Backup, Deduplication and Encryption: it’s now possible with ClouDedup

Hi there, in my previous post I presented ClouDedup, our solution for deduplication over encrypted data. I’m now gonna talk about how ClouDedup can be successfully deployed in order to address a very common use case: Backup. Doing regular backups is a strongly recommended practice, even though it happens very often that people don’t know how important a…

SSH hardening for cloud virtual machines

What’s specific to Cloud Virtual Machines? SSH is required to access your virtual machines that run in your Cloud infrastructure, so you can not disable it. Due to new threats that arise with IaaS Cloud Computing (Cloud Security Alliance Top Threats), you must protect your infrastructure against Malicious insiders. Even if we refer to IaaS…

Elastic Vulnerability Assessment (EVA) Credentials for AWS EC2 and VPC

One of the major obstacles to Elastic Detector adoption is the step where infrastructure API credentials are asked. Security guys do not easily give their keys to strangers. We fully understand that, so we have proposed two solutions: Virtual appliance, such as an AMI on the AWS marketplace. We provide VMware (vmdk) and KVM versions…