{"id":844,"date":"2017-01-09T04:02:28","date_gmt":"2017-01-09T02:02:28","guid":{"rendered":"https:\/\/community.virtono.com\/?p=844"},"modified":"2017-01-09T04:02:28","modified_gmt":"2017-01-09T02:02:28","slug":"securing-the-clouds","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/knowledgebase\/securing-the-clouds\/","title":{"rendered":"Securing The Clouds"},"content":{"rendered":"<p>Technology is massively integrated with modern business, but many of those businesses still lack a modern security solution which helps protect against vulnerabilities in each layer of organisation. With the Protection Service for Business (PSB), this changes everything. It is a unique breakthrough on technology which provides total protection yet increased productivity within businesses, and this revolutionary product was introduced by the leading online global security company F-Secure. PSB Solutions comes with a variety of features such as the Workstation Security which provides protection for all of the customers computers within one subscription regardless of platform, the Server Security which gives real time<br \/>\nprotection for Windows and Linux servers, e-mail and Server Security for users who runs Microsoft Exchange and Mobile Security which handles the security for all mobile platforms with features such as antivirus, anti-spyware, anti-theft, and browsing protection. PSB is a cloud based platform which delivers to companies, small to medium sized enterprises, the next step in productivity as well as a complete overall protection for the entire IT environment, while reducing costs for businesses. IT can also be described as a turn-key protection suite for multi-device settings, which offers the best security in the market bundled with advanced value-added features such as the Software Updater, which gives state of the art security solutions.<br \/>\nSecuring The Clouds Internet security is scrutinised daily and F-Secure is trying to alleviate your concerns with the Protection for Business (PSB) security solution<br \/>\n\u201dThe new PSB solution by F-Secure allows businesses especially SMEs to focus more on their businesses and leave security to the experts. By choosing security as a service, businesses no longer have to worry about the IT security, security settings or software updates PSB protects all devices against the latest security threats, and F-Secure maintains the whole solution together with the local IT security partner to monitor and manage the customer\u2019s devices. No additional hardware investment is required, which translates to direct costs savings to the enterprise, and increased productivity for the business,\u201d said Christian Fredrikson, President and Chief Executive Officer of F-Secure Corporation yesterday at the launch of PSB in Kuala Lumpur, which was also attended by Paul Palmer, Vice President of F-Secure APAC. Repeating Fredriksons comments, Palmer explained that, with Malaysia being Southeast Asia\u2019s third largest economy and ranking sixth in the list of world 20 emerging markets, PSB is expected to propagate the SME security market and is the most suitable fit for small and medium businesses in Malaysia<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technology is massively integrated with modern business, but many of those businesses still lack a modern security solution which helps protect against vulnerabilities in each layer of organisation. With the Protection Service for Business (PSB), this changes everything. It is a unique breakthrough on technology which provides total protection yet<\/p>\n","protected":false},"author":3,"featured_media":845,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5],"tags":[],"class_list":["post-844","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/cloud-security.jpg?fit=767%2C538&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-dC","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":3947,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-configserver-security-firewall-csf-on-almalinux\/","url_meta":{"origin":844,"position":0},"title":"How to install ConfigServer Security &#038; Firewall -CSF on Almalinux","author":"George B.","date":"September 28, 2023","format":false,"excerpt":"In this guide, we will walk you through the step-by-step process of installing CSF on AlmaLinux, ensuring that your system is fortified against potential threats. Every system administrator has a responsibility to protect their server from potential attacks and vulnerabilities. ConfigServer Security & Firewall (CSF) is a strong tool that\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/09\/How-to-install-CSF-on-Almalinux.png?fit=360%2C240&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":2620,"url":"https:\/\/www.virtono.com\/community\/news-announcements\/why-should-you-choose-virtono-as-a-web-hosting-provider%ef%bf%bc\/","url_meta":{"origin":844,"position":1},"title":"Why should you choose Virtono as a web hosting provider?\ufffc","author":"Stefan Dutu","date":"June 3, 2022","format":false,"excerpt":"Best Web Hosting Provider Hello, my name is Stefan, and I am here yet again to talk about more topics of interest for you, our dear readers. Today we will evaluate Virtono\u2019s services, and believe me, they are top-tier quality! Choosing a web hosting service for your website or blog\u2026","rel":"","context":"In &quot;Announcements&quot;","block_context":{"text":"Announcements","link":"https:\/\/www.virtono.com\/community\/category\/news-announcements\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/06\/HOW-TO-START-A-BLOG.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/06\/HOW-TO-START-A-BLOG.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/06\/HOW-TO-START-A-BLOG.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/06\/HOW-TO-START-A-BLOG.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2022\/06\/HOW-TO-START-A-BLOG.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":3487,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-fail2ban-on-centos\/","url_meta":{"origin":844,"position":2},"title":"How to Install and Configure fail2ban on CentOS","author":"George B.","date":"June 10, 2023","format":false,"excerpt":"We'll walk you through the step-by-step process of installing and configuring fail2ban on CentOS. By the end, you'll have a robust defense mechanism in place to protect your server from unauthorized access attempts. In today's interconnected world, security is of utmost importance, especially for servers and systems that are constantly\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Install-and-Configure-fail2ban-on-CentOS.png?fit=600%2C330&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Install-and-Configure-fail2ban-on-CentOS.png?fit=600%2C330&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Install-and-Configure-fail2ban-on-CentOS.png?fit=600%2C330&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":789,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/malware-attack-on-virtual-machines\/","url_meta":{"origin":844,"position":3},"title":"MALWARE ATTACK ON VIRTUAL MACHINES","author":"Daniel Draga","date":"December 6, 2016","format":false,"excerpt":"Server-oriented malware is actually more likely to infect a virtual system than a physical one in many organizations. Now what? This expert e-guide provides the real story of how malware is adapting to virtual environments, so you can ensure protection going forward. \u00a0 Enterprises are increasingly adopting virtualization technology, according\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/12\/mobile-malware_126852062-thumb-380xauto-2252.jpg?fit=380%2C304&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":214,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/secure-socket-layer-ssl\/","url_meta":{"origin":844,"position":4},"title":"Secure Socket Layer (SSL)","author":"Daniel Draga","date":"July 30, 2016","format":false,"excerpt":"SSL stands for Secure Socket Layer. Secure Socket Layer (SSL) technology allows web browsers and web servers to communicate over a secure connection Originally developed by Netscape, SSL has been universally accepted on the World Wide Web for authenticated and encrypted communication between clients and servers. Responsible for the emergence\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/2.jpg?fit=376%2C286&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":676,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/data-security-in-cloud-computing\/","url_meta":{"origin":844,"position":5},"title":"Data Security in Cloud Computing","author":"Daniel Draga","date":"October 3, 2016","format":false,"excerpt":"\u0097With the development of cloud computing, Data security becomes more and more important in cloud computing. This paper analyses the basic problem of cloud computing data security. . \u0097Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/07\/IMG_2035.jpg?fit=1200%2C900&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=844"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/844\/revisions"}],"predecessor-version":[{"id":846,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/844\/revisions\/846"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/845"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}