German

Post of category Cloud

Cloud · Data Security

Security in the cloud

There are many studies on IT security and depending on the companies behind them and their purpose, the results are always to be treated with caution. But even if the absolute figures leave room for...

Cloud · Connected Cars · Digital Signage · Internet of Things · Smart Buildings · VPN

Keeping Industrial Revolution 4.0’s Treasures Hidden

The growing use of Industrial Internet of Things (IIoT) worldwide is in the process of turning the concept of smart factories into reality. The phenomenon has been described by observers as the fourth...

laptop-mobile (1)
Cloud · Data Security · Encryption · VPN

Encryption is Central to EU GDPR’s Demand for Privacy

Starting May 2018, any business offering goods and services to European Union (EU) citizens will have to comply with new General Data Protection Regulation (GDPR) rules.

security-protection-anti-virus-software-60504
Cloud · IT policy · SSL · VPN

The Rise of Cloud-based Services Fuels Demand for Managed VPNs

The growing popularity of cloud services coupled with security concerns is driving demand for managed VPNs. In particular, the success of public cloud services is gradually encouraging more...

pexels-photo-273739
Cloud · VPN · Wi-Fi

How to Enable a Secure Cloud VPN

Cloud computing has been around for about a decade – ever since the former CEO of Google, Eric Schmidt, introduced the term to the industry. Today, it can be considered a mature technology....

rsa-conference-image_full-size
Cloud · Cybersecurity Strategy · Internet of Things · Mobile · Shows · VPN

IIoT, Mobile and Cloud Security Take Center Stage at RSAC 2017

The RSA Conference (RSAC) is a regular highlight in the IT security calendar.

pexels-photo-296084
Cloud · Cybersecurity Strategy · Data Security · Internet of Things · VPN

Protecting virtual worlds of data in motion

Corporate IT departments are struggling to manage all the data now residing in the cloud. More and more information is flowing non-stop between physical mobile/Industrial Internet of Things (IIoT)...

76df8aa2-2f17-4a2a-80c1-c1e450256ba4
Cloud · Data Security

Control over our data

Anybody who uses the Internet uses, creates and leaves data behind. While in the past site visits were recorded in the depths of server log files rarely to surface again, these and related data are...

person-smartphone-office-table
Cloud · Cybersecurity Strategy · Data Security · Encryption · VPN

Cloud Security Pitfalls to Avoid

Cloud computing technology is fast becoming an attractive alternative to maintaining IT systems and applications on premise. In-house management and maintenance of IT is costly and resource-hungry....

26407407_s
Cloud

Why Outsourcing Remote Access Management Isn't the Answer for SMBs

"How do you keep your data secure when you're a data anchovy in a sea of hacker sharks?"