Change layout
AWS S3

Pre-Signed URLs Use-Cases

Pre-Signed URLs Use-Cases

Amazon S3 buckets protection is a critical security measure when using AWS. There have been numerous bad stories about unprotected S3 buckets, from established contractors like Accenture and Booz Allen Hamilton to huge companies like Verizon Wireless and Time Warner Cable. In this article, you will learn how to enhance the security of S3 buckets with pre-signed S3 URLs, and how to generate them for various cases.
Continue reading

Don’t miss new articles!
Thank you for subscribing!
Pay-as-You-Go Model for MSPs

Is the Pay-as-You-Go Model a Viable Option for MSPs?

Is the Pay-as-You-Go Model a Viable Option for MSPs?

When it comes to making big IT and services purchases, not every client may want to buy the same way.

This is especially true for MSPs, as small businesses often make up a significant portion of their clientele. A small business with a tight budget might not be able to afford a full-service managed service offering or maybe such a small business that the owners don’t feel like they need that level of support. Continue reading

IAM vs PAM vs PIM

IAM vs PAM vs PIM: Guide to Access Management

IAM vs PAM vs PIM: Guide to Access Management

With the rise in the number of solutions and applications that organizations are using, corporate access management becomes a critical layer of protection and should be treated accordingly. However, access management is not a cloud-only concept. It directly affects most of the IT assets in the organization, starting with desktop log-ins and up to physical access to the server lockers. So, to provide maximum possible security in the organization, you should embed a centralized access management policy. Continue reading

News header

News You Might’ve Missed. 16 – 20 Nov

News You Might’ve Missed. 16 – 20 Nov

What's new this week in the news for MSPs? Amazon announces AWS network firewall to block cloud threats; new serverless Database Migration Service from Google; Google launches Cloud Armor Adaptive Protection to prevent DDoS attacks; Egregor ransomware new trick besieges victims' printers with ransom notes; REvil ransomware attacks hosting provider Managed.com; and new Jupyter trojan malware steals usernames and passwords. Continue reading

Application Rationalization

Application Rationalization Guide and a Framework

Application Rationalization Guide and a Framework

In a small organization, it's easy to track and manage the usage of applications. However, over time, more internal departments appear, more people start to communicate with each other, and operations become more interconnected and complex. All that needs more complex solutions, more licenses, and more apps, all of which means more IT management. Continue reading

Load more