Tag: Azure Week

Migrate SQL Server Database to an Azure SQL Database
Migrate SQL Server Database to an Azure SQL Database
Blog Posts

You can use Azure Database Migration Service to migrate the databases from an on-premises SQL Server instance to Azure SQL Database. In this example, we will move the SQL Server 2008 database on on-premises Windows Server 2008 R2 to Azure SQL. As seen in the image below, there is a database called “DCOInsurance” on SQL… READ MORE

Site 2 Site VPN FortiGate to Azure Stack
Site 2 Site VPN FortiGate to Azure Stack
Blog Posts

Connecting Azure Stack to my FortiGate Firewall I wanted to connect my new local Firewall to my Azure Stack vNet. As I described later this year I did it with my old firewall which was a virtual pfSense Firewall. It was very good to learn the real parameters and to proof that against a commercial product. Things… READ MORE

Let’s Learn How to Build a Chat Application with Redis, WebSocket and Go
Let’s Learn How to Build a Chat Application with Redis, WebSocket and Go
Blog Posts

The WebSocket protocol offers a bi-directional (both server and client can exchange messages) and full-duplex (server or client can send messages at the same time) communication channel that makes it suitable for real-time scenarios such as chat applications etc. The connected chat users (clients) can send messages to the application (WebSocket server) and can exchange messages with each… READ MORE

Use Azure to Store SQL Server Backups Offsit
Use Azure to Store SQL Server Backups Offsit
Blog Posts

You always think your environment is setup correctly and that you’re able to recover in case of a disaster. You make backups, test your backups, setup DR solutions and in the end test the DR plan (very important). But have you ever considered a situation where all your data is unusable? If you get infected… READ MORE

Identity and Access Management
Identity and Access Management
Blog Posts

In non-cloud environments with static configurations, the focus has often been on firewalls and a traffic-centric approach for security. However, in the cloud, resources become dynamic, infrastructure and networking are shared, and users expect access to applications and data from any location at any time. Trying to manage your cloud security with firewall rules alone… READ MORE

Security Governance, Risk, and Compliance (GRC)
Security Governance, Risk, and Compliance (GRC)
Blog Posts

Implementation of information security may be subject to multiple priorities and constraints, including financial constraints. To understand the situation for your organization specifically, consider the three major factors below: Governance: security for your organization must not only be correctly designed and applied but must also be tracked and audited. Risk: your organization will have its… READ MORE

Build a Strong Cloud Perimeter with Conditional Access
Build a Strong Cloud Perimeter with Conditional Access
Blog Posts

Phew, another article about Conditional Access. That’s right, there a quite a few already. Fortunately, this topic never gets old. Here’s why: In the cloud there are no traditional network perimeters anymore. On-prem appliances are rendered useless as cloud services can be accessed world-wide. All you need is a valid set of credentials to sign-in.… READ MORE