Page 3,042«..1020..3,0413,0423,0433,044..3,0503,060..»

6 hours ago 5 Cloud Security Must-Haves in 2021 – Security Intelligence

Organizations undertaking the move to the cloud face a blizzard of sometimes confusing buzzwords. Theres hybrid cloud, multicloud, digital transformation, microservices and so much more. While these terms can be confusing, the key element to keep in mind is that cloud data security should be an inherent part of business-level strategy and discussion for any successful cloud migration.

The importance of addressing key security and compliance needs weighs heavily on many organizations. Its a very valid concern, as an estimated 990 million cloud servers are misconfigured.

In addition to cloud misconfigurations, some of the most top-of-mind hybrid cloud and multicloud concerns include:

Having so many issues to consider at once can be difficult to address effectively. To save time and become more productive, you should begin with these five basic concepts that will improve the outcomes of your cloud security program.

At the heart of every successful cloud security program is a well-defined strategy that includes the following criteria:

You may at some point consider whether native security controls from your cloud service provider (CSP) are viable or adequate enough to manage security for your environment. CSPs have varying sets of security controls baked into their cloud platforms. They can provide many advantages, including a limit on the number of third-party licenses youre managing, flexible consumption, ease of integration and more.

However, a cloud-native security approach raises some questions that need to be answered:

Once youve decided on the native security controls that are right for you, effectively managing those controls and policies requires first ensuring you have the right architecture and policies in place to support your business and regulatory requirements. And you should also have a strong governance layer that allows you to turn your cloud-native telemetry and alerts into actionable, prioritized decision-making.

Having the right configuration and continuous compliance of your cloud environments is vital for your cloud cybersecurity program, but this can be complex to oversee. You may have multiple teams or lines of business using your cloud services while having to comply with global standards from organizations such as the Center for Internet Security (CIS). Complicating your situation is an inability to get cloud context and correlation fast enough to help in detecting and responding to cloud security issues.

You should consider using cloud security posture management to address these complications and achieve the following goals:

Your application container environment may face security complexity and visibility challenges, limited testing time during rapid scaling and delivery, increased traffic and threats of container compromise. The following phases of container environments are major risks that can act as threat vectors:

Fortunately, coverage exists to secure container workloads for a hybrid cloud and multicloud environment. Following a thorough assessment and strategy, you need to consider integration services, design and implementation as well as on-going management for all phases of your container lifecycle. When those capabilities are in place, you have the following security benefits for Red Hat OpenShift, Kubernetes, Docker and other container platforms:

Development teams focus primarily on producing new applications and functionality for consumers as quickly as possible. Operations teams work on ensuring a responsive and stable system. To meet the increasing demand in the cloud for rapid innovation, development and operations should be integrated to foster collaboration and balance between development and quality.

Security strives to make sure that those rapid application deployments are free of vulnerabilities and comply with regulatory and corporate requirements.

To most meet the critical objectives of these teams, you should consider a culture shift to DevSecOps methodologies. DevSecOps is the consolidated set of practices that represents a combination of culture, process and technology for its practitioners.

By adding DevSecOps and secure development practices into your workloads, you can benefit from:

IBM Security Services is ready to help you learn more about and incorporate these cloud security solutions into your enterprise as you make the journey to the cloud. Register for a webinar on how to Accelerate your digital transformation with modern cloud security on April 1, 2021.

The right approaches can help you reimagine and modernize your approach to hybrid cloud and multicloud security.

Read more:
6 hours ago 5 Cloud Security Must-Haves in 2021 - Security Intelligence

Read More..

Why cloud storage is secure (and tips on using it securely) – Tom’s Guide

The number of businesses making the jump to cloud storage is growing by the day. But many individuals and business owners who havent made the switch yet are hesitant for a single reason: security. Giving up your sensitive data to be managed by another business, even if its one of the best cloud storage solutions, can feel like the digital equivalent of a trust fall.

So, is cloud storage secure? The answer is a resounding yes. In this guide, well explain what makes the cloud secure, and offer tips to help you keep your data safe.

One of the most important advantages of storing your data in the cloud is that its not just backed up once, but multiple times. To understand why this matters, its important to remember that any data you store in the cloud lives on physical servers.

When you upload files to your cloud storage space, those files are instantly copied onto multiple servers in independent data centers around the US or even around the world. So, with a single transfer, identical copies of your data are stored in several locations.

This redundancy is critical to ensuring that your data is safe. If any one server fails unexpectedly, there are still copies of your data available on another server. Even if an entire data center is destroyed by an event like a fire or an earthquake, another copy of your data is available on a server in another data center.

Top providers also routinely check the integrity of each data copy to make sure it is available if you need it. This system is so effective that Amazon Web Services estimates that the chance of losing your data from the cloud is just one in 100 billion.

Creating an equally effective system of data redundancy is nearly impossible to accomplish without using the cloud. You could keep identical hard drives in different cities around the country, but then how would you sync data across those drives every time you edited a file?

Cloud storage offers an effective way to ensure that your data is protected against physical drive damage, which is one of the most common causes of data loss.

Another thing that makes cloud storage secure is that cloud networks are under near-constant surveillance. Major cloud storage providers have dedicated operations centers that are staffed around the clock with cybersecurity experts. These teams are constantly on the lookout for digital threats to their cloud storage infrastructure, and they have the necessary tools to lock out intruders.

On top of that, cloud storage providers have software teams working 24/7 to manage the security of their applications. Missing security patches are among the most common vulnerabilities that hackers use to gain unauthorized access to a network. Cloud providers software teams not only ensure that every piece of software is patched to eliminate entry points, but also proactively stress-test their own systems to identify potential points of failure.

Cloud storage providers and data center operators also take the physical security seriously of the servers that hold your data. Most data centers are patrolled by security teams, and servers are often kept in locked cages as an extra precaution against theft.

All data stored in the cloud should be encryptedand only you should have the encryption key. This is common practice in the cloud storage industry, and is often referred to as end-to-end or zero-knowledge encryption.

Under this encryption scheme, your data is encrypted before it ever leaves your device. Only after the encryption process is completed are files transferred over the internet to your cloud storage space. Once they arrive, theyre kept encrypted at rest on your cloud providers servers.

This means that no one, not even your cloud storage provider, can decrypt your files and access their contents. In the event that your data is intercepted during transfer to or from the cloud, the attacker wont have the information needed to decrypt your files.

While cloud storage providers do most of the heavy lifting when it comes to keeping your data secure, you have an important role to play as well. Here are four things you can do to make sure your cloud storage is as secure as possible.

Turn on two-factor authentication

The majority of cloud storage providers offer an option to protect your account with two-factor authentication. This requires that you have both your password and a one-time verification code, which is sent to your phone or email inbox, to log in to your cloud storage account. As a result, attackers cant easily break into your account even if they crack your password.

Two-factor authentication is typically turned off by default when you set up a new cloud storage account. Make sure you turn this setting on to better protect your data.

Protect your encryption key

One major catch to end-to-end encryption is that without your encryption key, which is typically your account password, theres no way to access your data. If you lose your key, your cloud provider wont be able to help. Always keep a backup copy of your key available in case you lose or forget it.

However, you dont want to keep a copy of your encryption key somewhere that hackers could potentially get their hands on it. Consider writing down your key and keeping it somewhere secure. If you want to keep a digital copy of your key, you can use a physical device called a hardware security module. This puts your key behind a firewall, so that it cannot be accessed even if your computer is hacked.

Disconnect your devices

If your computer, smartphone, and other devices stay logged in to your cloud storage account when youre not using them, thats a potential entry point for intruders. By leaving your devices logged in, you allow anyone who gets hold of your device to break into your cloud storage. They dont even need to know your password or circumvent the two-factor authentication process.

Always log out of your cloud account when youre not using it. If your cloud provider offers an automatic time-out feature, turn it on.

Check your shared files

Cloud storage makes it easy to share files with friends, family, and colleagues. But creating links to your files that offer unlimited access can leave your data vulnerable.

Periodically audit which files and folders youve shared from your cloud account, and revoke access for anyone who no longer needs it. If your cloud provider offers links with passwords and expiration dates, put these features to use instead of sharing unrestricted access to your files.

Cloud storage is designed from the ground up for maximum data security. When you store data in the cloud, your files are encrypted and continuously monitored to protect against cybersecurity threats. Your data is also stored redundantly to ensure that a copy will survive any catastrophe.

Still, its essential that you take proper precautions with your own devices to help keep your cloud storage secure. Always turn on two-factor authentication and make use of any additional security features that your cloud storage provider offers.

Read the rest here:
Why cloud storage is secure (and tips on using it securely) - Tom's Guide

Read More..

One of Brazil’s largest telecoms is going completely cloud-native – TechRepublic

TIM Brasil is partnering with Oracle and Microsoft to migrate all of its essential operations out of the data center.

Image: iStock/phototechno

TIM Brasil, one of the largest telecommunications providers in Brazil, announced that it's partnering with Oracle and Microsoft to migrate all of its on-premises workloads out of the data center and into the cloud.

One of the major reasons for its transition into a cloud-native operation is the COVID-19 pandemic. "TIM Brasil realized that it needed to accelerate its digital transformation, by verifying changes in consumer behavior to better meet evolving needs quickly and maintain its excellent standard of customer service," Oracle said in a press release. The shift of its IT infrastructure and management into the cloud, Oracle added, makes easier scaling and increased agility simpler as consumer demands shift and work styles evolve in the post-pandemic world.

SEE: Cloud data storage policy (TechRepublic Premium)

TIM also cites environmental, social and corporate governance (ESG) sustainability goals as part of the reason for the move. Oracle and Azure's combined operations use renewable energy, and shifting its operations to the cloud will make TIM's 2030 carbon neutrality objective easier to meet.

"We are the first carrier to promote a change with this dimension, also anticipating initiatives related to governance and sustainability, within a larger project related to an ESG agenda across all of TIM's operations," Said TIM CEO Pietro Labriola.

The data center-to-cloud transformation that TIM will undergo is no small undertaking: It will involve the migration of 7,000 servers, 35,000 cores, 1,200 databases and 15 petabytes of storage into a hybrid Oracle Cloud Infrastructure and Microsoft Azure environment.

TIM will be making use of the Oracle-Microsoft Azure Interconnect located in Brazil, allowing it to "run critical workloads on Oracle Exadata Cloud Service, Oracle Database Cloud Service and OCI's Oracle Cloud VMware Service, while running SAP HANA and VDI workloads on Azure, with 40 Gbps connection and federated identity between the two clouds," Oracle said.

SEE: Top cloud providers in 2020: AWS, Microsoft Azure, and Google Cloud, hybrid, SaaS players (TechRepublic)

Modern telecom companies have remained steadfast users of local hosting, according to Clive D'Souza, senior director at Oracle Cloud Infrastructure Senior Partnerships. "Most telcos are very sensitive to latency, jitter and need performance service level agreements--100% of the time," D'Souza said. "Only a bare metal cloud with assured latencies and performance SLAs will be suitable and only Oracle Cloud Infrastructure offers this."

TIM Brasil, D'Souza said, is one of the first telcos to move 100% to the cloud, as far as he's aware. Being the first of a new class of pioneers in the telecommunications world makes TIM Brasil's move worth watching as it transitions to being 100% cloud-native in the coming months.

This is your go-to resource for XaaS, AWS, Microsoft Azure, Google Cloud Platform, cloud engineering jobs, and cloud security news and tips. Delivered Mondays

Go here to read the rest:
One of Brazil's largest telecoms is going completely cloud-native - TechRepublic

Read More..

6 Ways Cloud-Based Software Can Reduce Operation Costs – Techiexpert.com – TechiExpert.com

What is the cloud?

The definition of the cloud may seem unclear, but fundamentally, it is a term used to describe a global network of servers, each with unique functions.

The cloud is not a physical entity, but a huge network of remote servers around the world that are connected to each other to act as a single ecosystem. These servers are designed to store and manage data, run applications, or deliver content or services, such as video streaming, webmail, office software, or social media.

You do not need to access files and data from your personal or local computer, but you can access them online from any device connected to the Internet, which means that all the information can be used anytime, anywhere.

Working in the cloud represents an adaptive advantage because some applications have options that can be customized according to your business needs. This allows you to test what works for you and discard features that wouldnt bring as much benefit. Additionally, you can always go back and include a feature that was initially discarded, in case something changes about it.

Since theres not much setting up to do, these changes are made very quickly and dont represent any IT hard labor or equipment costs.

There are platforms such as Google Drive, OneDrive, iCloud, Dropbox, among many others, from which you can easily do this.

When we talk about cloud storage, we refer to information stored on cloud-based servers. When navigating the internet, you can use a platform such as OneDrive, and download a document, you can access the information stored on a certain server located anywhere in the world.

Some of the functions of the cloud are:

Stop buying bulky technology and get cloud services instead, which are readily available. Traditional computing and technology are expensive to acquire, complex to set up, and nowadays inefficient and underutilized.

Cloud services require almost no entry cost, making the access and use of advanced technologies very inexpensive, easy, and hassle-free. For example, the ease of obtaining cloud services gives you several low-cost options.

These are some of the monthly and annual costs of the most popular cloud operators in the world:

Thats right, now all your computers will automatically update the software. In the end, we will forget about the problem of having to insert the disk computer one by one to install an update.

Imagine this is a problem for employees in your company with multiple computers. Youll see great benefits from Cloud adoption. Now, imagine there are two or more branches in the same city or even in different cities. By using cloud-based solutions, your entire business will keep running, saving a lot of logistics costs.

Cloud updated tools:

You no longer have to pay high hourly rates for consulting and installation services that are common in traditional technical solutions. With cloud services, there is no need to pay expensive consulting fees up front, and services can be up and running in a few hours rather than months or years.

Plus, stop signing expensive maintenance and support contracts. Traditional technology means keeping up with updates that change every 3-6 months. Cloud service providers can support and maintain the technology and infrastructure to ensure 24-hour access to the latest cloud services.

By providing cloud services, companies can have management tools and other functions available. Its necessary to know how to use them correctly to take advantage of all its functions, thus reducing costs.

One of the main ways to save money with cloud-based software is to use the tools that the service provider offers. These tools will help your organization make the most of its resources.

Automation is an excellent tool to cut costs. By automating cloud services, companies can eliminate various manual and cumbersome processes, simplifying activities, and gaining extra time to focus on more productive tasks. Additionally, errors can get minimized.

The automatic expansion of resources is used to solve the excessive cost of data when using Cloud services. Thus, you can control the amount of processing that the cloud application must do.

This process can help evolve cloud computing networks, allowing organizations to gain greater flexibility without worrying about paying for excessive contracted services.

By investing in these advantages and effectively managing your resources in the cloud, you can reduce your investment costs, thereby having extra money to expand your business even further..

Since cloud apps process data from the cloud instead of computers, many apps are suitable for mobile devices, such as smartphones and tablets, and dont require expensive devices with high processing power and storage capacity.

Therefore, you can gradually give up Hardware to promote a popular strategy, such as BYOD (Bring Your Own Device) or a strategy used from your own device, where employees can use their laptops, mobile phones, and tablets to work.

In addition, you and your employees will be able to access your work information at any time and place, which has great advantages for better control of the company. This also means greater flexibility and the ability to work from home, which is essential in todays world.

A cloud-based communication system is a service that enables you to make calls over the web instead of using ancient analog phones that make use of copper cables or fiber optics to establish connections.

A cloud-based phone system has an array of different features, unlike the traditional analog phones which are limited in terms of features and are less updated. Some of the features of a cloud-based phone system include: unified communications, international calling, artificial intelligence, instant messaging, cloud communication, call forwarding, voicemail-to-email, integrations, automated voice menu and ring anywhere.

Cloud phones are hosted in one or in several data centers which are offsite and secure.

The phone systems can be used with many different types of devices such as: phones with adapters, smartphone apps or phones that are VoIP enabled.

All of the data and knowledge is kept within the cloud rather than maintaining the package through a server. This will ensure that you save on maintenance and upgrade costs as everything can simply be upgraded within the cloud.

Cloud-based phone systems work by breaking up your voice into little digital packets that are sent as information over the net to the recipient of the call. A cloud-based PBX is used when routing a call.

Cloud-based phone systems are accessible through a variety of different ways, all you will need is an internet connection. People can make cloud-based calls via the following methods:

There is no doubt that cloud computing has been growing and evolving in many different industries. It is highly important that businesses use technology to be more efficient, as it boasts a number of advantages such as, an increase in productivity, security and assistance of scaling on a global level those are only to name a few.

Cloud computing is a service that allows users to pay only for what they need- that is the major advantage. It dramatically reduces costs for businesses therefore allowing them to invest in other projects, features or infrastructure to grow their business.

More here:
6 Ways Cloud-Based Software Can Reduce Operation Costs - Techiexpert.com - TechiExpert.com

Read More..

Why end-to-end encryption is a must-have for enterprises – TechTalks

If youve been following technology news, youve probably heard of end-to-end encryption. Its the technology that makes sure the data you sendwhether its a file, an email, or a text messagewill only be accessible to its intended recipients. To malicious actors monitoring, internet service providers, and government agencies, end-to-end encrypted data will appear as indecipherable gibberish. Even the developer of an application and the company hosting its servers wont be able to read user data if its end-to-end encrypted.

End-to-end encryption has become very popular in recent years, especially in the consumer messaging application market. Signal, Telegram, WhatsApp, Skype, and Viber are just some of the household names that have end-to-end encryption capabilities.

But the enterprise sector has been slower in adopting end-to-end encryption. Many companies rely on cloud providers to keep their data safe, while others set up their own on-premise servers to make sure data remains within their physical boundaries.

In an interview with TechTalks, Gyorgy Szilagyi, co-founder and Chief Product Officer at end-to-end encrypted cloud storage platform Tresorit, discussed how enterprises can benefit from end-to-end encryption and what challenges they must overcome.

Most cloud storage platforms provide a convenient user experience at the cost of security. You get access to file viewing, editing, sharing, and collaboration features. But your data is encrypted at rest, which means the encryption keys are stored in the cloud providers servers. If the server gets hacked, you lose your data.

In many sectors, enterprises are bound by regulatory constraints such as GDPR or HIPAA, which put severe constraints on how they store their data. Theyre also worried about the impact of possible data breaches at the cloud provider. This makes it difficult for them to adopt cloud products.

The majority of Tresorits larger customers are drawn from highly regulated industriesthink financial services, R&D, healthcare, and life sciences, Szilagyi says. During their day-to-day work, they need a solution that is easy to use and capable of handling confidential data in a compliant manner. In-the-cloud (or at rest) encryption models do not satisfy both requirements: they are convenient but not secure.

End-to-end encryption provides a strong barrier against data breaches. In case malicious actors break into a companys server, they wont be able to access end-to-end encrypted data because the keys are stored on user devices, not on the servers.

Enterprise IT buyers want a system where they do not have to rely on trusting employees with using digital services or securely sharing and managing confidential files, Szilagyi says. Human errors are the most common causes of data breaches, so companies need workflows with built-in security.

End-to-end encryption can also add a layer of security to cloud platforms, enabling secure collaboration with external parties such as contractors, advisors, and partners. What you get is the flexibility of cloud solutions with enterprise-grade security.

Almost two-thirds of our enterprise customers lack a virtual data roomlike solution for securely sharing confidential data beyond company walls, Szilagyi says. In our experience, end-to-end encryption is often the final pull factor for businesses to switch from on-premise solutions to the cloud or start using the cloud as an additional solution that enables flexibility and sharing.

End-to-end encryption is a strong data-protection measure that ensure compliance to strict data protection regulations. It can also accelerate the legal review process for technology procurement. Having zero access to the data stored on servers offers less liability in data processing agreements, Szilagyi says.

The coronavirus outbreak forced many countries into lockdown. Organizations had to figure out how to their employees with the tools to work safely from home. Large enterprises that already had remote working tools in place had to find ways to scale and expand their infrastructure. Small and medium businesses that had no experience in remote work had to start from scratch.

Companies needed to switch to remote work almost overnightthis was challenging for both SMBs (who didnt typically have work-from-home policies) and enterprises (who did not have remote work policies not suitable for large-scale deployment), Szilagyi says.

Making on-premise tools available to remote workers became a major challenge. Many companies started considering cloud-based solutions for file storage, collaboration, and messaging. Naturally, data encryption and security became a serious concern.

In my view, the difference in the challenges faced is not really between those who had and did not have end-to-end encrypted solutions, but between those who took data security seriously before COVID and those who didnt, Szilagyi says.

The pandemic has given rise to a new wave of security risks. One example phishing scams that use misinformation surrounding covid-19. Many attackers are banking on the weak defense barriers of home networks to lure remote workers into traps. And the sudden shift from on-premise to cloud solutions has opened the way for many human errors, such as security misconfigurations resulting from lack of experience and know-how.

This global switch to remote work created both cloud security risks and end-point security weaknesses, Szilagyi says. End-to-end encryption is not a magical, all-in-one solution for each of these security risks, but, combined with strict data control capabilities, it can help to protect data from common security threatslike cloud attacks and employee errorsand will continue to remain crucial to companies after the pandemic has been and gone.

Tresorit is one of several companies that have focused on client-side encrypted tools. The company launched its cloud storage solution for consumers in 2013 and for businesses in 2014. Since then, it has grown to more than 10,000 business organization users. During the pandemic, Tresorit saw a sudden surge in demand for its end-to-end encrypted cloud storage solution. The company, which was founded in Switzerland and Hungary in 2011, now has offices in Budapest, Munich, and Zurich. It has servers across 12 geographical regions from the U.S. to Singapore, and it has grown from 10 to 120 employees.

In 2017, Tresorits cloud storage service became a finalist at the Cybersecurity Product Awards in the encryption category. In 2020, Tresorit became the first end-to-end encrypted service provider to be named a Customers Choice in Gartner Peer Insights Voice of the Customer: Content Collaboration Tools. The recognition is based on user feedback and shows that end-to-end encryption doesnt need to come at the expense of convenience and user experience.

We would like to continue advocating the widespread adoption of end-to-end encryption among businesses of all sizes, Szilagyi says. End-to-end encryption is gaining traction in messaging, especially in the consumer market, but it is not as common for other use cases such as emailing, data storage and file collaborationall of which are vital for business workflows.

Fortunately, were seeing some positive trends in the adoption of end-to-end encryption in enterprise applications. Zoom added end-to-end encryption to its video-conferencing platform in late 2020. More recently, Microsoft announced that it will be adding end-to-end encryption support to Teams, its enterprise messaging and collaboration tool.

The fact that Microsoft Teams has added end-to-end encryption shortly after Zoom, one of their biggest competitors, shows that protecting privacy has become a competitive advantage in the enterprise SaaS market as well: e2ee has become a must-have technology for companies in this space, Szilagyi says.

In the future, the Tresorit team will continue to add enterprise-level product features on their platform.

Developing features that could be seen as at odds to end-to-end encryption, such as search capabilities, extensive service integrations, or user provisioning, is challenging. But were working to solve as many of these technology challenges as possible, Szilagyi says.

In tandem with growing support for end-to-end encrypted solutions, there are calls for regulation that requires encrypted services to provide government agencies access to encrypted data. This would mean that, for instance, if a law enforcement body is investigating a criminal case, service providers should be able to assist them by providing them the unencrypted data records of suspects. This would require e2ee service providers to create backdoors into their own technology, such as a master key that could decrypt all data encrypted with their applications. This would undermine the main goal of end-to-end encryption, which is to give users exclusive ownership of their data.

Despite a growing need for digital security and a strong support of data protection regulations, end-to-end encryption is under threat from global regulatory attempts to access encrypted information, Szilagyi says. We will continue to advocate for the integrity of encryption and to stand up against attempts to gain backdoor access for law enforcement. Any attempt to access encrypted data, even if it is deemed lawful or targeted, creates vulnerabilities in encrypted systems and affects the security of millions of businesses and billions of people.

More here:
Why end-to-end encryption is a must-have for enterprises - TechTalks

Read More..

ColorTokens Wins Four Globee Awards, Including Company of the Year, at the 2021 Cyber Security Global Excellence Awards – Business Wire

SANTA CLARA, Calif.--(BUSINESS WIRE)--ColorTokens Inc., a leading innovator in zero trust-based cybersecurity solutions, today announced it had taken home four wins at the 17th Annual 2021 Cyber Security Global Excellence Awards.

The annual event is hosted by The Globee Awards, organizers of the worlds premier business awards programs and business ranking lists. These prestigious global awards recognize cybersecurity and information technology providers with advanced, ground-breaking products, solutions, and services that are helping set the bar higher for others in all areas of security and technologies.

ColorTokens was named a Gold Winner of Company of the Year in the Security Cloud/SaaS category. The companys newest offering, Xassure, was named a Silver Winner in the New Product/Service of the Year for Security Services. And, its Xprotect and Xshield products each captured a Bronze Award for Hot Security Technology of the Year.

Were proud to be recognized as an industry player whose company and products have been named winners by the Globee Awards, said ColorTokens EVP and Co-Founder Rajesh Khazanchi. Xprotect and Xshield were already award-winning products, but now were proud to share that our newest offering Xassure joins them as an award-winner. Xprotect, Xshield and Xassure are part of the Xtended ZeroTrust Platform, which single-handedly secures cloud workloads, containers, dynamic applications, endpoints, servers and users from internal and external threats. These recent awards underscore ColorTokens unparalleled approach and products that are changing the enterprise security landscape.

ColorTokens is a leader in deploying zero trust security at critical points throughout the network, combining deep visibility, simulation mode, identity-based segmentation, and endpoint/server lockdown delivered across hybrid networks spanning users, endpoints, servers, applications and workloads. The Xtended ZeroTrust Platform delivers all of this without any downtime, reboots, reconfiguration, hardware, onsite visits, or impact on business continuityachieving unrivaled deployment capability.

More than 45 judges from around the world representing a wide spectrum of industry experts participated in the judging process.

About the Globee AwardsGlobee Awards are conferred in eleven programs and competition: the CEO World Awards, the Consumer World Awards, The Customer Sales & Service World Awards, the Globee International Best in Business Awards, the Golden Bridge Awards, the Cyber Security Global Excellence Awards and Security World Awards, the IT World Awards, One Planet American Best in Business Awards, the Globee Employer Excellence Awards, the Globee Corporate Communications & Marketing World Awards, and the Women World Awards. Honoring organizations of all types and sizes and the people behind their success, the Globee Awards recognize outstanding achievements and performances in businesses worldwide. Learn more about the Globee Awards at https://globeeawards.com.

About ColorTokensColorTokens Inc., a leader in cloud-delivered zero trust security, empowers global enterprises with a proactive approach to securing cloud workloads, dynamic applications, endpoints, and users. Through its award-winning Xtended ZeroTrust Platform, ColorTokens delivers products and services that help businesses accurately assess and drastically improve their security posture in hybrid environments. For more information, please visit http://www.colortokens.com.

Link:
ColorTokens Wins Four Globee Awards, Including Company of the Year, at the 2021 Cyber Security Global Excellence Awards - Business Wire

Read More..

Recognizing the Risks of the Cloud – Security Boulevard

A recent article in Forbes discussed prioritizing the risks of the cloud, and specifically called out four areas of risk that need to be addressed by organizations moving to the cloud. The article recognized risks come from:

The last two, network and platform security are well understood, and have been widely used in on-premises deployments as well as cloud deployments. Most security deployments and spend are around security for network and platforms. Unfortunately as many organizations are finding out, network and platform security isnt enough to effectively secure the cloud.

In todays world of increasing attacks, (especially zero day attacks) and the increasing success of attacks, application and workload security are gaining in attention and focus. Applications and workloads are the gateways to the data thats sought after by cyber criminals, and attacks against applications and workloads are increasingly sophisticated, meaning traditional tools around network and platform security are failing to detect these types of attacks.

For many organizations, a Web Application Firewall (WAF) is fulfilling their application security requirements. But a WAF alone is missing out on many application security needs. While WAFs have been around in their current form since around 2002, WAFs function as a network perimeter security solution and they have failed to meet the security needs around many of the issues that applications and workloads face in todays threat landscape. WAFs only have visibility to see the traffic coming to and from the application or workload, but not whats happening in the application or workload directly.

The second area organizations have typically had security is on the platform. For platform security, many organizations continue to rely on standard anti-virus/anti-malware or Endpoint Detection and Response (EDR) solutions to protect their servers. Unfortunately, these types of solutions are designed to protect end-user systems, and specifically the operating systems running on those systems, rather than applications servers. They arent designed to protect against attacks targeted specifically against applications and workloads, and typically dont understand the transactional languages or operations of the applications and workloads.

Application and workload security needs to have visibility into the application itself, along with the ability to understand the transactions happening between the end-user and the application and the application with the APIs it is using to access data.

Unlike network and platform security solutions, a Runtime Application Self-Protection (RASP) solution can see whats happening inside the application, to determine if theres inappropriate use of the application itself. In addition, RASP is really the first security category to offer self protection for applications and workloads.

A typical RASP solution has code level visibility into applications and workloads and can analyze all the activity related to applications and workloads to accurately identify when an attack occurs, thereby reducing the amount of false positives.

Even the latest revision of NIST SP800-53 includes the addition of RASP (Runtime Application Self-Protection) to the catalog of controls required by the security and privacy framework. The update came in September of 2020 and its a first in recognizing this advancement in application security by now requiring RASP.

By running on same server as the application, RASP solutions provide continuous security for the application during runtime. For example, as mentioned earlier, a RASP solution has complete visibility into the application, so a RASP solution, like the one from K2 Cyber Security can analyze an applications execution to validate the execution of the code, and can understand the context of the applications interactions.

K2 Cyber Securitys RASP solution offers significant application protection while at the same time using minimal resources and adding negligible latency to an application.

Here at K2 Cyber Security, wed like to help out with your RASP and IAST requirements. K2 offers an ideal runtime protection security solution that detects true zero-day attacks, while at the same time generates the least false positives and alerts. Rather than rely on technologies like signatures, heuristics, fuzzy logic, machine learning or AI, we use a deterministic approach to detect true zero-day attacks, without being limited to detecting attacks based on prior attack knowledge. Deterministic security uses application execution validation, and verifies the API calls are functioning the way the code intended. There is no use of any prior knowledge about an attack or the underlying vulnerability, which gives our approach the true ability to detect new zero-day attacks. Our technology has 8 patents granted/pending, and has no false alerts.

K2s technology can also be used with DAST testing tools to provide IAST results during penetration and vulnerability testing. Weve also recently published a video, The Need for Deterministic Security. The video explains why the technologies used in todays security tools, including web application firewalls (WAFs) fail to prevent zero day attacks and how deterministic security fills the need for detecting zero day attacks. The video covers why technologies like artificial intelligence, machine learning, heuristics, fuzzy logic, pattern and signature matching fail to detect true zero day attacks, giving very specific examples of attacks where these technologies work, and where they fail to detect an attack.

The video also explains why deterministic security works against true zero day attacks and how K2 uses deterministic security. Watch the video now.

Change how you protect your applications, include RASP and check out K2s application workload security.

Find out more about K2 today byrequestinga demo, orget your free trial.

Read this article:
Recognizing the Risks of the Cloud - Security Boulevard

Read More..

IT Insight: The seamless connection between the digital and real world – Seacoastonline.com

JoAnn Hodgdon| Guest Columnist

IoT, the Internet of Things.What is it?Wikipedia defines it as: the network of physical objects - things or objects - that are embedded with sensors, software, and other technologies for the purpose of connecting and exchanging data with other devices and systems over the Internet.

The Internet of Things (IoT) is the seamless connection between the digital world and what is our real world.By 2025, IoT trends suggest the number of connected devices will rise to 75 billion. According to Gartner, every second 127 devicesget connected to the internet!Think mobile phones, smart home and office security, heating systems, appliances, contact lenses and even smart yoga mats.

With many people working remotely, a key trend coming out of this year's list is the need for location independence.IT providers and leaders must recommend location-independent services. Live anywhere in the world and make a living with little more than a laptop and an internet connection! IoT edge computing which includes Internet of Things, both for consumer and for business, is one example of how to get there while securing your connected devices.

Even if you are not working remotely now due to the pandemic, the workplace of the future is evolving to include mobile device implementation and remote support technology.Take for instance contactless interactions accessing spaces and buildings with IoT such as smart cards, sensors and wearables as opposed to password enabled criteria.

IoT applications are utilized to enhance employee work environments at home.Soon corporate real estate will be a thing of the past with a greater percentage of decision makers anticipating permanent remote workers after COVID.Those who plan future offices are using smart power, lighting and energy.Many already use sensor-enabled space use to monitor congested areas, like dining facilities and for social distancing.

Virtual queues for curbside assistance and check-in have replaced waiting or standing in line.The IoT has enabled new expectations in customer service. Precise time slots due to tracking customer location have raised the customer experience to a new level. With a customers permission via an app, the consumer world is forever changed!

Within a business network, it is possible to move your IoT devices further from the data to the edge of your network.Via wireless connection, Edge computing allows you to take advantage of IoT and new transformational business applications. Your devices will spend less time communicating with the Cloud, react quicker to local changes and operate more reliably.

You can transform your business and devices with Microsoft Azure. A managed Azure Cloud Solution includes less physical infrastructure to manage.Retire your local servers when you move all your server functions to the cloud. No more static servers in your building or any other hardware, let alone the floor space and electricity to keep them running.

You also pay only for what you use so your company can scale and grow without any large capital investments. You have total control over your costs each month and can easily adjust your usage and capacity on demand to suit your budget.

With all your key business applications and data in the cloud, you are automatically protected when disaster strikes. Downtime is limited to a matter of hours, not days, and your staff and remote users have permanent access no matter what.

Your Azure Cloud Solution can be built to keep your IT infrastructure at optimal performance all the time, including your IoT devices.

MS Azure IoT Edge is a fully managed service that provides your business with the necessary uptime, communication and security you need. You will know that your devices are operating with the correct software and are authorized to communicate with one another.

Securing connected devices is mandatory. IoT Edge integrates with Azure Defender for IoT to provide threat protection and security management. It also supports any current hardware security model to provide strong authenticated connections for confidential computing.Make the switch to a managed Azure Cloud Solution.The seamless connection between your digital and real world is here.Prepare for future innovation!

JoAnn Hodgdon is vice president and co-founder of Portsmouth Computer Group (PCGiT) with her husband David. PCG provides comprehensive managed IT services, business continuity, security, cloud computing and Virtual CIO services to their clients. You may reach her at joann@pcgit.com or at http://www.pcgit.com.

View post:
IT Insight: The seamless connection between the digital and real world - Seacoastonline.com

Read More..

Morphisec Raises $31M Funding Led by JVP to Enable Every Business to Simply and Automatically Prevent the Most Dangerous Cyberattacks – PR Web

Morphisec Logo

BEER SHEVA, Israel and BOSTON (PRWEB) March 25, 2021

Morphisec, a leader in cloud-delivered endpoint and server security solutions, today announced that it raised $31 million in funding led by JVP. Other existing investors, including Orange and Deutsche Telekom Capital Partners, also participated in the funding. Morphisec, deployed on over 7 million endpoints, offers enterprises cutting-edge cyber prevention that automatically stops the most dangerous attacks in an automated and easy-to-manage manner without any impact on users, performance, or IT teams, while conserving costs and achieving best-in-class efficacy.

The investment will support an aggressive hiring push aimed at drastically increasing headcount across the U.S. and Israel. As Morphisec ramps up recruiting talent for every level of its organization, it is announcing today the appointment of Steve Bennett to its board of directors, effective immediately. Bennett formerly served as CEO of major software and security companies, including Symantec and Intuit. Before that, Bennett spent over 20 years at General Electric in multiple executive management roles.

Morphisec aims to protect users and workloads everywhere. The pandemic resulted in remote work at levels never seen before, making perimeter security irrelevant and forcing organizations to protect the endpoint as the last true perimeter. Moreover, accelerated migration to the cloud, whether on the applications/SaaS level (e.g., Office365, SalesForce) or infrastructure (e.g., AWS, Azure) requires organizations to protect endpoints and workloads in a low-cost, automated and deterministic fashion. Morphisec comes to these organizations defense without needing dedicated security teams to respond to and investigate attacks automatically stopping the most dangerous attacks targeting workstations, VDIs, servers, virtual machines, and cloud workloads.

Midsized enterprises are historically underserved by the cybersecurity market and left behind by cost-prohibitive tools and staff constraints, said Ronen Yehoshua, CEO of Morphisec. The challenges for these organizations have only increased in the last year with work-from-home employees using unsecured devices and connecting to an endless array of cloud-based applications. Morphisec has proven to be the only cybersecurity solution capable of bringing them simple yet effective protection that also fits into their existing budget. With this new investment, we will further our commitment to bring organizations of all sizes threat prevention that stops advanced attacks in their tracks before the breach and costly damage.

Morphisecs suite of solutions for endpoints, servers, and cloud workloads uses patented zero trust runtime security powered by moving target defense technology to block threats. Rather than trying to remediate attacks after they hit, Morphisecs proprietary technology based on moving target defense stops attacks deterministically and automatically, without requiring knowledge of threat type or manual oversight, making it highly effective against advanced attacks such as zero-day and unknown threats.

The companys flagship solution Morphisec Guard is a complete endpoint prevention platform that combines traditional antivirus with the power of Morphisecs advanced protection against ransomware, malware, and evasive attacks. Its latest solution, Morphisec Keep, protects servers and cloud-based applications from advanced threats. Keep ensures mission-critical workloads running on server cloud instances, including private and public clouds hosted on AWS, Azure, and GCP, are automatically protected with zero downtime or performance impact.

Endpoints of all types workstations and servers, on-premises and in the cloud, physical and virtual are the ultimate frontiers of cyber protection. Organizations today settle for low efficacy, high cost, non-deterministic, performance-impacting, knowledge-challenged sets of solutions like EDRs, behavioral, and signature-based approaches. These result in uncertainty, high-cost, and are difficult to manage in WFH and Cloud environments, said Yoav Tzruya, General Partner at JVP. Morphisecs unique approach provides measurable, deterministic, low-cost value while providing best-in-class protection, serving distributed organizations and further allowing risk-free cloud migration. Morphisecs unique ability to prevent attacks before any breach occurs without requiring knowledge of the threat positions it as the de facto proactive cybersecurity solution for the cloud.

Morphisec has brought the most significant innovation to prevention the market has seen in the last 10 years, said Steve Bennett. Ive never witnessed a cybersecurity company that has delivered so much value potential for mid-sized customers. Not only does it stop the breaches that make the headlines, but it does so in a way that allows budget-constrained businesses to receive the world-class prevention and business continuity that is often only reserved for the large deep-pocket corporations.

For information on the growing number of open positions in development, sales, and marketing at Morphisec visit: https://www.morphisec.com/careers.

About Morphisec

Morphisec delivers an entirely new level of innovation to endpoint protection to create a zero-trust execution environment for workstations, VDI, servers, and cloud workloads. This proactively creates a prevent-first posture against the most advanced threats to the enterprise, including APTs, file-based malware, zero-days, ransomware, fileless attacks, and web-borne exploits. This complete endpoint security solution easily deploys into a companys existing security infrastructure to form a simple, highly effective, cost-efficient technology stack that is truly disruptive to todays current cybersecurity model.

Share article on social media or email:

Read the original:
Morphisec Raises $31M Funding Led by JVP to Enable Every Business to Simply and Automatically Prevent the Most Dangerous Cyberattacks - PR Web

Read More..

Designing Servers In Rapidly Changing Times – The Next Platform

When chip makers launch the latest additions of their datacenter processors, server OEMs have historically immediately or soon after followed with a rollout of the latest new or enhanced systems based on those offerings. Then theyd wait until the next big unveiling by another chip maker, and the process starts again.

However, its getting more difficult to follow that pattern, for a number of reasons. The most obvious, at least right now, is timing. AMD this month unveiled its third generation Milan Epyc 7003 processors, the latest server chips based on the ever-evolving Zen microarchitecture that has enabled the company to muscle its way back into the server space and compete with larger rival Intel. For its part, Intel in short order will soon roll out its third generation Xeon SP CPUs codenamed Ice Lake prompting another round of announcements of servers that will be armed with the new chips.

But thats only part of the story. CPUs no doubt are still crucial components of servers, but increasingly so are accelerators like GPUs and field programmable gate arrays (FPGAs), as are features like security, cooling and management. In addition, enterprises have shifted over the past several years to look at the machines not simply for the power they offer but for how they can be used to run such advanced workloads as machine learning and data analytics and HPC.

And now compute environments like the cloud and increasingly the edge are factors when evaluating servers.

All that plays into the how system makers not only plan and develop their hardware lineups but also when they decide to roll them out. Those considerations played a role in Dells decision this month to unveil its complete portfolio of new and enhanced servers two days after AMD unveiled its Epyc 7003 family of new processors and just weeks before Intels expected rollout of its Ice Lake offerings.

We debated quite a bit, Ravi Pendekanti, senior vice president of server and networking product management and marketing at Dell, tells The Next Platform. We said, Should we launch a set of products with AMD? Should we then come out and do a lot of stuff with Intel? Then we looked back and said, Wait a second, that is not helping our customers who are making purchasing decisions. They want to look at the entire portfolio. Thats why we changed to a portfolio update, having both Intel and AMD in the mix. It wasnt easy across the organization, because we would bring typically in the past bring four or five products here, maybe three or four products. This meant the entire organization had to work on a pretty broad portfolio. We have never done this, honestly 17 platforms in one go and as we did that we also wanted to put the lens on workloads, which is why we said that we see that AI and the machine learning with the GPU stuff that customers want. But the other thing thats happening is the advent of things like 5G thats coming to the telco space.

Dells new portfolio includes systems with a mix of Intel and AMD chips and that touch upon the workloads and environments that are driving the rapid changes in IT. An example are the PowerEdge R6515 and R750 systems, seen below. The R6515 is powered by AMD Epyc chips and is designed to improve data processing in big data Hadoop databases by as much as 60 percent. Meanwhile, the R750 will come with Intels upcoming Ice Lake processors and promise to 43 percent better performance in massively parallel linear equations for compute-heavy workloads. The XE8545 server offers up to 128 Epyc cores, four Nvidia A100 GPUs and Nvidias vPGU software to accelerate AI and similar workloads as well as deliver security and management benefits. The 4U rack system is the foundation for Dells HPC Ready Solution for AI and Data Analytics. The 2U dual-socket R750xa, which will be powered by the Intels Ice Lake chips, also offers deep GPU capabilities support up to four double-wide GPUs and six single-wide GPUs for machine learning, inference and AI and supports Nvidias AI Enterprise, a suite of AI tools and frameworks launched earlier this month.

Pendekanti says the rapidly changing CPU picture not only with Intel and AMD, but also Arm and its manufacturing partners is something Dell and other OEMs have to take into account when developing its server roadmaps. For one, the timeline for new processors is accelerating. Where once chip makers came out with new offerings every two-plus years, the time between new generations is shrinking. AMDs first-generation Eypc chips launched in 2017, with the second generation rolling out in 2019. Secondly, just the number of chip makers needs to be addressed in server development, such as in the x86 space.

Until a few years ago, we didnt have to worry about [other chip makers]. It was only Intel. There was a hiatus that AMD took and now we have just for the CPU this interesting bifurcation, so we have to look at two of them, he says, adding that other technologies and concerns management, security and cooling are coming into play. Its not trivial because the technology adoption [trends] are changing [and] the number of technologies that are coming out. If I fast-forward to a couple of years, well have to think about things like smartNICs, which are coming out.

Power efficiency continued to be a focus in the latest PowerEdge systems. Dell is including ducted fans and adaptive cooling that can improve efficiency by up to 60 percent over the previous generation, as well as multi-vector cooling, which automatically directs airflow to the hottest parts of the server. Some servers also offer Direct Liquid Cooling, which includes technology that can detect leaks.

Security also was a focus. With the cloud and now the edge, data and applications increasingly are being generated and accessed outside of the datacenter, making them more vulnerable to hacking. Intel, AMD and Arm which Nvidia is looking to buy for $40 billion all are putting more security feature into their silicon and designs. Such hardware-based security also is key for system makers, according to David Schmidt, senior director of server product management at Dell. Its important to balance hardware- and software-based security.

You cant have one without the other, Schmidt tells The Next Platform. You really have to go down to the silicon-based root of trust. What weve been doing in the past couple of years around security, it starts in the hardware. It allows you to chain that root of trust all the way up into an operating system. Thats exactly where embedded hardware-based security comes into play, when it is time to secure OS all the way down to the hardware. It has been a huge focus of ours to make sure its there. Then you start being able to do some really cool things like security on the verification, which goes up into supply-chain type use cases. You can do active software scanning, you can do a greater chip security, which youll see both on Intel and AMD offerings.

Dell offers what it calls a cyber-resilient architecture and silicon root of trust. With the new systems, the vendor includes Secured Component Verification is an extension of its Secure Supply Chain assurance process, ensuring that the systems delivered to enterprises are exactly as they were manufactured, without any interference during delivery. The PowerEdge UEFI Secure Boot Customization enables boot security to be more closely managed to mitigate attacks.

Modern server planning also has to take into account the cloud and the edge. Hyperscalers and major cloud providers continue to be a driving force in the hardware space. According to Synergy Research Group, in 2020, global spending on cloud infrastructure services including infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) and hosted private clouds grew 35 percent, to almost $130 billion, helped in part by the COVID-19 pandemic. Meanwhile, enterprise spending on datacenter hardware and software fell 6 percent, to less than $90 billion. In addition, capital expenditures in the first three quarters of 2020 by hyperscalers hit $99 billion, up 16 percent year-over-year, with the capex aimed specifically at datacenters up 18 percent.

Dell has drawn from what the cloud providers are looking for, Pendekanti says.

We absolutely have learned quite a bit because we do work and provide product to some of the CSPs and its helped us in a few ways, he says. One of the things that most of these cloud service providers look for [is management], because most of these guys dont have tens of servers, they literally have tens of thousands of servers and hundreds of thousands of servers, which essentially means we need to make sure that we are able to provide the right management tools Those lessons have played a huge role into how we have morphed our whole portfolio in terms of manageability. Number two: When you look at the CSPs, they do actually look at architectures. Theyre looking at faster deployment, for example, or theyre looking at how to deal with security.

Dell last year also announced Project Apex, which is aimed at offering its product portfolio as a service, spanning products, consumption models and cloud strategies.

Dell and other OEMs also have to address the edge, which is expanding with the growth of the Internet of Things (IoT) and will accelerate as 5G connectivity comes to the fore. In its updated portfolio, Dell is including the PowerEdge XR11 and XR12 ruggedized systems, which will be powered by Intels Ice Lake processors and include support for multiple accelerators. They include smaller form factors that are 400mm and 16 inches deep, hardened chasses, remote manageability and NEBS Level 3 compliance, all key points for systems that are designed to be installed closer to where the data is being generated and users are located. They are certified for telcos and military uses.

The key thing has been most of these are ruggedized, Pendekanti says. On the CPU side, we dont need as much power right now for the device sitting at the edge. We dont really need to go out put the most platinum kind of SKU with the highest TDP. In most cases, we are looking at probably a processor SKU that is at a lower end of the TDP rating because you are literally not getting into all kinds of analytics at the edge. But you will probably do some processing, so the CPU stack that we look at doesnt have to take the entire spectrum. Our goal would be to actually leave it at the lower end of the spectrum for these edge boxes.

See more here:
Designing Servers In Rapidly Changing Times - The Next Platform

Read More..