article thumbnail

Top Architecture Blog Posts of 2023

AWS Disaster Recovery

2023 was a rollercoaster year in tech, and we at the AWS Architecture Blog feel so fortunate to have shared in the excitement. Building endless aisle architecture for order processing Check it out! #9: Architecture flow for Microservices to simulate a realistic failure scenario Check it out! #6: 6: Let’s Architect! Figure 5. #5:

article thumbnail

Volunteers Wanted: Help SIA Develop New Architectural Graphics Standard

Security Industry Association

The Security Industry Association (SIA) Architectural Graphics Working Group invites interested volunteers to participate in the development of a fully updated version of the SIA AG-01 standard. Interested volunteers are encouraged to attend the meeting and join the Architectural Graphics Working Group.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is Zero Trust Architecture?

Pure Storage

What is Zero Trust Architecture? Zero trust is not a product, service, or technology; rather it’s a strategy and standard, and one that more enterprises are adopting in place of outdated security approaches. In this article, we’ll discuss what ZTA is, why it’s augmenting traditional perimeter network security, and how to implement it.

article thumbnail

What is Hybrid Cloud Architecture? How does it work?

Acronis

For managed service providers (MSPs), hybrid cloud architecture offers an easy, efficient, and secure means to meet these client demands – but, for all the benefits you and your clients gain from hybrid cloud storage solutions, many still find the hybrid cloud approach and hybrid cloud management unreasonably complicated.

article thumbnail

What to know about zero trust architectures

Citrix

Zero trust architectures have gained rapid adoption by cybersecurity teams recently with the rise of knowledge workers moving to remote or hybrid work models. Related Stories How to implement zero trust security for your network How to create a zero trust network It’s time to stop using consumer browsers for work.

article thumbnail

Diving deep into Citrix zero trust architecture

Citrix

In my previous blog post , I discussed some of the observed challenges when implementing a zero trust architecture and how you can use Citrix technology to overcome them. In this post, I’ll dive deeper into the components that make … The post Diving deep into Citrix zero trust architecture first appeared on Citrix Blogs.

article thumbnail

Creating a Multi-Region Application with AWS Services – Part 1, Compute and Security

AWS Disaster Recovery

Many AWS services have features to help you build and manage a multi-Region architecture, but identifying those capabilities across 200+ services can be overwhelming. In Part 1, we’ll build a foundation with AWS security, networking, and compute services. Ensuring security, identity, and compliance. Building a global network.