking (SDN) will have on enterprise network security, and how to adapt to face these changing realities. Continue Reading

3Data protection-

Data security and GDPR

Securing data across a hybrid IT infrastructure is the primary responsibility of any organisation - and especially as the EU's General Data Protection Regulation (GDPR) puts a focus on securely managing personal data

Opinion

Six essential processes for keeping data secure

Data security is increasingly vital for organisations as the countdown begins for compliance with new rules imposed by the EU’s general data protection regulation Continue Reading

Feature

GDPR brings serious implications for data storage

New European Union data protection regulations put tough requirements on organisations that store “personally identifiable data”. We look at what is needed to achieve compliance Continue Reading

Opinion

Security Think Tank: Integrity of business data key to cyber defence

What types of organisation are likely to be targeted by data integrity breaches and how best can they detect and mitigate against such attacks? Continue Reading

Feature

How to improve security against email attacks and for GDPR compliance

About 200 billion emails are sent every day, but because of its importance email is constantly exploited by attackers, and yet is often overlooked in cyber security strategies Continue Reading

Feature

Dealing with data under GDPR

With the General Data Protection Regulation due to be enforced next year, Computer Weekly looks at how to address the requirements to suit your business Continue Reading

4Hybrid cloud-

Hybrid cloud security

Using public cloud services introduces additional security considerations, especially when combined with on-premise IT in a hybrid infrastructure

Tip

Hybrid cloud security challenges remain tough to overcome

While hybrid cloud continues to offer significant benefits to the enterprise, it also demands a cohesive security strategy that bridges on-prem and cloud-based systems. Continue Reading

Opinion

Security Think Tank: Striking the hybrid cloud balance

Hybrid cloud environments provide the most flexibility, but how can businesses decide when public or private cloud is more appropriate? Continue Reading

Feature

Five ways CIOs tackle hybrid cloud security

The traditional moat model is disappearing as companies embrace hybrid cloud strategies from microsegmentation to perimeter controls. Continue Reading

Feature

Why immutable buckets are a worthy risk management tool

Immutable buckets offer businesses benefits in terms of data compliance, backup, archiving and security Continue Reading

E-Handbook

Focus: Securing the cloud

While cloud services’ benefits of quick deployment and flexible scalability at a lower cost have driven enterprise adoption, security concerns continue to be a key factor in determining the extent and style of cloud adoption. However, for many enterprises the benefits outweigh the risks, and as a result, cloud adoption is still outpacing security capability. Cloud security processes in many companies are still relatively immature, according to some information security leaders. Already heavily-invested in cloud services, technology companies are stepping up efforts around security and the UK Government Digital Service (GDS) has published guidelines that it claims will make public cloud services safe for most government information and services. Despite these positive developments, the reality is that most apps are not enterprise ready from a security standpoint. In the light of the global rise in cyber crime,security experts warn that is more important than ever for applications developed on the widely-adopted Microsoft Azure platform to be secure by design. Continue Reading

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close