<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>כתבות בנושא מחשוב ענן - genie שירותי מחשוב לעסקים</title>
	<atom:link href="https://www.genie.co.il/en/cloud-computing-articles/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.genie.co.il/en/cloud-computing-articles/</link>
	<description></description>
	<lastbuilddate>Mon, 08 Apr 2024 10:39:47 +0000</lastbuilddate>
	<language>en-US</language>
	<sy:updateperiod>
	hourly	</sy:updateperiod>
	<sy:updatefrequency>
	1	</sy:updatefrequency>
	

<image>
	<url>https://www.genie.co.il/wp-content/uploads/2021/05/fav-200x200.png</url>
	<title>כתבות בנושא מחשוב ענן - genie שירותי מחשוב לעסקים</title>
	<link>https://www.genie.co.il/en/cloud-computing-articles/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>גיבוי זה לא רפליקציה ורפליקציה זה לא DR</title>
		<link>https://www.genie.co.il/en/backup-is-not-replication/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Mon, 08 Apr 2024 10:35:35 +0000</pubdate>
				<category><![CDATA[כתבות בנושא מחשוב ענן]]></category>
		<category><![CDATA[genie]]></category>
		<category><![CDATA[אבטחת מידע]]></category>
		<guid ispermalink="false">https://www.genie.co.il/?p=20027</guid>

					<description><![CDATA[<p>Quite a few people tend to confuse the concepts, so what is the difference between them and for what use is each suitable?! Replication: In computer systems, replication is the duplication of data or resources to ensure availability and performance. Replication is often performed by third-party software, such as VEEAM&#039;s backup and replication system, replication is performed between two different devices, often across locations […]</p>
<p>The post <a href="https://www.genie.co.il/en/backup-is-not-replication/">גיבוי זה לא רפליקציה ורפליקציה זה לא DR</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="20027" class="elementor elementor-20027" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-22f85d93 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="22f85d93" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-195b509b" data-id="195b509b" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-7a546dc3 elementor-widget elementor-widget-text-editor" data-id="7a546dc3" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p><strong>Quite a few people tend to confuse the concepts, so what is the difference between them and for what use is each suitable?!</strong></p><p><strong>Replication:</strong> <br />In computer systems, replication is the duplication of data or resources to ensure availability and performance. Replication is usually performed by third-party software, such as the VEEAM backup and replication system,<br />Replication is performed between two different devices, often across different locations, in order to ensure the survival of the information in case the main device is disabled.<br />The replication process involves creating copies of data or systems, for real-time synchronization. However, replication alone is not a comprehensive disaster recovery (DR) strategy.</p><p><strong>Disaster Recovery (DR):</strong> <br />DR includes a broader strategy than replication to ensure business continuity after a disaster. The communication issue plays a crucial role in DR by assisting in the smooth transfer of data between primary and backup systems and connecting the organization&#039;s users to the DR environment. A well-designed network ensures fast data recovery, minimizing downtime and maintaining operational integrity.</p><p><strong>backup:</strong> <br />Backup includes creating copies of data for long-term storage and recovery in the event of data loss or damage. While a communications network is not the primary focus of backup processes, effective network connectivity is essential to securely transfer and store backup data.<br />There are a large number of backup software such as Acronis as well as regular methodologies, which should secure the information in the event of a disaster.<br />Backup must be done in at least two circuits, a local backup and a backup outside the organization, in order to ensure that the information is saved in the event of a catastrophic event (fire, flood, earthquake, etc.).<br />In the event of an incident, with an emphasis on a cyber incident, the information will be restored to a &quot;clean&quot; environment that will be established.<br /><strong>Backup is the necessary solution for the protection of the organizational information.</strong></p><p><strong>In conclusion:</strong> Each solution stands on its own. Organizations that are interested in a quick recovery time will set up a DR site. Regarding backup, this is mandatory for every small and large organization.<br /><br /><strong>The author: Zabri Idan, VP of expert services and information security at Genie</strong></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div><p>The post <a href="https://www.genie.co.il/en/backup-is-not-replication/">גיבוי זה לא רפליקציה ורפליקציה זה לא DR</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>כיצד להגן על הנתונים שלך בענן &#8211; שלב בחירת הספק ועד בחינת עמידה ברגולציות</title>
		<link>https://www.genie.co.il/en/how-to-protect-your-data-in-the-cloud/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Tue, 19 Mar 2024 11:40:10 +0000</pubdate>
				<category><![CDATA[כתבות בנושא מחשוב ענן]]></category>
		<category><![CDATA[genie]]></category>
		<category><![CDATA[אבטחת מידע]]></category>
		<guid ispermalink="false">https://www.genie.co.il/?p=20016</guid>

					<description><![CDATA[<p>Cloud computing is the provision of computing services such as servers, storage, databases, networks, software, analytics and intelligence over the Internet. Cloud computing offers many advantages, such as scalability, flexibility, cost-effectiveness and innovation. However, cloud computing also poses significant challenges to information security, as data and applications are transferred from the traditional scope of the organization to the cloud, where they may be exposed to various threats and vulnerabilities. According to […]</p>
<p>The post <a href="https://www.genie.co.il/en/how-to-protect-your-data-in-the-cloud/">כיצד להגן על הנתונים שלך בענן &#8211; שלב בחירת הספק ועד בחינת עמידה ברגולציות</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="20016" class="elementor elementor-20016" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-22f85d93 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="22f85d93" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-195b509b" data-id="195b509b" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-7a546dc3 elementor-widget elementor-widget-text-editor" data-id="7a546dc3" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>Cloud computing is the provision of computing services such as servers, storage, databases, networks, software, analytics and intelligence over the Internet. Cloud computing offers many advantages, such as scalability, flexibility, cost-effectiveness and innovation. However, cloud computing also poses significant challenges to information security, as data and applications are transferred from the traditional scope of the organization to the cloud, where they may be exposed to various threats and vulnerabilities.</p><p>According to a [McAfee] report, cloud adoption will grow by 50% in 2023, driven by the COVID-19 pandemic and the shift to remote work. However, the report also found that 79% of the organizations experienced at least one cloud-related security incident in the past year, such as data breaches, stolen credentials, malware infections, denial-of-service attacks or insider threats.<br />The report also outlined the top cloud security challenges facing organizations, such as lack of visibility, misconfiguration, unauthorized access, compliance issues and data loss.</p><p>In this article, we&#039;ll discuss some of the best practices and recommendations for protecting your data in the cloud, based on the latest standards and guidelines from industry and academia. We will deal with the following topics:</p><ul><li>How to choose a secure cloud service provider</li><li>How to implement data encryption and key management</li><li>How to enforce access control and identity management</li><li>How to monitor and audit cloud activities and incidents</li><li>How to comply with legal and regulatory requirements</li></ul><h2><strong>How to choose a cloud service provider:</strong></h2><p>The first step in ensuring the security of your data in the cloud is choosing a reputable and reliable cloud service provider (csp). A CSP is a company that offers cloud computing services to customers, such as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), or Software as a Service (SaaS). CSP is responsible for providing the physical and logical security of the cloud infrastructure, such as servers, networks, storage and hypervisor.<strong> However, the CSP is not responsible for the security of the data and applications that the customer uploads or runs in the cloud. This is known as the shared responsibility model, where the CSP and customer share responsibility for securing the cloud environment.</strong></p><h3><strong>To choose a CSP that emphasizes data security, you should consider the following factors:</strong></h3><ul><li>The CSP&#039;s security policies and procedures, such as how they protect their infrastructure, how they handle incidents, how they respond to enforcement requests from law enforcement or third parties, and how they notify customers of any breaches or changes.</li><li>The CSP&#039;s security certifications and certifications, such as ISO 27001, SOC 2, PCI DSS, HIPAA, GDPR and others. These are standards and regulations detailing the requirements and recommended methods for managing information security in various fields and industries. A CSP that has obtained these certifications and authorizations demonstrates that they have implemented the necessary controls and measures to ensure the security of their customers&#039; services and data.</li><li>The security features and options offered by the CSP, such as encryption, key management, access control, identity management, logging, auditing, backup, recovery, and more. These are tools and mechanisms that allow the customer to improve the security of his data and applications in the cloud, according to his specific needs and preferences.</li><li>The security agreements and contracts between the CSP and the customer, such as the Service Level Agreement (SLA), the Terms of Service (TOS), the Privacy Policy and the Data Processing Agreement (DPA). These are documents that define the roles and responsibilities of the CSP and the customer, the scope and quality of the services, the rights and obligations of both parties and the remedies and obligations in case of disputes or violations.</li></ul><p>Before choosing a CSP, you should perform a thorough assessment and evaluation of the above factors, and compare different CSPs based on their security performance and reputation. You should also consult with your legal and compliance teams to ensure that the CSP complies with your regulations and co.</p><h3><strong>How to implement data encryption and key management</strong></h3><p>The second step in ensuring the security of your data in the cloud is implementing data encryption and key management. Data encryption is the process of turning data into an unreadable form, using a secret key and an algorithm. Data encryption prevents unauthorized access, modification or disclosure of data, even if the data is intercepted or stolen. Key management is the process of creating, storing, distributing, rotating, revoking and destroying the secret keys used to encrypt data. Key management ensures the availability, integrity and confidentiality of keys, and prevents key breach or loss.<br /><br /></p><ul><li><strong>There are two types of data encryption:</strong> Encryption at rest and encryption in transit. Encryption at rest is the encryption of data when it is stored on a device or device, such as a disk, tape or cloud storage service. Encryption in transit is the encryption of data as it is transmitted over a network or channel, such as the Internet, a VPN, or a cloud service. Both types of encryption are essential to protecting your data in the cloud, as the data may be exposed to various threats and vulnerabilities during storage or transmission.<br /><br /></li><li><strong>There are also two types of key management:</strong> Server-side encryption and client-side encryption. Server-side encryption is the encryption of data by the CSP, using keys generated and managed by the CSP. Server-side encryption is convenient and easy to use, since the client does not have to worry about data encryption and decryption, or key management. However, server-side encryption also means that the client must trust the CSP with the security and privacy of its data and keys, and that the CSP may have access to the data and keys, or may be forced to disclose them to law enforcement. or third parties. Client-side encryption is the encryption of data by the client, using keys that are generated and managed by the client. Client-side encryption is more secure and private, because the client has full control over their data and keys, and the CSP has no access to, or can&#039;t disclose, the data or keys to anyone. However, client-side encryption also means that the client has to take care of data encryption and decryption, and key management, which can be complex and challenging.</li></ul><h3><strong>To implement data encryption and key management, you should consider the following factors:</strong></h3><ul><li>The sensitivity and value of your data, such as personal data, financial data, health data, intellectual property, trade secrets and others. The more sensitive and valuable your data, the more encryption and key management you need to apply, and the more you prefer client-side encryption over server-side encryption.<br /><br /></li><li>The type and level of encryption and key management offered by the CSP, such as symmetric encryption, asymmetric encryption, hybrid encryption, hashing, digital signatures, key length, key rotation, key backup, key recovery, and more. These are different methods and techniques that affect the security and performance of encryption and key management. You should choose the encryption and key management that best meets your security requirements and expectations, and that are compatible with your applications and devices.<br /><br /></li><li>The cost and complexity of encryption and key management, such as the hardware, software, manpower and time required to implement and maintain encryption and key management. Encryption and key management may entail additional and complex costs for cloud operations, such as increased storage space, reduced processing speed, increased bandwidth, increased latency, increased human errors, and more. It is important to balance the pros and cons of encryption and key management, and optimize your encryption and key management processes.</li></ul><h3><strong>How to enforce access control and identity management</strong></h3><p>The third step in ensuring data security in the cloud is to enforce access control and identity management. Access control is the process of granting or denying access to data and resources, based on the identity and attributes of users and devices. Identity management is the process of authenticating and managing the identity and attributes of users and devices, such as usernames, passwords, roles, permissions, credentials, and others. Access control and identity management ensure that only authorized and authenticated users and devices can access your data and resources in the cloud, and that unauthorized and unauthenticated users and devices are blocked or restricted.</p><p><strong>There are three types of access control:</strong> Discretionary Access Control (DAC), Mandatory Access Control (MAC) and Role-Based Access Control (RBAC). DAC is access control where the owner of the data or resource decides who can access it, and can delegate or revoke access rights to others. MAC is the access control where access rights are determined by a central authority or policy, and cannot be changed by the owner or user. RBAC is access control where access rights are based on users&#039; roles and responsibilities, and assigned by an administrator or system</p><h3><strong>How to monitor and audit cloud activities and incidents in the cloud:</strong></h3><p>Cloud monitoring and auditing are processes that include collecting, analyzing, and reporting on the performance, availability, security, and compliance of cloud resources and services. Cloud monitoring and auditing can help organizations:</p><ul><li>Detection and response to information security incidents and breaches.</li><li>Identifying and mitigating vulnerabilities and threats in the cloud</li><li>Ensuring compliance with information security standards and regulations</li><li>Optimizing utilization and efficiency of cloud resources</li><li>Improving cloud service quality and customer satisfaction</li></ul><p><strong>There are various methods and tools that can be used to monitor and audit cloud activities and events. Some of the recommended methods and steps include:</strong></p><ul><li><strong>Understanding the attack surface of a cloud environment:</strong> Organizations need to identify and perform analysis of all the cloud assets and services they use, and map the interdependencies and relationships between them. Organizations should also monitor the configuration and status of cloud assets and services, and identify any changes or anomalies that could indicate a security issue².</li><li><strong>Set up strong access controls and encryption:</strong> Organizations need to implement strong authentication and authorization mechanisms to control who can access cloud resources and services, and what actions they can perform. Organizations also need to encrypt data in transit and at rest, and manage encryption keys securely³.</li><li><strong>Establish external sharing and collaboration standards:</strong> Organizations should define and enforce policies and rules for sharing and collaborating with external parties, such as customers, partners or suppliers. Organizations should also monitor and control the activities and permissions of external users, and revoke access when necessary¹.</li><li><strong>Updates of cloud systems and applications:</strong> Organizations need to update their cloud systems and applications with the latest security updates. Organizations should also test the compatibility and functionality of updates before deploying them to production environments.</li><li><strong>Use of cloud-native or third-party cloud monitoring and auditing tools: </strong>Organizations can leverage the tools and services built into or offered by cloud service providers, such as AWS CloudTrail, Azure Monitor, or Google Cloud Operations, to monitor and audit cloud activities and incidents. Alternatively, organizations can use third-party tools and solutions, such as BitSight, Exabeam or DevOps, to improve their cloud monitoring and auditing capabilities.</li></ul><h3><strong>How to comply with legal and regulatory requirements in a cloud environment:</strong></h3><p>Legal and regulatory requirements in a cloud environment can vary by industry and geography. Regulatory compliance refers to the discipline and process of ensuring that a company follows the laws enforced by the governing bodies in their geography or the rules required by voluntarily adopted industry standards</p><p>For example, if you handle healthcare data, you may need to comply with the Health Insurance Portability and Accountability Act (HIPAA) 1. If you handle credit card information, you may need to comply with the Payment Card Industry Information Security Standard (PCI DSS)</p><p>Cloud providers strive to ensure that their platforms and services comply with the relevant regulations. However, organizations should also confirm that their applications, the infrastructure on which these applications depend, and the services provided by third parties are also certified as compliant.</p><p>To maintain compliance standards in the cloud, it is important to classify the information assets, include in the contract the right to audit the cloud environment, an exit strategy, a business continuity plan, procedures and controls for managing IT services and re-planning operations. . A model for ensuring the right team structure and capabilities to manage cloud services</p><p>If you need more detailed information about Azure compliance offerings, you can visit the Microsoft Trust Center 1. They have a wealth of information on how to implement a compliance strategy.</p><p><strong>The author of the article: Idan Zabri, VP of expert services and information security</strong><br />​</p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div><p>The post <a href="https://www.genie.co.il/en/how-to-protect-your-data-in-the-cloud/">כיצד להגן על הנתונים שלך בענן &#8211; שלב בחירת הספק ועד בחינת עמידה ברגולציות</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>שמירה על הנתונים שלך: החשיבות של גיבוי שירותי Microsoft 365</title>
		<link>https://www.genie.co.il/en/saving-the-data/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Tue, 30 Jan 2024 11:50:11 +0000</pubdate>
				<category><![CDATA[כתבות בנושא אבטחת מידע]]></category>
		<category><![CDATA[כתבות בנושא מחשוב ענן]]></category>
		<category><![CDATA[genie]]></category>
		<category><![CDATA[אבטחת מידע]]></category>
		<guid ispermalink="false">https://www.genie.co.il/?p=19870</guid>

					<description><![CDATA[<p>In today&#039;s era, businesses rely heavily on Microsoft 365 services for communication, collaboration and productivity. While the cloud-based platform offers a suite of applications such as Outlook, Word, Excel and Teams, many organizations ignore a critical aspect – data backup. Data loss: accidental deletions , human errors or malicious attacks can result in the loss of valuable data. Regular backup of Microsoft 365 services creates […]</p>
<p>The post <a href="https://www.genie.co.il/en/saving-the-data/">שמירה על הנתונים שלך: החשיבות של גיבוי שירותי Microsoft 365</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div data-elementor-type="wp-post" data-elementor-id="19870" class="elementor elementor-19870" data-elementor-post-type="post">
						<section class="elementor-section elementor-top-section elementor-element elementor-element-22f85d93 elementor-section-boxed elementor-section-height-default elementor-section-height-default" data-id="22f85d93" data-element_type="section" data-e-type="section">
						<div class="elementor-container elementor-column-gap-default">
					<div class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-195b509b" data-id="195b509b" data-element_type="column" data-e-type="column">
			<div class="elementor-widget-wrap elementor-element-populated">
						<div class="elementor-element elementor-element-7a546dc3 elementor-widget elementor-widget-text-editor" data-id="7a546dc3" data-element_type="widget" data-e-type="widget" data-widget_type="text-editor.default">
				<div class="elementor-widget-container">
									<p>In today&#039;s era, businesses rely heavily on Microsoft 365 services for communication, collaboration and productivity.<br />While the cloud-based platform offers a suite of applications such as Outlook, Word, Excel and Teams, many organizations ignore a critical aspect – data backup.<br /><strong><br />Data loss:</strong> Accidental deletions, human errors or malicious attacks can result in the loss of valuable data. A regular backup of Microsoft 365 services creates a safety net that ensures that important files, mail and documents can be recovered in case of unexpected data loss.</p><p><strong>Security against cyber threats:</strong> As cyber threats evolve, the risk of ransomware attacks and data breaches increases. Backing up your Microsoft 365 data provides an extra layer of security.<br />In the event of a security incident, you can restore your information to the point before it was compromised, mitigating the impact of the attack.</p><p><strong>Compliance and legal requirements:</strong> Many industries are subject to strict regulations and legal regulations regarding data retention and protection.<br />Backing up Microsoft 365 services helps businesses meet these requirements, ensuring they meet the necessary standards and preventing potential legal ramifications.</p><p><strong>Employee productivity and collaboration:</strong> Collaboration is at the heart of Microsoft 365, with tools like SharePoint and Teams enabling seamless teamwork. In the event of data loss, the time and effort invested in collaborative projects can be jeopardized.<br />Backup Microsoft services<br />365 ensures that collaborative efforts remain intact, promoting uninterrupted productivity.</p><p><strong>Customization and configuration retention:</strong> Users often spend time customizing Microsoft 365 settings, configurations, and templates.<br />Regular backups ensure that these customizations are preserved.</p><p><strong>Economical solution:</strong> The cost of implementing a robust backup solution for Microsoft 365 far outweighs the potential losses caused by not having one.<br />Investing in backup services is a cost-effective means of safeguarding your data and maintaining the integrity of your business operations.</p><p><strong>In conclusion:</strong> While Microsoft 365 services offer unparalleled convenience and efficiency, data backup is essential to ensure resilience against unexpected challenges. Prioritizing data protection not only protects your information but also contributes to the overall security and success of your organization.</p><p><strong>The author: Zabri Idan, VP of expert services and information security at Genie</strong></p>								</div>
				</div>
					</div>
		</div>
					</div>
		</section>
				</div><p>The post <a href="https://www.genie.co.il/en/saving-the-data/">שמירה על הנתונים שלך: החשיבות של גיבוי שירותי Microsoft 365</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>הסבת עסק למחשוב ענן &#8211; לא סיפור פשוט</title>
		<link>https://www.genie.co.il/en/moving-business-to-the-computing-cloud/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Sun, 14 Aug 2022 10:00:11 +0000</pubdate>
				<category><![CDATA[כתבות בנושא מחשוב ענן]]></category>
		<category><![CDATA[מחשוב ענן]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8131</guid>

					<description><![CDATA[<p>Cloud computing represents one of the most significant trends in recent years, in the field of technology and computers. Cloud computing services embody a long list of advantages, starting with remarkable simplicity and the absence of the need for daily maintenance, the starting point can be complex. Here are several highlights that will help you move forward into the world of cloud computing in your business. Choosing a type of provider for cloud computing for businesses point […]</p>
<p>The post <a href="https://www.genie.co.il/en/moving-business-to-the-computing-cloud/">הסבת עסק למחשוב ענן &#8211; לא סיפור פשוט</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Cloud computing represents one of the most significant trends in recent years, in the field of technology and computers. Cloud computing services embody a long list of advantages, starting with remarkable simplicity and the absence of the need for daily maintenance, the starting point can be complex. Here are some highlights that will help you move forward into the world of cloud computing in your business.</p>
<h3><strong>Choosing a provider type for business cloud computing</strong></h3>
<p>The starting point should be that there is not one cloud computing service that is similar to another. Therefore, choosing the specific provider that provides these services must be wise. The main diagnosis is between three main types of providers:<br />
1. Global public providers - all the big names: servers from Microsoft, Google, Amazon DigitalOcean and more<br />
2. Companies that provide integration and computing services - including the ISP companies (Bezeq International, 012 Smile, Netvision) and the integration companies (Binet, Taldor, IBM)<br />
3. Independent suppliers - can certainly be large as well. For example, one of the prominent names in this field in Israel is Triple C</p>
<p>It is too short to go into detail here about every doubt there is, all the more so when it comes to the service packages it offers. However, there are a number of highlights that are important to consider: from an economic point of view, many believe that Digital Ocean&#039;s service is particularly profitable, and is therefore suitable for small to medium-sized businesses and organizations (SMB). On the other hand, others will actually recommend choosing a provider located in Israel, which may provide a quick and immediate response in the event of a malfunction or request.</p>
<h3><strong>The comprehensive tests and the assimilation procedure</strong></h3>
<p>It should be taken into account that in any case there may well be &quot;birth defects&quot; when joining a cloud service, especially during its implementation in the business: a scenario in which the business does not run in an exemplary manner in the first few days after - is not unthinkable. A useful recommendation, in this context, can be a careful examination of the field and joining a cloud service package only after understanding it for approval. There are guides on the Internet that make it possible to understand &quot;who is against whom&quot;, while consulting from professional companies operating in the field can also help.<br />
To avoid misunderstandings in the future, it is important to find out in advance what the characteristics of the service package are: the level of security (the cloud does not guarantee absolute security), the method of communication, the terms of the financial agreement (there are many packages that include a significant increase in prices after a certain period of time), the method of management and learning, stability The supplier and more. It is important to pay due attention to the technological options offered by the service package and make sure that they are suitable for specific needs: virtual storage and backup, an interface that supports Hebrew, personalization of the systems, and more.</p>
<p><strong>Do you need advice for converting the work environment in your business to the cloud? </strong><a href="https://www.genie.co.il/en/cloud-computing/">Click for more information on genie&#039;s cloud computing services</a></p><p>The post <a href="https://www.genie.co.il/en/moving-business-to-the-computing-cloud/">הסבת עסק למחשוב ענן &#8211; לא סיפור פשוט</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>גיבוי מידע זה חשוב.  אבל&#8230; מה עם השחזור?</title>
		<link>https://www.genie.co.il/en/data-recovery/</link>
		
		<dc:creator><![CDATA[doron baharav]]></dc:creator>
		<pubdate>Mon, 01 Mar 2021 12:13:09 +0000</pubdate>
				<category><![CDATA[כתבות בנושא מחשוב ענן]]></category>
		<category><![CDATA[genie]]></category>
		<category><![CDATA[גיא הוכמן]]></category>
		<category><![CDATA[מחשוב ענן]]></category>
		<category><![CDATA[שירותי מחשוב]]></category>
		<guid ispermalink="false">https://www.genie.co.il/?p=14271</guid>

					<description><![CDATA[<p>Would you agree to store all your capital in the basements of the most secure bank in the world, in the most advanced safe of its kind, knowing that at the moment of truth, when you need money urgently, there is no guarantee that you will have the key? Guy Hochman - CEO of Genie Computing Services As a business owner, you are aware of the importance of backup, which is why you chose one of the backup systems offered on the market. You make sure to back up your business information [...]</p>
<p>The post <a href="https://www.genie.co.il/en/data-recovery/">גיבוי מידע זה חשוב.  אבל&#8230; מה עם השחזור?</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Would you agree to store all your capital in the basements of the most secure bank in the world, in the most advanced safe of its kind, knowing that at the moment of truth, when you need money urgently, there is no guarantee that you will have the key?</p>
<p><strong>Guy Hochman - CEO </strong><strong>Genie Computing Services</strong></p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-14276" src="https://www.genie.co.il/wp-content/uploads/2021/03/DSC05930-600x400.jpg" alt="גיא הוכמן" width="889" height="500" srcset="https://www.genie.co.il/wp-content/uploads/2021/03/DSC05930-300x169.jpg 300w, https://www.genie.co.il/wp-content/uploads/2021/03/DSC05930-1024x576.jpg 1024w, https://www.genie.co.il/wp-content/uploads/2021/03/DSC05930-600x338.jpg 600w" sizes="(max-width: 889px) 100vw, 889px" /></p>
<p>As a business owner, you are aware of the importance of backup, which is why you chose one of the backup systems offered on the market. You make sure to back up your business information in the cloud, with tape backups and a local backup to a physical computer, and you even receive a daily report that proves that the information has indeed been backed up. In return, you enjoy the peace of mind that comes from knowing that at the moment of truth, you can &quot;press a button&quot; and return the situation to normal. All of this was true as long as the threats you faced were physical: fire, flood, theft, natural disasters and war damage. Then came the ransomware.</p>
<h3>Reproducibility - the difference between a &quot;slight hit on the wing&quot; and a crash</h3>
<p>As integrators who support companies in all sectors of the economy, we meet quite a few business owners who have experienced a ransomware virus and find out too late that this backup system is important, but without the ability to recover information efficiently and quickly, they are expected to have long and frustrating days of complete shutdown and severe damage to business income and reputation.</p>
<p>Therefore, as business owners, you must change the dialogue with your backup provider and examine not only the backup capabilities it makes available to you, but also the recovery capabilities. why? Because ransomware attacks in business are more common than you imagine, so it is likely that sooner or later, you will need these capabilities very much. That&#039;s how you do it right.</p>
<h3>10 good tips for managing an optimal backup and recovery setup</h3>
<ol>
<li><strong> Check the log regularly<br />
</strong>In many cases some user adds a folder or information in a location that is not configured for regular backup. This information, which is sometimes critical to the functioning of the organization, is not regularly backed up and this is discovered too late. Therefore, regularly check the log that shows the content of the backed up information and pay attention to whether all the relevant information is backed up.</li>
</ol>
<ol start="2">
<li><strong> Perform recovery tests<br />
</strong>Make data recovery tests a regular procedure, because a successful recovery indicates a full and proper backup. Regularly conduct sample tests, mainly for information that is defined as critical to the organization. In each test, different information was recovered and thus, over time, all the information will receive a test confirming that it can be recovered.</li>
</ol>
<ol start="3">
<li><strong> Create a backup log<br />
</strong>Document in the backup log all the sample recovery tests you have performed, so that you do not repeat, again and again, recovery tests for the same data and you do not miss other data.</li>
</ol>
<ol start="4">
<li><strong> Make a local backup<br />
</strong>Back up your information both in an external backup system and in a physical backup system in the business itself. The local backup will enable faster recovery than a cloud backup and will significantly shorten business downtime.</li>
</ol>
<ol start="5">
<li><strong> Disconnect the local backup system from the network<br />
</strong>A backup system that is connected to the network is exposed to ransomware attacks just like the information on the organization&#039;s servers. Such an &quot;infected&quot; backup cannot be used by you to restore the information.</li>
</ol>
<ol start="6">
<li><strong> We viewed the information in the backup<br />
</strong>Ransom attacks focus on the most significant weak point in the corporate network and in many cases it is the backup system. Therefore, make sure that the information in the backup is also compressed and encrypted at the highest level.</li>
</ol>
<ol start="7">
<li><strong> Custom backup and restore<br />
</strong>Every business has different types of information. Each type of information requires different backup and recovery levels, a unique backup policy, a different backup volume and a definition for the tools with which the backup will be performed. Therefore, be sure to customize the backup and recovery setup for your business.</li>
</ol>
<ol start="8">
<li><strong> backup procedure<br />
</strong>Write a mandatory backup procedure that defines the backup days, backup hours, the number of backups required each day, month or year and the recovery test plan. Appoint a person in charge of backups and make sure that the procedure is continued, even in cases where he leaves his position.</li>
</ol>
<ol start="9">
<li><strong> Define a dedicated budget section<br />
</strong>Backup and restore are not a luxury. They may be your only lifeline during a cyber attack on your business. Therefore, remember that for every shekel you try to save in this area, you may pay compound interest, to restore the circles of destruction.</li>
</ol>
<ol start="10">
<li><strong> don&#039;t wait for tomorrow<br />
</strong>Apply the recommendations today and you will be better prepared for the information crisis that, sooner or later, will affect your business as well.</li>
</ol>
<p>Do you want to be better prepared for information events through an optimal backup and recovery setup that is customized for your business? The Genie team and I are here for you. Together we will create a detailed backup plan, characterize the best backup and recovery solution, define backup procedures and accompany you hand in hand, in case of an information incident.</p><p>The post <a href="https://www.genie.co.il/en/data-recovery/">גיבוי מידע זה חשוב.  אבל&#8230; מה עם השחזור?</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>וירטואליזציה לעסקים: VMware או Hyper-v</title>
		<link>https://www.genie.co.il/en/virtualization/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Tue, 27 Aug 2019 05:23:09 +0000</pubdate>
				<category><![CDATA[כתבות בנושא מחשוב ענן]]></category>
		<category><![CDATA[Hyper-v]]></category>
		<category><![CDATA[VMware]]></category>
		<category><![CDATA[וירטואליזציה]]></category>
		<category><![CDATA[מחשוב ענן]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8155</guid>

					<description><![CDATA[<p>Virtualization is a general name for simulation software that helps business owners combine different functions on their desktop, in a way that optimizes performance and helps it run easily. For every business owner it is important to protect his information and also the processes of processing, transferring, protecting and maintaining it, there are several different solutions for this. The variety of software available on the market interfaces with the operating system (Mac, Linux [...]</p>
<p>The post <a href="https://www.genie.co.il/en/virtualization/">וירטואליזציה לעסקים: VMware או Hyper-v</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Virtualization is a general name for simulation software that helps business owners combine different functions on their desktop, in a way that optimizes performance and helps it run easily. For every business owner it is important to protect his information and also the processes of processing, transferring, protecting and maintaining it, there are several different solutions for this. The variety of software available on the market interface with the operating system (Mac, Linux and/or Windows) and enable central management of various factors on one screen.</p>
<h3 style="text-align: justify;">What operating system do I have?</h3>
<p style="text-align: justify;">Before you can choose which imaging software is most suitable for you from the selection available on the web, it is important that you first understand your needs and get to know your current management platform. If you use a Windows operating system, it is possible that the product they provide may fit you like a glove, if you use a different operating system such as Linux or Mac, you may have to choose a different interface, which can give you more than other products.</p>
<p style="text-align: justify;">The two most prominent products in the virtualization market are VMware from Windows, and Hyper-V from Microsoft. The two giant companies offer us two different products, so we examined and tested the differences between both:</p>
<p style="text-align: justify;"><strong>Hyper-V<br />
</strong>If you are already used to Microsoft&#039;s operating system, dealing with the company&#039;s management software will be easier for you than for others. Hyper-V will allow you to deal more smoothly with the Microsoft interfaces you already have, and also allows you to add as many management tools that are relevant to you. The software also allows you to manage your work environment (both physical and virtual) in a wide layout and supervision, but its major drawback is definitely noticeable - it does not allow you to manage different applications through the interface.</p>
<p style="text-align: justify;"><strong>VMware<br />
</strong>VMware is adapted to Windows 2008, and the number of programs that can be run on it is wide and convenient for every user. The interface enables automatic cloud security for everything done in it, virtual storage, temporary access to employees if it is necessary to make changes to the software, and more.</p>
<p style="text-align: justify;">One of the most striking differences between the two products we have presented is that in the Windows interface a visual change of the visibility of the user&#039;s desktop occurs in the software, in a way that can optimize and facilitate his work. In addition, through VMware, it is possible to give different access permissions to each developer, starting from viewing, to administrative access permission.</p>
<h3 style="text-align: justify;">VMware VS. Hyper-v</h3>
<p style="text-align: justify;">If we cross these two products, we will find that most businesses tend to use VMware more easily than HyperV, and the reasons for this are:</p>
<p style="text-align: justify;"><strong>Direct driver<br />
</strong>VMware is a software that directly accesses your desktop, and performs a direct synchronization between offline and online, thus enabling the adjustment of the technological system on a larger scale on your computer.</p>
<p style="text-align: justify;"><strong>The memory of the balloon<br />
</strong>The VMware storage and memory expansion method is different from what you have known until now. They invented the &quot;balloon memory&quot;, which means that when the software manager runs out of storage, he can turn to one of the partners and ask him to temporarily host some of the files. The software pops up the option automatically, and offers it to the administrator if necessary. When host storage is no longer needed, the software returns the information and files by default to storage with the administrator.</p>
<p style="text-align: justify;"><strong>Change of manager<br />
</strong>If the software goes through a lot of load and slows down the time it takes for the pages to load, VMware gives an option to change the manager and store all the important information in a safe way, so that the mass of the given information is not lost. Doing so can improve performance on the interface, and improve long-term storage issues. In addition, in the next version - <strong>VMware 5</strong> - The interface will be improved and will allow the transfer of information to an external hard disk, in a format similar to &quot;change of administrator&quot;, in order to improve long-term performance and provide a full backup of your work.</p>
<p style="text-align: justify;"><strong>The convenience of the software for the user<br />
</strong>One of the critical and prominent differences between VMware and Hyper-v is the convenience of the software. For those who are already familiar with Windows management software (who isn&#039;t?), VMware is a perfect solution. The software is designed in an easy and convenient way, synchronizes to your desktop in a convenient and simple way than the other prominent products on the market.</p>
<p style="text-align: justify;"><strong>In conclusion</strong>, in search of a solution to manage and secure your desktop, both programs can suit any user across the network, you just have to choose what suits you and your business best!</p><p>The post <a href="https://www.genie.co.il/en/virtualization/">וירטואליזציה לעסקים: VMware או Hyper-v</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>מחשוב ענן: טיפים לבחירת ספק</title>
		<link>https://www.genie.co.il/en/cloudcomputing-choosing-provider-tips/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 27 Dec 2018 09:25:42 +0000</pubdate>
				<category><![CDATA[כתבות בנושא מחשוב ענן]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8167</guid>

					<description><![CDATA[<p>Choosing a provider: tips for a cloud computing administrator - Cloud Computing is a form of service using a remote computer. How do you choose the right cloud provider for the business? The right provider is the one that will lead to the success of the process and vice versa. A challenging question. Many organizations worry, and quite rightly so, about outsourcing such an important organizational part to an external party. How to verify the professional level […]</p>
<p>The post <a href="https://www.genie.co.il/en/cloudcomputing-choosing-provider-tips/">מחשוב ענן: טיפים לבחירת ספק</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;"><strong>Supplier selection: tips for the manager</strong><br />
Cloud Computing - Cloud Computing is a form of service using a remote computer. How do you choose the right cloud provider for the business? The right provider is the one that will lead to the success of the process and vice versa. A challenging question. Many organizations worry, and quite rightly so, about outsourcing such an important organizational part to an external party. How to verify his professional level?<br />
What questions should be asked in order to receive the highest quality, most reliable and safest service?</p>
<p>Cloud Computing - Cloud Computing is a form of service using a remote computer. Through an Internet connection or through a dedicated communication line, all the data and business logic of a certain entity are concentrated on servers and computer units that are physically distant from it. This is about Hosting - hosting of the organization&#039;s computer systems, on a physical site of another organization. The hosting company provides infrastructure on which the applications of the hosting company will be built. The significant advantage of the cloud is the potential of saving resources of manpower and money, by avoiding the purchase of expensive computing equipment and the need for personnel to manage it, be responsible for upgrading it, repairing it, etc. The use of a cloud service improves the availability of information systems and produces a flexible and simple infrastructure for operation and maintenance, through a &quot;monthly rental service&quot;.</p>
<p>But here begins the main concern in the whole issue: how do you choose the right cloud provider for the business?! The right supplier is the one that will bring about the success of the process and vice versa. A challenging question. Many organizations worry, and quite rightly so, about outsourcing such an important organizational part to an external party. How to verify his professional level? What questions should be asked in order to receive the highest quality, most reliable and safest service?</p>
<p>It is important to understand first and foremost that a provider of cloud computing must be a type of &quot;integrator&quot; - a body with knowledge in many fields and experience with regards to the planning, implementation and support of computing infrastructures. In general, it is useful to examine three main areas when choosing the cloud provider: his professional level - the technical level of the body and the technical staff employed by him, his professional experience, etc.; the types of technologies, hardware products and manufacturers/brands he uses; The physical level of the facilities where he stores his computer systems and operates them.</p>
<p><strong>For this purpose, you should ask several main questions:</strong></p>
<ul>
<li>What is his knowledge and experience in planning the infrastructure, implementing and supporting the information systems?</li>
<li>Does the provider operate an infrastructure that includes a large number of customers?</li>
<li>Are his customers satisfied - don&#039;t be afraid to check who they are and ask these questions...</li>
<li>Does his team employ experts with knowledge in the various worlds of computing infrastructure - storage, backup, virtualization, disaster recovery, applications and operating systems?</li>
<li>Will the process of moving to the cloud infrastructure be quick and efficient or may it take longer?</li>
<li>What is the disconnection policy from the cloud infrastructure? Is the customer obligated or &quot;bound&quot;?</li>
<li>What is the level of service offered and the speed of the supplier&#039;s response in the event of a malfunction or problem?</li>
<li>Is there a compensation mechanism in case of damage to the business as a result of service or infrastructure problems?</li>
<li>Can the system performance be viewed by the customer at any given moment?</li>
<li>Is the control of the system operation in the hands of the customer?</li>
<li>How does the cloud provider secure the information on the network? What is its backup frequency?</li>
<li>Are these physical facilities that include physical survivability and a high level of security? Maybe even an underground location of the systems?</li>
</ul>
<p>It can be understood, therefore, that the questions that must be asked at the important stage of choosing the cloud computing infrastructure provider are many and varied. But all of them must be taken into account in order to make the right choice. This, in order to enjoy, after the selection, conditions of silence regarding the operation of the computer systems and the proper and efficient ongoing management of the entire organization.</p><p>The post <a href="https://www.genie.co.il/en/cloudcomputing-choosing-provider-tips/">מחשוב ענן: טיפים לבחירת ספק</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>מחשוב ענן לעסקים</title>
		<link>https://www.genie.co.il/en/cloud-computing-report/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 27 Dec 2018 09:22:38 +0000</pubdate>
				<category><![CDATA[כתבות בנושא מחשוב ענן]]></category>
		<category><![CDATA[מחשוב ענן]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8164</guid>

					<description><![CDATA[<p>The use of cloud computing services is constantly increasing in large organizations as well as in small businesses. Many businesses are interested in purchasing a server for their business for a variety of reasons: for the purpose of improving the network traffic rate, increasing the storage volume and buying a new server when upgrading to an old one. The purchase of expensive communication equipment for the needs of office work is done without a clear connection to the company&#039;s needs, the meaning is, an increase in expenses for the ongoing maintenance of [...]</p>
<p>The post <a href="https://www.genie.co.il/en/cloud-computing-report/">מחשוב ענן לעסקים</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">The use of cloud computing services is constantly increasing in large organizations as well as in small businesses. Many businesses are interested in purchasing a server for their business for a variety of reasons: for the purpose of improving the network traffic rate, increasing the storage volume and buying a new server when upgrading to an old one. The purchase of expensive communication equipment for the needs of office work is done without a clear connection to the needs of the company, the meaning is, an increase in expenses for ongoing maintenance of servers, as well as an increase in electricity expenses, all this in addition to the direct cost of the hardware.<br />
Consumption of services <a title="Cloud computing for business" href="https://www.genie.co.il/en/cloud-computing-services/">Cloud computing for business</a> is currently on the rise in large organizations as well as in small to medium-sized businesses. Many businesses are interested in purchasing a server for their business for a variety of reasons, whether for the purpose of improving the network traffic rate in the organization, increasing storage volume, or in buying a new server when upgrading to old equipment.</p>
<p>The purchase of expensive communication equipment for the needs of routine office work is sometimes done without a clear connection to the needs of the company, which means a significant increase in the indirect expenses of the business on the ongoing maintenance of servers, as well as high electricity expenses, all of this of course beyond the direct cost of the hardware.<br />
Company managers today have the responsibility to save resources, in light of the existing computing solutions with the development of the field of cloud computing services, it is easier to see the clear economic benefits in a focused and efficient utilization of the system resources in the organization and harnessing them to the changing needs of the company.</p>
<p>The name of the game today is control over the management of the existing resources in the business, their proper utilization can sometimes be the difference between a successful and profitable business and a wasteful organization.<br />
Through the use of cloud computers, it is now possible to focus more or less computing power according to the exact level of demand while avoiding a considerable investment in one-time purchases of computing systems and software for temporary or permanent needs, such as buying servers and their maintenance.</p>
<p style="text-align: justify;">As proof of the growing need for cloud computing services for businesses, KPMG, one of the largest international CPA firms in the world, published a survey called &quot;Clarity in the Cloud&quot;. Among the survey subjects, over 900 senior managers from 15 countries, some of whom have implemented cloud systems In their businesses, and the rest of the surveyed, were basically defined as potential users of cloud technology or providers of this service.</p>
<p style="text-align: justify;">From the results of the survey, the hypotheses about the increase in the rate of assimilation of the cloud technology were strengthened, it was found that the managers today see the advantages of using cloud computing services with increasing positiveness and expressed a high willingness to integrate cloud-based systems in the organization. Most of the managers who were surveyed regarding the future investment forecast, estimated that the investment in cloud computing will increase dramatically in the coming years, several managers even estimated that the investment in cloud computing technology will increase by 20% in the coming year in the companies they manage.</p>
<p style="text-align: justify;">Companies that will invest today and convert some of their systems to cloud computing are moving towards an efficient, flexible and safer future with less risk of malfunctions and will also benefit from savings in time, resources and current expenses, thus significantly improving the business&#039;s competitive prospects and placing it at the forefront of technological progress.</p><p>The post <a href="https://www.genie.co.il/en/cloud-computing-report/">מחשוב ענן לעסקים</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>מחשוב ענן: סינון אתרים</title>
		<link>https://www.genie.co.il/en/cloud-web-filter/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 27 Dec 2018 09:18:04 +0000</pubdate>
				<category><![CDATA[כתבות בנושא מחשוב ענן]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8161</guid>

					<description><![CDATA[<p>Filtering websites in the cloud - a cloud computing service allows organizations of any field and size - from a large business to public and government bodies and even private homes to limit user browsing to websites. The innovation here is the cloud. There is no longer any need to deal with complicated settings and maintenance that consumes many working hours. Today, with a nominal fee it is almost possible to control the entire field of website filtering in the organization, [...]</p>
<p>The post <a href="https://www.genie.co.il/en/cloud-web-filter/">מחשוב ענן: סינון אתרים</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div style="text-align: justify;">Filtering websites in the cloud - a cloud computing service allows organizations of any field and size - from a large business to public and government bodies and even private homes to limit user browsing to websites. The innovation here is the cloud. There is no longer any need to deal with complicated settings and maintenance that consumes many working hours. Today, with a nominal fee, it is almost possible to control the entire field of website filtering in the organization, optimize the utilization of bandwidth and avoid unnecessary risk of the sensitive information in any organization from external threats such as hackers and spies.</p>
<p>The work of organizations and businesses of all types and sizes relies on their computer system and its efficient functioning. It has been clear to everyone for several decades now that technology has become an existential basis found in the daily infrastructure of every business. In recent years, the working method known as &quot;cloud computing&quot; has become widespread among many businesses - computing located on a remote computer system. It is an external concentration of all business information on physically distant servers and computer units. Another significant advantage of the method of working in the cloud, apart from the financial and time saving of the human resource, is the ability to define clear and personal security goals.</p>
<p>Companies that provide a cloud service offer, in most cases, specific protections in the field of security such as the possibility to filter websites. Businesses, public bodies or even private homes, can make use of a cloud service from a provider that will offer them a filtering system that protects against unsafe surfing or prevents the possibility of entering certain content sites. And the reasons for this are many: from the surfing of children who must be protected from offensive websites (pornography, violence, drugs, etc.), organizations that fear damage to business information due to the entry of employees to certain content websites that may unwittingly lead to the intrusion of information security threats. Organizations that do not want their employees to surf social networks during working hours and waste valuable time (studies have revealed that employees in organizations waste an average of 50% of their time surfing social networks) to the public who, for religious reasons, want to create a clear distinction between legitimate content for their audience, and those that are not.</p>
<p>The advantage of the cloud service allows entities that use it to avoid the need to purchase and install the various security software<br />
and the maintenance, saving man-hours dealing with maintenance, installations and constant security upgrades, thereby avoiding considerable financial expenditure, as well as avoiding the use of software that burdens the corporate server and its speed of operation. A cloud-based filtering service takes into account defined security needs, will be able to provide smart, safe and efficient management of Internet traffic in any organization. Different cloud providers will allow this even at the level of setting for each computer position in the organization with smart permission management. The internet content filtering service accessible to the user will allow him to surf only within the content worlds that have been defined in advance and at the same time, will allow an improved level of security for the entire business computing infrastructure. This is through avoiding access to content sites that may endanger the network through viruses, spies, bots and various types of network threats that may disable the network and endanger the business.</p>
<p>The systems that provide the filtering services in the cloud will monitor the corporate network 24 hours a day, some of them will provide reports of the browsing habits of the employees in the organization, will allow the deployment of the network&#039;s security network also in different geographical locations and will provide an external and ongoing security envelope that prevents the penetration of threats into the corporate computer system. Hence , that the service method of filtering websites in the cloud allows organizations of all fields and sizes - from a business of hundreds of employees to public and government bodies and even private homes - not only to create significant savings in time and money resources, but also to correctly manage the security &quot;boundaries&quot; desired for the organization. An extremely important need for every business, as well as for the individual.</p>
<p>Interested in more information about the cloud website filtering service? <a title="Filtering sites in the cloud" href="https://www.genie.co.il/en/filtering-website/">click here</a></p>
</div><p>The post <a href="https://www.genie.co.il/en/cloud-web-filter/">מחשוב ענן: סינון אתרים</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>יתרונות שרת קבצים בענן</title>
		<link>https://www.genie.co.il/en/file-server-cloud/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 27 Dec 2018 09:12:42 +0000</pubdate>
				<category><![CDATA[כתבות בנושא מחשוב ענן]]></category>
		<category><![CDATA[מחשוב ענן]]></category>
		<category><![CDATA[שרת קבצים בענן]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8158</guid>

					<description><![CDATA[<p>Nowadays, the amount of information managed by organizations or commercial companies is enormous, therefore there is a need for advanced solutions to store the stored information, without losing a single bit. For the most part, organizations will choose the solution that seems to them the fastest and most available (and usually the most expensive), which is to increase the existing physical storage volumes: backup tapes, hard disk, external drives, even burning media. All these […]</p>
<p>The post <a href="https://www.genie.co.il/en/file-server-cloud/">יתרונות שרת קבצים בענן</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">Nowadays, the amount of information managed by organizations or commercial companies is enormous, therefore there is a need for advanced solutions to store the stored information, without losing a single bit. For the most part, organizations will choose the solution that seems to them the fastest and most available (and usually the most expensive), which is to increase the existing physical storage volumes: backup tapes, hard disk, external drives, even burning media. All of these require a large financial investment, unnecessary fuss.</p>
<p style="text-align: justify;">Today, the amount of information we manage as private individuals, as organizations or as commercial companies is enormous, therefore there is a strong need for advanced solutions to store the stored information, without losing a single bit. For the most part, organizations will choose the solution that they think is the fastest and most available (and usually the most expensive), which is to continuously increase the existing physical storage volumes: backup tapes, hard disk, external drives, even media burning. All of these require a respectable financial investment, unnecessary fuss, we are required to carry with us the external storage devices that may be damaged or stolen.</p>
<p style="text-align: justify;">The other solution is to use cloud file server storage technology. Unlike storing information on a physical server, which requires a connection to the organization&#039;s internal Internet network, a file server in the cloud allows access to information at any time and anywhere as long as you are connected to the Internet.</p>
<p style="text-align: justify;">The establishment of an FTP server in organizations requires the purchase of valuable equipment and a large investment in their maintenance, air conditioning of a server room, replacement of components, electricity, allocation of personnel for the ongoing maintenance of an FTP server whose main purpose is to transfer and store files, including large files, when speed Data transfer depends both on the quality of the components of the ftp file server itself and on the data transfer load in all the organization&#039;s infrastructures.</p>
<p style="text-align: justify;">In the case of using file storage technology on a cloud server, all these sections are eliminated, there is no longer a need to buy valuable equipment that requires replacement every 3-4 years, saving maintenance costs and personnel allocation. The huge advantage of storing files in the cloud is the ease of use and access to information. The information is stored on the most advanced servers in the world, backed up by several additional servers, automatically, and all this without sacrificing a high speed of transferring/downloading files (sometimes much higher than a standard FTP server), something that no small or medium-sized commercial company could afford until now because of the high costs. Moreover, most of the existing application software in the market are currently making the transition to cloud technology, which in the future will save a lot of money for organizations and companies that will purchase one &quot;cloud license&quot; instead of many software licenses.</p>
<p style="text-align: justify;">In a file server in the cloud, it is possible to define different permissions with a different level of access to files, which makes it possible to manage the information effectively on the server. How many times do you encounter the problem of sending a large file via email? From today there is no need to send! Simply upload the file quickly to a file server and send the access link to the file, directly to the recipient. On the server, each file receives its own unique address, which makes sharing, managing and searching files an easy and safe matter. By the way, the information on the cloud storage server is stored in an encrypted form when the encoding is done before the file is uploaded, on the user&#039;s computer. In addition, all the information found in a file server is stored and backed up on several additional servers that are powered by different power sources to allow the user access to the information at any given time. There is the possibility of accessing the files through all existing means of communication, computers, smart phones and tablets.</p>
<p style="text-align: justify;">The smart interface of the cloud file server supports Blackberry, Android, iPhone/iPad, Windows Phone 7 operating systems. You can create different user groups with different permission levels with the option of sharing files outside the organization as well. When a new file appears in the group, all group members receive an automatic update email informing them of new content in the group.</p>
<p style="text-align: justify;"><strong>Backwards compatibility<br />
</strong>On a physical server the return points depend on the operating system, on a cloud server the options are more flexible and specific return points can be defined for the server, where in the event of a malfunction you can return to them.</p>
<p style="text-align: justify;"><strong>maintenance cost<br />
</strong>The maintenance cost of a cloud server is a fixed monthly cost that is determined in advance, compared to a physical server that can break down or require an upgrade. and therefore may involve additional and unexpected expenses.</p>
<p style="text-align: justify;"><strong>In conclusion<br />
</strong>The ease of use, the flexibility of sharing information, the ability to control and locate files, saving money and technological progress, all of these lead us to the conclusion: moving to file storage in the cloud will contribute to every company both financially and organizationally.</p>
<p style="text-align: justify;"><a title="Cloud file sharing" href="https://www.genie.co.il/en/files-cloud-share/">Advance to the GShare cloud file sharing service - browse for more information</a></p><p>The post <a href="https://www.genie.co.il/en/file-server-cloud/">יתרונות שרת קבצים בענן</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>המדריך המלא לגיבוי מרחוק</title>
		<link>https://www.genie.co.il/en/remote-backup-guide/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 27 Dec 2018 08:41:56 +0000</pubdate>
				<category><![CDATA[כתבות בנושא מחשוב ענן]]></category>
		<category><![CDATA[גיבוי בענן]]></category>
		<category><![CDATA[גיבוי ענן לעסקים]]></category>
		<category><![CDATA[מחשוב ענן]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8152</guid>

					<description><![CDATA[<p>Remote backup is suitable for servers, computers, and laptops. The advantages of the remote backup are many and varied. If the hard drive crashes, the material can be retrieved quickly. The backup goes smoothly and without media errors since it is a relatively simple process. The backup is scheduled automatically and there is no need to get involved in different settings. There are remote backup programs that allow you to restore data [...]</p>
<p>The post <a href="https://www.genie.co.il/en/remote-backup-guide/">המדריך המלא לגיבוי מרחוק</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;"><a title="Remote backup" href="https://www.genie.co.il/en/remote-online-backup/">Remote backup</a> Suitable for servers, computers, and laptops. The advantages of the remote backup are many and varied. If the hard drive crashes, the material can be retrieved quickly. The backup goes smoothly and without media errors since it is a relatively simple process. The backup is scheduled automatically and there is no need to get involved in different settings. There are remote backup programs that allow you to restore data from previous versions - even a whole month back.</p>
<p style="text-align: justify;">Fire, burglary, missiles, earthquake or any other disaster...</p>
<p>The common knowledge among the common user is that when the information is stored on the Internet - it is not safe. The opposite is correct. In practice, remote backup servers are almost impossible to hack. Even if the hacker came, these are huge server farms, and it is impossible to know exactly which server your specific stored information is on.</p>
<p style="text-align: justify;">In most cases, the material is encrypted with standards developed and used by security bodies, such as encryption with algorithms such as the Advanced Encryption Standard 256bit. It is much easier to break into a business and take tapes that contain the core of the most secret and sensitive business information. Beyond that, most cases of information theft were carried out in-house, from betrayal from within. I don&#039;t mean to paranoia anyone, but just explain the logic behind things. In conclusion, before you run to buy a backup solution for a remote site, check a number of things:</p>
<ul style="text-align: justify;">
<li>Is our business information transmitted with sufficiently strong encryption?</li>
<li>Is the recovery quick - important for business continuity and quick recovery from a disaster.</li>
<li>Is there an expert who checks the backups for you every day - if the backup does not go through for some reason and there is no one to handle or warn you, your information is in danger.</li>
<li>Is the backup site in an underground location.</li>
<li>How many previous versions of the information can be saved (a week back, a month back, etc.).</li>
</ul>
<p style="text-align: justify;">Interested in more information about remote backup services for businesses? <a title="Cloud backup for businesses" href="https://www.genie.co.il/en/remote-cloud-backup-services/">click here</a></p>
<p style="text-align: justify;">Questions and answers on the subject: <a title="Questions about cloud backup" href="https://www.genie.co.il/en/remote-backup-faq/">Backup services</a></p><p>The post <a href="https://www.genie.co.il/en/remote-backup-guide/">המדריך המלא לגיבוי מרחוק</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>הקרב על המשרד של המאה ה-21 נמשך</title>
		<link>https://www.genie.co.il/en/office365-or-googleapps/</link>
		
		<dc:creator><![CDATA[Eyal]]></dc:creator>
		<pubdate>Thu, 27 Dec 2018 08:34:04 +0000</pubdate>
				<category><![CDATA[כתבות בנושא מחשוב ענן]]></category>
		<guid ispermalink="false">http://erd-genie.ln3.tempurl.tk/?p=8149</guid>

					<description><![CDATA[<p>Comparison test: office 365 vs google apps There is no doubt that these are the two main competitors in the arena of business applications based on cloud technology. In order to be able to compare two different types of cloud-based office application packages. When it is always observed that some will like the simplicity of Gmail and some will prefer the old, good and familiar Outlook. Some will prefer […]</p>
<p>The post <a href="https://www.genie.co.il/en/office365-or-googleapps/">הקרב על המשרד של המאה ה-21 נמשך</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p dir="rtl" style="text-align: justify;"><strong>Comparison test: office 365 vs google apps<br />
</strong></p>
<p style="text-align: justify;">There is no doubt that these are the two main competitors in the arena of business applications based on cloud technology. In order to be able to compare two different types of cloud-based office application packages. When it is always observed that some will like the simplicity of Gmail and some will prefer the old, good and familiar Outlook. Some will prefer the PowerPoint presentation of the office while others will prefer the Slides, from Google. Therefore, the comparison mainly refers to the business aspect and the differences in adaptation to the organizational needs of the two companies that are so different from each other.</p>
<p style="text-align: justify;">Many advantages are still found on Microsoft&#039;s side in the game of competition that has emerged in the last year between the two software giants in the cloud computing arena for businesses in Israel. But Google also brings up advantages that intensify the smaller your business is.</p>
<p style="text-align: justify;"><strong>Total adoption of the cloud</strong><br />
Many businesses have already fully adopted cloud technology. Some are still testing, testing and some are still experimenting with it. For the latter, Google Apps is not possible. Google works in a &quot;black and white&quot; method and does not allow compromises or intermediate &quot;gray&quot; areas. But most organizations are not interested, nor can they always move to the cloud fully and &quot;at once&quot;. And that&#039;s a problem. In fact, the main argument against Google is that it offers an incomplete enterprise solution, which includes too many problems and too little flexibility, which is essential for enterprises. And more detail about that:</p>
<p class="clearfix" style="text-align: justify;"><strong>Cloud is limited and a shame</strong><br />
From a simple comparison of the applications and the total features of the enterprise options, it appears that Google offers a narrower cloud experience at the end of the day, compared to <a title="Implementing Office 365 in businesses and receiving 24/7 support" href="https://www.genie.co.il/en/office365/">Office 365 which includes Hebrew support</a>, 24/7 and a human answer is available in the familiar local market. As a result, it is expected that some users will experience adjustment difficulties and a flexibility problem for the organization&#039;s needs. But according to Google&#039;s well-known method, which includes a collection of solutions for consumers based on basic needs, while requiring rapid adaptation to working habits in a familiar-new environment. In most cases, Google&#039;s environment is more dynamic than Microsoft&#039;s products, and from this also derive many advantages of meeting new needs, and this is an advantage that can be expressed in the long term of Google Apps&#039; product efforts. The potential to be more flexible and faster in terms of work interfaces and updates, that&#039;s where Google&#039;s approach tends and there&#039;s nothing new here.</p>
<p style="text-align: justify;">David Nichols, a director at Ernst &amp; Young was quoted: &quot;Currently, most companies have less than 30% of their systems in the cloud.&quot; In the long term, Nichols expects that cloud penetration in organizations will reach 70%, meaning widespread adoption of hybrid clouds. But still, businesses want their own pace without being forced to make a sharp and fast move. They want to keep their business information local and aren&#039;t ready to &quot;let go&quot; yet. And that is their right.</p>
<p>Hence the problem of the user experience in Google Apps, which turns out to be problematic in many cases. Similar to the shutdowns of the Google Apps for Teams, Google Listen, Google Video products for business demonstrations, new products and services are added, which after some time, are disabled according to one whim or another of the managers of the various divisions at Google. Consistency is the name of the game in the more conservative business culture and to these target audiences, Google has struggled to penetrate until the past year. Google, on the one hand, gets bad points for previously giving customers a week&#039;s notice for new features and canceling products with little or no warning. This unstable forecast does not allow businesses to plan in advance. Microsoft updates what is needed itself and provides a 12-month notice for significant updates, despite all the advantages we mentioned earlier and it is part of the &quot;game&quot; in the Google experience and many of the most enthusiastic users know how to accept this with love for the product and its constant upgrading.</p>
<p style="text-align: justify;"><strong>In addition, there is insurance</strong></p>
<p style="text-align: justify;">Microsoft, beyond the customer interface approach that is adapted to their needs, provides its customers with flexibility in the form of a solid and known service agreement in advance, a planned work plan, the ability to choose personally between a pure cloud experience or a hybrid experience that combines cloud services with local IT infrastructures. Microsoft, for its part, guarantees financial backup when the availability of any of the Office 365 services falls below the uptime of % 99.9 and its service agreement covers every user and every component of the package.<br />
The service level agreement (SLA) of Google Apps - does not guarantee the level of service necessary for most organizations and the readiness of the infrastructure should be read carefully. Google&#039;s SLA only covers some of the services it offers and does not cover unavailability issues. Moreover, Google Apps fails to provide the level of computing control that organizations rely on. Google Apps provides limited management tools that are mainly intended for small or micro businesses and does not produce the satisfactory answer for organizations with a complex geographical layout and large organizations.</p>
<p style="text-align: justify;"><strong>To sum up</strong>, there is no doubt that this is a competition. But advantages of flexibility, understanding of customer needs, backup of mistakes, reliability and seniority combined in stability without changes occurring new to the controllers - all these are without a doubt, still, tremendous advantages that give Microsoft first place of honor when it comes to a business application package for the computer user of any kind.</p>
<p style="text-align: justify;">Learn more about <a title="Cloud computing products for businesses" href="https://www.genie.co.il/en/cloud-computing/">Cloud computing products for businesses</a>, click on the product: <a title="Office 365" href="https://www.genie.co.il/en/office365/">Office 365</a>, <a title="Cloud backup" href="https://www.genie.co.il/en/remote-online-backup/">Cloud backup</a>, <a title="Cloud mail server" href="https://www.genie.co.il/en/exchange-mail-server/">Cloud mail server</a>, <a href="https://www.genie.co.il/en/anti-spam-cloud/">Anti spam</a></p>
<p style="text-align: justify;">Did you like the article? Share us on social networks</p><p>The post <a href="https://www.genie.co.il/en/office365-or-googleapps/">הקרב על המשרד של המאה ה-21 נמשך</a> appeared first on <a href="https://www.genie.co.il/en">genie שירותי מחשוב לעסקים</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>