Like walking into The Matrix, that’s how I felt when I first stepped foot in the data center that houses our main CloudGate servers. It’s a strangely eerie place, requiring visitors to make a lengthy walk through the forbidding hallway pictured above, all the way up to the reception desk in the distance. Gaining access to the data center’s innards requires biometric authentication and the possession of a key card, verified both by the data center’s systems and a somewhat stern-looking security guard. The message is clear: the data center takes security very seriously, and so should you. In
Cloud Identity and Access
Learn about the important topics for cloud identity and access.
Over the last decade, enterprise users have increasingly come to rely on a growing number of cloud services to perform their daily tasks.The strategic use of cloud services offers a number of immediate benefits to the enterprise, both in terms of required infrastructure, and in providing the necessary tools to a more mobile and geographically distributed workforce. The drawbacks, however, might be a little less obvious. As more and more sensitive and other data finds its way into various cloud services, it becomes harder and harder for administrators to manage their user accounts, and safeguard the organization’s data against unauthorized
By Robby Cornelissen With more organizations moving their servers to the cloud, managing SSH keys that are used to access these servers is fast becoming a critical identity and access management issue. Continue reading to gain a better understanding of the risks underlying poor SSH key management, and what to look for in a key management solution. Where did the server go? Not all that long ago, it was not uncommon to find a server sitting under the company’s reception desk. The server in question would typically be a repurposed desktop, its case rendered a grungy beige by
A newsletter a day keeps your worries