BALTIMORE, MD – July 27, 2015 – Edge Hosting, a national provider of secure, scalable and dependable managed hosting services, today unveiled the fourth generation of their CloudPlus™ infrastructure, CloudPlus4, for public cloud, private cloud and hybrid hosting configuration environments.
“As cloud adoption continues rapid acceleration, it’s more important than ever for cloud solutions to deliver more than cores and gigs. The cloud must deliver the customer outcomes,” said Vlad Friedman, Founder and CEO at Edge Hosting. “When designing our fourth generation cloud, we threw out the book, leveraged 17 years of mission critical hosting experience and built CloudPlus™ to eliminate the barriers that exist between cloud and physical hosting solutions.”
If your company works with sensitive personal health information, you know how important it is to keep this information from being accessed or seen by anyone who isn’t authorized to view it. This can be people in your office as well as people outside your company, who breach your computer security protocols.
HIPAA, the Health Information Portability and Accountability Act, which was enacted in 1996, requires all companies that deal with sensitive health care information, not just health care providers, to put in place the necessary security systems to keep that information from being seen by or disclosed to unauthorized persons. However, being HIPAA compliant isn’t just about putting up a firewall and having your systems password protected.
There are several choices out there for business owners in regards to outsourcing their servers and their data. Many companies are overwhelmed with options, and some end up choosing providers that look good on paper, but in reality don’t hold up their end of the deal.
Did you know that the Truth in Advertising laws require that all claims be backed up by proof, no matter where an ad appears, including online? In the case of fraud, the Federal Trade Commission takes action to stop the scam by filing suit, freezing the perpetrator’s assets, and obtaining compensation for the victims. The FTC “looks especially closely at advertising claims that can affect consumers’ health or their pocketbooks – claims about…conduct related to high-tech products and the Internet…”
While that’s some consolation, unfortunately it is still very easy for unknowing consumers to be lured into fraudulent proposal traps when it comes to choosing from the many managed hosting providers vying for their dollar. Here are four areas in which the majority of the “too good to be true” claims are hiding.
We’re so proud and excited to announce that Vlad Friedman, Founder and CEO at Edge Hosting, is a finalist for the 2015 Ernst & Young Entrepreneur Of The Year award!
The Ernst & Young Entrepreneur Of The Year award is recognized as one of the most prestigious business awards program in the country. Awards are given to entrepreneurs who have demonstrated excellence and extraordinary success in such areas as innovation, financial performance, industry impact, risk, personal commitment and more.
Being selected as a finalist is an honor in itself and is a testament to the outstanding achievement that each finalist has contributed to the regional business community.
Edge Hosting was founded by Vlad nearly two decades ago, and has grown to become a national player in the fully managed hosting environment for mission critical applications.
The winner will be announced on Thursday June 25, 2015 at The Baltimore Marriott Waterfront hotel.
Do you realize that every 30 seconds, more than $1.2 million changes hands online, thanks to e-commerce sites? Even if you don’t sell tangibles or services online, chances are high that your company has an established web presence for marketing.
As you grow your business, your need for more complex and personalized web features also grows. Perhaps you’ve not given much thought to your managed hosting provider’s capabilities until now, but as the demand for your company’s services increases, you need to pose some critical questions to your existing provider.
If the answers you receive result in the need to switch providers, these questions can help you prequalify a new provider before you sign on that dotted line.
Learning Android Forensics – EBOOK Review
Forensics is the methodology of gathering data needed to uncover information that can be used to solve a crime. By following along with this book, you’ll learn most of the latest practicable technologies utilized in Android related forensics.
This book is packed with so much information simply reading it twice isn’t enough, you’ll need to make a few pots of coffee in order to digest all the information made available in this book.
Author Rohit Tamma takes a unique approach to organizing and presenting material in this book. While the humor lacks in the book it is technically sound and straight forward. After reading the book, you’ll learn how to recover deleted files, application data, and the many methods to do so are covered.
I’ve looked over this book a few dozen times already and still shake my head at the various recovery options available despite the ‘security’ appliances utilized on the device and how easily they’re bypassed. So in short, don’t do anything that you’d have to hide or you’ll be pretty shocked when they uncover the deleted data you thought was gone forever! Continue reading
We’re proud to announce that the Defense Information Systems Agency granted a Department of Defense Provisional Authorization (PA) for cloud service offerings to host DoD mission data up to Impact Level 2 in a cloud environment to Edge Hosting!
The exact offering is:
Edge Hosting CloudPlus – Managed Cloud for Secure Windows and Linux Application Hosting. Service Model: Platform as a Services (PaaS) and Infrastructure as a Service (IaaS). FedRAMP Agency ATO by Department of Labor.
BALTIMORE, MD (April 2015) Edge Hosting, LLC, a leader in secure, scalable and transparent managed hosting services, today announced the culmination of annual auditing against the Security Rule of The Health Insurance Portability and Accountability Act of 1996 (HIPAA) and The Health Information Technology for Economic and Clinical Health (HITECH) Act. The third party auditor concluded “that the applicable trust services criteria and Administrative, Technical and Physical Safeguards associated with the Security Rule of HIPAA were met and operated effectively” throughout the annual testing period. Continue reading
BALTIMORE, MD (April 2015) Edge Hosting, LLC, a leader in providing secure, scalable and dependable managed hosting services, today announced the annual attainment of the Statement on Standards for Attestation Engagements (SSAE) 16 Service Organization Control (SOC) 2 Type II standards compliance. Assessed by auditors from CliftonLarsonAllen (CLA), this certification demonstrates the company’s commitment to the highest compliance standards of operational excellence for its customers around the world. Continue reading
WordPress is one of the easier to use and more popular CMS’s out there. Unfortunately due to its popularity, it is also one of the more targeted software as well. That’s the bad news. The good news? There are recommendations to follow for securing WordPress, which will mitigate the risk of a compromise. Continue reading