Latest Articles

Oracle Cloud Services – Create Tomorrow, Today!

With more than 30 years of experience in academia and over 11,000 higher education customers, Oracle has a history of success in helping institutions around the world enrich research, learning and operational experiences with innovative cloud solutions.
Oracle offers enterprise class and scale capabilities across the cloud – SaaS, PaaS, IaaS – designed to create a secure, reliable, and modern portfolio of mission-critical capabilities. It represents the industry’s most complete offering, perfectly suited for complex and high-speed computer-based research, operations management, and scaling up to meet peak needs.

Read More

Fundamental Cloud Security Part 13 – Case Study: Building a Secure Research Environment in AWS

The goal of this post is to present a common case study for building a research environment in AWS. Building an environment in the cloud involves several topics we need to take under consideration (such as how do I access resources in the cloud, where and how do I store data in the cloud, how do I protect the infrastructure, etc.) Let’s consider the following architecture: Researchers will connect to the cloud environment remotely over the internet and connect to a Linux machine with data analytics tools Original data sets will be stored using object storage Output data will be processed in a MySQL database Due to data sensitivity, data must be protected at all times In the following sections we will break-down the research team...

Read More

Fundamental Cloud Security Part 12 – Supply Chain in the Cloud

Working with public cloud providers raises many security challenges for customers, due to the fact that they do not control physical access to the cloud vendor’s data centers, the Cloud architecture or agreements between the cloud vendors and their suppliers. When conducting a risk assessment for supply chain in the cloud, we should ask cloud vendor questions such as: Who has access to my data stored in the cloud? What 3rd party suppliers (of the cloud vendor) have access to my data and is a data processing agreement in place? Does the cloud vendor store backups (in any form, from tape to physical hard drives) at 3rd party suppliers’ location? Do 3rd party suppliers have remote access to my data or to the systems storing or processing my...

Read More

Cloud Highlights from the Largest Networking Conference in Europe

Cloud user stories, vendor workshops and discussions: A recap of some of the most well-attended and popular TNC19 sessions From technical topics, to user stories from the field, strategic sessions on the future of implementing cloud services in the NREN community and other EC-sponsored programs, everyone seemed to be talking about cloud services and deployment at TNC19 in Tallinn. A highlight this year was a session that featured user stories from the field. Presenters showed how institutions and NRENs saved time, money and improved research and education by deploying cloud-based services. Garvan McFeeley (HEAnet), Michel Wets (SURFnet), Jakob Tendel (DFN), Antonio Saravia (RedIRIS), and Jessica Wu (JISC) described members’ “integration...

Read More

Fundamental Cloud Security Part 11 – Identity Management in Google Cloud Platform (GCP)

This document addresses another important aspect of cloud security – Identity Management. As the concepts and terms might be different between cloud providers, this document concentrates on Google Cloud Platform (GCP) and provides an overview of some of the key security services and resources it provides to cloud architects. Cloud Identity and Access Management (IAM) is a web service that helps you securely control access to GCP resources. You use IAM to control who is authenticated (signed in) and authorized (has permissions) to use resources. The following topics outline some of the key concepts for implementing IAM in Google Cloud Platform. Google Cloud IAM Identities in GCP are managed using a service called Cloud IAM (Identity...

Read More

Fundamental Cloud Security Part 10 – Identity Management in Microsoft Azure

This document addresses another important aspect of cloud security – Identity Management. While the concepts are common, the implementation approach varies for each cloud provider. This document concentrates on Microsoft Azure and provides an overview of Microsoft’s approach to identity Management and some of the key security services and resources it provides to cloud architects. The foundation of Microsoft’s approach is Azure Active Directory (Azure AD), Microsoft’s cloud-based identity and access management service, which helps employees sign in and securely access resources in Azure. The following are some of the key elements related to implementing Identity Management using Azure AD. Azure tenant A dedicated and trusted instance...

Read More

Lamaro – Cloud-based educational e-library solution

Inteligo is a white-label cloud-based educational e-library solution that can be incorporated in every institution to offer students and faculty. Within this service it is possible to store and maintain complete libraries of  ePub compatible digital materials. Institutions can provide free access to educational materials and further manage student access while attending or after they leave courses. Students can also access libraries through a mobile app at the institution on a BYOD basis. The service also manages DRM (Digital rights management) and provides additional content security. All services through GÉANTare provided exclusively inside EU. All data, including private data, will remain and be managed from within EU. Service has...

Read More

Paldesk – Brighter Interactions

Paldesk is an omnichannel communication solution that helps institutions interact with customers better, faster and in a more personalized way. Paldesk helps keep all customer conversations in one place. Paldesk makes it possible to switch between chat, e-mail, ticketing, and social media and offers impeccable customer support any time and any place. Users can fully customize entire communication ecosystems and connect to all major platforms and social media sources and provides advanced overview and statistics so managers have an accurate picture of support systems at a glance. All services through GÉANT are provided exclusively inside EU until 6 December 2024. All data, including private data, will remain and be managed from within EU...

Read More

Google Webinar: Information Security, Privacy & Data Protection in the Cloud 6th June 2019

Institutions want to move to the Cloud but often have questions about security, privacy and data redundancy. Learn some of the methods Google has created to secure data in Google’s Cloud, and how intellectual property is protected while meeting regulatory requirements. Learning Outcomes: Gain security insights and tips from the experiences of higher education IT leaders Understand the steps Google takes to ensure data security and privacy Get answers to your burning questions about security, privacy and compliance with Google Cloud This lunchtime webinar will provide an essential grounding in cloud security and data protection and will particularly benefit both technical and non-technical audiences considering moving to the cloud. About...

Read More

Microsoft Azure and Azure in Research update with Q&A. 16 June @TNC19 14:00-15:00

Brad Tipp, Microsoft Higher Education Research Director, and Mark Fitzsimons, Western Europe Education Azure lead, will discuss the latest Azure capabilities introduced over the last year as well as referencing recent Azure use in Research scenarios and other investments in the Higher Education sector by Microsoft for the coming year. We will have time for Q&A on everything and anything about Azure in this space. Come along, learn some new things, learn what others are doing and bring some of your most difficult questions to stump the presenters, and hopefully have some fun and enjoy yourselves.
Register here;

Read More
Skip to content