01 Welcome to Windows Server 2008 Application Infrastructure

| March 22, 2014

article image
Learn Windows Server from the experts – and gain the skills to power the next generation of cloud-optimized networks, applications, and web services. Our free Microsoft Windows Server training courses cover virtualization features, networking management, storage capabilities, and more.

Spotlight

SCSK Corporation

A global IT service company, SCSK Corporation will utilize the strength of both firms to provide customers with a powerful one-stop support survice, from system integration, IT infrastructure implementation, and IT management, through to BPO and IT hardware and software slaes. In the IT Management Group, SCSK supports sophistication of business management and improvement of operational efficiency of its customers from the aspect of IT services. This is accomplished by working together with customers to construct and manage IT system infra­structure and through the operation of data centers. In this way, the Group contributes to ­value-creating initiatives that are focusing on company growth, sustainability, and soundness.

OTHER ARTICLES

SASE as a Business Continuity Solution

Article | April 9, 2020

As offices worldwide sit abandoned, many of the millions of employees ordered to stay home are actually keeping hard at work, taking advantage of residential broadband connections, VPNs, email, video conferencing, and instant messaging applications to do their jobs. Thank the corporate world’s willingness to let employees occasionally work from home for the necessary IT infrastructure. However, as much as we’d like this alone to solve the business continuity challenges, enabling a handful of employees to work from home once a week is trivial compared to ensuring all of a company’s employees can do so for months on end.

Read More

Protecting your company during COVID-19: Guidance for CIOs and CISOs

Article | April 8, 2020

Cyberattackers are resourceful and opportunistic. They will move quickly to take advantage of a situation. COVID-19 is no different. There is a huge amount of global uncertainty and change right now which criminals are seeking to capitalize on. The risks are amplified by the immediate and unforeseen IT challenges that companies are having ensuring their staff can work from home. There are two areas which are most likely to result in a cybersecurity incident due to the ongoing crisis: remote access and phishing. We’ll cover both in this article and provide a set of prioritized recommendations to expeditiously prevent, or at least mitigate, these critical issues.

Read More

Why we need more 5G cyberhacks

Article | February 24, 2020

How secure are 5G networks? That question should be on the lips of every network operator (and their customers) as the next generation of mobile broadband technology is rolled out across the world. While the industry is likely to find out the hard way, there are steps that can be taken to head off potential trouble. One such step is for network technology vendors to open up their systems to ethical hackers to see what happens (a scenario that doesn't happen nearly enough in the industry across all types of network technology). So it was encouraging to see a recent report on what was the world's first 5G cyber hackathon, which was held last November in Oulu, Finland. It was particularly encouraging to see that two of the radio access network market's leaders, Ericsson and Nokia, participated, as more than 80 ethical hackers got stuck into 5G New Radio, non-standalone (NSA) core and 5G fixed wireless access systems to see what vulnerabilities they could uncover.

Read More

Data Security in the Cloud Best Practices

Article | April 8, 2020

Data security in the cloud best practices include: understanding and implementing security fundamentals, securing cloud infrastructure along the shared responsibility model, encrypting data in the cloud, and ensuring compliance with applicable regulations. Data security fundamentals often come back to the CIA Triad: data confidentiality, data integrity, and data availability. The shared responsibility model refers to the idea that both a cloud provider and the organization using the cloud are responsible for ensuring the overall security of the organization’s cloud infrastructure, including the data housed there.

Read More

Spotlight

SCSK Corporation

A global IT service company, SCSK Corporation will utilize the strength of both firms to provide customers with a powerful one-stop support survice, from system integration, IT infrastructure implementation, and IT management, through to BPO and IT hardware and software slaes. In the IT Management Group, SCSK supports sophistication of business management and improvement of operational efficiency of its customers from the aspect of IT services. This is accomplished by working together with customers to construct and manage IT system infra­structure and through the operation of data centers. In this way, the Group contributes to ­value-creating initiatives that are focusing on company growth, sustainability, and soundness.

Events