
Deploying and Managing Azure Sphere
In a previous post, we provided an overview of Azure Sphere and shared a few use cases showing the value of this comprehensive IoT security solution, including a hardware platform, operating system and cloud-based security service. Despite the widespread use cases, deploying and managing Azure Sphere is not without challenges. It requires careful planning and […]
Read More
Azure Sphere: A Brief Overview
If you are building or deploying Internet of Things (IoT) devices that require a high level of security and reliability, you may need Azure Sphere. Azure Sphere is a platform developed by Microsoft that combines hardware, software and cloud services to provide a secure and trustworthy environment for the deployment and management of IoT devices. […]
Read More
Overcoming the Challenges of Implementing a Cloud Center of Excellence
As we’ve discussed previously, organizations need to consider several factors before choosing to implement a cloud center of excellence (CCoE). In our experience over the past twenty years, several best practices stand out as a starting point for implementing a CCoE; however, executing on each of these best practices can be a challenge. First, let’s […]
Read More
Should I implement a Cloud Center of Excellence?
We often hear from organizations that are trying to mature their cloud practice and are wondering if a cloud center of excellence (CCoE) is necessary. This is not a straight-forward yes-or-no question. In very general terms, yes – a CCoE can help your business in several ways by: However, whether or not to implement a […]
Read More
How to defend against the biggest security threats in Azure
The average cost of a data breach is $4.35 million, according to a recent IBM Security study. As this cost continues to climb every year, organizations necessarily need to implement safeguards. In Azure, security is a shared responsibility model – Azure secures the infrastructure and the organization must secure the data and identities. In future […]
Read More
Cybersecurity in Azure: A Shared Responsibility
COVID has ushered in unprecedented cybersecurity risk. Throughout the past two years of the global pandemic, data hacking incidents have increased by 600% according to industry reports. With statistics like those, it’s no surprise that data and information security are more in demand than ever before. Organizations are leveraging the built-in security features of cloud […]
Read More
A Practical Game Plan for Building an Azure Cloud Center of Excellence
One of our latest Azure cloud services webinars focuses on the Cloud Center of Excellence framework. In it, VIAcode CEO Victor Mushkatin explains exactly what a Cloud Center of Excellence (CCOE) is and how it helps organizations achieve their cloud objectives. By introducing a practical game plan for organizations unsure of how to adapt the […]
Read More
The Importance of Measuring Effectiveness of Your Azure Cloud Services: Cost, Security, and Operations
Does your organization achieve its cloud spending, operational, and security objectives? It’s an important question many cloud service users struggle to answer because they don’t have the data to formulate an accurate response. In many cases, businesses do not know how to measure their cloud operations. As a result, they struggle to optimize their cloud […]
Read More
VIAcode Webinar: A Practical Game Plan for Building an Azure Cloud Center of Excellence
Learn how to overcome cloud challenges to build a Cloud Center of Excellence strategy tailored to your organization’s unique constraints with Victor Mushkatin, VIAcode CEO and former Group Program Manager for the Microsoft Azure Product Team. The webinar, A Practical Game Plan for Building an Azure Cloud Center of Excellence, begins at 1:00 pm EST on Wednesday, […]
Read More
How To Secure Your Azure VMs With Network Security Groups
Azure Network Security Groups (NSGs) are flexible firewall rules users can apply to subnets and resources within an Azure Virtual Network. They allow users to specify which incoming and outgoing connections should be allowed or denied. Microsoft has excellent documentation that describes how to configure and apply a Network Security Group, so we’re going to […]
Read More