Results for: cybersecurity

New Era, New Security Stack: Cloud Security Reimagined
Your Innovation Feed
Dror Arie, Senior Solutions Architect @ GlobalDots 19.04.22

Once every few years, new technologies mature and reach a tipping point which requires a completely new outlook on the enterprise landscape, as it keeps evolving too. 2020 was such a tipping point, introducing cloud usage and remote work in unprecedented scales worldwide. In the context of cloud security, this tipping point created a burning […]

Read more
5+4 = The New Cloud Security Stack
Your Innovation Feed
Eli Arkush 09.06.21

Infrastructures, threat, and security are all under a quick, constant evolution. Once every few year there comes a tipping point which forces us to rethink our technology posture. 2020 was that tipping point. The cloud surge has peaked during the Pandemic, as remote work became the new normal for most office-based businesses. This has introduced […]

Read more
slider item
Open Source & Code Security
Admin Globaldots 31.05.21

The recent SolarWinds breach highlights a new paradigm in the Software Supply Chain. When compared simply to the code itself without any additional tools, Proprietary Code is no more secure than Open Source. By contrast, many would argue that Open Source Code is more secure due to a faster fix/patch/update cycle and the pervasive access to source […]

Read more
DDoS (Distributed Denial of Service) Explained
Infrastructure DDoS
Francesco Altomare, Senior Sales Engineer @ GlobalDots 21.04.21

DDoS Mitigation & Protections services are a crucial part of any internet business strategy. At GlobalDots we analyze, implement and maintain Security for variety of companies, from Fortune 500 to startups and small-to-medium enterprises. Since the topic is broad and many of our customers ask very specific questions, we decided to put together this resource […]

Read more
Colocation Explained
Colocation & Hosting
Manuel Reischl, Head of Customer IT Support @ GlobalDots

Colocation hosting is quickly becoming more common as businesses find themselves increasingly dependent on their IT equipment and the necessity of having their data secure and available at all times. Many companies don’t want the hassle of constantly maintaining and monitoring their equipment, and others don’t have the infrastructure or expertise to do it themselves. […]

Read more
Stop Thinking Detection. Think Correlation
Cloud Workload Protection
From our Partners 21.02.21

Why security alerts are useless without proper context, and how to obtain it without sweating it.

Read more
Unlock Your Cloud Potential
Schedule a call with our experts. Discover new technology and get recommendations to improve your performance.
Contact us