Fordway Blog

Managing multiple cloud providers from a single pane of glass

[fa icon="calendar'] Aug 16, 2017 10:42:57 AM / by Caroline Houlden posted in Fordway Managed Services, cloud, cloud intermediation, Cloud Shock, Cloud Monitoring

[fa icon="comment"] 0 Comments

Most organisations moving services to cloud over the next few years will find themselves managing a hybrid solution - a mix of in-house, third party and public services. This means they’ll need to find an integrated way to manage their cloud portfolio, because every supplier will claim ‘it’s not my fault” when a problem arises, and they could waste a good deal of time tracking down the culprit.

Read More [fa icon="long-arrow-right"]

Hosting desktops and a critical regulatory portal for the Oil and Gas Authority.

[fa icon="calendar'] Jul 26, 2017 4:41:56 PM / by Caroline Houlden posted in Fordway Managed Services, cloud, DaaS, Web hosting, case study

[fa icon="comment"] 0 Comments

With the online portal which handles the majority of its consent and regulatory activities becoming increasingly unresponsive, the Oil and Gas Authority needed a new secure hosting environment. After a competitive tender it chose managed cloud provider Fordway, which now hosts the portal and provides back-up and DR using its own equipment in two UK data centres. Fordway also set up and hosts a remote desktop environment to run business-critical applications which could not be supported internally and enables new applications to be added rapidly to meet user demands.

Read More [fa icon="long-arrow-right"]

The Petya/NotPetya ransomware attack

[fa icon="calendar'] Jul 6, 2017 9:58:33 AM / by James Mason posted in Security, managed cloud, Ransomware, Incident Response, Fordway Managed Services

[fa icon="comment"] 0 Comments

With last week’s Petya/NotPetya malware coming so soon after the Wannacry infection which affected more than 230,000 computers in over 150 countries, every organisation needs to assess their ability to cope with ransomware. That means considering a range of factors, from your patching regime to your back-up and disaster recovery provision. It only takes one user to accidentally click on an infected attachment and you could find yourself testing your DR plan!

Read More [fa icon="long-arrow-right"]

Subscribe to the blog

 Submitting your information tells us you are okay recieveing blog updates and you are agreeing to our privacy policy and cookie policy. You can of course, opt out of these communications at any time!
How Secure is your Critical Business Data? get the guide