Many hosting providers offer a PCI- or a HIPAA-compliant solution that meets industry standards for high security and includes various tools to enable compliance. But at Layered Tech, we’ve taken this up several notches by offering complete compliance management through our Layer 4 Compliant Services.
With Managed Compliance, we take care of the majority of the work needed to pass a PCI audit. In fact, our clients are able to offload up to 80% of the 220 PCI controls, when they engage our Guaranteed Compliant offering. This work includes taking on roles and responsibilities like centralized logging, change control, managing code rolls, full documentation, and audit support.
Continue reading ‘PCI Compliance Management: What To Expect’
It seems obvious that better trained employees will have a positive impact in any business. Yet, a recent survey by Accenture found that 35% of executives say they have not invested enough in training to develop the skills they need, and 64% anticipate loss of revenue due to this skill gap
Continue reading ‘Why Education and Certification Matters for Tech Service Providers’
As Director of Compliance and Security services at Layered Tech since 2008, I have seen our Compliant Services business grow significantly during that time. With that growth, there has been a noticeable phenomenon related to our startup clients who have reached an attractiveness level high enough to become acquisition targets.
We are in a unique position to see this happen from start to finish. It is a behind-the-scenes supporting role where our economy of scale and simplified audit-service goals lend upward momentum. I have seen this happen several times, including with Layered Tech itself. It is a topic that deserves some background, so let me lay out an example of what I mean.
Continue reading ‘Startups That Fly – Layered Tech’s Role’
I’m excited to update you on the progress and status of Layered Technologies (LT) Inc. as we begin the fourth quarter of 2013.
Continue reading ‘Q4 Update From Layered Tech CEO Jack Finlayson’
The PCI DSS (Payment Card Industry Data Security Standard) is in a release cycle this year, meaning version 3.0 will be released shortly. At this year’s recent Community Meeting of the PCI Security Standards Council, much discussion centered on the new version of the standard, which is why both me and our Chief Risk Officer, Jeff Reich, attended.
Continue reading ‘Preparing for New Payment Card Industry Data Security Standards’
I have seen a shift in responsibility for overseeing and managing applications. Application monitoring and management is increasingly moving from application architects and developers and into IT operations. Our clients’ IT management folks are expected to be responsible for ensuring application health and performance and therefore are increasingly relying upon Layered Tech to provide management information and dashboard.
Continue reading ‘What You Need To Know About Application Performance Management’
Some of you might remember the movie Marathon Man starring Dustin Hoffman as Babe. In it, he is repeatedly questioned by the former Nazi SS dentist, Dr. Christian Szell and asked, “Is it safe?”
Christian Szell: Is it safe? Is it safe?
Babe: You’re talking to me?
Continue reading ‘Is It Safe?’
Every customer running revenue-critical business applications should consider adding application performance monitoring and management. For this reason, we have taken our experience deploying application performance monitoring tools for our customers and released a standard managed solution. Our new Application Performance Management (APM) service, powered by AppDynamics, offers a “managed with” model in which we integrate APM with our customers’ managed hosting and cloud service. We handle the deployment, configuration, monitoring and assist clients with utilizing the APM solution.
Continue reading ‘Should You Care About Application Performance Management?’
With the prevalence of cybercrime, governments have enacted laws; organizations have established standards; and companies such as Layered Tech have implemented considerable administrative, technical, and physical controls on information security to protect the confidentiality, integrity, and availability of data.
Continue reading ‘Layered Tech Commitment to Privacy Continues with Safe Harbor Recertification’
At the 2013 Electronic Transactions Association (ETA) Annual Meeting and Expo in New Orleans recently, I had the opportunity to give a presentation on Hacktivism titled Managing Risk for Online Threats and Hacktivism Actions. Attending these shows allows me to experience a little bit of local culture (the food and the venue were awesome), network with colleagues and learn about what is trending in the cloud space. I’m not surprised that the trending theme this year revolved around mobile technology.
Continue reading ‘ETA Eye Openers’