Zero to Hero with App Service, Part 4: Migrate Applications to Azure App Service

Zero to Hero with App Service, Part 4: Migrate Applications to Azure App Service

This article is contributed. See the original author and article here.

In this installment of Zero to Hero with App Service, learn how to migrate your existing applications to App Service. If you followed parts one, two, and three then you already have an application on App Service, and you can continue to the next article.

 

Overview

 

There are multiple ways to migrate a web application to Azure App Service:

  • Redeploy code using CI/CD Pipelines, Web Deploy, or the REST APIs
  • Containerize your web application and deploy from a container registry
  • Use App Service Migration Assessment Tool to migrate your ASP.NET, PHP web applications and Linux containers

App Service Migration Assessment Tool assesses whether your web site can be moved to Azure App Service. If your web site is public, you can simply provide your URL on this website to run the assessment. You can also download and run the assistant if your web site is hosted in a private environment. Post assessment App service Migration Assessment tool allows quick and easy migration of ASP.Net & PHP web applications running on IIS, and containerized web applications running on Linux operating systems to Azure App Service.

 

Step by Step Guidance

 

Please refer to Test Deployment and  Migration Instructions for step-by-step instructions on migrating a sample ASP.NET web application to Azure App Service.

You can also refer to the Microsoft learn module for more information on how to migrate an on-premises web application App Service.

 

How the Tool Works

 

  • Online assessment of publicly accessible web application using https://appmigration.microsoft.com/assessment
  • Tool based assessment of internal web applications using the version of tool available for Windows OS and Linux OS. (Download the tool at https://appmigration.microsoft.com/readiness)
  • Based on outcome of assessment (readiness checks) you may proceed further to migrate your web application to Azure App service using App Service Migration Assessment Tool

Please read How the Assistant Works for detailed information.

 

Readiness Checks

 

The App Service Migration Assessment Tool runs multiple readiness checks. The results of the readiness checks are used to decide if your app can migrate to Azure App Service. A comprehensive list of the checks is shown below.

 

IIS Server Site Checks

 

  • Port Bindings
  • Protocol
  • Certificates
  • Location Tags
  • ISAPI Filters
  • Application Pools
  • Application Pool Identity
  • Authentication Type
  • Application Settings
  • Connection Strings
  • Framework
  • Virtual Directories

For detailed information on readiness checks and possible remediation steps, see this article.

 

Linux Container Checks

 

  • Linux Platform
  • Container Volume
  • Exposed Ports
  • HTTP Traffic

Please read Linux Container Checks for detailed information on readiness checks and possible remediation steps.

 

Database Migration and Hybrid Connections

 

App Service Migration Assistant migrates the web application and associated configurations only, it does not migrate databases. There are multiple ways to migrate databases to Azure. Some options are listed below.

Your web application on Azure App service can also connect to an existing, on-premises database using Hybrid Connections.

Hybrid Connections allow your web application to securely access resources in other networks – in this case, an on-premises database. The migration tool configures and sets up Hybrid Connections for you, allowing you to migrate your site while keeping your database on-premises. You can then migrate your database later.

 

Azure Migrate Hub Integration

 

Azure Migrate provides a centralized hub to assess and migrate on-premises servers, infrastructure, applications, and data. The Migration assessment tool allows you to sync assessment data with Azure Migrate Hub for both successful migrations and migrations with blockers.

 

gauravseth_0-1595271963323.png

 

Summary

 

Using these resources, you can easily assess the migration feasibility of your .NET, PHP, and Linux containers. Once your migration assessment is complete, use the assistant’s step-by-step instructions to complete the migration to App Service. For more information, see the links below.

 

Helpful Resources

 

  1. App Service Migration Assistant Tool Website
  2. Migration checklist when moving to Azure App Service
  3. Linux Notes
  4. Release Notes
  5. Known Issues
  6. Azure CLI
Azure Marketplace new offers – Volume 79

Azure Marketplace new offers – Volume 79

This article is contributed. See the original author and article here.

We continue to expand the Azure Marketplace ecosystem. For this volume, 82 new offers successfully met the onboarding criteria and went live. See details of the new offers below:

Applications

AccessMyLAN.png

AccessMyLAN: AccessMyLAN is a cloud-based private Access Point Name solution that’s easy to deploy and works for any SIM-enabled device (smartphone, laptop, tablet, etc.). It continually protects users by filtering out malicious content and other online threats at the source.

Ahsay Whitelabel Cloud Backup Suite for MSPs.png

Ahsay Whitelabel Cloud Backup Suite for MSPs: Ahsay Whitelabel Cloud Backup Suite is designed for managed service providers, system integrators, and IT consulting companies, and it enables them to offer secure managed backup services hosted in the cloud or on-premises.

ALM Octane.png

ALM Octane: Micro Focus ALM Octane, a comprehensive DevOps management solution, supports enterprise application delivery with high-quality criteria, continuous visibility, and delivery across the entire application lifecycle.

Aquaforest Searchlight 2 OCR.png

Aquaforest Searchlight 2 OCR: Aquaforest’s solutions designed for SharePoint and Office 365 improve search success by ensuring that site collections are text-searchable. The trial version of Aquaforest Searchlight allows unlimited auditing, which will allow you to determine how many of your PDFs are not fully searchable.

Aquaforest Searchlight 2.0 Suite (OCR and Tagger).png

Aquaforest Searchlight 2.0 Suite (OCR and Tagger): Aquaforest’s Searchlight is built to enhance searches in SharePoint and Office 365. Searchlight Tagger can automatically add metadata tags based on document content, and Searchlight 2.0 adds Azure storage options, long file paths, and time zone handling.

Arista CloudEOS Router (BYOL).png

Arista CloudEOS Router (BYOL): The Arista CloudEOS Router is a feature-rich, multi-cloud, and multi-hypervisor virtual router that empowers enterprises and cloud providers to build consistent, highly secure, and scalable hybrid networks.

Avid - Edit On Demand.png

Avid | Edit On Demand: Avid | Edit on Demand brings the collaborative power of Media Composer and Avid NEXIS to the cloud, making it easy to set up an entire post-production video-editing suite whenever and wherever it’s needed.

Bluesource Cloud Locker.png

Bluesource Cloud Locker: Bluesource Cloud Locker, a scalable solution for storing legacy archive data, allows organizations to ditch aging on-premises systems and use it to store and export legacy email and PST files.

Cerberus.png

Cerberus: CryptoBLK’s Cerberus gives IT practitioners in banks, financial institutions, and blockchain/distributed ledger technology companies a cost-effective tool for real-time monitoring and alerts covering multiple blockchain applications and infrastructures.

Cloud Backup for Exchange Online.png

Cloud Backup for Exchange Online: Cloud Backup for Exchange Online is a SaaS platform hosted on Microsoft Azure that offers anytime protection for Exchange Online, OneDrive for Business, SharePoint Online, and more. Automatically back up your content up to four times a day with on-demand restore functionality.

Cloud Backup for OneDrive for Business.png

Cloud Backup for OneDrive for Business: Cloud Backup for OneDrive for Business is a SaaS platform hosted on Microsoft Azure that offers anytime protection for OneDrive for Business, SharePoint Online, Exchange Online, and more. Automatically back up your content up to four times a day with on-demand restore functionality.

Cloud Backup for SharePoint Online.png

Cloud Backup for SharePoint Online: Cloud Backup for SharePoint Online is a SaaS platform hosted on Microsoft Azure that offers anytime protection for SharePoint Online, OneDrive for Business, Exchange Online, and more. Automatically back up your content up to four times a day with on-demand restore functionality.

Cloud Double Check.png

Cloud Double Check: Habílitas’ Cloud Double Check lets you send and receive SMS and WhatsApp messages in bulk as part of an information or sales campaign. The SaaS platform is hosted on Microsoft Azure and delivers live reporting at each stage of your campaign. This application is available only in Spanish.

Cloudentity Authorization Control Plane - VM.png

Cloudentity Authorization Control Plane – VM: Cloudentity’s Authorization Control Plane delivers a rich authorization layer providing continuous and contextual security for your users, APIs, and services. Easily detect and prevent misuse of your APIs via a threat intelligence dashboard that provides insight across your application ecosystem.

CRP ERP and unlimited billing.png

CRP ERP and unlimited billing: Crol is a complete cloud enterprise resource planning solution offering unlimited billing and AI and business intelligence for small and medium-sized enterprises in Mexico. This application is available only in Spanish.

Data Management for Regulatory Reporting.png

Data Management for Regulatory Reporting: Analytium’s Data Controller helps banking, finance, insurance, and telecom organizations manage, process, and validate data for effective reporting and analytics. The web application lets users understand and monitor data and create reporting in complex and regulated industries.

Defend and Recover- Secure Azure with CSOC.png Defend & Recover: Secure Azure with CSOC: Secure Azure is an integrated Microsoft Azure and cybersecurity management solution based in the U.K. that aligns your cloud management to the Microsoft Cloud Adoption Framework, enabling you to address threats through Azure Sentinel and delivering managed threat detection and response.
Demand Planning and Forecasting and Replenishment for Auto parts.png

Demand Planning & Forecasting & Replenishment for Auto parts: Obase’s automated spare parts replenishment solution helps organizations transform data into actions for the toughest supply chain challenges. Adapt your inventory management processes to the fast-changing automotive industry and more accurately forecast inventory.

Devolutions Password Hub.png

Devolutions Password Hub: Devolutions Password Hub is a secure, cloud-based password manager for teams. It empowers organizations to easily vault and manage user passwords, along with other sensitive information, through a user-friendly web interface that can be quickly and securely accessed via any browser.

GeoServer on Windows Server 2016.png

GeoServer on Windows Server 2016: GeoServer on Windows Server 2016 is an open-source software server written in Java that allows users to share and edit geospatial data. Designed for interoperability, GeoServer publishes data from any major spatial data source using open standards.

GeoServer on Windows Server 2019.png

GeoServer on Windows Server 2019: GeoServer on Windows Server 2019 is an open-source software server written in Java that allows users to share and edit geospatial data. Designed for interoperability, GeoServer publishes data from any major spatial data source using open standards.

ITM SPO - Standalone VM.png

ITM SPO – Standalone VM: International Trust Machines Corporation (ITM) addresses the issue of convergence in blockchain technology and the Internet of Things (IoT) with a practical, scalable solution that leverages blockchain to provide data security, data integrity, and data traceability for IoT.

Joget DX Low Code Platform - RHEL - 10 users.png

Joget DX Low Code Platform – RHEL – 10 users: Joget is an open-source no-code/low-code application platform for fast, simple digital transformation. Joget combines business process automation, workflow management, and rapid application development to empower non-coders to quickly build and maintain apps anytime, anywhere.

Joget DX Low Code Platform - Ubuntu - 10 users.png

Joget DX Low Code Platform – Ubuntu – 10 users: Joget is an open-source no-code/low-code application platform for fast, simple digital transformation. Joget combines business process automation, workflow management, and rapid application development to empower non-coders to quickly build and maintain apps anytime, anywhere.

MiX Portal Software as a Service.png

MiX Portal Software as a Service: Advanced Mine Management Systems’ MiX is a self-service SaaS portal that facilitates near real-time streaming of siloed system data to Microsoft Azure IoT Hub. Ingest data into analytics and reporting to help make informed decisions and be proactive instead of reactive.

Modern Data Mart.png

Modern Data Mart: Modern Data Mart enables users to build a simple data-loading process or a modern data warehouse in the cloud. Integrate your data sources and optimize data ingestion using the Ralph Kimball methodology for data warehousing. This application is available in German.

Odoo 13 On Ubuntu 18.04 With Nginx.png

Odoo ERP CRM to consolidate your operations: Odoo is an open-source enterprise resource planning (ERP) and customer relationship management (CRM) platform that can consolidate a variety of business operations, from supply chain and project management to accounting and human resources.

Oracle DB in Azure.png

Oracle DB in Azure: Advatech Sp. z o.o. offers fast and easy online backup of Oracle Database on Microsoft Azure with cloning functionality. Back up Oracle Database according to Oracle recommendations and without downtime or performance impact on your production systems. This application is available in English and Polish.

Payruler Software as a Service.png

Payruler Software as a Service: Payruler is a comprehensive, web-based HRMS and payroll system locally built for Philippine businesses and tax structure. It covers the entire employee lifecycle from recruitment to retirement. Digitally transform your HR and payroll processes with Payruler.

Red Canary for Microsoft Defender ATP.png

Red Canary for Microsoft Defender ATP: Red Canary’s partnership with Microsoft brings exceptional security operations to teams using Microsoft security products. Red Canary for Microsoft Defender ATP supercharges the Microsoft Defender ATP endpoint protection platform with the Red Canary Managed Detection & Response offering.

SecurityScan Pack.png

SecurityScan Pack: Extend Solutions SA de CV’s SecurityScan Pack reduces vulnerability gaps to prevent information breaches, identity theft, and fraud. It identifies top security threats and provides a comprehensive vulnerability analysis with references and recommendations for better protection.

Shoptimize.png

Shoptimize: Shoptimize is an AI-powered, end-to-end e-commerce platform that delivers everything required to launch and grow an e-commerce store. Configure your store’s UI and UX, integrate payment gateways and logistics partners, and leverage market intelligence to attract and retain customers.

SMART OaaS General Production Environment.png

SMART OaaS General Production Environment: Mint Management Technologies’ SMART OaaS General Production Environment is a secure and cost-effective solution that combines Microsoft Azure services, Azure Blueprints, and proactive migration strategies and execution for continuous modernization of applications.

Spaceti.png

Spaceti: Spaceti’s property technology solution includes software that analyzes a building’s indoor environment, a mobile app for people in the building, and Spaceti’s proprietary IoT sensors. Get a precise overview of air quality along with the occupancy of individual workspaces, meeting rooms, and parking spaces.

SUNSPOTS Governance Mapping and Security Management.png

SUNSPOTS Governance Mapping & Security Management: SUNSPOTS.cloud is a multi-cloud, AI-powered SaaS platform for real-time infographics, mapping, and management of your organization’s governance and security. Automatically scan your cloud workloads and convert the data into easy-to-understand visual graphic maps.

Sync Public Folder Calendars to Smartphones.png

Sync Public Folder Calendars to Smartphones: The CiraSync platform automatically syncs the Office 365 GAL, shared calendars, public folder contacts and calendars, and CRM data to Exchange so that you can access accurate, up-to-date contacts and calendars on your iPhone or Android smartphone.

Sync Shared Calendars to Smartphones.png

Sync Shared Calendars to Smartphones: The CiraSync platform automatically syncs the Office 365 GAL, shared calendars, public folder contacts and calendars, and CRM data to Exchange so that you can access accurate, up-to-date contacts and calendars on your iPhone or Android smartphone.

Sync Shared GAL Contacts and Calendars to Smartphones.png

Sync Shared GAL Contacts & Calendars to Smartphones: The CiraSync platform automatically syncs the Office 365 GAL, shared calendars, public folder contacts and calendars, and CRM data to Exchange so that you can access accurate, up-to-date contacts and calendars on your iPhone or Android smartphone.

Sync the Global Address List to Office 365 Smartphones.png

Sync the Global Address List to Office 365 Smartphones: The CiraSync platform automatically syncs the Office 365 GAL, shared calendars, public folder contacts and calendars, and CRM data to Exchange so that you can access accurate, up-to-date contacts and calendars on your iPhone or Android smartphone.

Syncier Marketplace Private Area.png

Syncier Marketplace Private Area: Based on the Syncier Marketplace, a public marketplace for the insurance industry, Syncier Marketplace Private Area enables users to create, manage, and exchange API services across their organization. Syncier Marketplace Private Area is fully connectable to existing API gateways and IAM infrastructures.

Tag bio's COVID Financial Recovery for Providers.png

Tag.bio’s COVID Financial Recovery for Providers: During the COVID-19 pandemic, healthcare providers have seen a change in the populations and volumes of patients seeking care. The Tag.bio platform leverages an organization’s billing and electronic medical record data to inform decisions that will help improve financial recovery from the COVID-19 crisis.

The Kingdom Software.png

The Kingdom Software: Integrating geology, geophysics, log analysis, spatial data, analytics, and machine learning into a single application, IHS Markit’s Kingdom is an easy-to-use solution for the evaluation of subsurface data to resolve the complexities of reservoirs.

Theator Surgical Intelligence platform.png

Theator Surgical Intelligence platform: Powered by visual AI, Theator’s Surgical Intelligence platform puts defining intraoperative moments in the hands of surgeons so that they can continuously hone their craft. Theator is paving the path for real-time surgery decision support while helping create a stronger, healthier world today.

Truck Scheduler.png

Truck Scheduler: Truck Scheduler from Ceteris AG makes use of existing solutions that monitor traffic to calculate the estimated time of delivery at the destination. As soon as the planned time can no longer be met, Truck Scheduler sends update notifications automatically. This application is available only in German.

Trusted Token.png

Trusted Token: Envision Blockchain Solutions’ Trusted Token came out of the Enterprise Ethereum Alliance (EEA) Trusted Execution Working Group’s Devcon 5 presentation and uses reputation, reward, and penalty tokens to incentivize participation of member organizations and their employees in EEA groups.

Unravel for Azure Databricks Subscription Service.png

Unravel for Azure Databricks Subscription Service: Unravel for Microsoft Azure Databricks is a monitoring, tuning, and troubleshooting tool for big data running on Azure Databricks. Unravel provides granular chargeback and cost optimization for Azure Databricks workloads and can help evaluate cloud migrations from on-premises Hadoop to Azure.

Vormetric Data Security Manager v6.4.2.png

Vormetric Data Security Manager v6.4.2: The Vormetric Data Security Manager (DSM) from Thales eSecurity provisions and manages keys for Vormetric Data Security Platform solutions, including Vormetric Transparent Encryption, Vormetric Tokenization with Dynamic Data Masking, Vormetric Application Encryption, and Vormetric Key Management.

Webee Visual IoT.png

Webee Visual IoT: Webee is a next-generation Industrial IoT solution to increase the visibility, sustainability, and efficiency of industrial operations. Deploy end-to-end solutions in minutes with Webee’s no-coding, end-to-end toolset powered by AI, IoT, and computer vision.

Workspace 365.png

Workspace 365: Workspace 365 simplifies work with an adaptive workspace, adjusting to people’s roles, locations, devices, and browsers to offer a personalized experience. Take away the clutter and surface what’s important to each employee with Workspace 365.

Xalok - CMS Content Management.png

Xalok – CMS Content Management: Designed by and for journalists, Xalok allows users to edit texts, photos, videos, and graphics simply and quickly. Features include live image editing, easy multi-file upload management, automatic taxonomy, advanced search, metadata modeling, and live video. This application is available in Spanish.

Consulting services

[dot]NET to Azure OpenShift 4-Week Proof of Concept.png

.NET to Azure OpenShift 4-Week Proof of Concept: In this proof of concept, Perficient will get your ASP.NET app running in an Azure Red Hat OpenShift cluster. Having your app in a fully managed Kubernetes cluster on Azure will set it up beautifully for a microservices architecture moving forward.

1 hour Briefing on Azure Automation with Novunex.png

1 hour Briefing on “Azure Automation with Novunex”: Insight Direct (UK) Limited’s briefing will help you determine how your company can benefit from Microsoft Azure automation and the Novunex platform, a low-code/no-code solution for business processes.

Application Migration- 3-Week Assessment.png

Application Migration: 3-Week Assessment: This assessment from Applied Cloud Systems will identify applications that may be candidates for migration to Microsoft Azure. Let Applied Cloud Systems reduce your dependency on on-premises infrastructure and lower your costs.

Application Modernization 2-Day Workshop.png

Application Modernization 2-Day Workshop: Softlanding’s workshop will provide an overview of Microsoft Azure Platform-as-a-Service and help you modernize your applications using Azure and Microsoft Power Apps to meet your business objectives.

Application Modernization Assessment - 6 Weeks.png

Application Modernization Assessment – 6 Weeks: WinWire Technologies will review your applications with the aim of optimizing your business and cloud investments. The process will involve envisioning, consulting, and scoping sessions, along with workshops and application information discovery.

Azure Application Development- 10-Day Workshop.png

Azure Application Development: 10-Day Workshop: Tech Fabric LLC’s workshop will help you implement development strategies to automate business processes, safely connect data, eliminate manual work, and delight users with custom software solutions and the power of Microsoft Azure.

Azure Cost Optimization Audit (3-Day Assessment).png

Azure Cost Optimization Audit (3-Day Assessment): Forward-thinking organizations using Microsoft Azure are continually looking at ways to optimize costs and reinvest the savings into projects and initiatives that drive innovation. Hanu’s free assessment aims to save you 15 percent or more on your next Azure bill.

Azure Data Platform - 1 Hour Briefing.png

Azure Data Platform – 1 Hour Briefing: endjin’s briefing will increase your knowledge of the Microsoft Azure data ecosystem and is intended for chief technology officers, IT directors, and leaders of development, data, reporting, or AI.

Azure DevOps Innovate - 2-day Workshop.png

Azure DevOps Innovate – 2-day Workshop: In this hands-on workshop, Equinox Limited will help you transform your development business with Microsoft Azure DevOps. Equinox Limited will give your team an overview of CI/CD with pipelines, automation, and testing.

Azure MFA 4-hour workshop.png

Azure MFA 4-hour workshop: This workshop from edgemo will focus on Microsoft Azure Multi-Factor Authentication (MFA) and Conditional Access. edgemo will also cover best practices, implementation of Conditional Access policies, and rollout planning.

Azure Migration Discovery- 2 Hour Assessment.png

Azure Migration Discovery: 2 Hour Assessment: In this complimentary assessment, Parallo’s solution architects will examine your application and determine your ideal migration and modernization pathway to Microsoft Azure.

Azure Sentinel 4-hour workshop.png

Azure Sentinel 4-hour workshop: edgemo’s workshop will focus on Microsoft Azure Sentinel and help you put together a functional solution gathering telemetry from Active Directory, Azure Active Directory, and Office 365 to give you insight into user logins on your systems.

Capture and Consult- 4-Wk CAF Cloud Assessment.png

Capture & Consult: 4-Wk CAF Cloud Assessment: In this assessment, Six Degrees Technology Group Ltd. will deliver a quantitative and qualitative analysis for migrating to Microsoft Azure or optimizing your Azure environment to control cost, enhance performance, and minimize risk.

CIO- 1 hour cloud and DC transformation consultation.png

CIO: 1 hour cloud & DC transformation consultation: Insight Direct (UK) Limited’s briefing will guide you on your path to the cloud and demonstrate how you could benefit from a range of available services. This offer is available in German.

Cloud and DC Transformation Advisory 1 Hour Briefing.png

Cloud & DC Transformation Advisory 1 Hour Briefing: Insight Direct (UK) Limited’s briefing will guide you on your path to the cloud and demonstrate how you could benefit from a range of available services.

Cloud Adoption Framework- 1-2 Week Implementation.png

Cloud Adoption Framework: 1-2 Week Implementation: Applied Cloud Systems will put into place a framework so you can easily request and access cloud resources. Team members will be given access to the breadth of allowed cloud resources within compliance and budget constraints.

Cloud Readiness Assessment- Two Week Assessment.png

Cloud Readiness Assessment: Two Week Assessment: In this engagement, Logicalis Inc. will analyze your IT assets and non-Microsoft Azure workloads, then present you with an assessment of the cost and effort it would take to move them to the cloud.

Cloud Security Assessment- Two Week Assessment.png

Cloud Security Assessment: Two Week Assessment: Logicalis Inc. will analyze your Microsoft Azure environment and compare it against best practices for security, performance, agility, scale, and cost. Logicalis will then offer prioritized remediation steps.

Customer Insights- 5-Wk Implementation.png

Customer Insights: 5-Wk Implementation: This package from Best Practices Consulting will implement Microsoft Dynamics 365 Customer Insights so you can obtain a unique view of your customers and discover insights that allow you to create a personalized experience.

DevOps App Mod with GitHub and Azure- 4wk Imp..png

DevOps App Mod with GitHub & Azure: 4wk Imp.: InCycle Software will deliver key DevOps patterns and practices using GitHub repositories, CI/CD delivery with GitHub Actions, and artifact management with GitHub Packages. Also included is a proof-of-concept implementation of Dev/Test environments on Azure.

Enterprise App Dev- 8-Week Proof of Concept.png

Enterprise App Dev: 8-Week Proof of Concept: Solutions to specific business needs are not always provided by off-the-shelf software. AgileThought can help you with custom-developed software built upon Microsoft Azure DevOps and Azure Kubernetes Service.

ExpressRoute Consulting Svcs- 8-wk Implementation.png

ExpressRoute Consulting Svcs: 8-wk Implementation: CenturyLink’s professionals will assess, architect, and implement a Microsoft Azure ExpressRoute solution with Cloud Connect to accelerate your network maturity.

Financial Cash prediction with Azure ML- 8 Weeks PoC.png

Financial Cash prediction with Azure ML: 8 Weeks PoC: verovis GmbH’s proof of concept will enable clients to make cash management projections based on historical liquidity data. Data from the customer’s ERP system will be fed into self-developed models implemented with Azure Machine Learning and more.

Free 1 Day Product 360 Workshop - Contact Us Offer.png

Free 1 Day Product 360 Workshop – Contact Us Offer: Agile Solutions GB Ltd.’s workshop will identify business use cases, infrastructure requirements, Azure architecture, and delivery structure for a fully customized Product 360 data management solution.

Insight - ADS Foundations- 5-wk Implementation.png

Insight – ADS Foundations: 5-wk Implementation: Insight will conduct at least two workshops with your stakeholders, then will design and implement your Microsoft Azure data platform configured to a repeatable framework that is extensible for scalability.

Kickstart Cloud for ISVs - 2-Hr workshop.png

Kickstart Cloud for ISVs – 2-Hr workshop: Take the first step toward cloud success with Equinox Limited’s workshop, which will help you plan to move to the cloud, enable DevOps, and put your business on the path for continuous improvement.

KoçSistem Azure Data Factory.png

KoçSistem Azure Data Factory: Let KoçSistem manage Microsoft Azure Data Factory for you. KoçSistem’s team will conduct performance monitoring, resource lock management, and more. Simplify ETL at scale with this hybrid data integration service.

Mass Data Processing-IoT Integration-3 day Workshop.png

Mass Data Processing-IoT Integration: 3 day Workshop: After this workshop by Gfi Poland Sp. z o. o., attendees will understand the general architectural patterns of IoT systems and how Microsoft Azure services can accelerate business.

Modern Data Platform- 10-Wk implementation.png

Modern Data Platform: 10-Wk implementation: Over 10 weeks, Hitachi Solutions will implement its Modern Data Platform, a solution built for self-service analytics. Modern Data Platform can be a catalyst for change in the way you create, consume, and communicate information.

Regain Control Over Cloud Costs- 5-Day Assessment.png

Regain Control Over Cloud Costs: 5-Day Assessment: Objectivity Ltd.’s assessment is intended for companies that have migrated – or are migrating – their IT solutions to Microsoft Azure and are now seeking to optimize costs.

Windows Virtual Desktop (WVD) 2-Day Assessment.png

Windows Virtual Desktop (WVD) 2-Day Assessment: Is your organization considering Windows Virtual Desktop? This assessment by Spartan Systems Limited will help you determine how Windows Virtual Desktop could be implemented for maximum benefit.

Windows Virtual Desktop- 2-week Implementation.png

Windows Virtual Desktop: 2-week Implementation: DXC, formerly known as eBECS Limited, will deliver a remote desktop and application virtualization environment for your business needs. This scalable service offering enables the deployment and management of Windows Virtual Desktop on Microsoft Azure.

Disaster Preparation and Recovery Plan

Disaster Preparation and Recovery Plan

[vc_row css_animation=”” row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” angled_section=”no” text_align=”left” background_image_as_pattern=”without_pattern”][vc_column][vc_column_text]Hurricane season is here again and, if you haven’t already, it is time for your company to review your disaster plan. The list below is intended to help you put your business’ plan in place. It might seem overwhelming so please Contact us if you need assistance!

Protecting important information and documents

  1. Make a list of crucial organization contacts important (such as a list of employees, your insurance company, bankers, suppliers, lawyers, accountants, etc.) to your organizations and secure duplicate copies (paper, smart phone, cloud storage, etc.)
  2. To avoid water damage, back-up (to multiple sources) vital records and documents (i.e. accounting statements, insurance documents, legal contracts, tax returns) that are not easily reproduced. Store paper copies in a water and wind-proof location; store electronic copies off-site or in cloud storage.

Hardware and equipment

Before the storm inventory all hardware and software.
When it is determined the stores will be closed or there is an evacuation:

  1. Move all registers, printers, routers, floor mounted displays, and other non-mounted hardware to the place with the highest elevation.
  2. Wrap each piece of equipment in a trash back and make sure it is air tight.
  3. Staff should take laptops, tablets, phones with them if they evacuate to a safe place.
  4. Document the location of each piece of equipment and where it’s from.
  5. No equipment should be left plugged in.

Advance preparations

  1. Arrange for cleanup, repair, and restoration services for your facility with reputable firms outside of your immediate area, well in advance. This is very important since many organizations will probably be calling upon the same local clean-up services; you’ll be well-served by planning for your organizations clean-up beforehand.
  2. Establish a hurricane preparedness and response plan customized to your organization’s unique location, construction, operations and resources.
  3. Consider establishing a mutual aid agreement with an organization similar to yours that is located outside the storm’s impact area to share resources and serve as a possible evacuation site.
  4. Photograph the exterior and interior of your building as well as the contents. Store photos in a protected location, or email them to yourself to help document any loss.
  5. Notify your employees of the procedures that will take place in the event a hurricane warning or watch is issued.
  6. Address access to your facility after the storm. This may require contacting public authorities for official identification badges to enter what may become a restricted area.
  7. Determine what furnishings or major equipment will need to be protected or moved and document how you plan to accomplish it. You’ll have to decide if you want to try to protect them in place or move them out of the area at risk. Determine what manpower and any equipment you will need to get this done. If you’re planning to protect in place, move your equipment to well-protected interior rooms or the floors above the anticipate flooding level.
  8. Identify outside furnishings and equipment such as trash cans, signs, furniture, awnings, etc., that could be blown about and become “deadly projectiles” and determine either how they will be secured or where they will be stored.
  9. Make sure that any of your facility’s rooftop equipment such as air conditioning units, antennas, exhaust fans or turbines are firmly secured or strapped down to the roof structure (e.g., the joists) to withstand high winds.
  10. Ensure you have the necessary tools to board up windows and brace doors. The first priority in protecting your facility will be to keep the wind out. Wind pressure and windblown debris can break windows and blow in doors. Sliding glass doors, large picture windows, skylights, French doors, inward opening double doors, and garage doors are particularly vulnerable. Such tools as a circular or hand saw, a drill with appropriate bits, a hammer or nail gun, hand or power-driven screwdriver, and a wrench may be needed. Nails will be sufficient on wood-framed windows and doors but screws or bolts and washers are necessary for metal-framed windows and doors.
  11. Ensure that your staff knows how to turn off the utilities (gas, water, electricity) for your buildings at the main shut off switches.

Action Items – If evacuation is recommended by local officials:

  1. Close your operations and business.
  2. Revise telephone answering system to inform callers of facility closure.
  3. Transfer essential business records and valuables (if you haven’t done so already) to a safe location out of the evacuation area.
  4. Where possible, move furnishings away from exterior windows and doors and as many items as possible off the floor.
  5. Move expensive equipment out of the area or move it to the most heavily constructed interior area of you facility. If your locale is subject to surge flooding, move your equipment to floors above the anticipated surge level. Cover equipment that can’t be moved with plastic sheeting to minimize damage from leaking roofs or broken windows.
  6. Conduct an orderly shutdown of your computer(s) and sensitive electrical equipment and disconnect and unplug nonessential equipment to protect from damage caused by power surges immediately before or after an outage.
  7. Brace exterior doors that open inward and brace any roll-up doors. To prevent them from lifting from their tracks, wedge sliding doors. (Do not block emergency exits.)
  8. If you have storm shutters, close and lock them. If not, close, lock and board up your large windows and glass doors. Lower blinds and close curtains to help hold back flying debris. Remove after the storm to provide adequate ventilation.
  9. Turn off electricity, gas, water, and other utility services.
  10. Find the safest place for vehicles.
  11. Make sure your staff has departed your organization before evacuation routes become impassable due to flooding or high winds.

Action Items – If evacuation is not recommended:

  1. If local officials do not recommend evacuation of your area, your facility may still experience high winds and heavy rain generated by a hurricane.
  2. Take appropriate protective measures outlined above as a guide to reduce the vulnerability of wind and heavy rain damage.
  3. Have your building maintenance staff on standby and materials ready to expedite speedy repairs.
  4. Be prepared for loss of utilities. This means having battery-powered lights, radio, a supply of potable water and, if possible, an emergency generator.
 
After the hurricane >>

Reentering evacuated areas

  1. If you evacuated your facility, you may have difficulty returning quickly because roads may be damaged, blocked by debris, or flooded in low lying areas.
  2. Access to storm-damaged areas may be limited by local law enforcement personnel to keep people out of areas with dangerous conditions, facilitate rescue and recovery work, and limit access to unoccupied properties.
  3. After the hurricane passes, entry to storm-damaged areas may be limited to search and rescue personnel, law enforcement personnel, firefighters, utility crews, and road clearing teams. Once officials determine it is reasonably safe, property owners and essential employees will be cleared to enter the area, but they may be required to have a permit or pass, or be included on an access list maintained by the city. Contact your local emergency management office to determine the procedures for returning to storm-damaged areas.
  4. Listen to your radio or television stations (or check the internet if possible) and return only after an “all clear” is issued by authorities. Drive only if absolutely necessary, and avoid flooded roads and washed out bridges. Driving may be especially hazardous due to debris on the streets, emergency vehicles in operation, and nonworking traffic and street signals.

Checking your facility

  1. Enter your facility with caution. Beware of insects, snakes and animals driven to higher ground by flood waters.
  2. As soon as possible after the storm, assess any damage and look for obvious structural damage to your facility and its foundations. If you see significant damage, don’t attempt to enter the affected building. Also inspect the roof, roof mounted equipment, walls, doors and windows (outside and inside).
  3. If possible, cover up openings in the building shell with plastic sheeting or tarpaulins.
  4. Identify immediate hazards, such as downed or dangling electrical lines, leaking gas, broken sewers, flammable liquids (or other hazardous materials) and broken water pipes on your property. Exercise extreme caution and stay away from downed power lines and broken sewer lines. Do not take lanterns, torches or any kind of open flame into a damaged building as there may be leaking gas or other flammable materials present. Report any damage to power, water or wastewater equipment to your utility company.
  5. Make sure the electrical outlets and appliances throughout your facility are dry and free of water before turning the power back on. If you have any doubt about the condition of wiring or appliances, have an electrician check them to make sure there are no short circuits.
  6. Clean up debris, remove water.
  7. Clean roof drains and remove debris to prevent drainage problems.
  8. Use fans to speed the drying process. Do NOT use heaters.

[/vc_column_text][/vc_column][/vc_row]

What is Anti-virus and How Does It Work?

What is Anti-virus and How Does It Work?

While anti-virus is an important part of your security, it cannot detect or stop all attacks. Ultimately, you are the best defense, not just technology.

Overview

Anti-virus is a security program you install on your computer or mobile device to protect it from getting infected by malware. The term “malware” is a catch-all phrase for any type of malicious software, such as viruses, worms, Trojans and spyware. In fact, the term malware comes from combining the words malicious and software. If your computer has become infected by malware, a cyber attacker can capture all of your keystrokes, steal your documents or use your computer to attack others. Contrary to what some people believe, any operating system, including Mac OS X and Linux, can be infected.

You can purchase anti-virus software as a standalone solution or it is often included as part of a security package. The problem is that anti-virus can no longer keep up with cyber attackers; they are constantly developing and releasing new types of malware. There are so many new versions of malware released every day that no anti-virus program can detect and protect against all of them. This is why it is important for you to understand that while anti-virus will help protect your computer, it cannot detect or stop all types of malware. To better understand better why, let’s look at how most of these programs work.

How Anti-Virus Works

In general, there are two ways anti-virus software identifies malware: signature detection and behavior detection. Signature detection works like the human immune system. It scans your computer for characteristics or signatures of programs known to be malicious. It does this by referring to a dictionary of known malware. If something on your computer matches a pattern in the dictionary, the program attempts to neutralize it. Like the human immune system, the dictionary approach requires updates, like flu shots, to protect against new strains of malware. Anti-virus can only protect against what it recognizes as harmful. The problem is that cyber attackers are developing new malware so fast that anti-virus vendors cannot keep up. As a result, no matter how recently your anti-virus was updated, there is always some new variant of malware that can potentially bypass your anti-virus software.

With behavior detection, anti-virus does not attempt to identify known malware, but monitors the behavior of software installed on your computer. When a program acts suspiciously, such as trying to access a protected file or to modify another program, behavior-based anti-virus software spots the suspicious activity and alerts you to it. This approach provides protection against brand new types of malware that do not yet exist in any dictionary. The problem with this approach is that it can generate false warnings. You, the computer user, may be unsure about what to allow or not allow and become desensitized to all those warnings over time. You might be tempted to click on “Accept” on every warning, leaving your computer open to attack and infection. In addition, by the time the behavior is detected, the malware most likely has already run on your machine and you may not know what actions the malware took before the anti-virus software identified it.

Anti-virus is an important part to securing your computer and mobile devices. Whenever possible, we recommend you install and actively use it. However, the key point to remember is that regardless of how your anti-virus works, it can never protect you from all types of malware. Ultimately, you, and not just technology, are the best defense against today’s cyber attackers.

 

Anti-Virus Tips

  1. Obtain anti-virus software only from known, trusted sources and vendors. It is a common ploy of cyber attackers to distribute fake anti-virus programs that are really malware.
  2. Make sure you have the latest version of your anti-virus software installed, that your annual subscription is paid for and active and that your anti-virus is configured to update automatically. If your computer has been offline or powered off for a while, your anti-virus software will need to update itself when you turn it back on or reconnect it to the Internet. Do not postpone these updates.
  3. Make sure your anti-virus automatically scans portable media, such as USB sticks, and ensure real-time protection is on.
  4. Pay attention to the on-screen warnings and alerts generated by your anti-virus software. Most alerts include the option of getting more information or a recommendation about what to do next. If you get an alert on a work-supplied computer, be sure to contact the help desk or your supervisor immediately.
  5. Do not disable or uninstall your anti-virus software because you feel it is slowing down your computer, blocking a website or preventing you from installing an app or program. Disabling your anti-virus will expose you to unnecessary risk and could result in a serious security incident. If problems persist on a work computer, contact your help desk. If the problems persist on your personal computer, try contacting the anti-virus vendor, visiting their website for more information or replacing your anti-virus with another product.
  6. Do not install multiple anti-virus programs on your computer at the same time. Doing so will most likely cause the programs to conflict with each other and may actually reduce the security of your computer.
  7. Learn to recognize the warnings that your anti-virus software produces. Cyber attackers can set up malicious websites that post very realistic but fake anti-virus warnings and offer to help you “fix” your computer. Clicking on the links or buttons on these websites can actually harm your computer.

This article is from the December Issue of OUCH! by SANS Institute