All of the major public clouds offer identity and access management (IAM) tools. The exact nature of the various cloud IAM tools vary, however. So do their names.
As a result, if you are familiar with the IAM solutions available from one public cloud, such as Amazon Web Services (AWS), it can be challenging to understand how IAM tools work on another platform, like Google Cloud or Microsoft Azure.
This article clarifies that issue by comparing the identity and access management tools and frameworks associated with each of the three major public clouds -- AWS, Azure, and Google. It identifies the key IAM-related terms and tools to know for each cloud and explains the approach that each cloud takes to managing user accounts, groups, access control and (where applicable) Active Directory integration. Continue reading
What is server hardening? There are many different ways for a hacker to attack a Windows server, from unpatched system vulnerabilities to misconfigured settings, unnecessary protocols, or vulnerable applications. The process of getting these vulnerabilities closed off or patched (or at least most of them) is server hardening Continue reading
Just 3 weeks after the release of the last iteration of our flagship backup solution, we're back with yet another update of CloudBerry Backup. Release 5.5 is a minor update that focuses on security enhancements.
This week everybody is talking about the hacking of Dropbox, the popular online storage service that has over 200 million users and keeps anything from private photos to sensitive documents. Malefactors have stolen almost 70 million account details including email addresses and protected passwords.
Amazon Web Services ensure data security of in compliance with the so-called Shared Responsibility model. It is based on the following assumption: AWS does such operations like decommissioning of old storage devices in accordance to the latest industry standards and controls physical access to data centers, and the user takes care of securing his root credentials, assigns security groups, edits access control list policies and performs identity management. Therefore, the user takes full responsibility for any security breach on his/her side.
Use this checklist to find out if your account is in compliance with AWS security best practices to protect crucial data and ensure stable work for your resources.
As you may know, one of the leaders on the cloud market, Amazon company, offers Amazon Virtual Private Cloud (VPC). It is an isolated AWS segment which represents a virtual network managed by your team. Now it is fully supported by Cloudberry Drive.
Here you will find a brief feature explanation and guidelines how to connect your Amazon VPC to Cloudberry Drive.
This article refers to CloudBerry Drive 1.4.3 and later.
As always we are trying to make CloudBerry Drive more mature and robust, The newer version of CloudBerry Drive comes an ability to manage mapped drives across all users on a computer.
In previous versions CloudBerry Drive stored mapped drive settings for a particular user by default and then there was an option to share user settings to all but now you can set "all users" mode on install so that all users will initially work with the same settings and be able to manage mapped drives between each other.
This post explains how to get started with Amazon S3 account and register it with CloudBerry Backup, a powerful solution that allows you to automate your backup/restore process. We hope that this product will become your tool of choice and help you effectively manage your backups and restores. Continue reading
Just a few days ago Amazon S3 team sent an email to many of their customers warning them about the bucket settings with the following subject:
Important Security Notification regarding your Amazon S3 bucket settings Continue reading