Page 2,980«..1020..2,9792,9802,9812,982..2,9903,000..»

Managed Servers Market Expected to Witness a Sustainable Growth over 2026 & Key Analysis by Capgemini, TCS, XLHost, Albatross Cloud, Sungard…

This detailed assessment of all the factors and dynamics affecting the global Managed Servers market landscape provides the client with a critical overview to gain detailed insights to understand the market. This document is well equipped with resourced and information that is essential in changing the growth course of an organization in the Managed Servers market.

Key Companies Covered in This Report: Capgemini, TCS, XLHost, Albatross Cloud, Sungard Availability Services, Hetzner, iPage, Viglan Solutions, Atos, LeaseWeb

Download Sample Copy of Managed Servers Market Report: https://www.reportsintellect.com/sample-request/1840084

NOTE: The Managed Servers report has been assessed while contemplating the COVID-19 Pandemic and its impact on the market.

Managed Servers market segmentation:

The Managed Servers market report has been bifurcated and further divided into various sub segments in order to make it easy to comprehend in a very efficient way, hence increasing the productivity. The segmentation adds a structure and ease of access to the data that has proven to be very overwhelming at times.

By types:Cloud-BasedOn-Premis

By Applications:BFSIIT & TelecommunicationEducationGovernmentRetailManufacturingConsumer GoodsEnergy & UtilityOthers

By Regions:North AmericaEuropeAsia-PacificSouth AmericaThe Middle East and Africa

Check discount for report @ https://www.reportsintellect.com/discount-request/1840084

Some of The Key Aspects Covered in This Report:

Report Highlights:

About Us:

Reports Intellect is your one-stop solution for everything related to market research and market intelligence. We understand the importance of market intelligence and its need in todays competitive world.

Our professional team works hard to fetch the most authentic research reports backed with impeccable data figures which guarantee outstanding results every time for you.So whether it is the latest report from the researchers or a custom requirement, our team is here to help you in the best possible way.

Contact Us:

sales@reportsintellect.comPhone No: + 1-706-996-2486US Address:225 Peachtree Street NE,Suite 400,`Atlanta, GA 30303

Here is the original post:
Managed Servers Market Expected to Witness a Sustainable Growth over 2026 & Key Analysis by Capgemini, TCS, XLHost, Albatross Cloud, Sungard...

Read More..

Benefits of Picking HostingRaja Server – The Citizen

There are chances that you have chosen shared hosting at the stage where you first host an area since it is the most sensible and less exorbitant other option. Regardless of the way that it is significant that you need to change to a dedicated server while your web develops. You can begin shared hosting from the outset and afterward move to Dedicated Server India Else, so your site can crash with developing traffic. Basically, the dedicated server shows that your site has its own foundation and you don't need to impart it to some other organizations. It furnishes the server with force and solidness.

What are the Benefits of picking HostingRaja Dedicated Server India?

Most space proprietors as of now have this inquiry at the highest point of the need list concerning if the faithful servers should choose. In spite of the way that associations have numerous options for their destinations and servers, the common worker is the most celebrated and attainable. In any case, it is important that you go to devoted workers as the association develops. Here are a couple of reasons why Dedicated Server India ought to be chosen.

Assets are not shared:

As you have a private worker, you don't have to impart your PC to somebody. The resources are totally there for you. You don't have to adjust the impacts of the traffic and the servers. The helpless substance runs when you utilize a common worker on another site and afterward diminishes in inactivity, affecting the data transmission. At the point when you pick a devoted worker, you shouldn't have to think about it.

Improved security and execution:

It enhances uptime for your server as you pick a dedicated server. Albeit a ton of traffic gets from the pages, it is more astute to utilize a dedicated server since it has more noteworthy consistency and sturdiness than most other hosting solutions. You are not sharimg your servers to whatever other site that can shield you from a malignant space or a potential spammer when you select a dedicated host.

Flexibility in picking dedicated server India

A dedicated server encourages customers to modify the server, paying little mind to the requirement for RAM, actual space, etc. Until you choose a common server, a customer is restricted to the ventures, code, and working plans presented on the cloud. A dedicated server permits an association to have a refreshed server framework that fits the client's prerequisites. A dedicated server gives more prominent consistency regarding how it is feasible to change a dedicated server. Regarding how a dedicated server ought to be changed, a dedicated server gives some adaptability. You will pick the stage and programming likewise to the details.

No overhead for the upkeep of hardware:

A dedicated server supplier handles the weight of conveying and keeping up cloud offices, lessening costs for enormous venture workers and improving the profit from speculation.

Exceptional IP Address:

Per-worker has an uncommon IP address of its own. You should share the IP address with any remaining pages while picking shared hosting. There is a danger that the site's score could decay if the site close by is indecent. No such question happens for a dedicated server. At the stage where you have an enormous web-based business organization, it is important to have a dedicated server.

Who Need Dedicated Server Hosting

HostingRaja for dedicated server suppliers is an unimaginably successful other option. In the event that you settle on a dedicated server, the specialist co-op can dedicate a PC to oblige the association's IT responsibility. Insurance and ad-lib execution stretches out by a dedicated server. In the accompanying situations, Dedicated Server India is fit.

Sites that need dedicated transmission capacity for substantial traffic altogether for the site to run appropriately.

Organizations with intricate sites frequently need refreshes.

Organizations whose point is proportional to their online presence

An association that has a huge capital base.

Continued here:
Benefits of Picking HostingRaja Server - The Citizen

Read More..

No, the AWS bomb plot likely wouldn’t have shut down large parts of the internet – SC Magazine

Visitors arrive at the cloud pavilion of Amazon Web Services at the 2016 CeBIT digital technology trade fair in Hanover, Germany. The Department of Justice announced last week the arrest of a man who plotted to blow up an AWS datacenter in Virginia. (Photo by Sean Gallup/Getty Images)

A potential plot to bomb a datacenter run by the worlds largest cloud infrastructure provider would likely not have resulted in a massive shutdown for large portions of the internet, despite claims to the contrary made by the would-be attacker, experts say.

Last week, the Department of Justice announced that it had arrested and charged Seth Aaron Pendley, a 28-year-old man from Wichita Falls, Texas for plotting to blow up an AWS datacenter in Virginia. Prosecutors from the U.S. Attorneys Office for the Northern District of Texas said Pendley was arrested right after soliciting an undercover FBI informant to buy C4 explosives to carry out the plan.

According to the complaint, law enforcement first took notice on Pendley on Jan. 8 after an anonymous tipster informed them of posts on an online militia forum by a user named Dionysus who claimed they had traveled from Wichita County, Texas to Washington D.C. two days earlier and was present Jan. 6 during the Capitol riot. Dionysus expressed disappointment that others were not prepared to bring firearms to engage in violence and wrote that they were planning another experiment that would put them in a dangerous situation. When asked by another poster what they were hoping to accomplish, Dionysus responded: Death.

A confidential informant passed along an email associated with the account, which the FBI used to issue a subpoena to obtain subscriber records for Dionysus email account and unmask Pendleys identity.

Later in February, Pendley communicated with another informant over Signal, relaying his plans to attack Amazon Web Services data centers with explosives and sending a photo of a handwritten list of AWS data centers, including one in Virginia.

One of the reasons investigators suspected Pendleys threats were serious is because in those same text exchanges, he wrote that he planned to paint his car from Silver to Black before the attack, then repaint it again afterwards to avoid being identified by law enforcement. Pendley did indeed paint his car black several days later, and made it clear his target was knocking out AWS servers and shutting down large portions of the internet, which he believed would strike a blow against corrupt government officials.

The complaint does not say which party first brought up explosives, but does say that informant and Pendley agreed to meet later to conduct a sale of C4 explosives that could be used in the attacks, and when they did on April 8, the FBI arrested him.

The main objective is to f up the Amazon servers, Pendley is alleged to have said at one of the meetings. Theres 24 buildings that all this data runs through in America. Three of them are right next to each other and those 24 run 70 percent of the Internet.

The plan was not credible

While the threat and potential for destruction may have been very real, security experts say Pendleys plan would not have carried out his objective.

An attack on AWS assets could potentially have some second and third order effects because of how much the internet depends on functioning Amazon/AWS servers. The company owns close to half of the worlds public cloud infrastructure market, according to Gartner, and any brief outage or downtime at AWS usually results in wide swaths of the internet being unavailable. AWS cloud servers are also used by many businesses to store backup data in the event their business is hit by a cyberattack or other disaster.

However, they also take precautions precisely to avoid the potential for one datacenter to become a single point of failure.

Compute loads are distributed between multiple locations so that if one goes down, it would cause a reduction in total compute power, but the services would continue to be delivered even if at a reduced capacity, said Chris Morales, chief information security officer for Netenrich, a cybersecurity and resolution intelligence company, when asked about the potential impact of bombing a single datacenter location for a large cloud infrastructure provider.

Jim Reavis, CEO of the non-profit Cloud Security Alliance, told SC Media that Pendleys assessment of the damage to internet infrastructure from a successful attack is off-base. Tier one cloud providers like AWS are known for investing heavily in system resilience precisely to avoid cascading effects from an outage in a single location. Those practices often include things like data center redundancy, multiple network backbones within each location and other protections that prevent a localized problem from spreading too far.

Just gaining access to a data center itself is extremely difficult, Reavis said, one of the reasons observers tend to focus more on the potential for disruptive attacks in the digital arena.

Companies owning significant datacenter infrastructure invest heavily in physical security that you would associate with other highly valuable assets, such as bank vaults and military installations, said Reavis. These types of scenarios are part of the typical [disaster recover/business continuity] planning.

While software bugs, power failures, network loss and misconfigurations have led to widespread outages of AWS hosted sites in the past, a physical attack like the one described by Pendley would likely result in loss of life at the impacted facility and downtime for the customers that used that data center exclusively and without real-time or offline redundancy or backups.

But it wouldnt break the internet, or anything even close to it.

The allegation that this person claimed to have a plan to kill of about(sic) 70% of the internet is not credible without a significant number of co-conspirators operating with a highly sophisticated and coordinated plan, Reavis said. A physical attack could obviously result in localized devastation and loss of life but would not result in massiveInternet outages. It is also important for casual readers to understand that large datacenters are highly automated and have very few workers on site.

Read the original post:
No, the AWS bomb plot likely wouldn't have shut down large parts of the internet - SC Magazine

Read More..

Ready to be a GCP architect? Try this quiz and see – TechTarget

By

Published: 16 Apr 2021

With cloud central to organizations everywhere now, qualified cloud architects are in demand. This IT professional plays a critical role in formulating and implementing an organization's cloud strategy. Post-deployment, the cloud architect keeps an organization's cloud infrastructure updated and functioning.

Google Cloud Platform is one of the top three public cloud providers currently, in terms of market share. So passing the Google Cloud Professional Cloud Architect exam can open career doors. Becoming a Google Cloud Certified Professional Cloud Architect is one important way to demonstrate your expertise when it comes to the business and technical requirements needed to work in Google Cloud Platform.

In his book Google Cloud Certified Professional Cloud Architect Exam Guide, from McGraw Hill, author Iman Ghanizada surveys the underlying concepts the exam covers, from designing a cloud architecture to maintaining its operational reliability. This book also offers practice quizzes across its twelve chapters, covering everything from cloud identity to DevOps to billing and support. It is packed, too, with practical test-taking tips.

Help increase your odds of passing the certification exam by taking this quiz. These 10 questions, drawn from the exam guide, can help assess your readiness and identify where to focus your study time.

See the original post here:
Ready to be a GCP architect? Try this quiz and see - TechTarget

Read More..

Crate.io Expands CrateDB Cloud with the Launch of CrateDB Edge – GlobeNewswire

SAN FRANCISCO, April 15, 2021 (GLOBE NEWSWIRE) -- Crate.io, developer and supplier of CrateDB, the purpose-built database optimized for machine data use cases, today announced the launch of CrateDB Edge. The new solution enables Crate.io customers to capture and analyze data at the data source, regardless of geographical location or whether there is cloud or internet accessibility. CrateDB Edge brings the capabilities of CrateDB Cloud Crate.ios managed database-as-a-service to edge locations for the first time.

CrateDB is an incredibly powerful database that is purpose-built for the unique characteristics and high-volume, high-scalability demands of machine data use cases, says Bernd Dorn, CTO of Crate.io. With the launch of CrateDB Edge, our database can be deployed, managed, and backed up through the same database management capabilities and functionalities that run within the cloud service. Data collection and edge analytics continue to be available, even when the internet connection gets interrupted. Deployments in remote locations can be managed centrally, including backup and replication. Many of our current customers require the flexibility to leverage CrateDB in hybrid scenarios, a mix of cloud and edge. CrateDB Edge is built exactly for these cases.

Even as enterprises deploy database environments in the cloud, many and particularly those with strict data security parameters or with distributed locations generating high-velocity data require on-premises databases as part of a hybrid strategy. CrateDB Edge allows organizations to maintain full control over their infrastructure and still leverage CrateDB as an expertly-managed service. Customers can choose to deploy a cluster in their own region and operate it entirely on their own infrastructure, whether that is AWS, Azure, or on physical servers at their facilities. Kubernetes is the interface hosting the CrateDB Edge clusters; customers are in control of data through their CrateDB Cloud web interface.

CrateDB Edge is built to deliver:

We are excited about the benefits CrateDB Edge provides to customers; this is the next generation of database technologies that enable digitalization initiatives at scale, says Eva Schnleitner, CEO of Crate.io. For example, global industrial companies generating massive volumes of machine data in every plant can deploy a local cluster in each location. They get the freedom to utilize our CrateDB database on the edge and in the cloud, fully managed, backed up and synchronized even for locations with inconsistent or intermittent internet connections. Combining these features with data ownership flexibility and Crate.ios expertise managing and optimizing CrateDB for machine data, and we believe cloud-managed CrateDB Edge will be a very attractive solution for many organizations.

Crate.io is inviting existing and new CrateDB users to join an early adopter program to pilot and implement lighthouse cloud and edge use cases by visiting CrateDB Edge or sending an email to edge@crate.io.

About Crate.io

Crate.io is the developer of CrateDB, a highly scalable distributed open source database solution that combines the performance of NoSQL with the power and simplicity of standard SQL. Designed specifically to support machine data applications and IIoT, CrateDB is optimized for time series and industrial data and runs in the cloud on Azure and Amazon as well as on the edge and on-premise. Crate.io was founded in June 2013 and operates from its locations in the United States, Germany, Austria and Switzerland, as well as remotely worldwide.

A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/f95fadec-3282-42a0-90d7-22ff8b3359b

The rest is here:
Crate.io Expands CrateDB Cloud with the Launch of CrateDB Edge - GlobeNewswire

Read More..

The Middle East data center market by investment is expected to grow at a CAGR of 7% during the period 20202026 – GlobeNewswire

New York, April 16, 2021 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Data Center Market in Middle East - Industry Outlook and Forecast 2021-2026" - https://www.reportlinker.com/p05955548/?utm_source=GNW

The data center market has observed a steady growth due to the outbreak of the COVID-19 pandemic, resulting in heightened access to internet-related services aided by nationwide lockdowns and restrictions. IoT-enabled devices witnessed high acceptance for monitoring and surveillance purposes, especially in the healthcare sector, during the pandemic. Government agencies have also contributed to the growth of cloud-based services in the Middle East. In Kuwait, the Ministry of Health (MoH), the Central Agency for Information Technology (CAIT), collaborated with Zain to launch an application Shlonik to monitor citizens that have returned to the country. The growing adoption of cloud, IoT, big data in the wake of the COVID-19 has increased colocation investments in the region. Cloud, social media, and video conferencing service providers have contributed majorly to data generation. Many enterprises operating in the cloud are migrating to colocation data centers to operate hybrid infrastructure services.

The following factors are likely to contribute to the growth of the Middle East data center market during the forecast period: Smart City Initiatives fueling Data Center Deployments Submarine Cable Deployment and Impact on Data Center Investment Big Data, IoT, and Cloud Technology driving Data Center Investments Migration from On-Premises Infrastructure to Colocation & Managed Service

The study considers the present scenario of the Middle East data center market and its market dynamics for the period 2020?2026. It covers a detailed overview of several market growth enablers, restraints, and trends. The report offers both the demand and supply aspects of the market. It profiles and examines leading companies and other prominent ones operating in the market.

Middle East Data Center Market Segmentation The Middle East data center market research report includes a detailed segmentation by IT infrastructure, electrical infrastructure, mechanical infrastructure, cooling technique, cooling systems, general construction, tier standards, geography. The Middle East IT infrastructure market expects to grow at a CAGR of over 6% during 20202026. The server market is shifting slowly from rack-based to blade servers to support a high-density operating environment. This is because of the increased usage of IoT, big data analytics, artificial intelligence, and machine learning by enterprises across the Middle Eastern market. Enterprises prefer servers that can reduce space in the data center environment without affecting performance.

The UPS market in the Middle East anticipates to cross USD 89 million during the forecast period. There has a steady rise in the deployment of edge computing; also, colocation operators are investing in the region, which increases the demand for high-capacities UPS in the region. The use of 750?1,500 kVA systems has witnessed high adoption along with less than 500 kVA UPS systems. The adoption of lithium-ion batteries is also likely to increase during the forecast period as the price of these batteries is expected to decline during the forecast period.

Cooling systems, including water-cooled chillers, CRAH, and cooling towers, are installed with N+20 redundancy in the Middle East region. Most facilities in the region design to cool servers via water-based cooling techniques. The growing construction of data centers in the UAE is a key factor in developing multiple chillers, cooling towers, and CRAH units. In Saudi Arabia, data centers construction will increase the adoption of multiple chillers, cooling towers, and CRAH units. Newly constructed data center facilities will use advanced air-based cooling techniques because of the high temperature. Data centers in Turkey adopt CRAC & CRAH units and chiller units. In terms of redundancy, most operators use N+1 and N+2 cooling redundancy. Besides, operators are likely to deploy dual water feed for efficient and uninterruptable operations.

Brownfield development is more cost-effective than greenfield development in the Middle East. In the Middle Eastern region, data center commissioning service providers follow standard operating procedures, depending on the depth of commissioning required in the facility. The Middle East data center market is mostly dominated by small data centers with less than 15 MW power centers. The building & engineering design market is expected to reach over USD 32 million in 2026, growing at a CAGR of approx7%. The increasing demand for reliable, efficient, and flexible building infrastructure among service operators is expected to influence its growth. The adoption of physical security apparatus is increasing to protect the data and information. BFSI, telecommunication, and healthcare are the most vulnerable sectors for intrusions and breaches. Sensors and video cameras are installed for surveillance in data centers in the region. The use of artificial intelligence and machine learning in the data center is driving the DCIM solutions market. DCIM solutions improve efficiency, monitor power consumption, and predict system failures. They are becoming a major part of data center operations as they monitor critical elements such as power, cooling, and IT infrastructure.

Most data centers in the UAE are Tier III certified or built according to Tier III standards. Several data centers in Saudi Arabia are built according to Tier III or Tier IV standards and have a minimum redundancy of N+1 in power and cooling infrastructure. Tier III data centers are equipped with UPS systems redundancy of N+1. The majority of modern data centers in Turkey are developed according to Tier III standards, with a minimum of N+1 redundancy in power infrastructure. A few data centers operate 2N power infrastructure or have additional capacity to commission 2N infrastructure solutions based on the customers demand. Most developments in Turkey are greenfield projects, whereas modular data centers are confined to enterprise on-premises deployments.

By IT Infrastructure Servers Storage Network By Electrical Infrastructure UPS Systems Generators Transfer Switches and Switchgears PDUs Other Electrical Infrastructures By Mechanical Infrastructure Cooling Systems o CRAC & CRAH Units o Chiller Units o Cooling Towers, Dry Coolers, & Condensers o Other Cooling Units Racks Others Mechanical Infrastructure By Cooling Technique Air-based Cooling Technique Liquid-based Cooling Technique By General Construction Core and Shell Development Installation and Commissioning Services Engineering and Building Designs Physical Security DCIM/BMS By Tier Standards Tier I & II Tier III Tier IV

INSIGHTS BY GEOGRAPHY Turkey, UAE, and Saudi Arabia are the three largest contributors to the Middle East data center market share. The rising adoption of cloud-based services leads to the growth of retail and wholesale colocation services in the UAE. The market is witnessing an increase in the demand for colocation spaces across existing and upcoming data centers. The rapid investment in 5G technology and its deployment is increasing investments in data centers. Dubai is one of the most preferred locations for data centers in the UAE, followed by Abu Dhabi. Similarly, Saudi Arabia is observing rapid digitalization and automation of business activities. In 2020, over 75% of companies implemented IoT in their applications. The internet penetration in Saudi Arabia was around 95% in 2020. Enterprises across various industries such as banking, financial services, insurance, IT & telecommunications, energy & utilities, media & entertainment, and manufacturing have adopted cloud services, thereby driving the market.

By Geography Middle Eastern Countries o UAE o Saudi Arabia o Jordan o Turkey o Other Middle Eastern Countries

INSIGHTS BY VENDORS Arista Network, AWS, Atos, Broadcom, Cisco Systems, and Dell Technologies are among the major IT vendors expanding their presence in the Middle East region. They have a strong physical presence in the region and are the major adopters of high-density, mission-critical servers, storage infrastructure, and network infrastructure. Vendors are focusing on sustainable data centers. They procure renewable energy sources in partnership with local service providers. Construction and design are critical for data center operators because they need to adhere to the Uptime standards.

Key Data Center Critical (IT) Infrastructure Providers Arista Networks Atos Broadcom Cisco Systems Dell Technologies Hewlett Packard Enterprise (HPE) Huawei Technologies IBM Lenovo NetApp

Key Data Center Contractors Atkins Deerns ENMAR ENGINEERING Edarat Group ISG RED Engineering Harinsa Qatar (HQ) Turner & Townsend McLaren Construction Group LAING OROURKE ICS Nett Linesight Qatar Site and Power (QSP)

Key Data Center Investors Amazon Web Services (AWS) Akbank Batelco Etisalat Group Equinix Gulf Data Hub Turkcell Telecom Italia Sparkle Khazna Zain

KEY QUESTIONS ANSWERED 1. How big is the Middle East data center market? 2. What factors are driving the data center market in the Middle East? 3. What opportunities are offered in the UAE data center market? 4. What is the Middle East data center market growth? 5. What factors are enabling the growth of colocation service providers in the region?Read the full report: https://www.reportlinker.com/p05955548/?utm_source=GNW

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________

More here:
The Middle East data center market by investment is expected to grow at a CAGR of 7% during the period 20202026 - GlobeNewswire

Read More..

A truly agnostic approach to key encryption removes the risks in hybrid cloud – ITProPortal

As organizations migrate workloads to the cloud in search of greater agility, innovation and reduced costs, they face serious security challenges that conventional key encryption technology fails to meet.

The range of security threats covers everything from the hijacking of cloud services to the criminal use of AI and ML and the emergence of cyber-espionage-for-hire. Ransomware and phishing attacks have increased as more enterprises adopt cloud applications.

The pandemic has accelerated this migration of data to the public and private clouds. A report from Deloitte1 highlights how investment in cloud infrastructure increased through 2020 with the scale of mergers and acquisitions indicating significant expectations of further growth. Much of this pandemic migration was on consumer-grade connectivity, however, as millions of employees worked from home, adding to the security vulnerabilities.

The hybrid use of a combination of public, private cloud and on-premises provision is increasingly what works best for organizations, but in the absence of effective security it increases the potential attack surface for cybercriminals. The typical enterprise may now use as many as 1,200 different clouds including commonplace applications or systems such Microsoft Exchange or Salesforce. Using a mix of environments for data and applications allows enterprises to spread the workload and risk, theoretically avoid vendor lock-in and achieve the maximum possible levels of resilience and security while optimizing workflows. It is why analysts IDC estimate more than 90 percent of enterprises worldwide will be relying on the hybrid approach to meet their infrastructure needs by the end of next year (2022).

Combined with the imposition of stricter regulations such as the EUs GDPR, these developments make control of encryption keys used to protect data more important than ever. For those with heavy investments in on-premises infrastructure, hardware security modules (HSMs), or apps partially in the cloud, the inability to secure and manage the cryptographic keys that protect their data across a multitude of scenarios has the potential to bring their organizations to an extremely costly standstill.

The problem is that each cloud deployment requires a different key because the cloud providers use discrete systems and technologies to protect data. Refactoring to create these keys takes time and knowledge of the providers technology.

The creation and management of keys is a huge burden for IT managers, especially when hardware remains intact. Security is potentially compromised when organizations are unable to manage keys across disparate sites because of dependencies on the applications they are looking to authenticate, each having been written to specific cloud requirements. Developers and solution architects take on the biggest migration risk, because the painstaking work that it took to develop an application once, may now have to be repeatedly refactored to ensure that keys work anywhere in the cloud, at any time.

For key management, organizations may feel they can rely on the solutions provided by the major cloud service providers (CSPs), who have made encryption simple to activate. It is just so much easier. There is a big problem with this, however, because having the keys held by the same entity that holds the data is contrary to any notion of best practice. Besides the obvious vulnerability that comes from cybercriminals penetrating the CSPs security to gain access to its customers data, there the risk of CSPs having to comply with government warrants for disclosure.

It is also far harder to achieve consistency of data governance across an organizations entire and varied infrastructure including on-premises hardware when keys are managed by the cloud provider. The way CSPs solutions deliver a segmented picture of the key logs and usage reports makes it impossible for enterprises to manage their entire range of keys in one place with full visibility across all sites. Time to market for new and existing applications also suffers as they require keys to ensure the requisite security policies are met in each case.

The way out of this tangle is through a cloud-agnostic solution that provides keys that protect data across all environments. This is an approach that does not require refactoring with every deployment. Every claim for cloud-agnosticism should be rigorously challenged, however, to ensure solutions will do what their creators claim.

The surest way to avoid an inadequate solution and to guarantee cloud-agnosticism is through the adoption of a third-party platform that overrides the complexity of refactoring. The solution should enable enterprises to write their own keys and to control them, setting policy in relation to usage. This needs to be through a separate, one-stop platform, using advanced technology such as multi-party computation (MPC). MPC splits a secret key into two or more pieces and places them on different servers and devices. Because all the pieces are required to get any information about the key, but are never assembled, hackers must breach all the servers and devices. Strong separation between these devices (different administrator credentials, environments, and so on), provides a very high level of key protection.

Adopting MPC third-party key management gives enterprises using hybrid cloud or multi-cloud infrastructures the single-pane-of-glass visibility that is essential for security and surveillance, providing information about all keys and digital assets, how they are stored, who is using them and how they are programmed.

This gives control that complies with various data protection and data privacy regulations such as GDPR. A good example that illustrates this is data-shredding, where an organization uploads highly sensitive data to the cloud and is obliged to delete it after a certain time. How can the organization ensure the data was eliminated from all instances, backups, servers in all relevant regions? This may be a difficult undertaking but holding the master encryption key separately from the cloud makes it much easier. Delete the master key, and the encrypted data in the cloud is instantly shredded and cannot be recovered.

Neither is it possible for a rogue user to get round policy governing data access, even if they work for a CSP. In other words, the adoption of a third-party cryptographic key platform founded on MPC technology removes much of the risk that currently accompanies the mass migration to the cloud at enterprise level.

This is the one way organizations can be certain to deliver greater responsiveness, innovation and efficiency from increased cloud adoption and the use of hybrid environments without any compromise of security.

Michael Hughes, Chief Business Officer, Unbound Security

Read the original post:
A truly agnostic approach to key encryption removes the risks in hybrid cloud - ITProPortal

Read More..

HCI reduced this Universitys IT, server issues by 90% – ETCIO.com

GLA University in Uttar Pradesh, India started their digital transformation journey with a few IT initiatives. In the initial phase, the university invested in various servers which supported multiple applications to run classes online and manage admissions as well. But with time and technology transitions, the university realised the lack of computing capabilities and faced server downtime issues while processing the system requirements. Those IT systems and servers were not enough to meet the universitys requirements and this situation caught the attention of their IT Head, Binod Bihari Ray.

The major IT pitfall

Binod Bihari Ray, a technology enthusiast, and IT expert decoded the universitys server and computing requirements. He started to work on various IT solutions and with the advent of brainstorming sessions, Ray finally decided to implement HCI(Hyper-Converged Infrastructure). According to him, the HCI technology is flexible, scalable and easy to maneuver, especially for small setups like the university.

Our infrastructure was not equipped to handle an overload of concurrent users which led to regular unscheduled maintenance checks and forced downtime of up to eight hours of server stoppage, and up to a minute for simple data retrieval jobs. We tried to invest in individual servers and outsourced admissions that just simply increased our IT investments, infrastructure manpower, and overheads significantly. This is when we decided to explore different vendors who would help us address this challenge, Binod Bihari Ray, IT-Head, GLA University told ETCIO.

Eureka! HCI is the solution

Ray and his team gathered knowledge and did self-research on the use cases of HCI and how this technology will solve the universitys IT problems at a reasonable cost. He wanted to partner with an IT vendor with which his team can collaboratively solve the problem. But the challenge was to select a single vendor who can manage multiple things simultaneously and can react promptly.

After going through different vendors portfolios, POCs, etc, based on cost, implementation, and availability factors, Ray decided to implement Dell EMC VxRail, an HCI solution by Dell Technologies. He did multiple discussions with the technology provider to understand how beneficial this HCI solution is going to be for the university. Later on he deployed Dell EMC VxRail which helped the university in lifecycle management of a fully integrated hardware and software stack while cutting costs.

The process of execution of the project was simple. GLA University being a prime educator understood the importance of adopting new technologies and put their trust in us. We were able to execute the entire process of assessment, identification, and action within just a span of 2 weeks. Experts at Dell Technologies guided us and with their support, we deployed Dell EMC VxRail HCI System Software with utmost ease. Now, GLA University will be able to handle any type of workload that might come their way even during this era of remote working, Gurpreet Singh Bhatia, MD, Arrow PC Network said when questioned about the companys contribution in this project deployment.

Ray expressed that choosing the HCI solution was a relatively easy call to take, because of the cost efficiency factor of the solution. Moreover, he has a separate budget for IT spending, and other than the technology cost, he is quite zealous about how an innovative solution can change the universitys way of working.

Deployment manifesto

Post thorough research, we got in touch with Arrow PC Network, a Partner of Dell Technologies, to overcome the challenges related to our workloads. They explained to us the need for a 3-tier/vSAN Architecture to automate business requirements. In addition, they suggested that we deploy VxRail HCI System Software, powered by Dell Technologies as it is an end-to-end server technology solution that can be easily implemented into any current business process experience and is optimized to support the most demanding workloads and applications. Arrow PC Network, with the support of Dell Technologies, led the project and carried out the deployment of the VxRail solution. Additionally, a full staff training was completed within just 2 weeks, Ray highlighted.

Post-deployment situation

Before deploying HCI, the university faced critical issues in handling the overflow of concurrent users. HCI helped the university with enhanced computing performance and simplified processes without sacrificing features or reliability while reducing time spent on building and maintaining IT systems.

With the HCI solution, GLA University has modernized its data centre and has become cloud-ready for the future. They are now able to meet any HCI use case including support for many of the most demanding workloads and applications as well as experience consistent performance.

The university has been able to reduce their overheads; namely, AMC, electricity, cooling units, etc., and have even diverted 80% of their teams time to high-value tasks without worrying about their savings in terms of manpower and training.

Since HCI has the power to merge storage and compute into one, we realized, it would not only help us reduce our initial footprint but would also help in reducing our investments and costs in the long run. Not only this, but we were also surprised by the simplicity that it would provide us, in terms of applications and their interface, making it easier for our staff to manage. Hence, going ahead with the HCI solution was a wise decision for us, Ray concluded.

Read more here:
HCI reduced this Universitys IT, server issues by 90% - ETCIO.com

Read More..

Top Threats to Your IT Security in 2021 (And How to Address Them) – Bdaily

Member Article

2020 saw cyber crime rates rise by 31%. This upward trend has continued on a similar trajectory since the inception of digital technology and shows no signs of slowing down.

Cyber crime is an ever-present threat to your business and your workforce. Your digital assets have immense value their loss can destroy your business. Cyber security should be a top priority in 2021, but with so many avenues available for hackers to exploit, what kind of threats should you be paying closest attention to right now?

Despite being an ageing practice (relatively speaking), phishing emails remain one of the greatest threats to your organisations security.

Generally, when our minds turn to phishing emails, we think of poorly put together messages from fake looking email addresses, often riddled with horrible code formatting and spelling mistakes.

But, while these kinds of mass phishing attempts are still ever-present, phishing can get far more sophisticated when it comes to corporate cyber crime. Phishing hackers can use the vast array of personal information available online to build a profile of their victims.

Often digging up details from social media LinkedIn being a great place to start phishers work out the best target within your business. For example, if they want customer payment details, theyll go after the accounts management team. Theyll then be able to check for personal information to sprinkle into the email to make it seem genuine, perhaps referencing a gathering or recent picture of a pet based on a social post. Theyll then be able to ascertain who their target works with, build a fake email that looks genuine, and set up their message.

They may even pretend to be you.

With so much background research, these emails can be really tough to see for what they are. Theyre intelligent cyber attacks that your employees will not anticipate. So how do you protect against them?

You make sure your employees do anticipate them.

Use training to make sure your employees are aware of the threats they face from phishing. They might not always know if the email is a phishing attempt straight away, but they can learn to look out for warning signs, such as requests to share data or passwords.

This awareness can lead to a new policy, such as ensuring employees never ask for sensitive data over email or that passwords and data are shared through internal and monitored systems rather than email accounts.

Shadow IT is a bit of a buzzword, but it simply describes the use of unapproved software through your systems and network.

With the introduction of cloud software, coupled with unprecedented levels of internet access, its become increasingly easy for your employees to use internal system software to access online services and programs take Skype, Dropbox and CRM services as examples.

Theyll use these in place of your approved company software, often for innocent reasons, such as being familiar with the software, believing it to be a more effective tool, or just out of pure habit.

Since this shadow software hasnt been assessed or approved, it can pose a security risk. The software could carry malware or present an unprotected backdoor to attackers, or it could be used to share data without proper encryption and protective measures.

The simple solution here is assessment and policy. Crackdown on user profiles and search for unapproved software usage while also educating staff on the risks they pose.

Creating awareness both within your technical teams of the potential for shadow software and your employee base as to the damage this shadow software can have could dramatically reduce the risk of it becoming a problem for your business.

Back to more buzzwords with IoT Internet of Things.

IoT devices is a collective term used to describe the diverse range of new hardware creeping its way into modern life. From smart speakers to wearable tech, the IoT device market is growing rapidly.

While these innovations tend to make life easier, they are also novel and well within their infancy. Were still learning about their unique security vulnerabilities and design flaws to this day. For example, back in 2019, hackers learned they could use laser technology to influence smart home speakers like Google Home and Alexa.

Simply put, we just dont know how these machines can be used to potentially infiltrate IT systems and gain access to data.

The easiest way to solve the problem is to avoid integrating IoT smart technology with your business, but that might not be feasible if the tech in question is important for processes.

Instead, it may be more prudent to consider how much access your IoT devices have to your network and what methods of protection you can put in place to put distance between them and your data, should they fall prey to cyber criminals in the future.

With remote work on the rise following the COVID-19 pandemic, businesses face a new cyber security problem.

Remote working devices need to connect to your systems, but they cannot be covered in the same layers of security as your local hardware. With staff now using off-site hardware to work, there is a serious risk of remote cyber breaches.

The answer to this problem lies in endpoint solutions.

There are services like the Microsoft Modern Desktop that allow users to access their entire suite of work software through the cloud. They only need a monitor and a device capable of streaming the remote desktop. Their actual computer setup is all virtual stored and managed online, not on their devices.

This kind of setup gives businesses near-total endpoint control.

Instead of protecting the entire remote system of each remote employee you have, you only have to manage a single endpoint for each of them.

By securing access to your cloud service using systems like two-step authentication and regularly updated access controls plus a policy that ensures no other hardware is installed on the device used to access your workspaces cloud platform you can seriously reduce the chance of remote workers causing cyber breaches.

An important note here is to remember the risk of shadow software.

With remote workers all accessing a cloud system, shadow software installation will be directly housed within your cloud servers, not external drives. This makes it even easier for hackers to infiltrate your network, as theyre already inside the walls, so to speak. If youre running remote desktops, shadow IT policy must be clear and strictly enforced.

This was posted in Bdaily's Members' News section by Optimising IT .

Excerpt from:
Top Threats to Your IT Security in 2021 (And How to Address Them) - Bdaily

Read More..

The Southeast Asia data center market by investment is expected to grow at a CAGR of over 8% during the period 20212026 – GlobeNewswire

New York, April 16, 2021 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Data Center Market in Southeast Asia - Industry Outlook and Forecast 2021-2026" - https://www.reportlinker.com/p05758036/?utm_source=GNW

The data center market in Southeast Asia is growing significantly, with multiple investments in Singapore, Indonesia, Malaysia, Vietnam, Cambodia, and Thailand. Southeast Asia is among the fastest-growing digital markets worldwide. The internet usage and social media trends have increased the demand for faster internet networks and data centers to store data generated by them. The internet penetration is one of the strongest drivers for the data center market in Southeast Asia. Moreover, social media usage among consumers and digital transformation by enterprises across industry verticals are other major factors promoting data center growth. The investments are growing significantly across Singapore, Indonesia, Malaysia, Vietnam, Cambodia, and Thailand. In 2020, Equinix, Digital Realty, NTT Global Data Centers, Space DC & GIC, ST Telemedia Global Data Centres, DTP, and DCI Indonesia were major investors in the Southeast Asia data center market.

The following factors are likely to contribute to the growth of the Southeast Asia data center market during the forecast period: Increasing Adoption of Renewable Energy Implementation of Advanced Technology in Data Centers Replacement of VRLA with Lithium-Ion Batteries Increased Adoption of All-Flash & Hybrid Array

The study considers the present scenario of the Southeast Asia data center market and its market dynamics for the period 2020?2026. It covers a detailed overview of several market growth enablers, restraints, and trends. The report offers both the demand and supply aspects of the market. It profiles and examines leading companies and other prominent ones operating in the market.

Southeast Asia Data Center Market Segmentation The Southeast Asia Data center market research report includes a detailed segmentation by IT infrastructure, electrical infrastructure, mechanical infrastructure, cooling technique, cooling systems, general construction, tier standards, geography. The server market expects to witness significant growth in the next few years due to increased investments from large cloud service providers in the region. The adoption of converged and hyper-converged infrastructure solutions is projected to increase the demand for servers with multicore processors. The migration of enterprises from on-premises to colocation facilities is likely to aid in the growth of high-performance computing (HPC) infrastructure in the Southeast Asia market.

The data center generator market is likely to grow due to the construction of large and mega facilities across the Southeast Asia region. The adoption of efficient power systems such as gas generators is growing. The implementation of the carbon tax in countries such as Singapore has driven operators to opt for efficient generators. Although generators are the significant sources of carbon emission, their adoption among facilities continues to grow. However, operators are adopting efficient and cleaner power sources. Innovations in terms of fuel cells are expected to reduce the use of generators during the forecast period.

Most data centers in Singapore design to cool infrastructure through water-based cooling techniques. The use of air-based cooling is low in Singapore than in other Southeast Asian countries. Data centers are designed for hot/cold aisle containment systems and are equipped with 42U and 45U racks. However, 47U48U racks expect to witness high growth during the forecast period. In Malaysia, both air-based and water-based cooling systems use for cooling purposes. Large facilities in the country expect to use water-based cooling solutions, whereas small ones are likely to use air-based cooling systems. Similarly, several small data centers in Thailand implement air-based cooling systems.

The majority of data center development in Malaysia is greenfield construction. The market has strong growth potential for modular projects. The labor cost in Malaysia is cheaper than in Singapore. However, the non-availability of a skilled workforce is a significant challenge among service providers operating in the country. Several facilities in Singapore install DCIM, BMS, and EMS systems for physical security, monitoring, and management. The data center market in Thailand includes greenfield and brownfield data center construction. It requires trained data center professionals to overcome the shortage of skilled workforce in the country. Infrastructure providers and their local partners also serve as a strong backbone for installation and commissioning services.

The Tier III data center market in Southeast Asia expects to reach USD 1.3 billion in 2026, growing at a CAGR of over 8%. There are over 89 tier III certified facilities in seven countries, including Singapore, Indonesia, Malaysia, and Thailand. Indonesia is the major location with around 40 certified facilities. Most new data centers in the region are designed according to Tier III standards with a minimum of N+1 redundancy. The Tier IV data center market is expected to reach over USD 620 million by 2026. Singapore, Indonesia, Thailand, and Myanmar are witnessing Tier IV facilities construction, with Indonesia and Thailand accounting for seven Tier IV facilities. Facebook, Apple, Microsoft, and Google are the major contributors to the Tier IV market.

By IT Infrastructure Servers Storage Network By Electrical Infrastructure UPS Systems Generators Transfer Switches and Switchgears PDUs Other Electrical Infrastructures By Mechanical Infrastructure Cooling Systems o CRAC & CRAH Units o Chiller Units o Cooling Towers, Dry Coolers, & Condensers o Other Cooling Units Racks Others Mechanical Infrastructure By Cooling Technique Air-based Cooling Technique Liquid-based Cooling Technique By General Construction Core and Shell Development Installation and Commissioning Services Engineering and Building Designs Physical Security DCIM/BMS By Tier Standards Tier I & II Tier III Tier IV

INSIGHTS BY GEOGRAPHY Singapore is the major data center hub in Southeast Asia, with the presence of several facilities operated by internet, cloud, telecommunication, and colocation service providers. The sub-sea fiber network connectivity routes over 90% of the worlds Internet traffic. Singapore has robust fiber connectivity to major APAC data center market and continues to expand its capacity. Many cloud service providers support customers in APAC via Singapore. The Singapore government is likely to migrate government systems to the cloud. In December 2020, Equinix announced the development of its fifth data center facility in Singapore (SG5), which expects to be operational by Q2 2021. The impact of the COVID-19 pandemic on the Singapore data center market was low as these services were termed as essential. Singapore is observing investment in renewable energy such as solar and wind sources which are led by hyperscale and colocation data center operators such as Microsoft, Facebook, and Equinix. Renewable energy installations will continue to grow among existing and upcoming facilities across the country.

By Geography Southeast Asia o Singapore o Malaysia o Thailand o Indonesia o Cambodia & Myanmar o Vietnam o Philippines

INSIGHTS BY VENDORS HPE, Dell Technologies, Fujitsu, NetApp, Inspur, Oracle Huawei, NetApp, and Cisco Systems are among the major revenue contributors in the Southeast Asia data center market share. AWS, Microsoft, Alibaba, Tencent, IBM, Oracle, and Google are expanding their new cloud regions. These providers are the major adopters of high-density, mission-critical servers, storage infrastructure, and network infrastructure. Schneider Electric, Eaton, Cummins, Vertiv, Rolls Royce Power Systems, HITEC Power Protection Caterpillar, and ABB are the major electrical infrastructure vendors with a strong presence in Southeast Asia. The infrastructure market in Southeast Asia will witness immense competition with the growing construction of data centers in the next few years.

Key Data Center Critical (IT) Infrastructure Providers Arista Networks Broadcom Cisco Systems Dell Technologies Fujitsu Hewlett Packard Enterprise (HPE) Huawei Technologies IBM Inspur Lenovo NetApp Oracle

Key Data Center Support Infrastructure Providers ABB Bosch Security Systems (Robert Bosch) Caterpillar Cummins Cyber Power Systems Delta Electronics Eaton Fuji Electric HITEC Power Protection KOHLER-SDMO Legrand Mitsubishi Electric Corporation Piller Power Systems Rittal Rolls-Royce Power Systems Schneider Electric Vertiv Group

Key Data Center Contractors Arup Group AWP Architects Aurecon Group CSF Group Cundall DSCO Group Fortis Construction Faithful+Gould Kienta Engineering Construction LSK Engineering M+W Group (Exyte) NTT FACILITIES Group Nakano Corporation PM Group Sato Kogyo

Key Data Center Investors AIMS Data Centre AirTrunk Operating Bridge Data Centres BDx (Big Data Exchange) Digital Realty DCI Indonesia DTP Equinix Iron Mountain Keppel Data Centres Kepstar Data Centre Management NTT Global Data Centers Regal Orion Space DC ST Telemedia Global Data Centres VADS Berhad

KEY QUESTIONS ANSWERED 1. How big is the Southeast Asia data center market size? 2. What is the number of Tier III data centers in Southeast Asia? 3. What is the total number of data centers in Southeast Asia? 4. Which cooling systems are likely to generate the largest revenue in the Southeast Asia data center market during the forecast period? 5. Who are the key investors in the Southeast Asia data center market? 6. What are the key factors driving the growth of the Southeast Asia data center market?Read the full report: https://www.reportlinker.com/p05758036/?utm_source=GNW

About ReportlinkerReportLinker is an award-winning market research solution. Reportlinker finds and organizes the latest industry data so you get all the market research you need - instantly, in one place.

__________________________

See the rest here:
The Southeast Asia data center market by investment is expected to grow at a CAGR of over 8% during the period 20212026 - GlobeNewswire

Read More..