Micro-Segmentation to Your Cloud

Micro-Segmentation to Your Cloud

Security for public and community clouds has greatly improved recently. Major cloud service providers such as Amazon Web Services and Microsoft have made substantial investments in security to help ensure their subscribers’ data is safe and their cloud experience is exceptional. In fact, the security from such cloud service providers is better than in many companies’ own data centers. Some companies now actually view security as one of the primary justifications, in addition to cost savings and agility, for moving their applications to the cloud.

Still, the thought of putting critical data on the cloud accessible by just about anyone is really scary and the perceived added vulnerability is preventing many enterprises from fully leveraging the cloud. They may be using the cloud for non-critical data such as test and development but not for their core business applications that access their most sensitive data.

New micro-segmentation offerings are now available to provide enterprises with added layers of cloud security and instill the confidence they need to put more of their enterprise applications on the cloud. In doing so, large companies have the opportunity for tremendous cost savings, to make their products and services more globally accessible and to dynamically adjust to business conditions in real time.

There are five security advantages these new micro-segmentation offerings provide to the cloud that haven’t previously been obtainable:

  1. New micro-segmentation offerings enable companies to use a consistent set of tools for both their local data centers and the cloud. In the past, security administrators and operators have had to use different security tools for their local data centers and each cloud service provider. This meant the security roles and policies within their companies had to be mapped and maintained across multiple data centers (private and public) and different toolsets – a very complex and costly undertaking. Contemporary micro-segmentation tools work within a company’s local data center and across leading cloud service providers’ data centers, greatly simplifying operations and reducing costs.
  2. New micro-segmentation technologies provide encryption within the cloud from virtual machine to virtual machine. Traditionally, it was believed that data was secure enough once within the security protection provided by the perimeter of the public data center. New micro-segmentation technologies now encrypt data between the virtual computing instances within the cloud for each company and user community. This encrypted added layer of security is a major step forward for protecting the most sensitive data in the cloud.
  3. New micro-segmentation technologies use concealment as a basis for security strategy. Traditional security offerings have used a fortress strategy in which they build a wall around the data they are trying to protect, but still leave the processing environment visible to cybercriminals. New micro-segmentation offerings conceal the applications and data on the cloud to the point where it doesn’t appear like anything is active. Cybercriminals aren’t seeing information such as active IP addresses, operating system types or other information that would provide insight as to how to attack a company’s data. The cybercriminals are not aware of the applications and data in the cloud, and therefore it is not a target.
  4. Micro-segmentation prevents lateral movement of security infiltrations to the data center. A key concern of the cloud is that a company’s data may be compromised because “the other guy” on the cloud didn’t take the appropriate precautions. Micro-segmentation protects cloud users from “the other guy.” Each company’s cloud processing environment is isolated and secure. Malware and cybercriminals are bounded by any given segment, and this makes all users of the cloud more secure.
  5. Micro-segmentation can prevent security breaches in the cloud. A security breach occurs only when a company’s data leaves the cloud, not when the actual security infiltration occurs. New micro-segmentation capabilities contain threat intelligence that recognizes abnormalities and invoke policies to prevent data from leaving the cloud where these inconsistencies occur until the appropriate security analysis can be applied.

The cloud has never been more secure and micro-segmentation takes cloud security to amazing to new levels, so that enterprises can fully realize the benefits of the cloud even for their most critical and sensitive data.

About the Author

Rod Head shotRod Sapp, Global Vice President, Security and Cloud Product Management, Unisys

Rod Sapp manages the Unisys products portfolios including Enterprise Servers, storage, security products and cloud products.

Rod and his team are responsible for business planning, server portfolio definition, partner selection & management, and product launch and lifecycle management.

Rod’s organization collaborates extensively with Unisys sales channels and clients as well as Unisys engineering and services organizations to develop market-leading whole product solutions. Rod’s organization works closely with Unisys strategic technology partners including Dell, IBM, EMC, Oracle, VCE, Intel and Microsoft.

Rod’s background includes ten years of sales experience and twenty years of product and portfolio management that has included the Unisys ClearPath mainframe servers and more recently comprises the Unisys X86 business, storage offerings and software products.

Source: TheWHIR

Meeker: Internet Trends Changing Faster Than Ever

Meeker: Internet Trends Changing Faster Than Ever

India has passed the US as the second largest global internet market, behind China, with 277 million users with an annual growth rate of 40 percent, according to the latest research released by Mary Meeker of Kleiner Perkins Caufield & Byers (KPCB). The Internet Trends 2016 presented at Vox Media’s Code Conference on Wednesday shows major change happening in advertising methods, web search, and internet video viewing.

The report comes as DigitalOcean has opened up its second Asian data center in India, one of many US-based internet companies that has expanded to the country in recent months.

SEE ALSO: IoT to Drive Next Wave of Connected Devices: Report

It is little surprise that internet advertising is growing, or that mobile advertising growth outpaces desktop, but the extent of these trends is striking. There was a 20 percent increase in overall spending to $60 billion in the US in 2015, and mobile ad spend roughly doubled in that time. Still, the report shows that based on time spent, mobile still represents a major opportunity for advertisers, with 25 percent of time but only 12 percent of advertising spent on mobile. Non-mobile internet use takes 22 percent of consumer’s time, and 23 percent of advertising spending.

Ad blockers and muted videos represent major growing barriers to the effectiveness of that advertising, however, with 93 percent of internet users considering using ad blocking software, and 81 percent muting video ads. Privacy is also a looming issue, with 50 percent saying they are very concerned about data privacy and how companies use customer data.

READ MORE: China Said to Push for More State Control Over Video Websites

US data privacy regulation policy is in currently in development by the FCC, with advertisers expressing fear earlier this week that their effectiveness could be curtailed by proposed rules.

The report also highlights the declining use of text as a form of internet communication, suggesting it is being replaced in many areas by voice and image. The number of Baidu queries by speech, for instance, had reached one in ten in September 2014, when the company’s chief scientist Andrew Ng predicted that half of all searches will be done by voice or image in 2020.

As big data is adopted by businesses, opportunities for business apps will continue to emerge, according to the report, which is potentially a boon for both web hosts and cloud service providers.

A general point made throughout the report is that the pace of market transformation related to the internet is out of proportion with historical changes in media or technology. The rapid pace has made many internet companies highly profitable very quickly, but it puts pressure on companies to be nimble and forward-thinking.

Source: TheWHIR

Dataguise Survey Highlights IT Security Issues

Dataguise Survey Highlights IT Security Issues

Dataguise has announced the findings of a new survey titled “Strategies for Securing Sensitive Data.” In the survey, 100 senior IT decision makers, including CxOs, VPs, directors, and managers were questioned on the topic of sensitive data security, including technologies in use, impacts to businesses when failures occur, and accountability after such events. The survey participants represented firms from a wide variety of industries that were chosen for the intensity at which they consume data. Conducted between March and April of 2016, the survey uncovers several truths about sensitive data management, risks, and increasing budgets for improving IT security infrastructure.

In March of 2016, Dataguise commissioned Gatepoint Research to conduct an invitation-only survey of enterprise IT executives regarding strategies for securing sensitive data. Candidates were chosen from a wide range of industries, including financial services, health care, manufacturing, business services, consumer services, retail, media, and education. 54% of those that completed the survey work for Fortune 1000 organizations with revenues over $1.5 billion. 20% work for medium to large firms whose revenue is between $250 million and $1.5 billion. 26% are employed by small enterprises with less than $250 million in revenue.

Observations and conclusions of the 13 question survey included the following:

  • Companies are transitioning toward big data frameworks, including cloud-based environments such as Microsoft Azure HDInsight. 28% of respondents report more than a year of experience with these big data repositories and another 38% in various stages of adoption.
  • Data security challenges often have a negative impact on organizations with 73% reporting that data security concerns terminate or delay data-driven business initiatives.
  • Companies use multiple security solutions to protect sensitive data, with 82% using network monitoring, 80% leveraging data encryption, 79% implementing access controls, 69% installing perimeter controls, 63% using volume and file encryption, and 43% implementing data masking.

Even with multiple layers of security in place, less than half of all respondents did not believe that their data was secure with only 47% of respondents confident that their sensitive data throughout their organization was safe. Furthermore, it was revealed that sensitive data within organizations can be widely accessed by a large number of individuals. In addition to 80% of respondents indicating that their IT teams had access to sensitive data, 40% said test and development teams also had access and 29% indicated that end-users throughout the enterprise maintained the ability to view this information. Finally, while 62% of those surveyed said their firms passed security audits, 11% failed and 20% were unclear if they passed their audit or not.

Identifying where the buck stops when unauthorized access to sensitive data occurs, the survey also asked who would be held accountable if the organization encountered a breach. 88% of respondents said that their IT security team (including the CISO/CIO) would face scrutiny. 47% said their CEO or board of directors would be placed with the responsibility. 38% of organizations would point to the chief data officer (CDO) for the breach and 24% would fault the user or users who created the data. The takeaway here is that IT security teams are at the greatest risk should a situation occur and must strengthen their data infrastructure to ensure the danger of unauthorized access remains low.

“As we have experienced, many companies are throwing everything they have at IT security challenges. The problem is that even multiple point solutions still leave gaps that put these organizations at risk,” said JT Sison, vice president of marketing and business development for Dataguise. “Addressing this at the data layer plugs the remaining gaps, regardless of its migration across systems and networks. Additionally, platform agnostic monitoring of this sensitive data provides precise intelligence to administrators, providing a much higher level of protection for greater levels of confidence.”

A complete copy of survey results are available for free download at the website.

Source: CloudStrategyMag

IoT to Drive Next Wave of Connected Devices: Report

IoT to Drive Next Wave of Connected Devices: Report

The Internet of Things (IoT) will surpass cell phones as the largest category of connected devices in 2018, according to research released this week by Ericsson.

The Ericsson Mobility Report covers a variety of topics related to mobile connections, including the current explosion in video streamed to mobile devices.

Ericsson estimates there will be roughly three billion IoT devices in North America alone by 2021. In the same year, there will be 450 million mobile subscriptions and mobile data traffic will reach 22 GB per smartphone each month.

SEE ALSO: Special Report: The Internet of Things and You

Mobile traffic growth will be driven by streaming video, as consumers now in their teens lead a shift away from traditional televisions. Smartphone TV and video viewing by teens has increased by 85 percent in the last 4 years. The shift will see streaming video, including embedded video in social media and on web pages, grow by 55 percent to well over 30 exabytes globally each month, or close to 70 percent of all mobile data traffic, over the next five years. Web browsing by contrast will grow at a compound annual rate of 15 percent.

LTE subscriptions increased by 150 million to 1.2 billion in Q1 2016. Smarphone subscriptions also rose, and Ericsson expects them to exceed basic phone subscriptions in the third quarter of this year.

The report also calls for “global spectrum harmonization to secure early 5G deployments.”

Cisco also predicts that video will make up more than half of all mobile data traffic by 2020, and Gartner identified mobile video as a huge opportunity for communication service providers (CSPs) last year. Data center interconnection is another market likely to benefit from mobile video growth.

Ericsson partnered with AWS in February to encourage telecoms and CSPs to build links to the cloud to improve the efficiency of mobile app delivery, in anticipation of increased data demands. The company also joined with Orange Telecom in November to test different networking approaches and hardware for IoT devices.

Source: TheWHIR

Had it with Apache Storm? Heron swoops to the rescue

Had it with Apache Storm? Heron swoops to the rescue

Last year, Twitter dropped two bombshells. First, it would no longer use Apache Storm in production. Second, it had replaced it with a homegrown data processing system, Heron.

Despite releasing a paper detailing the architecture of Heron, Twitter’s alternative to Storm remained hidden in Twitter’s data centers. That all changed last week when Twitter released Heron under an open source license. So what is Heron, and where does it fit in the world of data processing at scale?

A directed acyclic graph (DAG) data processing engine, Heron is another entry in a very crowded field right now. But Heron is not a “look, me too!” solution or an attempt to turn DAG engines into big data’s equivalent of FizzBuzz.

Heron grew out of real concerns Twitter was having with its large deployment of Storm topologies. These included difficulties with profiling and reasoning about Storm workers when scaled at the data level and at a topology level, the static nature of resource allocation in comparison to a system that runs on Mesos or YARN, lack of back-pressure support, and more.

Microsoft rolls out SQL Server 2016 with a special deal to woo Oracle customers

Microsoft rolls out SQL Server 2016 with a special deal to woo Oracle customers

The next version of Microsoft’s SQL Server relational database management system is now available, and along with it comes a special offer designed specifically to woo Oracle customers.

Until the end of this month, Oracle users can migrate their databases to SQL Server 2016 and receive the necessary licenses for free with a subscription to Microsoft’s Software Assurance maintenance program.

Microsoft announced the June 1 release date for SQL Server 2016 early last month. Among the more notable enhancements it brings are updateable, in-memory column stores and advanced analytics. As a result, applications can now deploy sophisticated analytics and machine learning models within the database at performance levels as much as 100 times faster than what they’d be outside it, Microsoft said.

The software’s new Always Encrypted feature helps protect data at rest and in memory, while Stretch Database aims to reduce storage costs while keeping data available for querying in Microsoft’s Azure cloud. A new Polybase tool allows you to run queries on external data in Hadoop or Azure blob storage.

Fed Had Dozens of Cyber Breaches in Recent Years, Reuters Says

Fed Had Dozens of Cyber Breaches in Recent Years, Reuters Says

By Jeanna Smialek

(Bloomberg) — The Federal Reserve detected more than 50 breaches of its computer systems from 2011 to 2015, Reuters reported, adding to signs that the central bank may be vulnerable to hackers or spies.

Hacking attempts were cited in 140 of 310 total reports provided by the Fed, and four incidents in 2012 were called acts of “espionage,” Reuters said in an article Wednesday based on Fed records obtained through a Freedom of Information Act request. At least two of the espionage cases resulted in information being disclosed. The Fed’s national cyber security team identified 51 cases of “information disclosure,” Reuters reported.

SEE ALSO: Security Pros Split on Whether Private Data is Safer with Government or Private Companies

The documents, later obtained by Bloomberg, span 2,239 pages and are heavily redacted. The records don’t identify hackers or say whether sensitive information was accessed or money was stolen, Reuters said. The Fed didn’t immediately have a comment on the report.

Cyber security at central banks is under increased scrutiny following the theft of more than $80 million from the Bangladesh central bank’s accounts at the New York Fed. The Reuters article covered cases involving the Fed’s Board of Governors in Washington and the news agency didn’t have access to reports from local teams at the 12 regional Fed banks, which include New York.

Theft Briefing

House Science Committee Chairman Lamar Smith, a Texas Republican, on Tuesday sent a letter to New York Federal Reserve President William Dudley asking for a briefing and information related to the February theft. Hackers stole from Bangladesh Bank’s account at the New York Fed, which has said instructions to make the payments were authenticated by the Swift message system that’s widely used by financial institutions.

READ MORE: Half-Baked Government Consolidation Causes Cybersecurity Headaches: Report

While acknowledging that the Bangladesh bank’s systems “appear to have been the weak link” in that case, the Smith letter states that it’s Congress’s responsibility to ensure that the New York Fed is “taking all precautions to protect American finances and aggressively execute its own role as overseer of Swift.”

In response to a letter earlier this year from Democratic Representative Carolyn Maloney of New York, New York Fed General Counsel Thomas Baxter said that “there is no evidence of any attempt to penetrate Federal Reserve systems in connection with the payments in question.”

Source: TheWHIR

How You Can Squash Bad Actors In Your Organization

How You Can Squash Bad Actors In Your Organization

Let’s start off with a few statistics, courtesy of IBM. Fifty-five percent of all cyberattacks are either carried out or facilitated by by employees within the walls of your business. Of those attacks, 31.5 percent are intentional.

By contrast, 45 percent of attacks are facilitated by outsiders.

The statistics paint a rather clear picture, no? It’s easy to be distracted by the ever-present threat of hackers or malware – so much so that all too often, security teams forget that a malicious insider can cause just as much damage as a hacker (sometimes more).

Whereas an attacker needs to find some way to access your network, a malicious employee’s already inside. From the beginning, they’re operating from within your firewall, from within every line of defense designed to prevent a data breach. Not only does this make them significantly more difficult to stop, it also means they can cause far more damage if left unchecked.

So what can you do, exactly? How can you prevent an insider from wreaking havoc within your security perimeter?

First, understand their motivations

The motive behind a malicious insider’s actions often boil down to one of two things: either they’re acting on some frustration or grievance with their company, or they’re motivated purely by financial gain. The good news is that the former can be mitigated through good management techniques. After all, an employee won’t generally have reason to cause harm to their company if they love their job, right?

Of course, understanding’s only the first step. You aren’t really going to be able to do much to satisfy an employee that’s angry about being laid off, nor can you really stop a greedy insider threat with kind words and good management. In order to actually protect your data, you’ll need to take things a little further.

Second, implement strict access controls

Too often, I see enterprises that seemingly take a communal approach to file security. That is to say, everyone has access to everything – even a lowly desk jockey in accounting is able to log in to a file repository containing their business’s most sensitive data. Simply put, this is unacceptable – an employee should only be able to access a particular file or repository if it’s directly related to their work.

Otherwise, they need to be locked out.

Third, utilize document-centric security

Now, even access controls won’t always stop an employee if they’re aware of a particular security hole or glitch. That’s where document control comes in. If you protect all of your sensitive files with a solution that lets you control how, when, and where they’re accessed, then it won’t matter if a malicious insider releases them into the wild – you can just flick a switch and they’ll be unusable.

Finally, be proactive

Last but certainly, always make sure you stay abreast of the latest vulnerabilities, and remove access permissions from employees that no longer work for you. A disgruntled former IT professional might be aware of an unpatched vulnerability that they can exploit to access your network – it falls to you to keep that from happening. Active prevention offers more protection than even the most hardened firewall.

About the Author

Max HostForWebMax Emelianov started HostForWeb in 2001. In his role as HostForWeb’s CEO, he focuses on teamwork and providing the best support for his customers while delivering cutting-edge web hosting services.

HostForWeb Facebook

HostForWeb Twitter

Source: TheWHIR

Salesforce Acquires Demandware for Ecommerce Expertise

Salesforce Acquires Demandware for Ecommerce Expertise

Salesforce has jumped into the digital commerce market with both feet by acquiring ecommerce platform Demandware, according to an announcement on Wednesday. Salesforce will pay $75 per share, or $2.8 billion, and when the deal is completed at the end of July, Demandware will become Salesforce Commerce Cloud.

Gartner predicts the global ecommerce market will grow by more than 14 percent annually to over $8.5 billion by 2020.

SEE ALSO: Salesforce Names Amazon Its Preferred Cloud Provider

Demandware is based in Burlington, Massachusetts, and traded on the NYSE, with share prices just below $48 at Tuesday’s close. Salesforce estimates it will bring in an extra $100 to $120 million in the second half of fiscal 2017, but Demandware’s value to Salesforce will largely come through providing ecommerce to its existing customer base, and in bringing Demandware’s enterprise customers onto Salesforce’s core CRM products.

“Demandware is an amazing company—the global cloud leader in the multi-billion dollar digital commerce market,” said Marc Benioff, chairman and CEO, Salesforce. “With Demandware, Salesforce will be well positioned to deliver the future of commerce as part of our Customer Success Platform and create yet another billion dollar cloud.”

SEE ALSO: Magento, WooCommerce Lead Ecommerce Platform Market Share: Report

Demandware’s customers include globally recognized brands like L’Oreal and Marks & Spencer, and the company enables them to deliver personalized experiences with software for web, mobile, social, and in-store shopping.

“Demandware and Salesforce share the same passionate focus on customer success,” said Demandware CEO Tom Ebling. “Becoming part of Salesforce will accelerate our vision to empower the world’s leading brands with the most innovative digital commerce solutions that enable them to connect 1:1 with customers across any channel.”

It appears from comments in a blog post by Ebling that Demandware employees will all join Salesforce.

A report released in March by aheadWorks shows the Demandware platform is used by 1.2 percent of the Alexa top 1 million sites. It trails far behind Magento and WooCommerce in that regard, but is still tied for 11th among all ecommerce providers, and adding even a small percentage of Salesforce’ customers would easily push it into the top ten.

Source: TheWHIR

DigitalOcean Brings Bangalore Data Center Online

DigitalOcean Brings Bangalore Data Center Online

DigitalOcean has launched its new data center in Bangalore, India, to support the growing startup ecosystem in the country. The New York-based cloud company calls India one of the “most important technology markets in the world.”

The announcement comes shortly after DigitalOcean closed a $130 million credit facility to support its global expansion.

According to an announcement on Tuesday, DigitalOcean will continue to offer a single pricing plan across all of its regions, including Bangalore, starting at $5 USD per month. Bangalore is DigitalOcean’s 8th region, joining New York, San Francisco, London, Amsterdam, Singapore, Frankfurt, and Toronto.

DigitalOcean has hired a local team and partnered with NASSCOM’s 10,000 Startups initiative in order to support the Indian startup ecosystem. The NASSCOM program brings corporations and early stage Indian tech companies together.

“India is poised to unleash a tremendous amount of innovation in the next decade,” Ben Uretsky, CEO and co-founder of DigitalOcean said in a statement. “We want to empower the next generation of software companies by providing them robust and easy to use cloud infrastructure they need to grow.”

Bangalore is DigitalOcean’s second data center in Asia. The facility will feature DigitalOcean’s latest servers and network architecture.

Source: TheWHIR