Dan Sullivan Contributor - SearchCloudComputing SearchCloudComputing Explore the role of network as a service in cloud computing 25 Aug 2015 SearchAWS Techniques to create a more secure AWS 24 Aug 2015 SearchCloudSecurity What are the security concerns of backup as a service? 21 Aug 2015 SearchWindowsServer Extending Microsoft Azure applications with connectors 20 Aug 2015 SearchDataManagement Types of NoSQL databases and key criteria for choosing them 14 Aug 2015 SearchCloudSecurity Our AWS encryption keys were exposed accidentally -- now what? 13 Aug 2015 SearchCloudSecurity Is the Certified Cloud Security Professional certification worth pursuing? 07 Aug 2015 SearchCloudSecurity How can AWS EC2 Container Service improve Docker security? 30 Jul 2015 SearchCloudComputing Testing cloud applications for Azure, Google Cloud 29 Jul 2015 SearchCloudSecurity Why would public cloud providers turn off customer cloud accounts? 23 Jul 2015 SearchCloudSecurity Are PaaS database applications more secure than IaaS applications? 16 Jul 2015 SearchCloudComputing Fill security gaps with centralized cloud data encryption 15 Jul 2015 SearchAWS Three preconfigured hardened OS choices for AWS 10 Jul 2015 SearchCloudSecurity What can enterprises learn from the new EU cloud security framework? 09 Jul 2015 SearchCloudComputing Should PaaS providers fear the Docker invasion? 08 Jul 2015 SearchSecurity Comparing the top security analytics tools in the industry 06 Jul 2015 SearchCloudSecurity How does a cloud readiness assessment work? 02 Jul 2015 SearchCloudSecurity Is a hybrid DDoS defense strategy the best option for enterprises? 26 Jun 2015 SearchContentManagement How to define user access controls for cloud content services 23 Jun 2015 SearchCloudComputing Three hybrid cloud management issues and how to tackle them 19 Jun 2015 SearchCloudSecurity Cloud authentication: What's the best way to secure cloud credentials? 18 Jun 2015 SearchAWS Think like a hacker with security threat modeling 16 Jun 2015 SearchCloudSecurity What are the benefits of a 'bring your own key' encryption service? 11 Jun 2015 SearchCloudComputing Is Google's PerfKit a reliable cloud benchmarking tool? 11 Jun 2015 SearchCloudSecurity How does ISO/IEC 27018 affect cloud provider selection, PII privacy? 04 Jun 2015 SearchCloudComputing Would Azure Data Factory benefit my cloud data? 01 Jun 2015 SearchAWS Enabling real-time data processing with Amazon Kinesis 29 May 2015 SearchCloudSecurity Is the Google Cloud Security Scanner enterprise grade? 28 May 2015 SearchAWS How can I manage workloads that run on-premises and in AWS? 28 May 2015 SearchSecurity Six criteria for procuring security analytics software 26 May 2015 SearchCloudSecurity What advanced email security controls does AWS WorkMail offer? 22 May 2015 SearchAWS Compare NoSQL-based AWS database options 21 May 2015 SearchCloudComputing How do I move between Google Compute Engine instances? 20 May 2015 SearchCloudSecurity How do Xen hypervisor security updates affect the public cloud? 18 May 2015 SearchAWS How AWS compares to DigitalOcean cloud services 08 May 2015 SearchCloudComputing Tips on building a hybrid cloud management strategy 04 May 2015 SearchAWS Which EC2 instance types are better for regression tests? 30 Apr 2015 SearchEnterpriseDesktop Desktop management tools and best practices 23 Apr 2015 SearchEnterpriseDesktop Software deployment tools, patching critical to endpoint management 23 Apr 2015 SearchEnterpriseDesktop The importance of desktop inventory management tools 23 Apr 2015 SearchCloudComputing Should I move my cloud computing application in-house? 20 Apr 2015 SearchCloudSecurity How can hybrid app security risks be mitigated? 15 Apr 2015 SearchCloudSecurity AES-128 encryption key generation: Leave it to AWS or do it in-house? 15 Apr 2015 SearchCloudSecurity Traditional vs. cloud pen testing: What's the difference? 14 Apr 2015 SearchCloudSecurity What's the business case for Amazon's three AWS monitoring tools? 14 Apr 2015 SearchAWS Should I use Amazon DynamoDB when developing mobile apps? 14 Apr 2015 SearchCloudSecurity AWS security groups vs. traditional firewalls: What's the difference? 10 Apr 2015 SearchCloudComputing Taking the mystery out of Google Compute Engine pricing 06 Apr 2015 SearchCloudSecurity What are the security pros and cons of hybrid cloud storage? 06 Apr 2015 SearchAWS Tune database query performance with Redis cache 31 Mar 2015 SearchCloudSecurity How can cloud access security brokers improve enterprise security? 30 Mar 2015 SearchAWS Survive and thrive in cloud DevOps 27 Mar 2015 SearchSecurity Three reasons to deploy security analytics software in the enterprise 25 Mar 2015 SearchAWS Boost application availability with AWS load balancing 25 Mar 2015 SearchSecurity Introduction to security analytics tools in the enterprise 23 Mar 2015 SearchCloudSecurity What policies should be in a cloud infrastructure security program? 23 Mar 2015 SearchCloudComputing Maximize your ROI with cloud storage management 20 Mar 2015 SearchAWS Buy or DIY? Get the right performance monitoring service 20 Mar 2015 SearchEnterpriseDesktop Establish BYOD guidelines for every step of your mobile initiative 18 Mar 2015 SearchCloudSecurity Can the Cloud Security Alliance help with comparing cloud providers? 16 Mar 2015 SearchCloudComputing Prevent cloud billing shock with cost monitoring tools 13 Mar 2015 SearchCloudComputing Deploying cloud storage resources 12 Mar 2015 SearchEnterpriseDesktop Tighten app control and manage identities with EMM 10 Mar 2015 SearchCloudSecurity Can proprietary databases be securely migrated to the AWS cloud? 09 Mar 2015 SearchEnterpriseDesktop How do I open an .xpx file in Office 2002 SP3? 05 Mar 2015 SearchEnterpriseDesktop MDM, MIM and MAM products help in securing data 04 Mar 2015 SearchCloudComputing Azure vs. Google: Finding your cloud vendor fit 04 Mar 2015 SearchAWS Use Git to version-control AWS app development 27 Feb 2015 SearchAWS Hit a configuration sweet spot with AWS Spot Instances 26 Feb 2015 SearchEnterpriseDesktop Why doesn't closing a file return me to Microsoft Windows Explorer? 26 Feb 2015 SearchAWS AWS OpsWorks automates configuration security 26 Feb 2015 SearchEnterpriseDesktop What are some alternatives to Windows Defender? 25 Feb 2015 SearchEnterpriseDesktop Assess devices, users to get started on a mobility program 25 Feb 2015 SearchAWS Watch online: Effective approaches to AWS cloud monitoring 23 Feb 2015 SearchCloudComputing Cloud storage options: Object storage systems or Hadoop? 23 Feb 2015 SearchCloudComputing Which cloud storage system matches your data? 20 Feb 2015 SearchCloudComputing In cloud storage, options abound 17 Feb 2015 SearchAWS Five reasons to use Go for AWS cloud programming 13 Feb 2015 SearchAWS AWS Lambda helps IT pros avoid management overhead 12 Feb 2015 SearchEnterpriseDesktop How does Windows 8.1 support affect Active Directory? 11 Feb 2015 SearchAWS Deploy server clusters with AWS EC2 Container Service 09 Feb 2015 SearchAWS Get to know Python tools and how to use them 28 Jan 2015 SearchCloudComputing Simplifying the complex cloud licensing equation 26 Jan 2015 SearchCloudComputing Should I use Go as my cloud programming language? 26 Jan 2015 SearchITOperations Here and there: Blending on-premises and cloud environments 23 Jan 2015 SearchAWS Testing AWS cloud application security 22 Jan 2015 SearchAWS Advantages of Amazon RDS vs. a personal relational database 14 Jan 2015 SearchAWS When and how to use the AWS Command Line Interface 12 Jan 2015 SearchAWS Amazon RedShift performance monitoring strategies 30 Dec 2014 SearchAWS Amazon Cognito offers back-end support in multi-device world 16 Dec 2014 SearchCloudComputing A cloud management tools comparison guide 10 Dec 2014 SearchCloudComputing How hosted private cloud services fill cloud model gaps 25 Nov 2014 SearchEnterpriseDesktop What's the best way to remote wipe a user-owned laptop? 17 Nov 2014 SearchAWS Amazon ElastiCache detects app performance bottlenecks 11 Nov 2014 SearchAWS Managing AWS multi-factor authentication 23 Oct 2014 SearchAWS Best practices for AWS disaster recovery 10 Oct 2014 SearchAWS Does AWS CloudFront work with static and dynamic content? 30 Sep 2014 SearchCloudComputing Facing the challenges of migrating applications to the Azure cloud 30 Sep 2014 SearchAWS How AWS CloudFormation helps streamline cloud resources 26 Sep 2014 SearchCloudComputing Is it possible to block employees from public cloud access? 25 Sep 2014 1 2 3