Category Archives: Cloud Hosting
Cisco pulls its HyperFlex hyperconverged infrastructure products – TechRadar
Cisco has confirmed that it has discontinued its HyperFlex hyperconverged infrastructure products due to market trends (via The Register).
Hyperconverged infrastructure combines data center elements, including storage, compute, networking, and management, into one unified system. The San Jose-based company blamed evolving customer needs and market dynamics for its decision.
In light of the services retirement, customers have been given five years of support before they will be forced to find an alternative solution.
In spite of its decision, the company will continue to accept orders for HyperFlex hardware and software until March 12, 2024.
However, customers straddling the borders of multiple companies might have a harder time with their HyperFlex setups. The report confirmed that Cisco will not certify future versions of ESXi to run on its hardware, leaving VMware customers to either persist with ESXi 8.0 once it exits support, or run unsupported code.
In response to the HyperFlex Data Platform (HXDP) end-of-life, which was officially confirmed on September 12, 2023, Cisco has issued a page of FAQs to help guide customers through their concerns.
Speaking to The Register, a Cisco spokesperson said that the company "remains committed to simplifying hybrid multi-cloud operations."
In fact, the news comes just two weeks after the company announced that it would enter a strategic partnership with Nutanix to simplify hybrid multicloud. The announcement launched with the offering [of] the industrys most complete hyperconverged solution for IT modernization and business transformation, which at the time raised questions about its now-discontinued HyperFlex products.
A Cisco spokesperson told TechRadar Pro:
"Cisco made the decision to discontinue its Cisco HyperFlex HCI product family, based on evolving customer needs and market dynamics. This decision has been timed to best support our customers, partners, and employees. Cisco remains committed to simplifying hybrid multicloud operations and is providing a path for customers with the recently announced partnership with Nutanix to deliver the industrys most complete, best-in-class HCI solution. Cisco will support existing Cisco HyperFlex customers over the next five years and will offer platform migration support and services with our solution partners in the channel."
via The Register
Read more:
Cisco pulls its HyperFlex hyperconverged infrastructure products - TechRadar
Why you need to consider the new-and-improved Thunderbird … – ITPro
The internet is a merciless engine of progress, and I dont always think thats a good thing. Take the Mozilla Foundation. Turning out internet software tools since the early days, it is now, according to statistic addicts, almost consigned to history when it comes to market share for its famous Firefox browser.
But theres also Thunderbird, a cross-platform email client application thats actually usable. This has recently been reworked with version 115, codenamed Supernova, and its changes are worth some attention.
We live in an era of cloud-resident email accounts. Actually, if you want to be pedantic about it, that description is nonsense.
What's new in Thunderbird Version 115, AKA Supernova?
> Dynamic unified toolbar> Much-improved visuals and icons> Easier density control> Intuitive app menu> Sortable folder modes> New tags view> Modernized cards view> Improved address book> Expanded accessbility> Improved calendar design
Read more via Thunderbird
Cloud scales up and down as your demand for computing varies, driven by your business and your customers.
When did you last ring up Hotmail and say deliver a bit faster, or demand the right to migrate your online presence from one cloud hosting region to another? Not even Amazons (otherwise excellent) business email hosting service gives you one iota of the controllability that cloud hosters take for granted.
This cuts little ice with the type of user who throws cloud around with abandon. The classic cloud-obsessed, intolerant user considers local expertise to be the kind of dinosaur they can do without, the moment they switch to the cloud. The problem for them is, thanks to COVID-19, we have all been through a global phenomenon that showed us exactly what happens when bureaucrats design a system using modern tools.
What does this have to do with Thunderbird? Very simply, its all about the uses and upkeep of a local database. Cloud systems assume there will always be a connection to the cloud, and that any database services are handled in a megascale, highly optimized fashion.
RELATED RESOURCE
1,700 CISOs and IT professionals share how they are protecting their organizations from cyber attacks.DOWNLOAD FOR FREE
What I found was that while pandemic systems (viral detection tests, vaccination records etc) were demanded locally, and held centrally, there was no plan B: if you were denied access, then even local copies of PDFs on Android phones wouldnt open. Ironically, thats because the bureaucrats used the PDF format to limit the lifetime of the certificates they graciously allowed me to download, and the lifetime, even opened locally, demanded a cloud connection to be checked and permitted.
All of the crises Ive seen in the last few years have, as an apparent side effect, included loss of access to the cloud. Whether its queueing for the passport check at Calais Eurostar, or sitting in huge traffic snarl-ups in California, the sign that you are in real trouble is that your cloud-resident services go down.
These experiences have made me much more interested in being able to have a local, portable repository of messages and documents, which doesnt depend on the cloud. Enter Thunderbird. I want to be able to show officials everything I need to satisfy their enquiries without necessarily having a trusted link.
I know that Thunderbird isnt alone. In particular, Yahoo has relaunched and rethought its local email app. I particularly like its take on the process of handling attachments, although I havent done enough testing to report on whether this is an entirely local process.
But I do think the use of email has now expanded so much that the assumptions about cloud storage and reasonable data sizes have had to be almost completely discarded. One of my customers has a 17GB Outlook data file: so big, I cant summon up the courage to do battle with it, at least not on his old workstation PC. Even equipped with all the utilities and knowledge on offer at Slipstick, I am wary of tangling with scattered, age-old lists of vital messages interspersed with the jagged remains of deleted junk emails.
Despite my several decades of VBA experience, the state of Outlook local data isnt something Im inclined to dabble in. There are far too many ifs, buts, ohs, and oughtas in the readme files to reassure me that Im taking a safe and reversible course of action with what is often a businesss most important data repository.
Thunderbird has no such qualms. It will go through a compaction exercise on an email folder with a right-mouse click. Zap! All that space left by deleted messages is gone. This might be for bad reasons: maybe Mozilla finds modern laptop or tablet disk volumes too miserly for the safe storage of vital messages in larger quantities, or perhaps its just too difficult to break the Outlook hegemony. But at least it tried.
I now run an ancient but very lovable ThinkPad Tablet 2 with an LTE modem and Windows 10 as my email viewer and repository. Slightly fiddly with my pinky finger as scrolling and selection stylus, but far better than staring at various hula-hoops and beachballs while waiting for cloud access to reappear. Normally with a downright angry queue of holidaymakers behind me, at the airport or ferry terminal.
I expect to have two types of heckling at this news, neither of which I actually disagree with. The first is those who point out that we have been here before, with mail databases dating back to Microsoft Exchange, Lotus Notes and many more. I can remember a certain frisson of shock at discovering that IceWarp could be set up to use a SQL Server for email message storage. Yes, various efforts to use databases for emails have been tried for decades. But I can report that if you hit an email database with a quarter of a million messages then you can quite easily break it: these days, a quarter of a million messages would be one nuclear familys mail archive.
The second heckle is that nobody uses email anymore! This is one of those things that seems to follow the sunspot cycle, with eras of low activity followed up by eras of massive outbursts of change. After all, wasnt Slack meant to replace email? I believe that email has found a new role: not as the main or even the first means of communication, but rather as the repository of information. Its the place where all those horrible follow-up copies get sent, along with legal notices: stuff you arent gagging to read, but which its handy to be able to look back on, once the dust settles and the camera live stream LEDs go dim.
This demands a well-designed, extremely robust, and recoverable database. Something I am pinning my hopes on Mozilla being able to deliver.
More here:
Why you need to consider the new-and-improved Thunderbird ... - ITPro
Delivering cloud value to businesses of all sizes – ITWeb
Delivering cloud value to businesses of all sizes Offering cost efficiency, 24/7 support, comprehensive security and most crucially scalability, a hosted cloud solution is the ideal option to help a business of any size punch above its weight.
Gareth Smith, Senior Manager Data Centre Infrastructure and Cloud Computing at Sizwe Africa IT Group.
For decades, small and medium-sized enterprises (SMEs) operated in one sphere of business, and large corporates operated in another, and it was a case of never the twain shall meet. However, the advent of the cloud has changed all that.
Today, businesses of all sizes are able to access enterprise quality solutions, thanks to the cloud. Such access, especially for organisations that are not yet at enterprise level, allows them to expand their operational footprint into those global markets that traditionally belonged to the enterprise space.
Gareth Smith, Senior Manager Data Centre Infrastructure and Cloud Computing at Sizwe Africa IT Group, explains that in a tough economy, with rising inflation and additional challenges like load-shedding, businesses of all sizes can gain a significant financial benefit by adopting the cloud.
Dont forget that in such tight economic circumstances, there are many businesses both large and small that struggle to afford the high overheads that come with the underlying hardware and expertise needed to run a cloud solution. Services such as web hosting, e-mail hosting, backup services. And they are also often beyond their reach. It is for these reasons and more that a hosted cloud solution is the ideal option for them, he says.
After all, these players seldom have either the trained personnel or the security expertise required to safely operate their business in the cloud. With a hosted solution, they gain access to 24/7/365 support, and the service providers own comprehensive security which in Sizwe Africa IT Group's case, includes firewalls, intrusion detection and spam protection.
Ultimately, he explains, it is the sheer scalability of the cloud, coupled with its pay-as-you-use principle, that delivers the benefits to these organisations. The ability to grow your business organically is made easy by the clouds ability to scale to meet an organisations changing business requirements.
Smith notes that it is equally important for any organisation that chooses to move to the cloud to ensure that their hosted cloud provider of choice offers a data centre that is technology-agnostic, secure and flexible. He adds that businesses that choose Sizwe Africa IT Groups Tier 2 Managed Data Centre get the very best in technical infrastructure and security operations.
"At Sizwe Africa IT Group, we firmly believe in the potential of cloud computing for the future of IT, and our goal is to make this technology accessible to businesses of all sizes across South Africa.
To this end, we offer services to the market that are designed not only to deliver outstanding value for money, but more crucially, to also provide an affordable, secure, dependable and, above all, scalable cloud hosting solution. These cutting-edge cloud services are readily accessible at sizwe.cloud," he concludes.
More:
Delivering cloud value to businesses of all sizes - ITWeb
Huawei Cloud in Token2049: Fueling Web3 Advances – PR Newswire
SINGAPORE, Sept. 13, 2023 /PRNewswire/ -- Token2049, Asia's influential Web3 event, was held in Singapore from September 10 to 15. During the event, Huawei Cloud showcased staking node engine, confidential computing, andZK rollup and discussed the future of the Web3 industry with top vendors, builders, and developers. Huawei Cloud also expressed their commitment to accelerating Web3 innovation with leading technologies.
Minute-level ZK Rollup Average Transaction Confirmation Time for Efficient ZK Running Environment
In TimeStamp2023 session held on September 11, Xue Tengfei, Huawei Cloud Web3 Technical Planning Expert, shared Huawei Cloud's innovative attempts in ZK hardware acceleration. With Huawei-developed XPUs, system-level architecture innovation, and optimized algorithms, the average transaction confirmation time of ZK rollups is expected to plummet from hours to minutes.
Xue Tengfei said, "We believe that the significant reduction in the transaction confirmation time of ZK rollups will pave the way for the large-scale use of Web3 applications. It will not only improve the performance and scalability of blockchains, but also provide more possibilities for industries and application scenarios."
Huawei Cloud QingTian Enclave Safeguards Transactions
On September 12, in Blockchain Security Alliance Meetup initiated by the Blockchain Security Alliance, Zhang Ziyi, Chief Architect of Huawei Cloud Blockchain, introduced innovative technologies provided by Huawei Cloud. He presented Node Engine Service (NES) for Ethereum staking node hosting, QingTian Enclave security framework, and ZK rollup hardware acceleration.
Zhang Ziyi said, "Web3 project participants can access NES to host their public blockchain nodes in an easy, stable, reliable, and efficient way. By now, service providers of blockchain data, wallets, and DApps have started their journey with NES."
In addition, Jia Xiaoqiang, Director of Huawei Cloud Virtualization Products, introduced Huawei Cloud's Web3 solution aiming to secure systems, applications, and sensitive data in wallet scenarios.
Jia Xiaoqiang said, "Huawei Cloud QingTian Enclave confidential computing solution is just like a safe for wallet private keys. It supports environment and identity authentication and full-link data encryption and decryption.Applications and data can be run with protection on Huawei Cloud Elastic Cloud Servers (ECSs). Unauthorized users and third parties are isolated to maintain transaction security of private keys and wallets."
IPFS Cloud Data Ecosystem with Tenfold Rewards
At the Fil Dev Summit on September 12, Bai Tao, Chief Cloud Storage Solution Architect of Huawei Cloud, shared InterPlanetary File System (IPFS) data service and elastic cloud deployment solution jointly developed by Huawei Cloud and partners. Huawei Cloud, with over 18 years of experience in enterprise-level storage, aims to deliver cloud storage services that are not only cost-effective but also highly efficient.
Bai Tao said, "Huawei Cloud's cloud data entry simplifies the process of storing data on IPFS, resulting in a 10-fold increase in data rewards and reduced data storage overhead for enterprises. Additionally, Huawei Cloud's large-ratio EC technologies enable 91% effective capacity usage of disks and scalable storage for data up to 10 EB-level. With the elastic cloud deployment solution, users can choose offline encapsulation, cloud verification, or end-to-end cloud deployment."
Node Creation in Seconds, 99% Staking Effectiveness: Unlocking Web3 Performance
On September 12, Zhang Ziyi shared more about Huawei Cloud NES at MetaEra Summit during Token 2049.
Zhang Ziyi said, "NES comes together with Huawei Cloud's homegrown innovative algorithms. Users can thus enjoy up to 99% staking effectiveness and higher rewards using NES." Currently, Huawei Cloud's hosting service of staking nodes has been launched on their website and is open for OBT.
Providing "Everything as a Service", Huawei Cloud aims to offer robust infrastructure that enables advanced, distributed computing power for Web3. This commitment extends to building an open, efficient, and secure blockchain platform that can foster innovation in the Web3 ecosystem.
SOURCE Huawei Cloud APAC
See more here:
Huawei Cloud in Token2049: Fueling Web3 Advances - PR Newswire
IBC 2023: Telos Infinity VIP’s Role in Cloud-Based Media Production … – Sports Video Group
Telos Alliance announces that its roster of manufacturers incorporating the Telos Infinity VIP Virtual Intercom Platform continues to expand, providing users with an integrated intercom solution as part of larger cloud-based production suites from a growing list of partners.
The Telos Infinity VIP is a full-featured intercom system that brings the functionality of a Telos Infinity hardware panel to any computer, tablet, or smartphone through its HTML-5 web interface or the VIP App for Android and iOS. VIP can be deployed on-premises on a COTS (commercial off-the-shelf) server independently of, or in conjunction with, an existing Telos Infinity hardware installation or hosted on cloud-based platforms.
As part of The Grass Valley Technology Alliance, Telos Infinity VIP incorporates into the Grass Valley AMPP platform, which connects hardware, software, and cloud-native services as a foundation for media production and distribution. Infinity VIP will be on display at IBC 2023 in the Grass Valley stand 9-A01.
Infinity VIP is also available as part of Vizrts Viz Now live production tool, the Ross Production Cloud end-to-end live production solution, and Panasonic Connects KAIROS Global Live Control Room.
Telos Infinity VIP intercom is ideally and uniquely suited to serve as an integral part of a larger system, says Martin Dyster, Telos Alliance VP of Business Development. All of VIPs benefits, including the ability to quickly and flexibly launch an Infinity panel on any computer, tablet, or smartphone, are now available to anyone using one of the cloud-based production solutions from our technology partners.
Amazon Web Services will offer Infinity VIP demos on their AWS cloud hosting platform at IBC 2023 in stand 5.C90, and a full Telos Infinity system, including VIP, will be featured at the Telos Alliance stand 8.C45.
Link:
IBC 2023: Telos Infinity VIP's Role in Cloud-Based Media Production ... - Sports Video Group
SAP Partners with Microsoft to Deliver RISE with SAP to Africa – IT News Africa
SAP Africa and Microsoft join forces to bring RISE with SAP to customers globally, including in Africa. RISE with SAP offers a comprehensive package of ERP software, industry best practices, and outcome-focused services. It aids companies in transitioning their core SAP ERP systems to the cloud, harnessing the cloud hosting capabilities of hyper-scalers like Microsoft.
Kholiwe Makhohliso, Managing Director for Southern Africa at SAP, emphasized the potential of cloud technologies. Together we empower organizations to run intelligent and frictionless enterprises in the cloud, with easy integration, a wealth of advanced services, and high levels of security and compliance, said Makhohliso. This combines to give companies an accelerated path to business transformation that can drive optimization and growth throughout the business.
Colin Erasmus, Chief Operating Officer at Microsoft South Africa, highlighted Microsofts commitment to delivering an exceptional cloud experience. By hosting RISE with SAP on Microsoft Azure, companies can access SAPs leading enterprise software in Microsofts top-tier cloud environment, fostering innovation and enabling rapid expansion into new markets and capabilities.
Accelerating business innovation in the cloud, RISE with SAP on the Microsoft Cloud offers a comprehensive solution for advancing business innovation and optimization quickly and with minimal risk. It streamlines enterprise planning and provides an accelerated path to cloud-based ERP software like SAP S/4HANA Cloud.
RISE with SAP has gained traction globally, with over 3,000 companies, including Microsoft, Standard Bank, and Standard Chartered, using it to migrate their ERP systems to the cloud. Vanessa Padiachee, Group CIO for Corporate Function at Standard Bank, stressed the importance of trust in partnerships.
For Standard Bank, continuing its relationship with SAP and Microsoft made sense due to their historical investments in SAP Finance technology and existing workloads on Microsoft Azure.
Read the original here:
SAP Partners with Microsoft to Deliver RISE with SAP to Africa - IT News Africa
How to strengthen cloud security with Zero Trust – Security Boulevard
If youre familiar with the Zero Trust framework, its principles may seem simple enough in the context of network security. Nobody not even your most senior leaders can be granted user access without first being checked at the gate.
Heres the problem: Traditional perimeters are a thing of the past. Today, with remote access and hybrid work a mainstay of the modern enterprise, cyber threats are challenging your organization like never before. Thats why the most forward-thinking businesses are implementing Zero Trust.
However, two questions remain. How do Zero Trust principles work in a cloud environment? And, more importantly, how can they help you safeguard your sensitive data?
In this guide, well walk you through the convergence of Zero Trust and cloud security. From why its important to how it works, well help you identify all the tools and technologies you need to create a Zero Trust cloud for safe and secure access.
IT professionals are well-versed in the art of Zero Trust security. Since its inception in 2010, this innovative approach has quickly ushered in a wave of support for modern network access.
However, whats not so crystal clear is how this security policy will translate to an increasingly cloud-first landscape. What does Zero Trust for the cloud even mean and how does it work? Lets connect the dots.
According to Forrester, a Zero Trust architecture is built upon three fundamental concepts:
These tenets form the core of the Zero Trust framework and can be applied to any cloud environment whether its a public, private, hybrid, or multi-cloud infrastructure.
Contrary to a traditional security posture, which assumes a condition of implicit trust, the Zero Trust model believes all endpoints, users, and applications are potential cyber threats. Organizations that embrace the Zero Trust approach especially in the cloud can unlock a host of significant benefits:
The further you more effectively implement Zero Trust principles, the sooner youll realize these key advantages. Not sure where to start? Check out our guide on the Zero Trust Trust Maturity Model.
Traditionally, Zero Trust security is predicated on an enterprises ability to manage the network itself. In turn, the security team can establish access control policies and other mechanisms and more importantly, it can enforce them.
But now, with more organizations hosting information in cloud environments, there is concern over whether or not enterprises lack this level of control. Cloud domains are owned/operated by cloud providers and Software-as-a-Service (SaaS) vendors, meaning a companys network security policy doesnt automatically carry over to the cloud environment. Consequently, sensitive data that is stored or transmitted is at risk of being spread out across an unprotected attack surface. And, because these safeguards dont automatically carry over, many businesses might have little to no insight into:
In simple terms, theyre sitting ducks. Worse yet, threat actors have taken notice. IBM reports that 82% of all breaches in 2022 involved data stored in the cloud, suggesting cybercriminals are targeting cloud-hosted assets and virtual infrastructure.
More than a buzzword, Zero Trust architecture has its fair share of enterprise applications. Strengthening a Zero Trust security posture can help you manage:
Its clear theres much to gain by adopting a Zero Trust model. But how do you actually do it?
Unfortunately, theres no such thing as a silver-bullet Zero Trust solution. However, there are several technologies and techniques that help you navigate the Zero Trust journey:
Certificate lifecycle management is essential to implementing Zero Trust at scale. Digital certificates are issued to people and devices so that organizations can verify their identities and authorize requests, whether it be to access the network or a specific corporate resource. Digital certificates are also used for strong encryption and access control. With so many certificates in use for so many purposes, CLM allows you to ensure no certificates go unmanaged, and enables you to enforce the principle of least privileged access.
There are three important steps in the certificate lifecycle:
Keys and secrets underpin the security of cryptographic processes. Managing their complete lifecycle is critical for comprehensive security.
User identity is the heart of post-perimeter cybersecurity. A robust, feature-rich IAM portfolio is key to securing identities and keeping your most valuable assets protected from compromised credentials, phishing attacks, and other threat vectors. Essential capabilities include:
Now that you know why creating a Zero Trust cloud is important and the tools it takes to get there, lets talk about the actual implementation process.
Be warned: Its not happening overnight. The Zero Trust journey could turn out to be a multi-year endeavor, so its best to take a phased approach. You can implement the foundations early, but as an ongoing process, reaching Zero Trust maturity will require continuous effort.
Here is one approach to how you can start your journey to Zero Trust maturity:
As cloud environments grow larger and more complicated, traditional network security tools are falling short of the mark. Todays organizations need more robust, advanced, and automated solutions that not only lay the foundation for a Zero Trust architecture, but also pave the way for ongoing security well into the future.
The good news? Thats where Entrust comes into play. Our portfolio of Zero Trust solutions are designed to secure your most critical resources:
From phishing-resistant MFA and adaptive authentication to strong credentials and CLM, we offer a full range of tools to take your asset protection to the next level. Leverage our expertise to:
Ready to get started? Explore our Zero Trust solutions for more information.
The post How to strengthen cloud security with Zero Trust appeared first on Entrust Blog.
*** This is a Security Bloggers Network syndicated blog from Entrust Blog authored by Samantha Mabey. Read the original post at: https://www.entrust.com/blog/2023/09/zero-trust-cloud-security/
Go here to read the rest:
How to strengthen cloud security with Zero Trust - Security Boulevard
Want to reduce your application TCO by 64 percent? – The Register
Sponsored Post Maintaining your Windows applications either on prem or in the wrong type of cloud hosting environment can sometimes build a significant technical debt. So wouldn't you like to know how a combination of the AWS cloud and AMD processors can help you migrate and modernize those workloads and save you money (up 64 percent less total cost of ownership according to AWS)?
You can find out by signing up to attend the AWS Windows Migration & Modernization Day. The Business Track kicks off in Sydney at 10:30am AEDT on 31 October (registration opens half an hour earlier) at the AWS office at Level 37, 2 Park St, Sydney, NSW 200 (see it on a map here).
After formal introductions Ben Place, AWS APJ Head of Business Development for Windows will kick of the serious proceedings by talking you through the reasons to run your Windows workloads on AWS. Existing customers will then step up to share their experiences, including Justyn Green, Cloud Practice Lead at Versent, and Justin Fenwick, General Manager of IT at EVT Limited.
After lunch a second Technical Track at 1:30pm AEDT will see James Scanlon, Microsoft Specialist Solutions Architect at AWS offer his insight on how AWS can help organizations navigate the technical and licensing implications involved in .Net modernization pathways. Next up is AWS Microsoft Principal Solutions Architect Sri Attanayake, who will deliver a session on SQL modernization with Babelfish, before the afternoon is concluded with a few networking drinks to celebrate the day.
Interested? You can register to attend the AWS Windows Migration & Modernization Day here.
Sponsored by AWS.
Go here to see the original:
Want to reduce your application TCO by 64 percent? - The Register
Life in the Clouds: Navigating Security Challenges in Cloud … – tripwire.com
As the realm of technology continues to evolve, the significance of cloud computing has grown exponentially. This paradigm shift offers unparalleled scalability, efficiency, and cost-effectiveness benefits. However, with these advantages come a host of security challenges that need careful consideration.
This article delves into the vital realm of cloud security, exploring the multifaceted landscape of safeguarding data, identities, networks, and services.
Within cloud computing, a critical aspect is understanding the shared responsibility model. This model delineates service providers' and users' roles and responsibilities in safeguarding data. Encryption techniques emerge as key players in bolstering data security, mitigating vulnerabilities, and preserving user privacy.
Complying with data protection regulations, such as GDPR and HIPAA, isn't just a legal obligation; it's a cornerstone of building trust and ensuring ethical practices. By adeptly navigating these considerations, organizations can erect robust defenses, reinforcing the integrity and confidentiality of their data within the dynamic landscape of cloud environments.
Security in the cloud ecosystem hinges on adept Identity and Access Management (IAM). IAM deftly navigates the fine line between data accessibility and protection. Robust authentication methods lay the foundation for controlled entry. Multi-factor authentication (MFA) stands as a sentinel, demanding layered verification. Meanwhile, Role-Based Access Control (RBAC) refines permissions, curtailing potential breaches.
Beyond its security prowess, IAM is a vehicle for compliance with industry benchmarks. By skillfully implementing these practices, organizations reinforce their security posture. This ensures the cloud's advantages are harnessed without compromising data integrity or eroding user confidence.
The very fabric of cloud security extends to robust network security measures. Virtual Private Clouds (VPCs) offer a secure enclave for data and applications, segregating them from potential threats. Firewalls and Intrusion Detection Systems (IDS) act as vigilant gatekeepers, monitoring traffic for unauthorized access and malicious activities. Secure network protocols, like HTTPS and VPNs, encrypt data in transit, thwarting interception.
The dynamic nature of cloud environments demands agile security configurations that adapt to changes seamlessly. By integrating these elements, organizations forge resilient network defenses that insulate critical assets from harm. Network security not only guards against breaches but also nurtures users' trust, showcasing a commitment to safeguarding data while harnessing the boundless potential of cloud resources.
Amid the complex nature of cloud security, vulnerability management emerges as a vital thread. Regular vulnerability assessments and penetration tests unveil potential weak points. Effective patch management is imperative, promptly addressing vulnerabilities as they surface.
Within the realm of container and microservices architecture, security remains paramount. This entails embedding protective measures during the development phase and throughout the software's lifecycle. Proactive vulnerability management curtails the exploitation window, bolstering the defense against cyber threats. This approach not only safeguards the integrity of applications and data but also engenders a culture of continuous vigilance, essential in a landscape where new vulnerabilities can arise at any moment.
Selecting a reliable Cloud Service Provider (CSP) is pivotal. Scrutinizing security features and certifications is essential for ensuring a fortified cloud environment. Additionally, avoiding vendor lock-in risks is crucial. Organizations must plan for a feasible exit strategy that safeguards data and minimizes disruption.
The evaluation process extends beyond technical attributes, encompassing legal and compliance considerations. A well-informed choice ensures alignment with security goals and business needs. This section delves into the intricacies of CSP evaluation, spotlighting the significance of a thorough assessment in establishing a secure cloud foundation.
Infusing security into cloud architecture is a strategic imperative. This proactive approach mitigates risks at their roots, fostering a robust foundation. Implementing automated security measures, from intrusion detection to threat response, minimizes human error and response time. Organizations ensure seamless scalability without compromising protection by designing security as an integral component. This section explores the synergy between architecture and security, underlining how a comprehensive strategy cultivates an environment where innovation flourishes with fortified defenses.
Security education holds paramount importance in fortifying defenses. Recognizing and preventing phishing attacks are pivotal skills. By cultivating a risk-aware culture of attention and vigilance, organizations empower their workforce and actively safeguard against potential threats.
Leveraging real-time monitoring tools allows swift threat identification. Developing an incident response plan ensures a well-coordinated approach to tackling security breaches, minimizing impact and recovery time.
Internal security audits uphold vigilance, identifying vulnerabilities and areas for improvement. Engaging third-party auditors brings impartial assessments, validating compliance and bolstering overall security posture.
In the ever-expansive sky of technological progress, cloud computing has emerged as a guiding star. Yet, as we soar towards innovation, we must anchor our journey in security's embrace. Data protection, identity fortification, network resilience, and vigilant management build a strong force capable of meeting the threat of cyber criminals head-on.
Like celestial navigators, we steer by the constellations of compliance and awareness. The cloud's potential is boundless, but so too is its vulnerability. As we stand at the precipice of possibility, let us weave security into every thread of the cloud's tapestry, ensuring a firm foothold as we traverse the uncharted realms ahead.
Lets remember to keep our feet on the earth and our eyes on the cloud.
Editors Note:The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire.
Link:
Life in the Clouds: Navigating Security Challenges in Cloud ... - tripwire.com
Object-Based Storage Market Thrives on Efficiency and Scalability Demands 2023 to 2028 – Yahoo Finance UK
Company Logo
Object Based Storage Market Market Share Of Cloud Hosting Software By Program Global 2022
Object Based Storage Market Market Share Of Cloud Hosting Software By Program Global 2022
Dublin, Sept. 11, 2023 (GLOBE NEWSWIRE) -- The "Object-Based Storage Market - Growth, Trends, COVID-19 Impact, and Forecasts (2023-2028)" report has been added to ResearchAndMarkets.com's offering.
The object-based storage market is expected to register a CAGR of around 12% during the forecast period. In contrast to conventional storage architectures like file systems, which manage data as a file hierarchy, and block storage, which manages data as blocks inside sectors and tracks, object storage is a type of computer data storage that maintains data as objects.
Key Highlights
The storage market is evolving to address new challenges in enterprise IT, such as exponential data growth, rapid digitalization and globalization of business, and requirements to connect and collect everything. Storage infrastructure systems based on object storage are growing significantly in both the number and capacity of deployments and are becoming the platform of choice to address the growth of unstructured data in enterprise data centers.
The steep growth of unstructured data for emerging and established workloads requires products driven by infrastructure software-defined storage that can deliver tens of petabytes of storage and potentially leverage hybrid cloud workflow with public cloud IaaS. New and established storage companies are developing scalable object storage products to address cost, agility, and scalability limitations in traditional scale-up storage environments.
Most organizations use a mix of storage types: file storage, block storage, and object storage. But the use of object storage is surging for several reasons: speed, scalability, searchability, security, data integrity, and reliability. Object storage provides various benefits for organizations that want to aggregate vast amounts of data, essential layer applications on top of that data store, conduct advanced data analytics that drives innovation, and protect against ransomware attacks.
Story continues
Key Market Trends
Cloud based Deployment to Dominate the Market Share
The steep growth of unstructured data for emerging and established workloads requires products driven by infrastructure software-defined storage that can deliver tens of petabytes of storage and potentially leverage hybrid cloud workflow with public cloud IaaS. New and established storage companies are developing scalable object storage products to address cost, agility, and scalability limitations in traditional scale-up storage environments.
The current unstructured storage market is evolving to embrace hybrid cloud workflows and capabilities as IT leaders are looking to take advantage of public cloud agility, efficiency, and cloud computing capabilities. The object storage segment is considered a two-sided market. There are multiple providers of object storage protocols and consumers of these protocols consisting of applications. There were several providers than consumers until the Amazon S3 API became the de facto standard for object storage. Also, companies utilizing object storage platforms in enterprise data centers adopted Amazon S3, a protocol prominently used in the public cloud, because of the developer community around it.
Several providers and consumers are using Amazon S3. Utilizing public cloud services like AWS has brought significant customer awareness to the object storage market. Software developers building Mode 2 web and mobile applications sometimes must repatriate these applications back to enterprise data centers. Enterprise IT seeks control of data and applications, while software developers seek efficient ways of programmatically interacting with infrastructure.
For the majority of cloud applications, scalability is a crucial necessity. An application's capacity to process requests, users, etc., and manage peak workload should rise as the amount of computing power is horizontally increased. Most cloud service providers also make it simple to increase computing capabilities to accommodate peak demand. However, a quick investigation will reveal numerous reasons these operations can fail or even linger forever.
They can also be challenging to debug. Utilizing file and block storage solutions has the additional drawback of making the takedown of the compute instance more likely to fail or hang. These problems make it impossible for the application to scale as needed right away. However, since object-based storage does not require a mounting phase, this is not a problem. The recently generated compute instances have right away access to the object storage.
North America to account for significant market growth.
North America is expected to expand the global market through the projected period. The region's cloud object storage market is anticipated to grow throughout the review period due to the regional main players' consolidation. Additionally, the region's use of cloud storage services by large and small & medium organizations has increased due to the region's large-scale influx and outflow of enormous data.
One of the factors driving the market's expansion is the growth of internet traffic and user-generated content, and the North American area sees the most I.P. traffic internationally. Cisco projects that the region's I.P. traffic will grow by 21% annually to 108.4 EB by last year.
Competitive Landscape
The object-based storage market is fairly competitive and consists of several players, with a few major players currently dominating the market. Many companies are working on this technology due to its numerous advantages over other storage options. Some major players are Hitachi Vantara Corp, NetApp Inc., IBM Corporation (Red Hat), Scality Inc., and Dell EMC.
For more information about this report visit https://www.researchandmarkets.com/r/gba993
About ResearchAndMarkets.comResearchAndMarkets.com is the world's leading source for international market research reports and market data. We provide you with the latest data on international and regional markets, key industries, the top companies, new products and the latest trends.
Attachment
Go here to see the original:
Object-Based Storage Market Thrives on Efficiency and Scalability Demands 2023 to 2028 - Yahoo Finance UK