Hybrid Multi-cloud Security, now with Azure Key Vault

After months of development and behind-the-scenes preparation, Microsoft has announced its Azure Key Vault. We were proud to be invited by Microsoft to participate in early development and integration of our CloudLink data security product with Azure Key Vault. You can read the formal announcement here. In this post, let me highlight a few important […]

Sony hack lessons – protect the data, but also software and secret credentials

Sony hack lessons – protect the data, but also software and secret credentials   We do not know yet who did it and how they did it. There is suspicion that known malware was used. Software integrity was likely compromised. Attackers might have gotten their hands on some secret credentials to get in. Being practitioners […]

Azure Virtual Machine Encryption – making data security easy to buy, deploy and manage

Earlier this year, CloudLink launched SecureVM for Microsoft Azure, a virtual machine security solution designed to encrypt boot and data volumes in the cloud. SecureVM was designed to address two key customer needs.   First and foremost, SecureVM addresses the top concern associated with running workloads on a cloud-based infrastructure. In the traditional physical world, […]

Refine versus Re-invent

Sometimes the best solutions are the ones that improve on existing solutions – making them more versatile or tuned for new uses. I was reminded of this the other day when we announced our SecureVM product for the public cloud. In designing this solution to help customers secure their cloud data, our team decided to […]

AFORE is now CloudLink

AFORE is a leading provider of advanced data security and encryption management products. Since 2011, enterprises and service providers have trusted us to secure mission-critical data and sensitive customer information in multi-tenant private, public and hybrid clouds. Our product, CloudLink®, secures data in world-recognized cloud and virtualization platforms from AWS™, EMC®, Microsoft®, RSA®, VCE® and […]

Key Control in the Cloud

Key Control in the Cloud A frequent discussion as organizations seamlessly extend to the cloud is security. Moving to the cloud for even small workloads is logical and inevitable, and security as a best practice is as well. Security often equates to encryption and when cloud providers provide encryption, well, in many cases they hold […]

Four Reasons to Move Forward with the Hybrid Cloud

CloudLink SecureVSA for VMware vCloud Hybrid Service

“Too risky.” “Too costly”. “Too complicated.” If you’re a cloud advocate in your organization, you’ve heard these objections to deploying workloads in the public cloud. Concerns about compliance, data security, and deployment complexity may be hindering your organization’s cloud adoption progress. While these objections have been valid historically, new solutions are rapidly turning them into […]

Post Tags: , , , , , , , , ,

Moving Sensitive Data to the Hybrid Cloud: Four W’s to Consider

Each day at AFORE, we work with business enterprises and cloud service providers who are taking advantage of the benefits that the hybrid cloud has to offer. We believe that the significant growth we’re seeing with hybrid cloud deployments will only continue to increase. In fact, Gartner recently stated that “Nearly half of large enterprises […]

Securing private data in the public cloud

As public cloud computing continues to gain strong momentum, the vendor landscape for IaaS is rounding out nicely with Amazon Web Services (AWS) the clear leader of the pack.   Focussing on the enterprise application space, from my observation, a significant amount of customers cloud projects over the past few years fell into two major buckets: […]

HIPAA – When healthcare providers move their data to the cloud

Healthcare providers have a lot to contend with these days. Beyond the constant demands to improve the quality of patient care and operating efficiencies, healthcare organizations are experiencing dramatic changes in information technology with the emergence of Electronic Healthcare Records systems, mobile computing and Bring-Your-Own-Device (BYOD) as well as cloud and virtualized computing platforms. While […]

Post Tags:

AFORE at ASIS 2013

Visit us at ASIS 2013 Seminar and Exhibits, September 24 – 26, 2013, booth #283 at McCormick Place, Chicago, IL. To set up a meeting please contact: James LaPalme, VP Sales & Marketing by email

Defending your data

  These days your data needs protection more than ever. AFORE has teamed with EMC army of vSpecialists and SEs to fight for security of the enterprise data.

Dealing With Persistent Threats – A cloudy business (Part III)

In my last blog, I discussed some of the broader aspect of advanced persistent threats and I promised to touch on the subject of these threats when it comes to cloud computing. When it comes to cloud computing, there are a lot of security fears flying around. Some of these fears are well founded while […]

Dealing with Persistent Threats (Part Deux)

Most security systems currently deployed within organizations focus on access control, malware/virus detection and network edge protection (i.e. firewalls, DLP, etc…). Unfortunately, none of these security systems is very useful when it comes to dealing with Advanced Persistent Threats. Now I’m not saying that everyone should go off and get rid of these mechanisms since […]

Post Tags:

Dealing with Advanced Persistent Threats

So this is the first of several blogs where I want to write on the subject of advanced persistent threats, or APTs for short. Unlike viruses and malware that are spammed at hundreds of millions of users in the hopes that a few of them will get suckered in, APTs are totally different. Wikipedia defines […]

Post Tags: ,