
{"version":"1.0","provider_name":"OTAVA","provider_url":"https:\/\/www.otava.com","title":"Staying ahead of the cloud cybersecurity curve","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"TGhJHuM5We\"><a href=\"https:\/\/www.otava.com\/blog\/staying-ahead-of-the-cloud-cybersecurity-curve\/\">Staying ahead of the cloud cybersecurity  curve<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.otava.com\/blog\/staying-ahead-of-the-cloud-cybersecurity-curve\/embed\/#?secret=TGhJHuM5We\" width=\"600\" height=\"338\" title=\"&#8220;Staying ahead of the cloud cybersecurity  curve&#8221; &#8212; OTAVA\" data-secret=\"TGhJHuM5We\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.otava.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"For the upcoming IMN Data Center East Conference, I\u2019ve been invited to speak on the panel called \u201cStaying Ahead of the Curve on Services\u201d about managed services for data center operators. From my experience, two of the highest value managed services a data center operator can provide are backup and managed security services. I wrote about backup services in a previous post, so this one is about considerations for offering security services around cloud computing and colocation. Hosted security as a managed service requires a much larger investment than backup services. Significant dedication and resources are required to achieve a solid security posture that coordinates a company\u2019s people, processes, and technologies, but greatly increases value for clients. Some technologies are easy security entry points. Antivirus, patch management, SSL certificates and managed firewall are good places to start. In my opinion, these services are table stakes to play in the cloud computing market and many colocation clients have come to expect the same set of options as managed services. Offering an expanded set of services for strong security is a much harder business decision. The investment to deliver expanded security services such as two-factor authentication, log monitoring and review, file integrity...","thumbnail_url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/mike-klein-150.jpg"}