Search
Close this search box.

TIC Connectivity and FedRAMP High – Is Cloud Nirvana near?

GSA’s FedRAMP PMO has been continually evolving the compliance framework for driving the wider adoption of commercial cloud services. Last year, they released for public comment the  TIC Overlay initiative as well as the FedRAMP High baseline. Both of these are critical to enhanced cloud adoption and helping Federal customers solve some of the critical […]

Magento on AWS for Scalable eCommerce

Magento ecommerce, the number one ecommerce CMS in the world helps its users grow their online business in a great way through its powerful features. Magento 1 has been the leading ecommerce CMS and Magento 2 is the future of the electronic commerce world. 26% of the top million ecommerce sites are powered by Magento. […]

AWS Price Drops for C4, M4 and R3 Instances

Amazon announced their 51st price drop of 5% for On-Demand and Reserved instance, and Dedicated host prices for C4 and M4 instances running Linux in the US East (Northern Virginia), US West (Northern California), US West (Oregon), Europe (Ireland), Europe (Frankfurt), Asia Pacific (Tokyo),Asia Pacific (Singapore), and Asia Pacific (Sydney) regions. The price drops include On-Demand, […]

Intrusion Detection, Intrusion Prevention and Web Application Firewalls

As more and more businesses are hosted online and increasingly on cloud platforms such as AWS, it is critical to ensure robust cybersecurity defenses are in place. Typically, the security architecture for most web facing applications begins with boundary protection using a firewall. There are a number of security sub-systems such as Intrusion Detection Systems […]

Secure and Scalable Magento Hosting with AWS EC2 and Aurora

Magento is an open source cloud based digital commerce platform that empowers merchants to integrate digital and physical shopping experiences. Magento enterprise edition provides an engaging shopping experience to the users by providing personalized content, fast checkout and a seamless shopper experience. However, in order to ensure the integrity of the user experience and sensitive […]