CALL US 1800-399-2000

Avoiding Ransomware in the Cloud - Watch the Webinar

Monica Brink

Cloud security and compliance has been top of mind for IT leaders for some time now and, recently, a more specific cloud security threat has emerged - that of ransomware. With adoption of cloud computing for more mission-critical use cases growing, there is naturally concern about protecting against ransomware in the cloud as well as on-premise. Our iland CTO, Justin Giardina, recently wrote about the threats and means of remediating them in CloudTech - check out his article here.  Justin will be also be joining the Chief Cybersecurity Officer of Trend Micro, Ed Cabrera, to deliver a webinar on this topic - don't miss it:

Webinar - Dec 13th, 11:00AM EST | 8:00AM PST | 4:00PM GMT, Register here

Read More
Topics: ecs

Cloud services for SME business - a fork in the road

Richard Stinton

Last week I had the privilege of speaking at a TechUK event in Newcastle, England, hosted by the Federation for Small Business and the Local Enterprise Partnership at Newcastle College.

Read More
Topics: DRaaS, IaaS, backup, cloud, ecs

Automating the iland cloud using Microsoft Powershell and PowerCLI - Part One

Richard Stinton

We often get questions from customers about the best way to automate their cloud environments. As iland provides Infrastructure-as-a-Service based on VMware vCloud Director, we expose a RESTful API that can be used to automate things at the vCD level.

We also offer a higher level REST API for the iland cloud console which exposes other services that iland has curated into the console, such as vSphere performance data, security and compliance data, disaster recovery services with Zerto, etc.

More information on the iland REST API is available here.

Read More
Topics: ecs

Running Docker Containers Using VMware Photon in the Cloud

Richard Stinton
Containerization of applications, using Docker, Rocket and Pivotal Garden, is becoming a popular way of deploying what are known as ‘Cloud-Native Apps’.  This is the new way of deploying applications that scale easily using the cloud, while maintaining security.
Read More
Topics: ecs

Ensuring Availability When Migrating Apps to the Cloud

Richard Stinton
In this post, I want to focus on the availability aspects of migrating a typical application - near-legacy, single VM solutions where Windows or Linux VMs have been spun up to deliver an application all on one server or perhaps a couple of servers.
Read More
Topics: ecs

Cloud Firewall Security – Going Beyond vCloud Director

Dave Templet
Working in Cloud Engineering at iland, I get the opportunity to help customers deploy our solutions in ways that are specific to their business needs. Often, this involves helping them adapt cloud services to their compliance requirements. I’d like to share one example of this with you which shows how the iland cloud console provides the features customers need to ensure firewall security.
Read More
Topics: ecs

Healthcare Mobile Application Security & the Cloud

Monica Brink

With increasing interest in cloud hosting & services coming from the healthcare industry, this recently published infographic from Arxan caught our eye as it highlights some of the differences in perception and reality around how secure mobile applications are. Like many industries, more and more employees in healthcare are using mobile applications to do their jobs - and this means more and more sensitive data passing through these applications.

Read More
Topics: healthcare, ecs

Remote Console Access - do you need it in your cloud?

Jeff Polczynski

To continue with my hard-learned lessons that not all clouds are the same, I’m back to report on another feature that I was shocked to find absent in Microsoft’s Azure cloud: remote console access.
As in my prior blog post about Azure’s lack of large disk support, this post follows the adventures of a friend of mine who was attempting to build an application stack atop Azure. Let’s call this friend Jim.
Jim builds his applications with security baked in. Immediately after booting a VM, Jim configures the host-based firewall with very restrictive rules. By host-based firewall I’m referring to the built-in Windows Firewall in Windows Server and later, and iptables in Linux.

Read More
Topics: cloud, ecs

Subscribe to Blog Updates

Gartner names iland a Leader for DRaaS