Key aspects of protecting your data in the cloud featured image

Key Aspects of Protecting your Data in the Cloud

While new technologies are designed to counter cyber threats, attackers are constantly evolving and coming up with new ways to exploit potential system vulnerabilities. Therefore, it is crucial for businesses that keep their data in the cloud to build robust and effective security measures that make sure their systems are protected at all times. A sound security plan requires considerable …

HAProxy featured image

HAProxy and Load Balancing Concepts: the Basics

Introduction High Availability Proxy (HAProxy), is a popular open-source proxying and TCP/HTTP load balancer solution able to run on Solaris, FreeBSD, and Linux. It is most commonly used to enhance the reliability and performance of a server environment by providing a balanced distribution of workload across multiple servers. This type of tool is used in many high-profile environments like Instagram, …

business continuity features featured image

CloudSigma Security & Business Continuity Features

CloudSigma Security Capabilities CloudSigma endeavours to deliver a high degree of security and privacy for customers in accordance with the various aspects of their computing. This is reflected in CloudSigma certifications like ISO27001/17/18, PCI DSS and CSA Security, Trust, Assurance and Risk (STAR). We regard this as a top priority and are committed to openness and transparency with respect to our …
Share Cloud Infrastructure

Share Cloud Infrastructure Securely

We are happy to announce the ability to share infrastructure between accounts in a secure way. You can also define what actions you can take against those shared resources giving you fine grain control. This new functionality will allow you to share various sets of resources with one or more other accounts. We call each policy an Access Control List …