<iframe src="//www.googletagmanager.com/ns.html?id=GTM-MRFNVD" height="0" width="0" style="display:none;visibility:hidden">

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.


  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.

Soha Blog

Haseeb Budhani

Recent Posts

Cloud-Based DDoS Services May Not Be As Foolproof As You Think

[fa icon="calendar'] Oct 12, 2015 4:00:29 AM / by Haseeb Budhani posted in Blog

[fa icon="comment"] 0 Comments

Are you using one of the many cloud-based DDoS services out there to protect your Internet-facing infrastructure? If yes, great! Clearly you are cognizant of the various volumetric attacks that your infrastructure may be exposed to and have taken necessary steps to protect against such attacks by leveraging a cloud-based DDoS service of your choice.

Read More [fa icon="long-arrow-right"]

Did You Hear? CDNetworks’ Enterprise Application Security (EAS) Service is Powered by Soha Cloud!

[fa icon="calendar'] Sep 21, 2015 9:23:58 AM / by Haseeb Budhani posted in Blog

[fa icon="comment"] 0 Comments

CDNetworks, a global content delivery network (CDN) provider, is selling a new service called Enterprise Application Security (EAS), the foundation for which is provided by Soha Cloud. CDNetworks announced EAS last week, along with a marquee customer, McLarens. McLarens is leveraging EAS to securely deliver a critical, business application worldwide to its employees and partners.

Read More [fa icon="long-arrow-right"]

Application Access in the Public Cloud is Broken

[fa icon="calendar'] Jan 26, 2015 4:38:20 AM / by Haseeb Budhani posted in Cloud, Engineering, AWS, Blog, Security

[fa icon="comment"] 0 Comments

Building out an application infrastructure in a public cloud (e.g. AWS or Azure) can be a liberating experience: No hardware to order and maintain; no WAN bandwidth contracts to worry about; even application images are available in the various public cloud market places. But when it comes to setting up a secure perimeter for your applications, the only models available are the ones that were designed for the cold, dark days when traditional data centers were the norm.

Read More [fa icon="long-arrow-right"]