"I was surprised by the amount of traffic we were able to pass if we were limited in the past without knowing how much. With Cloudride's solution, we were able to provide continuous fast traffic and a larger number of users, especially during this time that all the studies went to video."
Eyal Knaan CTO Classboost
“Cloudride has supported us in building a robust and flexible IoT solution that is ready to scale as our business expands. We have come to trust and rely on their Cloudride professionalism for AWS architecture.”
Haim Baron CEO RFKeepr
“The collaboration with Cloudride helped speed Theator’s time to market with the security audits as well as new Theator services.”
Dotan Asselmann CEO Theator
”Cloudride experts acknowledge our company's infrastructure development process and architect a solution tailor-made for our needs. Their work was a crucial milestone that enabled us to scale our engineering teams and systems in step with our rapid growth.”
Miki Schnarch VP R&D Kioxia
"Cloudride gives you the feeling that they are really willing to go above and beyond. They are driven by providing value and results and are simply willing to take those extra steps that differentiate between a supplier and a partner"
Aviel Dahan Global IT Director Radwin
"The process was a great time-saving experience. For us to take something solid to the council for approval was a pain-free process, and I look back at it and think that the selection of the IT Policy system was absolutely the right call on our behalf. A new era. Whatever digital future demands, we will keep developing the right solutions for our customers."
Oded Har-Tal CTO DataRails
Jun 10, 2021 10:54:14 PM
Confidential computing is the promise of working with hypersensitive information in the cloud without anyone being able to access it, even while the data is being processed. The booming field has seen the leading cloud providers’ launch offers since 2020. Google, Intel, and similar big players have all rallied behind confidential computing for the secure exchange of documents in the cloud. To be precise, we should rather speak of a hyper-secure and, above all, secret exchange. Unlike traditional cloud security solutions that encrypt data at rest and on transit, confidential computing goes a step further to encrypt your data in processing. For businesses running operations on the cloud and the Edge, there is no shortage of potential uses of the technology, starting with the transmission of confidential documents liable to be stolen or modified, such as payment-delivery contact details between commercial partners. Or the exchange of give-and-take information between two companies through a smart contract prevents one of the partners from consulting the other's data without revealing their own.
May 31, 2021 11:59:17 PM
The cloud has changed the way of consuming and operating computing resources. More and more companies are using the cloud strategy to improve business performance and accelerate digital transformation.
May 20, 2021 5:10:27 PM
"Cloud-native" has become a concept integrated into modern application development projects. A cloud-native application is an application that has been designed specially for the cloud. Such applications are developed and architectured with cloud infrastructure and services in mind. These applications rely on services that ignore the hardware layers and their maintenance. The Cloud Native Foundation is a community of doers who push to enable more Open-Source vendor-free applications