Cloud Hyperscaler Platform Service Comparison
Introduction Comparison of key services in the Public Cloud Broadly accurate. Many services not included but a good overview comparing the 3 major ‘Hyperscaler…
Read More »Introduction Comparison of key services in the Public Cloud Broadly accurate. Many services not included but a good overview comparing the 3 major ‘Hyperscaler…
Read More »
AWS System Manager and Operational Improvements to your estate https://aws.amazon.com/systems-manager/ Operational support is a key pain point, cost problem an…
Read More »
AWS Networking, Security and SysOps The system operations of AWS is a client pain point. Costs, Governance, Security issues with AWS deployments and operations…
Read More »
An introduction to Networking and Security on AWS Introduction to AWS Network level Security Best Practices 1: Bastion Hosts For non-VPN, Internet based access…
Read More »
AWS S3 and Security AWS S3 Overview link. Object store – region-based storage resource in AWS. Amazon S3 is intentionally built with a minimal feature set that…
Read More »
AWS Migration Services Overview AWS Migration Services AWS Migration Hub AWS Application Discovery Service AWS Database Migration Service AWS Server Migration …
Read More »
Build one per Cloud platform For Very Large Enterprises, it is unlikely that you will succeed at Cloud, without a centralised method, set of processes, standar…
Read More »
Modular Areas – AWS Security areas which support NIST, CVE, CIS (Common Internet Security), OWASP, Cloud Security Best practices. 1: Security On AWS • Security…
Read More »
Author: Kurt Marko, Marko Insights Original: https://searchcloudcomputing.techtarget.com/tip/Explore-the-pros-and-cons-of-cloud-computing Sept 2 2020 Edited, S…
Read More »
1)Elastic Load Balancer Summary Elastic Load Balancer allows the incoming traffic to be distributed automatically across multiple healthy EC2 instances It assu…
Read More »
An Overview to AWS Tagging Strategies It is best practices to tag all resources within AWS. Most firms do not tag, or do not properly tag their resources. This…
Read More »
AWS has 5 areas which map back to NIST: IAM, Detection, Infrastructure, Data Protection, Incident Response. Identity & Access Management 1.Secure your AWS …
Read More »