Key aspects of protecting your data in the cloud featured image

Key Aspects of Protecting your Data in the Cloud

While new technologies are designed to counter cyber threats, attackers are constantly evolving and coming up with new ways to exploit potential system vulnerabilities. Therefore, it is crucial for businesses that keep their data in the cloud to build robust and effective security measures that make sure their systems are protected at all times. A sound security plan requires considerable …

HAProxy featured image

HAProxy and Load Balancing Concepts: the Basics

Introduction High Availability Proxy (HAProxy), is a popular open-source proxying and TCP/HTTP load balancer solution able to run on Solaris, FreeBSD, and Linux. It is most commonly used to enhance the reliability and performance of a server environment by providing a balanced distribution of workload across multiple servers. This type of tool is used in many high-profile environments like Instagram, …

business continuity features featured image

CloudSigma Security & Business Continuity Features

Security Capabilities CloudSigma endeavors to deliver a high degree of security and privacy for customers in accordance with the various aspects of their computing. This is reflected in CloudSigma’s ISO-27001 certification. We regard this as a top priority. We are committed to openness and transparency with respect to our security procedures and policies. Thus, this post presents a detailed overview …

Share Cloud Infrastructure

Share Cloud Infrastructure Securely

We are happy to announce the ability to share infrastructure between accounts in a secure way. You can also define what actions you can take against those shared resources giving you fine grain control. This new functionality will allow you to share various sets of resources with one or more other accounts. We call each policy an Access Control List …