Moving to the Cloud:  Myth Versus Reality

Moving to the Cloud: Myth Versus Reality

Cloud computing solutions have been available for well over a decade. Software as a Service (SaaS) came to prominence first, followed closely by Infrastructure-as-a-Service (IaaS) solutions, then advanced Platform-as-a-Service offerings (PaaS), and now Function-as-a-Service, or “serverless” cloud hosting models, where the application requests compute resources without visibility or knowledge...

Read More
Application Security from the Inside Out: Part 2

Application Security from the Inside Out: Part 2

In my previous post, I addressed four coding policies that almost guarantee a data breach. This post will cover five solution strategies to shore up your application’s security. The guiding principle to correct these flawed policies (see Part 1) is to change the priorities that direct development and support of software applications.…

Read More
Application Security from the Inside Out: Part 1

Application Security from the Inside Out: Part 1

The recent data breach at Equifax is an unfortunate reminder of a long list of hacked sites (Target Stores, OPM, Sony, and others) that were caused by vulnerabilities in the application code. These companies seemed just as surprised as their customers by the attack and had to wonder, “how did this happen?” They did not need to look further than their own unintentional coding policies.…

Read More
Tap into Actionable Data – 5 Considerations for Delivering Successful Reporting Implementations

Tap into Actionable Data – 5 Considerations for Delivering Successful Reporting Implementations

The marketplace for business intelligence and analytics tools becomes more saturated every day.  Between standardized reporting, ad hoc self-service visualizations, and predictive analytics, many managers and buyers are so overwhelmed by keeping up with product releases and understanding tool features that they do not have time to consider the pitfalls that can sabotage a successful...

Read More
Office 365 vs. G Suite: The dilemma of choosing between the behemoths and the benefits of Office 365

Office 365 vs. G Suite: The dilemma of choosing between the behemoths and the benefits of Office 365

Those who remember Microsoft’s Business Productivity Online Suite (BPOS) understand why there was such an interest in the release of Google Apps vs Office 365. Since their initial release, Google Apps has bloomed into G Suite and BPOS has evolved into Office 365. Both of which are capable of hosting a cloud based collaboration solution for companies of any size.…

Read More
More Data, More Problems… Leveraging the Azure Import/Export Tool

More Data, More Problems… Leveraging the Azure Import/Export Tool

In today’s market businesses are likely familiar with the enterprise services provided in Azure and have already started planning a cloud transition.  As Azure expands its core offering and more business transition to a cloud platform, the question becomes, “how does an organization move large amounts of data to the cloud, specifically to Azure?”  Introducing the Microsoft Azure Import/Export...

Read More
Is Data Warehousing really dead?

Is Data Warehousing really dead?

Traditional data warehousing was pioneered by Ralph Kimball and Bill Inmon in 1970s to address growing problem of accessing data for reporting and analytics from multiple disparate data sources. Key drivers and goals of data warehousing are: Collect data from multiple sources into a single repository Expose data for reporting and analytics in a performant way Keep full history of data...

Read More
Controlling Inbound and Outbound Traffic Flow in an Azure-based Cardholder Data Environment

Controlling Inbound and Outbound Traffic Flow in an Azure-based Cardholder Data Environment

In our previous post, we examined the trade-offs when implementing a Public Key Infrastructure (PKI) in Azure using Active Directory Certificate Services. For an overview of the blog series and a list of the topics being covered, see the introductory post, “Preparing to Migrate to a Secure Cloud”. This week, we will continue the Azure Secure Cloud Migration blog series by...

Read More
So Many Databases To Monitor, So Little Time (Part 2 of 2)

So Many Databases To Monitor, So Little Time (Part 2 of 2)

Picking up from last time, we’ve successfully prepared our instances in the proper way by utilizing Transact-SQL. Meaning, we were able to correctly map the service account that Tripwire uses to all the databases in a given instance. Additionally, we were able to grant the proper permissions to the account so that Tripwire will function correctly.…

Read More
Transparent Data Encryption with the Azure Key Vault

Transparent Data Encryption with the Azure Key Vault

In last week’s post, we covered a BitLocker implementation for Azure virtual machines. But as mentioned in that post, because BitLocker doesn’t fully satisfy the Payment Card Industry Data Security Standard (PCI DSS) requirement (specifically, 3.4 and 3.5.2) for data encryption at rest, we also implemented SQL Transparent Data Encryption (TDE) for all databases.…

Read More
Phone: 312-602-4000
Email: marketing@westmonroepartners.com
222 W. Adams
Chicago, IL 60606
Show Buttons
Share On Facebook
Share On Twitter
Share on LinkedIn
Hide Buttons