<iframe src="//www.googletagmanager.com/ns.html?id=GTM-MRFNVD" height="0" width="0" style="display:none;visibility:hidden">

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.

Soha Blog

Packet Pushers Podcast 35 reviews Soha Systems Launch

[fa icon="calendar'] Apr 12, 2015 11:49:49 AM / by admin posted in Blog

[fa icon="comment"] 0 Comments

Packet Pushers Network Break 35 podcast hosted by Greg Ferro and Ethan Banks discussed Soha Systems launch in their most recent podcast. You can download it here. The Soha Systems review and analysis starts at 30:12.

Read More [fa icon="long-arrow-right"]

Soha Cloud Available in the AWS Security Marketplace

[fa icon="calendar'] Apr 8, 2015 6:56:08 PM / by Robert Berlin posted in Blog

[fa icon="comment"] 0 Comments

It has been an exciting week at Soha Systems! We emerged from stealth mode, officially announced the availability of our Soha Cloud service, announced our initial $9.8 million funding from Andreesen-Horowitz, Cervin Ventures, Menlo Ventures and Moment Ventures and revealed that we have a double-digit number of Soha customers.

Read More [fa icon="long-arrow-right"]

Application Access in the Public Cloud is Broken

[fa icon="calendar'] Jan 26, 2015 4:38:20 AM / by Haseeb Budhani posted in Cloud, Engineering, AWS, Blog, Security

[fa icon="comment"] 0 Comments

Building out an application infrastructure in a public cloud (e.g. AWS or Azure) can be a liberating experience: No hardware to order and maintain; no WAN bandwidth contracts to worry about; even application images are available in the various public cloud market places. But when it comes to setting up a secure perimeter for your applications, the only models available are the ones that were designed for the cold, dark days when traditional data centers were the norm.

Read More [fa icon="long-arrow-right"]

VPNs Are Not As Secure As You Think

[fa icon="calendar'] Jan 20, 2015 5:30:04 AM / by Seetharama Sarma Ayyadevera posted in Blog

[fa icon="comment"] 0 Comments

So you set up a number of new applications in AWS and want to enable access for your entire user base. In your situation, 9 out of 10 infrastructure teams will select a Virtual Private Network (VPN) based solution to enable user access to applications. But are VPNs really the right choice? I think not.

Read More [fa icon="long-arrow-right"]

Why Soha chose Ansible over Puppet

[fa icon="calendar'] Sep 16, 2013 8:49:24 AM / by Shravan Mettu posted in Cloud, Engineering, Blog

[fa icon="comment"] 1 Comment

If you are running more than a few nodes to deliver an application, you may want to consider a reliable configuration management tool to ensure that all your nodes, depending on their identity, are running the correct code, and that their individual policy settings are in compliance with system-wide policies.

Read More [fa icon="long-arrow-right"]