Private clouds are cheaper and safer than public clouds

The choice of using private or public cloud solutions take into account many factors, and while price is an important one, it fights value, customer experience, and functionality for its place on the top three decision points to purchase.

When it comes to using cloud computing as part of your overall IT stack, the potential benefits are clear – scalability and responsiveness to ever-evolving business conditions are very attractive to those wishing to eliminate the capital expenditures and ongoing maintenance on-premises infrastructure require.

One of the common perceptions in cloud computing is a public cloud (from vendors such as Amazon, Microsoft, or Google) is much cheaper than spinning up private clouds. A new study from 451 Research finds that, as with many aspects of cloud computing, there is more than meets the eye. Beyond the inherent security issues with putting your sensitive information in public clouds, there are situations in which using private clouds are cheaper than public clouds.

When software-as-a-service rose in popularity, one of its major tenets was transparent, simple pricing. However, as the use cases for cloud computing grew in scope and complexity, so has pricing. The final bill for a cloud solution is quite complex, dependent on a number of factors such as deployment size, type, included workloads, labor costs, and utilization rates.

Private cloud solutions can be more cost-effective than public cloud solutions if you are certain of your utilization rates and labor efficiencies. The most important metric influencing this result isn’t necessarily volume or the number of virtual machines your company runs. Rather, it’s labor efficiency. Think about the number of engineers it would take to run virtual machines: 451 Research found when labor efficiency is beyond 400 virtual machines per engineer (400:1), all private cloud options become cheaper than public cloud.

Again, price is just one factor. It’s vital you continue to weigh security, privacy, and long-term strategy into any cloud computing purchasing decision. Generally, workloads attaining a high level of utilization, containing sensitive information, and easy to manage are best suited for private clouds. Variable workloads difficult to manage could be better for public clouds.

Ultimately, you may decide you need a mix of both to meet your specific business needs. The most important takeaway is you don’t have to throw security and privacy into the wind just to save money by using public clouds, because they may end up being more expensive in the long run.

Tired of the ambiguities in pricing, security, and privacy? At, we removed the complexity in pricing and management because our mission is to bring confidentiality, integrity, availability, safety, reliability, and efficiency to every interaction with you. We come to work every day because we want to partner with you and keep you secure from the constant onslaught of cyberattacks pervading our world today – not to wrap you up in a complex pricing structure leaving you wondering what you pay for each month.

We’ve built the private sector’s only counter intelligence team and next-generation secure infrastructure to offer a 24/7 managed service that protects, detects, and rapidly responds to cyberattacks with simple, transparent pricing. Not only do we protect you from hackers like no other, we also deliver tremendous cost efficiencies of up to 77 percent.

Keep the rest of the world out of your business. Fill out this form for a quote.

Posted in Cloud Hosting, Cyber Security | Tagged , , , , , | Leave a comment

How much space is remaining in my SharePoint site?

To analyze content disk space in SharePoint you could go through the trials of finding the Quota (if it is configured), finding the content database location, and examining the database. That will absolutely work, but what if you want to do it faster, and get some more valuable information?

Introducing WinDirStat! Well, this isn’t its first introduction; we also wrote about how to use this WinDirFul tool in the past. If you are unfamiliar with this tool, feel free to read that blog first, or watch the Amazing Joe Bohac give a spectacular visual walkthrough.

Try these steps out.

  1. You are going to want to map your site as a network drive. To map a Network Drive:
    1. Open ‘My computer‘
    2. Unfocus any selected drives and then click ‘Map Network Drive‘
    3. Select the drive letter that you want to use
    4. Under ‘Folder‘, enter the URL to the SharePoint library, ie. ‘ Documents’ (Please Note that you do not include the page name, ie. allitems.aspx, or the drive will fail to map properly)
    5. Click Finish.
      1. Notice in the screenshot below, you will need to specify you credentials for the site, and either use the folder as http(s) or \\networkpath.
      2. If you want the drive to appear permanently on your workstation, choose ‘Reconnect at logon’


2. Once that is completed, open WinDirStat (or any disk analysis tool) and select drive you just mapped.


3. Click ‘OK’ and let it do its PacMan thing! When it is finished, you will have a very detailed page of File Structure, Top Content Types by Size used, and a Graphical Representation of the space used and count of the file types.


4. Want to do one better? How about managing these file directly within this tool? If you see a file that is taking a large amount of space and you are sure it is not needed, you can delete it. Play around with this tool. You can click on the file types to highlight all of them in the bottom pane, or click any individual block in the bottom frame, or even by browsing the File Tree. It’s fairly robust, and powerful. Be careful though… With great power comes great responsibility. If you fully delete a file, it is gone for good.


There you have it. While these instructions are covering some of the basic things you can do with this tool, there are more reasons to use this for management of your site. We will leave that to all you wonderful SharePoint Admins to determine your best uses though.

Posted in Network Administration, SharePoint Tips & Tricks | Tagged , , , | Leave a comment

Cloud Security Consulting has 20 years of experience implementing and protecting complex secure cloud (hosted) environments for America’s top brands, such as US Army, Boeing, NASA, Intel, Blue Cross/Blue Shield, Fidelity Investments, and British Petroleum (BP) to name a few. Our cloud security consultants will work with your cloud security team to implement the proper infosec measures needed to enhance cloud governance and securely move your data and applications to the cloud.

The Cloud Consulting Team at is cloud platform and security tool agnostic. The team’s mission is to help organizations understand how people, processes and technology intersect in order to assist moving suitable workloads to public, hybrid, and secure clouds.

Our cloud governance, risk and compliance consulting services help design and calibrate your security operations to help you move to the cloud securely and without risking cloud data security.

When migrating to the cloud, organizations need to consider the wide range of data that could be affected – everything from routine correspondence to highly sensitive intellectual property. We offer a strategic cloud assessment that includes recommendations for data classification and selecting the best cloud solutions based on your data and privacy requirements.

Cloud Security Engineers

Extend your team with cloud security engineers from for cloud security duties including design, planning, management, maintenance and support.

Cloud Security Technologies

Learn which cloud security technologies are effectively protecting America’s top brands. Cut through marketing hyperbole with the help of Each year we reevaluate our deployed cloud security technologies to determine what will best protect your business and its high value data. Underperforming cloud security technologies are replaced and removed from the security tool stack.

Cloud Security Issues

Identify and work through cloud security issues such as authentication, APIs, system vulnerabilities, web services, DoS attacks, and multi-tenant risk. A cloud security company, like, can help you increase your security posture by mitigating risk in any cloud security issue that may arise.

Cloud Security Architecture

Cloud security architecture must take into account the three large cloud security challenges as identified by the Cloud Security Alliance (CSA): Multi-tenancy, divided responsibility, and dynamic environment.

  • Multi-tenancy
    • Resources are shared between tenants according to Service Level Agreements (SLAs)
    • Each provider is responsible for a proper isolation of its tenants’ computing, networking and storage resources
  • Divided responsibility
    • Besides the provider, tenants also have the responsibility to protect their assets
    • Dividing responsibility between the provider and the tenant depends on the SLA and needs to be agreed between the actors before the service is taken in use
  • Dynamic environment
    • The cloud environment is constantly evolving, and resources may dynamically scale up and down or even change their locations
    • Security policies have to capture and govern these dynamic changes

The experienced cloud security architects at design and build secure cloud environments keeping these three factors in mind throughout the process.

Logical Cloud Security Architecture Diagram

Logical Cloud Security Architecture Diagram (courtesy of CSA)


Cloud Security Services

Cloud security services and data protection are key to cloud success and yet most organizations are not aware of security infrastructure implications or best practices. Organizations moving sensitive data and core applications in the cloud must be confident with the security of these services, networks, and architectures.

A cloud security provider like helps you simplify and secure your infrastructure, unburden your team, protect your brand, and increase peace of mind. Depending on where you are in your cloud journey, has cloud security services to help protect your data and applications.

Cloud Security Checklist

Cloud security consulting and cloud security engineers need a cloud security checklist when evaluating a cloud security company or cloud security provider. Here is a cloud security checklist for your reference. For a more exhaustive checklist, download the CSA Cloud Controls Matrix (CCM).

  • Does the cloud security provider have a rigorous physical access protocol?
  • Does the cloud security provider perform employee and contractor background checks?
  • Does the cloud security provider meet current SSAE 16 SOC2 Type 2 certification?
  • Does the cloud security provider perform regular vulnerability assessments to determine security gaps?
  • Does the cloud security provider have backup and replication in place to ensure data integrity and persistence?
  • Does the cloud security provider have a Business Continuity Plan in place?
  • Does the cloud security provider log network traffic, file and server access?  This includes security logs for: security devices, network switches/routers, databases/servers, active directory, web/mail servers, VPN systems, VM systems
  • Does the cloud security provider provide adequate security for network access and authentication?
  • Does the cloud provider provide security measures for infrastructure, including sub-contractors?
  • Does the cloud security provider provide an active-active configuration between the primary and failover site?

Get cloud security consulting from by filling out this form, calling 866-780-4678, or emailing

Posted in Cyber Security | Tagged , , , , | Leave a comment expands global infrastructure with Sydney data center, a managed cloud computing and security services company based in Fenton, Missouri, has expanded its global infrastructure to include a data center in Sydney, Australia. adds this Asia Pacific location to its global infrastructure that already includes data centers in Frankfurt, London, St. Louis, and Kansas City. All data centers boast enterprise-grade security that includes physical measures like guarded entry with access cards and biometric registration, as well as cyber protection that is built into the entire network’s security framework.’s global infrastructure is highly available, fault tolerant, and scalable. It meets the Tier III Uptime Institute Data Center Standard and SSAE 16 SOC I Type II certification. Each data center includes redundancy in all critical systems, on-site Network Operations Centers (NOCs), backup power generators, advanced fire detection and suppression, temperature-controlled environment, raised anti-static floors, and 100% financially-backed uptime.

The Sydney data center lowers latency for Australian clients with lightning-fast, fiber-optic networking and helps meet regional compliance and data residency requirements.

Please contact at or 866-780-4678 for more information about its global infrastructure and to discuss simplifying your infrastructure in a dedicated cloud or a hybrid cloud model.

Posted in Cloud Hosting, Cyber Security, Network Administration | Tagged , , , , | Leave a comment

Fpweb supports you & you support the world

We recently sent our third quarter donation to charity: water on behalf of new customers!

charity: water trailer from charity: water on Vimeo.

For every $100 of new business spent with the experts at Fpweb, will donate $2 on your behalf to charity: water. 100% of the money will be used to build clean water projects.

We believe in a world where every single person has clean and safe water. Join us!

Posted in Team | Tagged , , , | Leave a comment adds international compliance certifications to fortify security offerings has added EU Privacy Shield, FedRAMP, and ITAR certifications to its list of compliance certifications that already includes HIPAA compliance for healthcare information, PCI and SOX compliance for financial information, and Cloud Security Alliance membership.

The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. The FedRAMP certification validates the trustworthiness, reliability, consistency, and quality of

The International Traffic in Arms Regulations (ITAR) is a U.S. government export regulation that covers the manufacture, sales, and distribution of defense and space-related articles and services on the United States Munitions List (USML). Administered by the U.S. State Department Directorate of Defense Trade Controls, the legislation is designed to control access to specific types of technology and associated data.

The USML includes items that are specifically designed, developed, configured, adapted or modified for a military application. However, the law also covers applicable data and information about the items on the list. ITAR stipulates that regulated technical data – regardless of its form – may be used solely by U.S. persons employed by the U.S. government or a U.S. company. The ITAR certification validates that is a U.S. company with all of its employees being U.S. citizens. complies with the EU-US Privacy Shield Framework as set forth by the U.S. Department of Commerce regarding the collection, use, and retention of personal information from European Union member countries. has certified that it adheres to the Privacy Shield Principles of Notice, Choice, Accountability for Onward Transfer, Security, Data Integrity and Purpose Limitation, Access, and Recourse, Enforcement and Liability.

The Privacy Shield Framework replaced the US-EU Safe Harbor Framework in 2016. BBB EU Privacy Shield offers compliance assistance and independent dispute resolution services to U.S. companies adhering to the Framework. The Framework also provides a set of robust and enforceable protections for the personal data of EU individuals. It provides transparency regarding how participating companies use personal data, strong U.S. government oversight, and increased cooperation with EU data protection authorities (DPAs).

For more information about the compliances and how can take on the burden of your IT compliance, visit, call 866-780-4678, or email

Posted in Administrative Support, Cloud Hosting, Cyber Security | Tagged , , , , , | Leave a comment

Managed Cloud Backup

Last week we posted a nifty infographic about managed SharePoint. It includes a section with the top five causes of data loss:

  • 44% hardware malfunction
  • 32% human error
  • 14% software corruption
  • 7% virus/malware attack
  • 3% natural disaster

Every organization would be wise to protect itself against data loss with comprehensive backup for all its data. An organization can backup to the cloud or locally for all its data, and unburden its team to work on what matters most, by trusting the experts at to manage its backup. You can backup your data on-premises, or in any cloud – Fpweb, AWS, Azure, wherever – and we’ll:

  • Maintain all metadata, security settings and version histories
  • Provide longer retention periods to protect against ransomware threats
  • Restore a single content item or entire server farm

Cloud Backup for Servers
Quickly and easily backup all your servers to the Cloud.  Backup physical and virtual servers to prevent the most common causes of data loss. Choose local and cloud backup targets with the retention policy that best meets your business needs.

Cloud Backup for Business
Cloud backup for business must have application and operating system backup, file versioning, security that exceeds compliance standards, and 24-hour support.  Encrypt your data during transfer and at rest.  Know what region or country your data is being archived to meet regulatory requirements.

Business Continuity Plan
Minimize business disruptions caused by service interruptions or accidental deletions with efficient recovery of all data and satisfy even the most aggressive Service Level Agreements (SLAs) by minimizing downtime and restore times.

Office 365 Backup Solution
Protect against Office365 data loss with off-cloud backup, archiving, and business continuity. Office 365 lacks the essential ability to recover documents once they’ve been removed from the trash. Furthermore, the retention period is only 14 days and you must restore the entire site. protects all your data with automated daily backups. Backup to the secure data center of your choice: Fpweb global data centers, Azure, AWS, or your own. Set longer retention periods for a bigger safety net to recover from ransomware and other cyberattacks.  Restore data right away – and get everyone right back to work.

Microsoft Cloud Backup
Your data and applications are everywhere—on servers, clients, and in the cloud. Managed backup services can protect your critical applications; files and folders; Windows servers and clients; and Azure infrastructure-as-a-service (IaaS) virtual machines (VMs).

Ensure Maximum Content Availability
Perform comprehensive backups of your content across your Office 365 services. Essentials takes your content and normalizes the data, so that whether you’re storing your backups locally or in another cloud service such as, Amazon or Azure, you always have quick and easy access to your content. The content is stored in the same format as it was in the source environment so that searching and restoring on a granular level is painless and maximizes content availability.

Find out more about managed cloud backup services from at Fill out this form, email, or call us at 866-780-4678 to get started.


Posted in Administrative Support | Tagged , , , , , , , , | Leave a comment

Managed SharePoint Infographic

SharePoint managed by

SharePoint managed by the experts at Simplify your SharePoint infrastructure with AWS, Azure, or Streamline SharePoint with Absolute Support®. Protect SharePoint with backup and disaster recovery.

Posted in Administrative Support, AWS, Azure, Office 365, SharePoint | Tagged , , , , , , , , , , , , , , , | Leave a comment