Archive for: Cloud

ZONE SE7EN > Blog > Cloud

post cover

OneLogin Improves Cloud-Based IAM Solution when Acquiring Cafesoft

Providers of identity management solutions, OneLogin, has announced the launch of new capabilities that will help enterprises with cloud-based IT and hybrid on-premise situations.  As well as new LDAP and RADIUS interfaces, OneLogin has acquired Cafesoft and their web access management (WAM) software. OneLogin’s new LDAP service enables enterprises to connect to OneLogin’s cloud directory […]

post cover

A New Approach to Content is Needed

By John Newton, co-founder, Chairman and CTO, Alfresco We are all keenly aware just how much technology is changing the way business operates.  Mobile technology and cloud computing in particular have revolutionised our work habits and processes. In turn, our expectations of what we can do with technology have also changed.  We now expect to […]

post cover

Is an Open API the Future of Cloud Security?

Earlier this year, CipherCloud and the Cloud Security Alliance (CSA) announced that they had launched a new working group to develop a Cloud Security Open API.  Their remit was to develop a guide for cloud service providers and enterprises on the interoperability and operation of cloud security, focusing on the protection of PII and sensitive […]

post cover

Alfresco Reaches Benchmarking Milestone – 1 Billion Documents with Amazon Aurora

Alfresco Software, a leading provider of ECM and Business Process Management software, has just announced that the latest version of their Enterprise Content Management (ECM) platform has reached a significant milestone in cloud-based content management – it’s passed the 1 billion document mark on a full cloud-centric technology stack-based on Amazon Elastic Compute Cloud (EC2) and […]

post cover

Cloud Computing; Great, But What About Security?

As we become more accustomed to huge amounts of data that we have to deal with, and the world in which we live in is ever-more digital, organisations worldwide face the challenges of storing and analysing – the cost of storage, albeit cheaper than in recent years; processing the data; analysing and extracting the relevant […]

post cover

Huddle Desktop Simplifies Cloud Collaboration

Huddle, leaders in secure collaboration tools for the enterprise, has announced the release of Huddle Desktop, their new desktop app that improves collaboration and productivity, incorporating deeper Microsoft Office application integration which enables users to manage their Huddle files online and offline more efficiently. Huddle Desktop has been developed to connect the user’s experience to a […]

post cover

Understanding Cloud Security

By David Jones, Cloud Solution Marketing Manager at Hyland, creator of OnBase. Cloud security tends to focus on perimeter security – or how the cloud system and its data is protected from external access; firewalls, password protection and secure Internet channels live here.  To be honest, this is the type of security that most people […]

post cover

IBM Announce a Range of Internet of Things Solutions

Following IBM’s pledge to put £2bn into Internet of Things (IoT) and cloud solutions, including a standalone IoT division, they have announced a series of new initiatives.  First are two vertically-focused IoT solutions; Aviation Maintenance has been designed to optimise availability as well as extending the life of aviation components critical to requirements.  Secondly, IBM’s […]

cover

Insight Zone’s Cloud Event Coming Soon – Sign Up Now!

Thinking about implementing a Cloud solution? Watch ZONE SE7EN’s Cloud event, the next in our 2014 Insight Zone series, and about those vital steps to take to help you make the right decision. Through informative Executive Interview and virtual Roundtable videos with leading experts and thought-leaders within the Enterprise Content Management (ECM) and Document Management […]

post cover

Geo-Fencing’s Benefits Revolutionising Mobile Security

By Tobias Manolo Geo-fencing does exactly what it says it does – it builds a virtual ‘fence’ that will trigger different actions depending on whether the platform, user, service or application is inside or outside the fence – and it’s for this reason that more and more applications, network platforms and services use this technology […]

Subscribe to our mailing list

* indicates required Email Address * First Name * Last Name *