White Papers http://www.onlinetech.com/resources/white-papers Sat, 16 Dec 2017 03:16:04 +0000 Joomla! - Open Source Content Management en-gb ariddle@onlinetech.com (OnlineTech LLC) Adopting Hybrid Cloud http://www.onlinetech.com/resources/white-papers/adopting-hybrid-cloud http://www.onlinetech.com/resources/white-papers/adopting-hybrid-cloud Hybrid cloud adoption increased from 19 to 57 percent of organizations surveyed in 2016, according to Intel Security. For an increasing number of organizations, hybrid clouds represent an ideal approach to capitalizing on the scalability of the public cloud and on-premises hardware.

Is a hybrid cloud the right strategy for you? Maybe not. But there are many compelling reasons for a hybrid cloud that IT executives will want to consider before making a decision.

Our "Guide to Building and Managing a Cost-Effective Hybrid Cloud" ebook serves as a tool for business leaders who are considering moving to a hybrid cloud model or are conducting more research into the pros and cons of hybrid cloud.

After reading this ebook, you'll learn:

  • How to create an effective hybrid cloud strategy
  • The differences between AWS and Azure
  • How to control costs and manage spend in a hybrid cloud
  • More tricks and tips

Call us at (877) 740-5028, or email us at contactus@onlinetech.com with any additional hybrid cloud hosting questions or concerns.

To view the full guide and download the PDF, please fill out the form below.

]]>
ckennedy@onlinetech.com (Carrie Kennedy) White papers Tue, 24 Oct 2017 02:46:21 +0000
HIPAA Compliant Hosting http://www.onlinetech.com/resources/white-papers/hipaa-compliant-hosting http://www.onlinetech.com/resources/white-papers/hipaa-compliant-hosting The increasing pressure to implement meaningful use, reduce healthcare costs, and improve care outcomes while still protecting patient interests has led to strategic review and overhaul by many healthcare providers and vendors.

PCI

Evaluating outsourcing options to allow industry experts to manage parts of the healthcare IT components is an obvious part of the equation, and the intensive capital expense, human resource, security, and maintenance demands specific to data centers make these prime candidates for cost savings.

However, balancing the resource benefits of outsourcing data center and hosting services with the risks of engaging an off-premise business associate is daunting in the wake of increasing PHI (protected health information) breaches and penalties.

Ultimately, finding the best blend of resources that can fulfill the availability, integrity, and confidentiality requirements to protect ePHI (electronic protected health information) - and thereby protecting the patients, covered entities, and business associates - is the challenge at hand.

This white paper explores the impact of HITECH and HIPAA on data centers. It includes a description of a HIPAA compliant data center IT architecture, contractual requirements, benefits and risks of data center outsourcing, and vendor selection criteria.

Call us at 734-213-2020, or email us at contactus@onlinetech.com with any additional HIPAA hosting questions or concerns.

To view the full white paper and download the PDF, please fill out the form below.

]]>
asage@onlinetech.com (Marcus Samland) White papers Mon, 29 Dec 2014 22:43:16 +0000
Moving to the Cloud http://www.onlinetech.com/resources/white-papers/moving-to-the-cloud http://www.onlinetech.com/resources/white-papers/moving-to-the-cloud Moving to the cloud is a critical event in the life of your organization. You need to make smart choices to make sure your data is protected. But how can you be sure which solution is the right one?

Our guide, 6 Must-Ask Questions on Public or Private Cloud Computing walks you through the beginning stages of your decision-making process so you can understand which option is best for your organization. 

This handy guide will help you:

  • Discover the benefits of both public and private cloud computing.
  • Understand when it makes sense to use each type of cloud.
  • Knowledgeably identify which solution best fits your organization.

Get the information you need to make the right choice for your data. 

Call us at 734.213.2020, or email us at contactus@onlinetech.com with any additional cloud questions or concerns.

To view the full guide and download the PDF, please fill out the form below.

]]>
asage@onlinetech.com (Marcus Samland) White papers Mon, 29 Dec 2014 22:43:16 +0000
Hosting ePHI http://www.onlinetech.com/resources/white-papers/hosting-ephi http://www.onlinetech.com/resources/white-papers/hosting-ephi As PHI breaches are on the rise, how do you balance the benefits of data center hosting with the risks of using an off site service? Is it possible to safely host ePHI offsite?

Online Tech’s white paper Making the Best Hosting Choice for Your ePHI explores the benefits and risks of outsourced hosting that healthcare organizations must consider before choosing a hosting solution. You’ll learn about the pros and cons and discover how to make smart decisions about hosting your ePHI. 

  • Discover how a compliant data center can improve security of your data.
  • Understand the contractual requirements a HIPAA compliant data center must live up to.
  • Find out the benefits and risks of data center outsourcing.
  • Get resources for finding the right data center.

Don’t get caught uninformed.

Call us at 734.213.2020, or email us at contactus@onlinetech.com with any additional HIPAA hosting questions or concerns.

To view the full guide and download the PDF, please fill out the form below.

]]>
asage@onlinetech.com (Marcus Samland) White papers Mon, 29 Dec 2014 22:43:16 +0000
Disaster Recovery http://www.onlinetech.com/resources/white-papers/disaster-recovery http://www.onlinetech.com/resources/white-papers/disaster-recovery Investing in risk management means investing in business sustainability—designing a comprehensive business continuity and disaster recovery plan is about analyzing the impact of a business interruption on revenue.

Disaster Recovery as a Service

Mapping out your business model, identifying key components essential to operations, developing and testing a strategy to efficiently recover and restore data and systems is an involved, long-term project that may take 12-18 months depending on the complexity of your organization.

Addressing high-level business drivers for designing, implementing and testing a business continuity and disaster recovery plan, this white paper makes a case for the investment while discussing the innate challenges, benefits and detriments of different solutions from the perspective of experienced IT and data security professionals.

Speaking directly to different compliance requirements, this paper addresses how to protect sensitive backup data within the parameters of standards set for the healthcare and e-commerce industries.

From there, this paper delves into different disaster recovery and offsite backup technical solutions, from traditional to virtualization (cloud-based disaster recovery), as well as considerations in seeking a disaster recovery as a service solution (DRaaS) provider. A case study of the switch from physical servers and traditional disaster recovery to a private cloud environment details the differences in cost, uptime, performance and more.

This white paper is ideal for executives and IT decision-makers seeking a primer as well as up-to-date information regarding disaster recovery best practices and specific technology recommendations.

Call us at 734.213.2020, or email us at contactus@onlinetech.com with any additional IT disaster recovery/offsite backup questions or concerns.

To view the full white paper and download the PDF, please fill out the form below.

]]>
asage@onlinetech.com (Marcus Samland) White papers Mon, 29 Dec 2014 23:30:57 +0000
PCI Compliant Hosting http://www.onlinetech.com/resources/white-papers/pci-compliant-hosting http://www.onlinetech.com/resources/white-papers/pci-compliant-hosting Engaging customers online is a necessity for every business today. Brick and mortar traditional retail shopping experiences compete aggressively with online buying experiences, with local customers often choosing to buy online even if the store is right down the street.

PCI

Key banking and bill processing transactions are only a mobile app away, making both e-commerce transactions and the the number of end points touching cardholder data prolific. Established companies have to become online and mobile before the younger, nimbler competition absconds with the mobile market share. Nascent startups have to provide mature transaction security to protect their reputation with customers, and access to credit lines.

Two primary business drivers impact the data center: security and availability. Security protects cardholder data. Availability protects company cash flow.

The major financial institutions collaborated to define the PCI DSS standard with a minimum set of security measurements to protect the waterfall of sensitive identity and payment information flowing through the Internet. Businesses that don’t meet the standard are risking steep fines, loss or reduction of credit lines, goodwill and loyalty from valued customers, and legal costs should a breach occur. Availability is protected by investing in redundancy throughout the IT infrastructure – every minute of downtime has a direct impact on the bottom line.

Every company that accepts credit card payments must be PCI compliant. Companies who can afford the extensive capital outlay to build their own PCI compliant IT infrastructure must invest in the resources to maintain constant and ongoing diligence with patches to all operating systems and applications, daily review of log files, periodic vulnerability scanning, and annual penetration testing. Companies that are not in a position to build a PCI compliant infrastructure, or maintain the rigorous daily demands required to meet PCI compliance, look to outsource their IT infrastructure to a partner who has met PCI compliance, and can relieve the initial CapEx investment and ongoing daily compliance burdens.

Most favor a predictable OpEx commitment over the CapEx-intensive burden of facility and infrastructure maintenance. Outsourcing IT infrastructure is a strategy that allows companies to focus their in-house IT resources on their own end-user applications instead of the operating systems or hardware. PCI hosting partners who provide a well-respected and documented auditors’ opinion from an independent PCI DSS audit can also be a valuable asset to drastically reduce the cost and complexity of PCI SAQs (Self-Assessment Questionnaires) and third-party PCI QSA audits.

This white paper explores the impact of the PCI DSS standard on data centers and server infrastructure, describes the architecture of a PCI compliant data center both technically and contractually, and outlines the benefits and risks of data center outsourcing, and vendor selection criteria.

Call us at 734-213-2020, or email us at contactus@onlinetech.com with any additional PCI hosting questions or concerns.

To view the full white paper and download the PDF, please fill out the form below.

]]>
asage@onlinetech.com (Marcus Samland) White papers Mon, 29 Dec 2014 22:47:25 +0000
Encryption of Cloud Data http://www.onlinetech.com/resources/white-papers/encryption-of-cloud-data http://www.onlinetech.com/resources/white-papers/encryption-of-cloud-data Organizations seeking to protect sensitive and mission-critical data quickly realize that there is no single answer to keep all systems completely secure.

DR

Online data security is a complex, rapidly evolving landscape, requiring robust and layered protections. Encryption is one tool in a comprehensive defense-in-depth strategy to mitigate the risk of accidental and intentional data breaches.

Like every other technology tool, implementation must work within a broader digital ecosystem, without disrupting the purpose that the system was designed to fulfill. Evaluating the benefits of encryption against potential tradeoffs such as cost, performance, and ongoing maintenance is at the heart of determining the most effective and efficient means of using encryption.

First, a few basics: 

What is encryption?

Encryption takes plaintext (your data) and encodes it into unreadable, scrambled text using mathematical algorithms, effectively rendering data unreadable unless a cryptographic key is applied to convert it. Encryption ensures data security and integrity, even if accessed by an unauthorized user, provided the encryption keys have not been compromised. Encryption can protect data in motion, referred to encryption in transit or encryption in flight, as well as at rest; meaning in storage. Encryption often occurs at multiple levels of a system, appropriate to the context of use and other system components.

Why use encryption?

Encryption is considered a best practice for any security-conscious organization, including those that need to meet specific industry compliance requirements such as HIPAA compliance for healthcare, PCI DSS compliance for ecommerce and retail, and SOX for financial reporting. Recurring data breaches are increasing, particularly in the healthcare industry that reports an estimated $7 billion loss due to data breaches. Even those organizations that determine their risk of data loss is minimal often choose encryption to mitigate the risk of having to report a data breach, since the loss of encrypted data may not be considered a reportable event if the encryption keys remain safe.

The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using encryption in the cloud.

Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a full arsenal of security services for a layered-defense approach to ensuring data is protected, even if accessed by unauthorized individuals. Additional security options to add to your IT solution will be covered.

Call us at 734-213-2020, or email us at contactus@onlinetech.com with any additional cloud encryption questions or concerns.

To view the full white paper and download the PDF, please fill out the form below.

]]>
asage@onlinetech.com (Marcus Samland) White papers Mon, 29 Dec 2014 22:34:06 +0000
Mobile Security http://www.onlinetech.com/resources/white-papers/mobile-security http://www.onlinetech.com/resources/white-papers/mobile-security The integration of diverse mobile devices throughout the work environment is both inevitable and enabling. Workflows previously tied to less portable devices can now enjoy free access wherever a wireless signal allows.

But enabling access also presents security, privacy, and confidentiality concerns. Industries that rely on sensitive data such as healthcare, financial, and insurance have heightened risks and concerns. Addressing security concerns is nothing new for these industries, but mobile technologies present a dizzying array of uniquely configured, user-selected hardware and software.

It’s a good bet that the selection of phone, carrier, and apps is driven more by usability than security. Information and security officers have a thinner tightrope to walk when enabling and protecting customers.

So what to do? This white paper explores approaches to mobile security from risk assessment (what data are truly at risk), enterprise architecture (protect the data before the devices), policies and technologies, and concludes with an example of a mobile security architecture designed and implemented within a hospital environment in which both enabling caregivers and protecting privacy, integrity, and confidentiality are paramount.

Call us at 734-213-2020, or email us at contactus@onlinetech.com with any additional mobile security or hosting questions or concerns.

To view the full white paper and download the PDF, please fill out the form below.

]]>
asage@onlinetech.com (Marcus Samland) White papers Mon, 29 Dec 2014 23:38:12 +0000
Bandwidth Service http://www.onlinetech.com/resources/white-papers/bandwidth-service http://www.onlinetech.com/resources/white-papers/bandwidth-service This document provides an overview of Internet bandwidth service. Internet bandwidth is the amount of data transferred between (to and from) the Internet. Understanding the difference between the speed of transferred data and the amount or number of bytes transferred your business requires can help you decide how much bandwidth you need to deploy.

]]>
asage@onlinetech.com (Marcus Samland) White papers Wed, 01 Oct 2014 22:22:00 +0000