Cloud Services

589

Solutions

942

Contributors

Cloud services are services made available to users via the Internet from a provider's servers. Cloud services are designed to provide easy, scalable access to applications, resources and services, and are fully managed by a cloud services provider. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources. Frequently offered cloud services are infrastructure-as-a-service (IaaS), desktops-as-a-service (DaaS), software-as-a-service (SaaS) and platform-as-a-service (PaaS). Examples of cloud services include online data storage and backup solutions, Web-based e-mail services, hosted office suites and document collaboration services, database processing, managed technical support services and more.

Share tech news, updates, or what's on your mind.

Sign up to Post

If you're having problems where a lot of messages that Cisco Cloud Email Security would normally filter out have been coming in, it appears to be the result of an upgrade gone wrong. In our case, it took a P1 ticket to get resolved.


We found evidence of an issue by looking at the incoming mail policies (accessible by going to Mail Polices > Incoming Mail Policies):



You will notice that the Anti-Spam, Anti-Virus, and Graymail columns are all showing "Not Available". That is because they are all disabled. These all need to be enabled to get things working normally again.


When we accessed the Cisco IronPort Anti-Spam settings, it showed that it was globally turned off. (This can be accessed by going to Security Services > IronPort Anti-Spam).



However, we were completely unable to turn anything on, regardless of access level (I'm a Cloud Administrator, but my coworker is an Administrator).


The cause of the problem: Cisco upgrading our appliance, and it turned out the feature keys somehow got blown out. In setting them back in, there is a requirement of accepting an End User License Agreement. Somewhere within this area is where Cisco failed to properly handle things.


Resolving this required creating a ticket with Cisco (initially a P3 ticket, which eventually got escalated to P1). If you're seeing yourself with this exact same issue, know you're not alone. Hopefully, Cisco fixes this for all of their CES customers in one swoop, but just watch out for this just in case. 


This problem started this past Friday morning for us but has just gotten resolved as I'm creating this post. While getting the ticket resolved, I highly recommend requesting that Cisco adds an email address from your organization to Atlas so that you're notified of when upgrades are planned to take place.

1
Powerful Yet Easy-to-Use Network Monitoring
Powerful Yet Easy-to-Use Network Monitoring

Identify excessive bandwidth utilization or unexpected application traffic with SolarWinds Bandwidth Analyzer Pack.

As more and more organizations are pushing their operations to the cloud, it's vital that you understand how threats could compromise those operations. We will focus on the aspect of the cloud security computing threats and countermeasure.
4
LVL 16

Expert Comment

by:Edwin Hoffer
Comment Utility
Nice piece of information contains in this article.

We have to know about the latest trends in IT before going to know about Cloud Security in details.

Visit some good article link:

https://www.experts-exchange.com/articles/31708/Current-IT-Trends-and-Cloud-Security-Threats-2018.html

https://www.experts-exchange.com/articles/31694/What-is-Cloud-Based-Security-What-are-its-Security-Controls.html
1
This article covers an all-important comparison between Tokenization vs Encryption. Also, read about What Tokenization & Encryption is in detail. Both technologies are used for Cloud data security to prevent cyber crimes.
2
Getty-Security
In this article, I explain what Convergent Encryption is and how it can be used.
0
Cloud computing is a model of provisioning IT services. By combining many servers into one large pool and providing virtual machines from that resource pool, it provides IT services that let customers acquire resources at any time and get rid of them the instant they are no longer needed.
1
Cloud Computing
Cloud is selling like hotcakes in the town. Technology lovers and even businesses have joined the wagon to taste a piece of this delicious technology treat. But how many of us really know what cloud is?
0
LVL 5

Author Comment

by:Pallavi Godse
Comment Utility
Thank you very much Andrew!
0
Cloud Security Threats 2018
The onset of year 2018 has been a usual business for IT teams still struggling to find their way out in terms of strengthening their cloud security.
0
Cloud Hosting
Myths can prevent you from using the most productive alternatives available for you and opposing cloud accounting because of some myths falls into the same category of missing out on opportunities. Let's expose the myths and enable your business to prosper by moving to cloud accounting.
0
MT Managed Cloud
As the cloud has become an integral part of enterprises’ workflow worldwide, there is an increasing demand for cloud managed service providers that can bring the expertise to the process and help enterprises maximize their investment in the cloud.
0
Cloud for Startups
Are you a startup company? Being a startup, you may be using shared hosting, or maybe even dedicated hosting. But have you ever given a thought to using cloud computing now? Yes, don’t be surprised, it is possible for startups to opt for cloud computing.
0
Cloud Class® Course: Ruby Fundamentals
LVL 12
Cloud Class® Course: Ruby Fundamentals

This course will introduce you to Ruby, as well as teach you about classes, methods, variables, data structures, loops, enumerable methods, and finishing touches.

Dropbox has a relatively new feature called Smart Sync. This feature allows Dropbox Professional (not plus) and Dropbox Business (if enabled) users to store information in Dropbox WITHOUT storing any files on their computer.
0
devops-what-why
As we talk to multiple clients across the globe, one common discussion thread seems to be that DevOps for one company, may not necessarily be the same as for another company.
0
If anyone asked you to network diagram of the internet, it was drawn in the form of a fluffy cloud which further became known as cloud computing. Popularly cloud computing is defined as workloads that run over the internet in a commercial provider’s datacenter – named as the public cloud.
0
The decision to migrate to the cloud is not a simple one—many factors, such a cost, ease of use, and ongoing maintenance come into play. The goal is always for cloud platforms to make storage and backups more seamless and effective. Here’s a look at how Experts Exchange made the transition.
5
(mt) Partner Program
Media Temple is thrilled to announce the launch of our new Partner Program, specifically designed to empower digital agencies and adtech platforms by offering white-glove support and exclusive hosting enhancements to optimize their sites and their clients’ online projects.
0
The Contribution of Cloud Computing for the Gaming Industry
The article lists top benefits which gaming industry bestows with the assistance of cloud computing technology.
0

Expert Comment

by:Aridane Alamo
Comment Utility
I believe that cloud gaming would be more for casual gamers but cloud computing have much more to offer to gaming than just game streaming. Server side should allow for giantic single shard online worlds spread in multiple servers over multiple continents, yes there are some technical difficulties but all of them have solution with current technology so I'm expecting a revolution in online gaming in the next years thanks to cloud computing.
0
Let's take a look into the basics of ransomware—how it spreads, how it can hurt us, and why a disaster recovery plan is important.
2
A look at how technology has changed storm coverage and how it can help in the aftermath.
9
LVL 19

Expert Comment

by:Kyle Santos
Comment Utility
I've donated money a couple times to the relief efforts and have contacted friends that I know there who tell me they are doing OK.
0
A look at what happened in the Verizon cloud breach.
4
LVL 19

Expert Comment

by:Kyle Santos
Comment Utility
I was able to do this easily last night by logging into my Verizon account online and going to settings to change the PIN.  I didn't even have to call customer service.
1
Upgrade your Question Security!
LVL 12
Upgrade your Question Security!

Your question, your audience. Choose who sees your identity—and your question—with question security.

VoIP ISP
Why do some people recommend buying business VoIP from an ISP? What are the benefits to my company? What are the costs?
0
Let’s face it: one of the reasons your organization chose a SaaS solution (whether Microsoft Dynamics 365, Netsuite or SAP) is that it is subscription-based. The upkeep is done. Or so you think.
2

Expert Comment

by:Ranjit Shankar
Comment Utility
Great article! Useful links, also the important points "Bandwidth, Objectivity, Expertise, Strategy, ROI" and the details about the points are very much clear... "it is not only worth the discussion, but it’s likely worth doing a more detailed assessment..." - very true! Also, you are right i.e. checking the reviews is more significant before going with any cloud computing consulting services provider for a long-term relationship... Thank you!
0
You deserve ‘straight talk’ from your cloud provider about your risk, your costs, security, uptime and the processes that are in place to protect your mission-critical applications.
1
Powerful tools can do wonders, but only in the right hands. Nowhere is this more obvious than with the cloud.
0
There’s a movement in Information Technology (IT), and while it’s hard to define, it is gaining momentum. Some call it “stream-lined IT;” others call it “thin-model IT.”
1
Your data is at risk. Probably more today that at any other time in history. There are simply more people with more access to the Web with bad intentions.
1
LVL 1

Expert Comment

by:Mihai Corbuleac
Comment Utility
Absolutely true! Backup is mandatory these days. I would recommend multiple backups (different hosts). The most common threat these days is indeed Ransomware and that's because it is very different from other types of viruses. Learn more about it and what you need to do to keep your data safe. Remember to always keep everything patched and updated!
0

Cloud Services

589

Solutions

942

Contributors

Cloud services are services made available to users via the Internet from a provider's servers. Cloud services are designed to provide easy, scalable access to applications, resources and services, and are fully managed by a cloud services provider. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources. Frequently offered cloud services are infrastructure-as-a-service (IaaS), desktops-as-a-service (DaaS), software-as-a-service (SaaS) and platform-as-a-service (PaaS). Examples of cloud services include online data storage and backup solutions, Web-based e-mail services, hosted office suites and document collaboration services, database processing, managed technical support services and more.