Archive for March, 2010

Before you dive in to the cloud, make sure your network is secure and managed!  We are seeing enterprises and SMBs everyday adopting new cloud computing models to help further business opportunities, raise profit margins, etc., however, neglecting to take into consideration security and policy measures.  Now IT managers are quickly looking for ways to […]

What We're Reading, Week of 3/22

Posted: 26th March 2010 by VPN Haus in Highlights

Gartner Blog… Cloud Security and VPNs Neil McDonald remembers the debate over whether or not the Internet could be securely used for remote access. He says nowadays, we take VPNs for granted. We’ve given up control of the pipe (the Internet), but it doesn’t mean we have to give up control of the data in […]

What We’re Reading, Week of 3/22

Posted: 26th March 2010 by VPN Haus in Highlights

Gartner Blog… Cloud Security and VPNs Neil McDonald remembers the debate over whether or not the Internet could be securely used for remote access. He says nowadays, we take VPNs for granted. We’ve given up control of the pipe (the Internet), but it doesn’t mean we have to give up control of the data in […]

VPN’s Can Prevent Data Breaches

Posted: 24th March 2010 by VPN Haus in Rethink Remote Access

Stumbled upon an interesting article last week in the Wall Street Journal, titled Data Breaches Are Heaviest at Hotels.  The underlying news isn’t anything new, but there are some alarming statistics and details that struck me as a surprise. Sarah Nassaur references a SpiderLabs report in her article that examines data breach investigations across various […]

VPN's Can Prevent Data Breaches

Posted: 24th March 2010 by VPN Haus in Rethink Remote Access

Stumbled upon an interesting article last week in the Wall Street Journal, titled Data Breaches Are Heaviest at Hotels.  The underlying news isn’t anything new, but there are some alarming statistics and details that struck me as a surprise. Sarah Nassaur references a SpiderLabs report in her article that examines data breach investigations across various […]