Azure Site Recovery for VMware disaster recovery just got a lot easier (and cheaper)

Azure Site Recovery (ASR) is an extremely powerful disaster recovery (DR) service that’s built into Microsoft Azure. Unlike Azure Backup, which is very inexpensive and
FAQ: Achieving compliance with newly released Azure disk encryption for Windows and Linux

Early this year, we wrote about encryption-at-rest as part of our security series. Traditionally, encryption-at-rest, or disk encryption as we’ll refer to it going forward,
Cloud API’s aren’t just for developers, IT ops and security may see the greatest gains

IDG (parent company to media brands such as CIO, CSO, Network World, and more) recently released their 2015 Cloud Computing Study in which they survey
Red Hat on Azure: A Case Study for Cloud Transformation
On the heels of the recent announcement of Red Hat Linux becoming available on Azure, I feel like it’s the perfect time to share our
Highly secure, highly available virtual machines on Azure
Microsoft’s Azure public cloud offers hyper-scale infrastructure and availability around the globe; a feat that’s difficult for even large enterprises to achieve. One of the
3 tips for making your multi-cloud approach wildly successful

As I speak with customers and partners, it’s striking how many of them are no longer making the choice between infrastructure in their own datacenter’s
What to think about when considering data-at-rest encryption

In our previous post in our security best-practices series we addressed data-in-flight encryption, what it means, and offered some tips for implementing it in your environment.
Disaster recovery isn’t just about worst-case scenarios, it’s about delivering high-availability to your core applications.

Disaster recovery (DR) is a difficult concept in IT. It requires one to not only think about the many implications of a worst-case scenario but
Are you encrypting your data-in-flight? If not, you should be.

We spend a lot of time working with our customers to align their technology platform choices with best-practices security and compliance standards. Over the past