The benefits of utilizing AWS Direct Connect

Network operators may adjust their routing policy to decide how to send and receive traffic through adjacent autonomous systems. This is known as traffic engineering, and it’s used for a variety of reasons: to reduce bandwidth costs by utilizing particular paths or improving performance by using a particular transit provider that has a less-congested or …

How to develop a well-architected framework by using AWS’s Four Pillars for best practices

AWS is its own special beast–with a huge number of products and services added each month, it’s easy to feel overwhelmed at all AWS’s cloud offerings. Fortunately, there are ways to proactively ensure you’re maximizing your utilization. AWS released a whitepaper a few months ago highlighting some of the best practices of using its cloud. The AWS …

Guidelines And Best Practices For Using Apache Cassandra On AWS

Apache Cassandra is a massively scalable open source NoSQL database that’s widely deployed in the AWS cloud. It’s ideal for managing large amounts of structured, semi-structured, and unstructured data across multiple distributed locations. Cassandra is a masterless, peer-to-peer distributed system where data is distributed among all nodes in the cluster. Each node has knowledge on the …

Big Banks Will Be Big Business for AWS

Experts estimate there are more than 14,000 attacks on networks and systems every day, with new vulnerabilities in critical software increasing by 50% annually. These are alarming stats for any IT organization, but especially those in sensitive industries like banking. These stats are also why security is one of the key hesitations when it comes …

AWS RDS Migration Service Updates

Post from 2016: At AWS re:Invent last year, we joined Amazon as a Relational Database Services (RDS) database migration partner. RDS is back in the news as Amazon announced several new updates this month. Among the new features is the ability to share encrypted database snapshots with other AWS accounts, and adding encryption to a previously unencrypted database …

IT Security Still Big Concern in Moving to the Public Cloud

Post from 2016: Take a look back at the past year and you’ll see a number of companies that have experienced data breaches, hacks, and other security issues. It’s not limited to a certain industry, either: Experian (financial), BlueCross BlueShield (medical), Ashley Madison (online)…and the list goes on. While breaches are obviously bad news to …

How to Reduce Costs and Security Threats Using Two Amazon Tools

Have you ever gone to see a movie that would have been amazing if not for one person? The plot was engaging, the dialogue was well-written, and there were strong performances from most of the cast. But there was just that one actor who simply didn’t live up to the rest of the film, and …

What Should You Do to Transform Your IT?

A strong IT strategy is a must for any enterprise, regardless of its level of involvement in the cloud. The very foundation of a business depends on its ability to operate smoothly, swiftly, and efficiently while limiting security risks. Our partners at VMware and EMC developed a white paper entitled “The State of IT Transformation” that discusses the crucial …

Dissecting the “Treacherous Twelve” Cloud Computing Threats in 2016, Part 1

Though more businesses than ever moving to the cloud, the space is still not completely devoid of risk. To address some of these threats, the Cloud Security Alliance developed the “Treacherous Twelve” report. While these are certainly plausible threats, there are ways to limit your exposure to harmful effects. In the first of a two-part series, …