Page 3,648«..1020..3,6473,6483,6493,650..3,6603,670..»

Unlock The Full Value Of SAP Hana In The Cloud With IBM Power – E3zine.com

With the addition of IBM Power Systems in SAP Hana Enterprise Cloud, customers now have more choices and greater flexibility to run their workloads where they want to across the hybrid cloud.

In February this year, IBM announced that IBM Power Systems has been certified for the Hana Enterprise Cloud (HEC) as a critical infrastructure platform provider for large Hana systems. The service will run on IBM Power 9 based IBM Power Systems E980 servers, which have one of the industrys largest virtualized server scalability of 24TB for the Hana database.

IBM and SAP have always had a long-standing, client-centric relationship since forming the digital transformation partnership more than three years ago. This certification marks yet another significant step forward in simplifying the IT infrastructure for the managed, private cloud environment, and strengthens the IBM Power and SAP Hana relationship in their mission to accelerate transformation for the enterprise.

Christoph Herman, SVP and Head of Hana Enterprise Cloud Delivery, summarises the value of this announcement as follows, Hana Enterprise Cloud on IBM Power Systems will help clients unlock the full value of SAP Hana in the cloud, with the possibility of enhancing the scalability and availability of mission critical SAP applications while moving workloads to Hana and lowering TCO. Combining Hana Enterprise Cloud capabilities with IBM Power Systems can help establish a faster path to cloud readiness for our clients while addressing risk and providing closer alignment to the intelligent enterprise.

The Hana on Power solution runs the same Suse or Red Hat Enterprise Linux distributions as x86 servers, with the flexibility, scalability, resiliency and performance advantages of Power servers allowing SAP to:

As you can see, with the addition of IBM Power Systems in Hana Enterprise Cloud, customers have more choices and greater flexibility to run their workloads where they want to across the hybrid cloud.

The Tech Data IBM team supports clients Hana on IBM Power Systems journey. If youre interested or need more information about Hana migration on IBM Power Systems, message Craig Cannon at [emailprotected]

Follow this link:
Unlock The Full Value Of SAP Hana In The Cloud With IBM Power - E3zine.com

Read More..

In the cloud, who can hear your developers scream? – The Register

Webcast Like children flying the family nest, applications and services are leaving the on-premises corporate environment and theyre not even coming back so you can do their washing.

One of the core features of the ever-topical digital transformation trend is business infrastructure thats less about centralized servers and data centres, and more about endpoints typically managed remotely via a cloud provider.

It can be tricky to secure all these distributed systems and services. If your developers are working within a growing number of complex coding, testing, and operations environments, for instance, theres a lot of moving parts to track and protect.

Its, therefore, a valid course of action to focus on your people, and give them the freedom to do their work while making sure they have the tools and support to stay secure and safeguard your business.

On May 6, 2020, a Register-hosted webcast will turn its lens on exactly this issue.

Our Tim Phillips will be joined by Guy Podjarny of secure development experts Snyk to dig down into how and why traditional security methods dont tend to wash with modern cloud-based developer environments, and how dev-first security approaches can prove a surprisingly painless alternative.

From describing how to equip and educate programmers to manage and reduce risk, yet remain on the ball with day-to-day work, to the behavioural and process shift required of your average working human to maintain a more security-savvy way of working, it will be a valuable conversation for anyone whos worried coders may fall behind the curve as an organisation leaps into the cloud.

Sign up for the webcast, brought to you by Snyk, right here.

Link:
In the cloud, who can hear your developers scream? - The Register

Read More..

Critical SaltStack vulnerability affects thousands of datacentres – ComputerWeekly.com

A series of critical vulnerabilities in SaltStacks open source Salt remote task and configuration framework will let hackers breeze past authentication and authorisation safeguards to take over thousands of cloud-based servers if left unpatched.

Salt is used in infrastructure, network and security automation solutions and is widely used to maintain datacentres and cloud environments. The framework comprises a master server acting as a central repository, with control over minion agents that carry out tasks and collect data.

The two vulnerabilities, which are assigned designations CVE-2020-11651 and CVE-2020-11652, were uncovered by F-Secure researchers in March 2020 while working on a client engagement.

They affect all versions of Salt up to 3000.1, and are considered so severe that they carry a Common Vulnerability Scoring System (CVSS) rating of 10, the highest possible.

Successfully exploited, they enable attackers to execute code remotely with root privileges on Salt master repositories, meaning they could, for example install backdoors into systems, carry out ransomware attacks, or take over systems to mine cryptocurrencies. F-Secure said it had already found 6,000 such repositories openly vulnerable on the public internet.

F-Secure principal consultant Olle Segerdahl said this meant the vulnerabilities were particularly dangerous and urged Salt users to download two new patches versions 3000.2 and 2019.2.4 that were issued by SaltStack on 29 April 2020, prior to the co-ordinated disclosure.

Patch by Friday or compromised by Monday, said Segerdahl. Thats how Id describe the dilemma facing admins who have their Salt master hosts exposed to the internet.

Patch by Friday or compromised by Monday thats how Id describe the dilemma facing admins who have their Salt master hosts exposed to the internet Olle Segerdahl, F-Secure

Segerdahl said the 6,000 Salt masters he found during the course of his research, which are popular in environments such as Amazon Web Services (AWS) and Google Cloud Platform (GCP), were of particular concern.

I was expecting the number to be a lot lower. There are not many reasons to expose infrastructure management systems, which is what a lot of companies use Salt for, to the internet, he explained.

When new vulnerabilities go public, attackers always race to exploit exposed, vulnerable hosts before admins patch or hide them. So if I were running one of these 6,000 masters, I wouldnt feel comfortable leaving work for the weekend knowing its a target.

Even though the publicly accessible Salt masters are highly at risk of exploitation, Segerdahl added that hosts hidden from the internet could still be exploited easily if attackers have already accessed their target organisations network in some other manner.

Organisations using Salt should take advantage of SaltStacks automated update capabilities to make sure their systems are patched as soon as possible. Those with exposed Salt hosts can use additional controls to restrict access to Salt master ports 4505 and 4506 on default configurations or at the very least block them from the public internet. SaltStacks website carries further guidance on how to do this.

Segerdahl said that looking on the bright side, he had found no evidence or reports of anyone exploiting the vulnerabilities in real-world attacks although it is very important to note that following disclosure this will likely change in short order.

F-Secure pointed out that any reasonably competent hacker should be able to create a 100% reliable exploit for the vulnerabilities within the next 24 hours due to this, the firm has not provided any proof-of-concept exploit code, as this risks harming Salt users who are slow to patch.

It is also possible for Salt users to detect attacks exploiting the vulnerabilities, said Segerdahl. Concerned organisations can and maybe should search the master host systems for any signs of intrusion the Salt master repository records scheduled jobs which defenders can examine.

Further details on the vulnerabilities can be found in F-Secure Labs advisory notice.

Excerpt from:
Critical SaltStack vulnerability affects thousands of datacentres - ComputerWeekly.com

Read More..

Hot On The Heels Of Mellanox, Nvidia Snaps Up Cumulus Networks – The Next Platform

Last week, when we talked to Nvidia co-founder and chief executive officer, Jensen Huang, about how the datacenter was becoming the unit of compute and in such a world networking was critical, it was obvious that acquiring Mellanox Technologies for $6.9 billion was just the beginning of the strategy that will no doubt unfold in the coming months and years.

Huang didnt wait long to make another move, with Nvidia acquiring open network software provider Cumulus Networks for an undisclosed sum and marrying it with Mellanox in its newly formed networking business unit.

Sometimes, to understand what a company is doing you have to take a really hard look at the things that key people at that company have seen and done in their careers. This is one of those cases.

Cumulus Networks was founded in 2010 by JR Rivers and Nolan Leake, and dropped out of stealth in the summer of 2016.

Rivers was the companys chief executive officer and its face until recent years. Rivers got his start as an engineer at 3Com back in 1989m and then had gigs at Gran Junction Networks and Cisco Systems, rising in the engineering ranks in networking. After a decade at Cisco, Rivers move to a short four-month stint at Google, and then went back to Cisco a few years before the Great Recession and stayed until it was mostly over, which is when Cumulus Networks was founded.

Leakes first big job was as a member of the technical staff at VMware for three years in 2002 through 2005, and then he took a job as technical director of software engineering at server startup 3Leaf Networks, which created NUMA big iron from InfiniBand switching and a homegrown distributed virtual machine of the likes of ScaleMP, RNA Networks, and TidalScale. Leake was then a member of the office of the CTO at Nuova Systems, the Cisco spinoff that created its NX-OS network operating system and their Nexus line of switches, which was spun back in as Cisco launched the Nexus 5000 series in 2008 ahead of (and more or less concurrent with and connected to its California Unified Computing System blade servers, which converged servers and switching). Leake was the founder of Tile Networks, which created a virtualized storage fabric for compute clouds, and then joined up with Rivers to co-found Cumulus Networks in early 2010 as its chief technology officer.

Leake left Cumulus Networks in June 2016 and Rivers took over as CTO until he left in July last year. Rivers went to Amazon Web Services to become a senior principal engineer on its network, and Josh Leslie, who headed up sales at both VMware and Cumulus Networks, took over as chief executive officer at the network operating system startup as Rivers switched roles to CTO back in 2016.

Over the past decade, Cumulus Networks has been working on a number of fronts to try to break open the datacenter switch, prying its operating system from the underlying hardware as Facebook talked to us at length about when we first started The Next Platform five years ago. Some history and laying out of the terrain is in order to understand what Nvidia is doing and why it is doing it.

The hyperscalers and big public cloud providers all have their own network operating systems and various kinds of controllers that comprise their networks; in some cases, as with the customers of Arista Networks, companies can use that companys Extensible Operating System, a variant of Linux that is hardened for networking and that has features to allow them to put other features on the box given the CPU, FPGA, of switch ASIC functions in a box. In the case of Microsoft, it created the Switch Abstraction Interface, or SAI, and its own variant of a network operating system called SoNIC, which itself runs on Open Network Linux, a Linux kernel tuned for networking created by Big Switch Networks, which was eaten by Arista Networks in February and which has a stack of software-defined networking software that makes it a valuable asset.

There was a flurry of activity back in the 2015 and 2016 timeframe, when Hewlett Packard Enterprise open sourced OpenSwitch, a new network operating system, based of course on the Linux kernel, that was inspired by (but distinct from) the Comware and ProVision NOSes that were deployed on its respective 3Com and HPE switches. Dell, which had acquired Force10 Networks in July 2011 to add datacenter-class networking to its portfolio, open sourced the FTOS NOS created by that switch company in early 2016, calling it OS10 and running underneath SAI as well. Mellanox Technologies, just acquired by Nvidia last week, had its own open source NOS interface tools, called SwitchDev, which worked in conjunction with Cumulus Linux as well as the homegrown Onyx operating system from Mellanox (formerly known as ML-NX) and the Microsoft Azure networking stack (which is not completely open source) and which come from the same time in early 2016.

There are a lot of open source Linux NOSes out there, or pieces that can be assembled into one. The NOS created by Cumulus Networks is arguably the most popular of the open source ones. Leslie tells The Next Platform it has thousands of customers and hundreds of thousands of ports under management and importantly, has a staff of network experts who know how to make it work that will be valuable to Nvidia as it makes its tries to realize its datacenter aspirations. But as we have pointed out in the past, networking doesnt require a Linux kernel Arrcus has created its own ArcOS from scratch starting from a routing base and coded by Cisco routing luminaries, and it is most certainly not open source, just like neither IOS or NX-OS from Cisco or EOS from Arista or the homegrown OSes from the hyperscalers and cloud builders most certainly are not.

In addition to creating the ONIE NOS installer, which the entire industry uses on whitebox switches powered by ASICs from Broadcom, Mellanox, and others, Cumulus Networks also created a fork of the open source Quagga routing stack, called Free Range Routing, or FRR, which runs atop the Linux kernel as well as a bunch of Unix kernels and which addresses many of the shortcomings of Quagga. The Cumulus Linux 4.0 stack and its NetIQ 2.4 telemetry software were last updated in November last year, adding support for the deep buffer Qumran ASICs from Broadcom and the Spectrum-2 ASICs from Mellanox. To date, by the way, Cumulus itself supports 14 different ASICs from Broadcom and Mellanox (on 134 distinct switch platforms), and while it has been evaluating other ASICs, like those from Innovium and Barefoot Networks (now part of Intel), the latter are not yet supported.

All of this work is distinct from Dent, which is an edge Linux NOS aimed at retail and other types of locations that Amazon (the online retailer, not its Amazon Web Service cloud unit) has been building with Cumulus Networks, Mellanox, Marvell, and others over at The Linux Foundation.

There is really synergy here, Kevin Deierling, senior vice president in the networking business unit at Nvidia after the Mellanox acquisition. If you look at these technologies narrowly, you might say they are all competitive open platforms. But if you look at them broadly, there really is a huge amount of complementary as well as common technologies. We will see where each of these open networking platforms prevail, but more importantly, what this means is that Nvidia has embraced the open networking stack and it is going to accelerate the networking business within Nvidia.

We suspect we will learn more about exactly how this will all map out during Jensen Huangs GTC 2020 keynote, which is happening on May 14.

Go here to read the rest:
Hot On The Heels Of Mellanox, Nvidia Snaps Up Cumulus Networks - The Next Platform

Read More..

Review hybrid cloud offerings that bring the cloud on premises – TechTarget

Many organizations are drawn to the benefits of public cloud services, but not all of them can ditch their on-premises environments, infrastructure or legacy applications. Connectivity, regulatory requirements and latency concerns are just a few of the factors that prevent certain companies from moving fully to the cloud.

To cater to enterprises unable to host all their workloads in the cloud, public cloud providers developed hybrid cloud offerings that push their services into on-premises environments. These efforts to bring the public cloud on premises have enabled organizations to choose which workloads to run in the cloud and which to keep in the data center. Those organizations can then link the two environments with dedicated networking.

Get to know the hybrid cloud and on-premises infrastructure services from AWS, Microsoft and Google that aim to bring the cloud directly to customer locations.

Google Anthos. Google Anthos is a hybrid cloud container environment built for consistency across the cloud and on premises. Launched in April 2019, IT teams use this software to manage cloud technologies -- particularly Kubernetes containers -- on internal hardware and legacy applications.

Anthos is based on container clusters that run on the managed container service Google Kubernetes Engine (GKE). Users can access Anthos in the cloud with GKE and in data centers with GKE on-prem. Anthos runs on any server that supports Kubernetes. This Google Cloud service offers multi-cloud functionality, with management capabilities for workloads on AWS and Microsoft Azure, as well as other third-party options. This enables users to get the benefits of a public cloud deployment without being locked into one cloud platform.

A core component of this hybrid cloud offering is Anthos Migrate, which automates the migration of legacy virtualized workloads in the cloud or on premises into Kubernetes containers. Anthos also comes with a set of management, monitoring, security and authentication tools bundled for on-premises and cloud environments. Anthos' key features include Anthos Config Management for cluster administration and management, Istio on GKE service mesh, Strackdriver monitoring, Cloud Run for event-driven workloads and more.

Google has partnered with hardware providers -- including Cisco, Dell EMC and NetApp -- to bring Anthos to more customers. These partners provide Anthos systems that will be available on hyper-converged infrastructure.

AWS Outposts. Outposts is the on-premises version of AWS cloud infrastructure. Outposts are specialized racks that house AWS-designed compute and storage servers, as well as some AWS services and tools. AWS delivers, installs, maintains and updates these racks.

Each Outpost is connected to a local AWS Availability Zone for access to all of the tools and services available in that Region. Outposts are built for organizations that want to utilize the AWS platform but have low latency or regulatory needs that require workloads to remain in their data centers.

Outposts are designed to provide many of the AWS tools, services, APIs and security controls in on-premises environments. Supported services currently include a range of EC2 instances, Elastic Block Store, Amazon Relational Database Service and AWS CloudFormation. AWS plans to expand the supported offerings over time.

There are two versions of AWS Outposts: AWS native Outposts and VMware Cloud on AWS Outposts. The native version, which launched at AWS re:Invent 2019, is managed entirely by AWS and accessed through the Management Console. The VMware Cloud variation, which is still in beta, runs VMware's software-defined data center software and enables customers to use VMware control planes and APIs.

Unlike some other public cloud providers' on-premises services, AWS Outposts is not a multi-cloud offering. The AWS hybrid cloud platform is a single-vendor service that does not support workloads in other clouds.

Azure Stack. Microsoft launched Azure Stack in 2017 as a way for users to host Azure cloud services on premises. The initial Azure Stack service has since expanded into a portfolio of three services. Each one is designed to tailor Azure capabilities to different infrastructure needs and environments.

Azure Arc. Microsoft's latest hybrid cloud service is in the preview stage of development. IT teams use Arc to deploy Azure services and management capabilities in the cloud or on premises. Azure Arc can control Windows and Linux server farms on premises. It also supports Kubernetes container deployment and management across cloud and on-premises environments. The Azure Arc preview has built-in support for Microsoft's public cloud data analytics services, such as Azure SQL Database and Azure Database for PostgreSQL Hyperscale.

Arc is based on Azure Resource Manager, the framework that manages deployment, administration and governance of Azure resources. However, Azure Arc expands the capabilities of Resource Manager into multi-cloud and hybrid cloud environments.

Follow this link:
Review hybrid cloud offerings that bring the cloud on premises - TechTarget

Read More..

AWS Cloud Formation Market Countries Analysis Report 2020 by Industry Size, Share, Growth Rate and Revenue Aminet Market Reports – amitnetserver

Global AWS Cloud Formation Market Forecast 2019-2026

This comprehensive AWS Cloud Formation Market research report includes a brief on these trends that can help the businesses operating in the industry to understand the market and strategize for their business expansion accordingly. The research report analyzes the market size, industry share, growth, key segments, CAGR and key drivers.

New vendors in the market are facing tough competition from established international vendors as they struggle with technological innovations, reliability and quality issues. The report will answer questions about the current market developments and the scope of competition, opportunity cost and more.

Market Summary:

The AWS Cloud Formation market is a comprehensive report which offers a meticulous overview of the market share, size, trends, demand, product analysis, application analysis, regional outlook, competitive strategies, forecasts, and strategies impacting the AWS Cloud Formation Industry. The report includes a detailed analysis of the market competitive landscape, with the help of detailed business profiles, SWOT analysis, project feasibility analysis, and several other details about the key companies operating in the market.

This report studies the AWS Cloud Formation market status and outlook of Global and major regions, from angles of players, countries, product types and end industries; this report analyzes the top players in global market, and splits the AWS Cloud Formation market by product type and applications/end industries.

The final report will add the analysis of the Impact of Covid-19 in this report AWS Cloud Formation industry.

CLICK HERE TO REQUEST A SAMPLE COPY

AWS Cloud Formation in its database, which provides an expert and in-depth analysis of key business trends and future market development prospects, key drivers and restraints, profiles of major market players, segmentation and forecasting. A AWS Cloud Formation Market provides an extensive view of size; trends and shape have been developed in this report to identify factors that will exhibit a significant impact in boosting the sales of AWS Cloud Formation Market in the near future

Scope and Segmentation of the Report

The segment analysis is one of the significant sections of this report. Our expert analyst has categorized the market into product type, application/end-user, and geography. All the segments are analyzed based on their market share, growth rate, and growth potential. In the geographical classification, the report highlights the regional markets having high growth potential. This thorough evaluation of the segments would help the players to focus on revenue-generating areas of the Vertical Farming market.

Regional Analysis

Our analysts are experts in covering all types of geographical markets from developing to mature ones. You can expect a comprehensive research analysis of key regional and country-level markets such as Europe, North America, South America, Asia-Pacific, and the Middle East & Africa. With accurate statistical patterns and regional classification, our domain experts provide you one of the most detailed and easily understandable regional analyses of the AWS Cloud Formation market.

Competitive Landscape:

The research report also studied the key players operating in the AWS Cloud Formation market. It has evaluated and explained the research & development stages of these companies, their financial performances, and their expansion plans for the coming years. Moreover, the research report also includes the list of planned initiatives that clearly explain the accomplishments of the companies in the recent past.

Research Methodology

The research methodology of the market is based on both primary as well as secondary research data sources. It compels different factors affecting the AWS Cloud Formation industry such as historical data and market trends, different policies of the government, market environment, market risk factors, market restraints, technological advancements, forthcoming innovations, and obstacles in the industry.

Table Of Content

1 Report Overview

2 Global Growth Trends

3 Market Share by Key Players

4 Breakdown Data by Type and Application

5 North America

6 Europe

7 China

8 Japan

9 Southeast Asia

10 India

11 Central & South America

12 International Players Profiles

13 Market Forecast 2019-2026

14 Analysts Viewpoints/Conclusions

15 Appendix

Moreover, the research report assessed market key features, consisting of revenue, capacity utilization rate, price, gross, growth rate, consumption, production, export, supply, cost, market size & share, industry demand, export & import analysis, and CAGR.

AWS Cloud Formation Market Key players influencing the market are profiled in the study along with their SWOT analysis and market strategies. The report also focuses on leading industry players with information such as company profiles, products and services offered financial information of last 3 years, key development in past five years.

CLICK HERE TO KNOW MORE

About Us:

Market research is the new buzzword in the market, which helps in understanding the market potential of any product in the market. Reports And Markets is not just another company in this domain but is a part of a veteran group called Algoro Research Consultants Pvt. Ltd. It offers premium progressive statistical surveying, market research reports, analysis & forecast data for a wide range of sectors both for the government and private agencies all across the world.

For more detailed information please contact us at:

Sanjay Jain

Manager Partner Relations & International Marketing

http://www.reportsandmarkets.com

Ph: +1-352-353-0818 (US)

Continued here:
AWS Cloud Formation Market Countries Analysis Report 2020 by Industry Size, Share, Growth Rate and Revenue Aminet Market Reports - amitnetserver

Read More..

Gmail and Outlook sitting in a tree, not t-a-l-k-i-n-g to me or thee – The Register

Nobody likes Mondays, least of all Google's Gmail, the POP3 and IMAP services of which fell over this morning to deprive Monday morning mailers their start-of-week fix.

The issues appeared to kick off at around 11:30 BST and continues to prevent those who prefer to access their Googly mail via means other than the browser. The problem appears to be related to POP3 and IMAP access; if you're connecting to Google's servers using those services, then sending and receiving email could be a challenge.

Google had planned to turn off access to G Suite account data for apps not using OAuth for first-time users from 15 June 2020 and all accounts from 15 February 2021, but back-pedalled in March, putting the move on hold "until further notice."

Or until Star Wars day, judging by the wailing on Twitter.

Google itself has remained tight-lipped on the issue, with its Gmail social media orifice insisting there were no disruptions. Indeed, devices or apps running with OAuth have continued to behave correctly and the Gmail website is unaffected.

Far be it from us to suggest that this might be a fitting reminder that it is time to consider a move to something a little more modern rather than trying to access Google email from a third party client.

The G Suite team, doubtless mindful that people tend to pay for its services, acknowledged a problem and reassured users that the problem is being looked into.

The Register has contacted Google to find out who kicked the plug out of that ageing server under the desk. We will update if a response is forthcoming.

Sponsored: Webcast: Build the next generation of your business in the public cloud

See the article here:
Gmail and Outlook sitting in a tree, not t-a-l-k-i-n-g to me or thee - The Register

Read More..

The attacker and the data centre – ITProPortal

Even with growing cloud adoption data centres still house a huge amount of information and for attackers, represent a valuable target that is hard to resist. The vast security measures put in place by enterprises to protect their data centres means attacking and infiltrating a data centre system is a slow process which requires patience. In order to compromise a data centre, a significant amount of time and effort needs to be put into planning and executing the attack.

Subsequently, the attacker needs to operate below the radar of the security teams. Attackers can stay hidden in networks for months, even years, in order to get to their final goal: exfiltrate or manipulate data from the data centre. It is, therefore, incredibly important for security teams to understand what they need to look out for when monitoring for these attacks. In our experience, there are six critical attack vectors and techniques that cyber-attackers use in order to pull off a sophisticated attack against data centres.

Firstly, there is the co-opting of administrative access. Due to the privileged access administrative accounts have to the data centre; they are natural targets for attackers. The protocols used by administrators give attackers powerful access into the data centre if they are able to authenticate. Ultimately, this is a much easier way of accessing the data centre because it removes the need to exploit an application vulnerability. By using standard admin tools and services such as SSH, Telnet or RDP, attackers can easily blend in with legitimate admin traffic, meaning they can go undetected for a long time. Consequently, any attacker that has breached the system is even harder to track and recognise. It is vital that security teams stay vigilant to any changes in the observed privilege behaviours.

Data centre admins sometimes implement local authentication options, or additional admin accounts to be used in an emergency in order to access the hosts and the workloads they need to manage. These local authentication options and accounts are usually not logged so there is no record of them being used. Furthermore, the login details are often shared across hosts and workloads to simply make life easier. Naturally, this poses a huge risk because attackers will find these authentication credentials by compromising an administrator, and then they carefully and silently access the data centre with the knowledge that their presence and activity is not being logged.

Authenticated local access also allows the attacker to extend further into the data centre hardware. For example, virtualisation is tantamount to the running of a data centre. This virtual environment lifecycle in the data centre is an interesting one because, in order to work, it needs to run on the physical hardware. Therefore, the virtual discs found in data centres can only work with the presence of physical disks, and the physical disks run in physical servers. Physical servers are independently managed by management planes. The management planes are designed to have a lights-out and out-of-band management, with their own memory, power, processes and protocols. This enables administrators to mount disks and re-image servers in situations where the power to the main server is powered off.

Intelligent Platform Management Interface (IPMI) is an example of a protocol which allows an action such as the one above. There are a variety of own branded versions of IPMI, such as Dell iDRAC or HPE Integrated Lights-Out (ILO) which some hardware servers use. However, they are all established on the IPMI framework and they perform the same functions.

Despite this, IPMI and similar protocols are renowned for having security weaknesses and vulnerabilities that attackers can utilise and take advantage of. Worryingly, in September 2019, researchers at Eclypsium found over 47,000 workstations and servers that were running on Supermicro motherboards and were exposed to the internet, and wide open to attacks, due to the vulnerabilities found in baseboard management controller (BMC) which is a component of IPMI. This is not a-typical for IPMIs and naturally represents an attractive target for attackers looking for an easy route into a data centre.

IPMI is not the only vulnerable aspect of a data centre. Because data centres are such an attractive target, physical servers, routers, switches, and firewalls are targeted by the most advanced attackers, including nation-states. The attackers are clever and sly so will aim low and use methods to enter the data centre at a critical level but stay beneath the radar. This is often at the level of the operating systems which ultimately makes them incredibly difficult to detect with traditional methods. Techniques such as these are used by attackers because it enables them to infect the security devices which are meant to protect the data centre network. They can then use those devices to launch attacks that penetrate an even deeper level of the network.

It is vital that administrators keep an eye on their data. The end goal of an attack is to steal or manipulate this data. Attackers seek to create monetary value from the data they find, so it is prudent to start viewing data centres essentially like a bank vault full of money. Like any criminal, attackers will try and steal data with as little disruption as possible. They do not want to draw attention to themselves, so depending on the skillset of the attackers, they will use a variety of approaches to smuggle data out of the data centre. One approach may be to take the data in bulk, or alternatively, take it a little bit at a time in an attempt to avoid detection. The latter example is the more obvious approach as it stops attention being drawn to the attacker. The data is then often moved directly to the Internet, or to a staging area in the campus network.

No one data centre is the same; they vary according to users and organisations. There is however a method to the attacks and a series of events which unfold prior to the attack on the data centre. This usually involves starting at the bottom of the chain. For example, their first point of penetration may be through a compromised employee account, that may have been compromised though a phishing email, or a malware riddled application, for example. This allows them access to the network where the attackers look to expand their presence by targeting other devices, and while doing so, plant backdoors or hidden tunnels to communicate with each other inside the now compromised network. Patience and resilience are key to their next stage because they then spend time recognising and identifying valuable assets and resources within the network which they can utilise to make their time and presence worth the effort. The administrators credentials are an attackers golden trove and once they access this, the attack is usually at its most mature. This enables them to attack an organisations data centre because administrators are often the only individuals who can access the data. The movements prior to access of the administrators credentials build up to the peak attack on the data centre.

Attackers are usually more inclined to focus on the physical infrastructure of a data centre and understand the levels required to gain access. They have no problem starting at the bottom of the chain and working their way up through the network in order to reach the pivotal level of data centre access. Therefore, organisations need to look at the bottom of the chain, from employee accounts and client devices, and work their way up through the system, employing security at every level to ensure attackers cant gain access to what is arguably their most valuable asset their data centre. By doing this, even if attackers were to find a way to start accessing information which will give them the key to a data centre, they will expose themselves to multiple detection opportunities that provide security teams the best chance to find attackers early. Early detection can make the difference between a contained incident or a successful takeover that costs the organisation time, effort, reputational damage and money.

Matt Walmsley, senior technology industry marketer, Vectra

See the rest here:
The attacker and the data centre - ITProPortal

Read More..

5 benefits of switching to cloud hosting – KnowTechie

Downtime, slow loading speeds, high dedicated-server costs. Do any of these strike a nerve?

Traditional servers have limitations, and they can severely affect your e-commerce business. Cloud hosting provides a solution; its efficient, cost-effective, secure, reliable, and easy to migrate. So why arent more of us using it?

Im guessing for some companies the thought of changing web host or theirIT structure, seems like a complicated and costly affair, when it couldnt be further from the truth.

Lets look at some of the advantages of using a cloud web host.

Uptime and loading speed are both vitallyimportant to the performance of your website; cloud hosting can guarantee both, heres why.

Traditional hosting servers are independent, so if it fails, your website will go offline, cloud web host servers are interconnected, if one fails, the next takes over, guaranteeing maximum uptime.

Standard hosting servers share their bandwidth amongst multiple websites; this directly reduces the loading speeds. Cloud hosting, on the other hand, distributes the data across various servers, when one slows down the next picks up the pace.

Cloud servers can instantaneously scale to meet any demands made upon your website.

Think of it as a flexible server that expands as your traffic grows and contracts as your traffic slows, meaning you only ever pay for the service you need and when you need it. Traditional servers can be scaled up, but its a timely and costly process, and you have to buy a fixed package. While cloud servers allow you to pay on a month to month basis, so you only ever pay for what you need.

Initially, choosing a cloud hosting option for your business can seem expensive, but its worth the investment.

As previously mentioned, scalability becomes an affordable option, there are other features too, such as free data migration, resource monitoring, fully managed hosting, increased workforce mobility, speed of loading, and zero downtime. To get a better understanding of what cloud platforms can offer and cost,click here.

Traditional hosting can provide an almost equal level of security as a cloud, but this will require you to upgrade to a private server, which will be expensive.

Cloud hosting offers multiple layers of protection without the need for one dedicated server. The advanced security infrastructure has authentication identity systems, data encryption, storage segregation, firewalls, and routine backups. Another advancement is in file transfer, as they pass within the cloud; theres no possibility offile corruption.

Cloud has many beneficial features over traditional servers, one being freedom of access.

Traditional servers are location restricted, meaning you have to consider this when choosing as it affects yourwebsites loading speeds. Cloud technology is world-wide, enabling users to gain access and work from any location, anytime, and from any device, all thats needed is an internet connection.

Have any thoughts on this? Let us know down below in the comments or carry the discussion over to ourTwitterorFacebook.

Read the original post:
5 benefits of switching to cloud hosting - KnowTechie

Read More..

Managed Hybrid Cloud Hosting Market Size by Top Key Players, Growth Opportunities, Incremental Revenue , Outlook and Forecasts to 2026 – Latest Herald

Telstra

Global Managed Hybrid Cloud Hosting Market: Competitive Landscape

This section of the report lists various major manufacturers in the market. The competitive analysis helps the reader understand the strategies and collaborations that players focus on in order to survive in the market. The reader can identify the players fingerprints by knowing the companys total sales, the companys total price, and its production by company over the 2020-2026 forecast period.

Global Managed Hybrid Cloud Hosting Market: Regional Analysis

The report provides a thorough assessment of the growth and other aspects of the Managed Hybrid Cloud Hosting market in key regions, including the United States, Canada, Italy, Russia, China, Japan, Germany, and the United Kingdom United Kingdom, South Korea, France, Taiwan, Southeast Asia, Mexico, India and Brazil, etc. The main regions covered by the report are North America, Europe, the Asia-Pacific region and Latin America.

The Managed Hybrid Cloud Hosting market report was prepared after various factors determining regional growth, such as the economic, environmental, technological, social and political status of the region concerned, were observed and examined. The analysts examined sales, production, and manufacturer data for each region. This section analyzes sales and volume by region for the forecast period from 2020 to 2026. These analyzes help the reader understand the potential value of investments in a particular country / region.

We Offer up to 30% Discount @ https://www.marketresearchintellect.com/ask-for-discount/?rid=181292&utm_source=LHN&utm_medium=888

Key Benefits for Stakeholders:

The report provides an in-depth analysis of the size of the Managed Hybrid Cloud Hosting world market, as well as recent trends and future estimates, in order to clarify the upcoming investment pockets.

The report provides data on key growth drivers, constraints and opportunities, as well as their impact assessment on the size of the Managed Hybrid Cloud Hosting market.

Porters 5 Strength Rating shows how effective buyers and suppliers are in the industry.

The quantitative analysis of the Managed Hybrid Cloud Hosting world industry from 2020 to 2026 is provided to determine the potential of the Managed Hybrid Cloud Hosting market.

This Managed Hybrid Cloud Hosting Market Report Answers To Your Following Questions:

Who are the main global players in this Managed Hybrid Cloud Hosting market? What is the profile of your company, its product information, its contact details?

What was the status of the global market? What was the capacity, the production value, the cost and the profit of the market?

What are the forecasts of the global industry taking into account the capacity, the production and the value of production? How high is the cost and profit estimate? What will be the market share, supply, and consumption? What about imports and export?

What is market chain analysis by upstream raw materials and downstream industry?

Get Complete Report @ https://www.marketresearchintellect.com/need-customization/?rid=181292&utm_source=LHN&utm_medium=888

About Us:

Market Research Intellect provides syndicated and customized research reports to clients from various industries and organizations with the aim of delivering functional expertise. We provide reports for all industries including Energy, Technology, Manufacturing and Construction, Chemicals and Materials, Food and Beverage and more. These reports deliver an in-depth study of the market with industry analysis, market value for regions and countries and trends that are pertinent to the industry.

Contact Us:

Mr. Steven Fernandes

Market Research Intellect

New Jersey ( USA )

Tel: +1-650-781-4080

Tags: Managed Hybrid Cloud Hosting Market Size, Managed Hybrid Cloud Hosting Market Trends, Managed Hybrid Cloud Hosting Market Growth, Managed Hybrid Cloud Hosting Market Forecast, Managed Hybrid Cloud Hosting Market Analysis

Read more here:
Managed Hybrid Cloud Hosting Market Size by Top Key Players, Growth Opportunities, Incremental Revenue , Outlook and Forecasts to 2026 - Latest Herald

Read More..