Page 59«..1020..58596061..7080..»

Security in the public cloud explained: A guide for IT and security admins – ComputerWeekly.com

Who is responsible for security in the public cloud? This is a question businesses need to consider as they increasingly deploy more workloads and use cloud-based IT infrastructure, platform services and applications.

In Gartners How to make integrated IaaS and PaaS more secure than your own data center report, analysts discuss the benefits of adopting a cloud-native approach to IT security.

Gartner defines a cloud-native mindset as a way to consider IT infrastructure and applications in the cloud as modular and microservices-based. The report authors state that such an architecture is typically container-based, orchestrated and incorporates heavy use of application programming interfaces (APIs). In addition, Gartner says such IT infrastructure is updated using an immutable infrastructure approach.

However, the analysts warn that such an approach does not work well for on-premise IT. The on-premise architectural patterns and their associated tools are poorly suited for the public cloud and will likely frustrate the needs of developers and business units adopting public cloud for its dynamic and ephemeral nature, they note in the report.

Gartner urges IT security leaders responsible for cloud security to be open to embracing new approaches, patterns, products and best practices, and consider alternative IT security technology providers when adopting public cloud.

While largely a benefit, the public cloud also leaves organisations open to public cloud security risks, particularly when they allow users to access on-demand services from various locations using different devices. Beji Jacob, who is on the ISACA emerging trends working group, describes cloud security as technology and techniques engineered to prevent and mitigate threats to an organisations cyber security.

Companies must implement cloud computing security to support both digital transformations and the use of cloud-based tools to protect assets, he says, adding that cloud security works by combining several technologies, all designed to tighten cyber defences for off-premise data and applications.

Rob Dartnall, CEO of SecAlliance, regularly conducts threat-led penetration tests (TLPT) that are part of regulatory frameworks, such as the Bank of Englands CBEST targeted assessment and the UK governments intelligence-led simulated attack framework, GBEST, in the UK.

A key component of the threat intelligence element of these tests is called targeting intelligence, he says. Essentially, it is hostile reconnaissance of an entity that includes many things, but importantly, the reconnaissance of the perimeter and cloud services of an entity to look for weaknesses that could be used to gain a foothold.

In Dartnalls experience, although technical exploitation of a perimeter service by the red teamer is rare against mature entities such as banks, the discovery of shadow services, intellectual property ranges and domains that the entity was not aware of is certainly not rare.

He says there is a direct correlation between those entities that suffer a breach and those that have deployed external attack surface management (EASM). This is an approach to perimeter security where an internal team or external security service provider continuously looks at the perimeter and beyond, not only looking at what is running, versions, services and ports, security controls and misconfigurations, but also at new shadow services, usually accidentally set up by rogue developers, engineers or architects. These shadow IT services, he says, consistently lead to security incidents and data breaches.

There is a role for artificial intelligence (AI) and machine learning (ML), which can operate at a large scale, utilising learning, and can adapt to an organisations data protection needs. By increasing automation, decision-making can be sped up, and data bound for, or already deployed, in the cloud, can be assessed and appropriately protected more rapidly, according to Scott Swalling, a data and cloud security expert at PA Consulting.

Swalling says cloud tools such as Google BigQuery and Amazon Macie use AI and ML to provide capabilities that help organisations better manage their data in public clouds and mitigate the exposure of sensitive data.

AWS Config, Azure Policy, or Google Clouds Security and Command Centre also help automate the monitoring and enforcement of security policies. Implementing continuous monitoring solutions will detect and alert on misconfigurations, suspect access requests and other security incidents in real time.

In addition to automated monitoring and enforcement, Swalling points out that the implementation of well-managed and regularly reviewed threat management allows organisations to be more proactive and agile in their response to threats.

Identity and access management is a core component of proactive IT security management. However, Carlos De Sola Caraballo, senior principal analyst at Gartner, warns that traditional asset-centric approaches to identity management will fail to provide the necessary visibility in cloud environments.

He recommends that IT security leaders focus on user identities and their associated permissions, establishing baselines for normal behaviour and configuring alerts to detect anomalies.

This approach enhances the ability to track and manage incidents across the cloud infrastructure, ensuring a more comprehensive and timely response, he says.

Whether an organisation is beginning its journey of migrating key services to the cloud or launching a cloud-native evergreen project, involving security specialists with a deep understanding of the cloud security model is an important factor.

Elliott Wilkes, chief technology officer (CTO) at Advanced Cyber Defence Systems, touches on the cloud shared responsibility model, whereby cloud providers are responsible for certain elements of each of the services. He says they need to monitor, defend and protect these elements, which include physical infrastructure and access controls at datacentres, resilient power backups and the like. All of the things youd typically expect a datacentre to provide, the CSPs [cloud service providers] will provide, he says.

Knowing what parts of the public cloud infrastructure are managed by the cloud service provider enables IT teams to develop a plan for how to tackle the security gaps they need to address.

Gartners Caraballo recommends that IT security leaders engage governance, risk and compliance (GRC) and legal teams early in the process of selecting a CSP.

Wilkes agrees, saying: Explicit contract stipulations are necessary to ensure robust incident response support from the CSP.

Caraballo recommends that IT security leaders consider overall business resilience when developing a strategy to respond to security incidents that occur in cloud environments. He notes that this requires a broader approach, which involves not only technical responses, but also strategic planning, such as digital supply chain redundancies and robust legal contracts. He urges IT security leaders to ensure their incident response plans are comprehensive, incorporating cloud-specific considerations and aligning with overall business continuity and disaster recovery strategies.

According to Caraballo, the transition to cloud environments necessitates a fundamental shift in incident response strategies. He urges IT security leaders to reassess and upgrade their incident response procedures, leveraging automation, proactive collaboration and identity-centric security to meet the unique challenges of the cloud.

The dynamic nature of cloud security demands equally dynamic and flexible incident response strategies, ensuring that organisations can respond swiftly and effectively to emerging threats, he adds.

The good news, at least from Swallings perspective, is that cloud providers have the ability to assess vast amounts of data and threats. This, he points out, means public cloud services are currently superior in leveraging AI than simpler on-premise security tooling.

See original here:
Security in the public cloud explained: A guide for IT and security admins - ComputerWeekly.com

Read More..

Youth Empowerment Section Commences 4th Batch of Amazon Web Service Re/Start Cloud Computing Skill Training – Central Tibetan Administration

The 4th Batch of the Amazon Web Service Re/Start Cloud Computing program.

Bangalore: The Youth Empowerment Support section of the Home Department, CTA, in collaboration with Natio Cultus Consultancy LLP (a part of Indonesia-based Orbit Future Academy), commenced the 4th Batch of the Amazon Web Service Re/Start Cloud Computing program on 1 July 2024, at Dalai Lama Institute for Higher Education (DLIHE) in Bengaluru.

The opening event was graced by the presence of the Chief Guest, Dr Tenzin Passang, Principal of DLIHE, along with Aparna Singh, Program Director of Orbit Future Academy; Shefali, AWS Instructor; and Sonam Tashi, Project Officer of the YES Section. This year, 11 young Tibetans participated in the AWS program.

-Report filed by Department of Home, CTA

Inauguration of AWS Cloud Computing Skills Training 4th Batch.

Dr Tenzin Passang, Principal of DLIHE presenting the Mrs Aparna Singh, Program Director of Orbit Future Academy.

Dr Tenzin Passang, Principal of DLIHE speaking.

Read the original:
Youth Empowerment Section Commences 4th Batch of Amazon Web Service Re/Start Cloud Computing Skill Training - Central Tibetan Administration

Read More..

Hybrid and Multi-Cloud technologies in 2024: Developments, challenges, and Innovations – Sify

The future of cloud computing is a fine balance between the flexibility of the cloud and the protection of data, where hybrid and multi-cloud form the music of continued innovation.

Consider running an internet discussion with thousands of users while it requires immense stability and protection, it also needs to be able to adapt to the increasing number of users in a matter of seconds. However, sudden surges in the number of attendees during live sessions place great stress on their on-premises servers, to the point that the courses become frustrating to manage. Thats the cloud conundrum for business today.

This is where hybrid and multi-cloud technologies provide the prerequisite solution. To effectively address the demands of large audiences, the organisation uses a public cloud for live streaming and chat during times of maximum attendance while preserving the confidentiality of data in a private cloud. Scalability and security go hand in hand with this strategy, making it a great combination for any global event.

Lets now examine the most recent developments, challenges, and innovations influencing hybrid and multi-cloud solutions in 2024.

One of the biggest changes that will be observed in hybrid and multi-cloud technologies by 2024 is better integration. Currently, cloud providers are working towards providing synchronous compatibility between different environments of clouds. For example, Microsoft Azure Arc helps organizations maintain and govern resources in on-premises, edge, and multi-cloud spaces. This makes it more efficient to run the cloud services and it gets rid of the hassle of dealing with different cloud services. A real-time example is Nokia, which is a multinational firm that applies Azure Arc to govern the firms IT resources irrespective of their location, as well as ensure the smooth functioning of the IT systems.

As organisations transition to hybrid and multi-cloud systems, security continues to be a top priority. With improved encryption standards, AI security analysis, and the zero-trust architecture, cloud security in 2024 will be even more strengthened. Such solutions as IBM Cloud Pak for Security are instrumental in this by presenting companies such as IBM with extensive security analytics across hybrid and multi-cloud settings. For example, the worlds largest bank, BNP Paribas, uses IBMs tight security to protect its financial data and adheres to stringent legislation in multiple clouds.

AI & ML are now embedded in hybrid and multi-cloud environments in todays world. These technologies enable predictive algorithms, control of resources, and improvement of organizational processes. For example, the Google Cloud AI Platform offers solutions that cover the entire machine learning development process and deployment across different clouds. This capability enables the formulation of crucial conclusions and the application of automation across an organization.

One of the best use cases of AI and ML cooperation can be discussed concerning GE Healthcare, where Google Cloud AI and ML are implemented in the companys medical imaging products. Using these technologies, GE Healthcare has enhanced imaging algorithms that aid radiologists in better and faster diagnosis of a condition. This integration benefits the patient by improving their health while at the same time enhancing the efficiency of operations in healthcare institutions, thus highlighting the effectiveness of AI & ML in hybrid and multi-cloud models.

Indeed, hybrid and multi-cloud are a perfect solution for businesses, although orientation in such a topology is not easy. Here are the key challenges that organisations need to address effectively:

It can be challenging when an organization is using multiple cloud environments that have different tools interfaces and billing structures. The IT teams require skills in managing the different cloud management platforms, security solutions, and orchestration services for a seamless functioning across the hybrid and multi-cloud ecosystem. For instance, a company may use AWS to host resources, Microsoft Azure to host data, and a private cloud especially for storing financial information. While working with different platforms, it is revealed that each has a unique management console and billing system, and IT personnel need to be acquainted comprehensively with these interfaces for handling the inventory, solving problems, and controlling expenses.

The ability to maintain uniform security across several cloud domains is one of the fundamental challenges. Therefore, for all types of clouds, businesses must create and put into place strict security procedures that include encryption, access rights, risk assessment, and compliance with legal requirements. This is especially true when working with a multi-cloud environment, where data can be located on different providers platforms with various levels of protection. For instance, a healthcare provider may allow patient records to be stored on the private cloud due to privacy concerns but may use the public cloud for analytics. So, it is important to keep an equal level of encryption, access control, and periodic security checks in both settings to avoid compromising patient information and medical records.

Still, vendor lock-in is a potential concern when it comes to multi-cloud. The rationale behind multi-cloud is to avoid being overly reliant on a single vendor, but even here this issue persists. This means that organizations can end up locked in with particular cloud providers for particular services or employments, and it can be inconceivable and costly to shift to another provider in the future. For example, an enterprise may rely on several computing applications that are not available on a server provided by a typical cloud provider. When they consider changing providers in the future, they may have a problem transferring their applications to another serverless provider because of proprietary functions or interfaces. The key to avoiding being locked into a particular cloud provider is to research and effectively determine which providers can offer the services needed now and in the future without requiring a change in providers.

Hybrid and multi-cloud architectures are being enhanced by edge computing, as it offloads computation and storage closer to data origin. This innovation helps lower the latency and enhances the response time for applications that require real-time output. Tech giants like AWS are already providing solutions like AWS Outposts to bring the AWS infrastructure services into the customers premises. A clear example is in self-driving cars, where edge computing comes in handy to process data and make decisions in real time, which is vital to operations.

Kubernetes and the use of containers are emerging as a new solution to deploy and manage applications in hybrid and multi-cloud environments. Kubernetes offers a foundation for automatically deploying, scaling, and managing application containers across the clusters of hosts. This technology is backed by prominent cloud providers such as Google Cloud Anthos that apply consistent management across the hybrid or multi-cloud setup. For example, the fintech firm PayPal deploys Kubernetes to guarantee the high availability and horizontal scalability of its services when deploying onto a variety of cloud platforms to support its global payment processing needs.

Serverless computing is a form of cloud computing in which the cloud provider manages the execution of all application code in response to events while providing limited computing resources for the code to run. This innovation makes the development process less complex and improves scalability among the applications. Azure Functions and AWS Lambda are examples of Serverless Computing that enables businesses to upload code which runs in response to particular events and these can automatically scale up or down. An example of this is Netflix, the video streaming company that utilizes AWS Lambda for managing content and delivery to viewers across the globe.

The future of cloud computing is a fine balance between the flexibility of the cloud and the protection of data, where hybrid and multi-cloud form the music of continued innovation. AI-based security solutions and serverless architecture, which are relatively new concepts, have opened the door to a new level of organizational efficiency and business scalability. But its not easy to simplify this complex system, which is why sophisticated IT players, the real choreographers are needed. Thereby, the limitations of a single cloud are history. The stage is set for businesses to unlock a new level of efficiency and scalability; the only question is, are you ready for your curtain call? For more detailed information on trends such as hybrid and multi-cloud, visit Sify Technologies and explore their comprehensive resources on cloud solutions.

Read the original here:
Hybrid and Multi-Cloud technologies in 2024: Developments, challenges, and Innovations - Sify

Read More..

Crafting a Robust Cloud Security Strategy in 2024 – MSSP Alert

As cloud computing has evolved, weve entrusted more and more of our data to it. Our everyday correspondence is in the cloud. Our favorite applications are in the cloud, and, more and more, our most sensitive data is in the cloud. To protect the integrity of your organizations assets, youll need a comprehensive cloud security strategy.

However, the cloud isnt a single piece of hardware or software. Its a complex ecosystem of computers, routers, apps, websites, files, services, and more. As such, your organizationssecurity posturehas to be just as versatile and flexible as the systems it protects.

Crafting a cloud security strategy in 2024 requires a clear understanding of modern threats, countermeasures, and best practices. With the right knowledge and tools at your disposal, you can educate your staff, secure your data, and take full advantage of what the cloud has to offer.

Because the cloud encompasses so many different systems, it can be difficult to pin down exactly what a modern cloud security strategy should look like. In broad terms, cloud security refers to any process thatsafeguards data in the cloud, whether that data is in an app, a file storage system, or a development platform. This means implementing smart security policies, and updating them over time as threats change.

Cloud computing hasbeen around since the 1960s, but didnt become widely available until the 1990s. As cloud computing has advanced, security protocols have had to keep pace with it. Early cloud security solutions could control access to remote systems and offer basic data protection, but not much else.

Over time, cloud security has become more sophisticated. Todays security solutions offer continuous monitoring, real-time incident response, and a focus on theshared responsibility model. Essentially, employees are responsible for keeping their own data secure, while organizations and service providers are responsible for keeping the systems that store the data secure.

While no two organizations will employ the exact same protocols, there are a few elements that every good cloud security strategy needs:

As of 2022,60% of all corporate datalives in the cloud and that number is not likely to go down anytime soon. As organizations shift their resources from local servers to cloud apps, company policies must evolve to address a different set of security risks. IT and security teams need to be aware of the latest cybersecurity threats as well as the countermeasures for them.

The world of cybersecurity moves fast. Security researchers find an average of72 new vulnerabilities per day. A good security suite can block most of these potential exploits but probably not all of them. To keep pace with emerging threats, your organization should be proactive. Resources such as theLookout Threat Intelligence Platformcan keep you apprised of new vulnerabilities as they emerge and help you analyze current patterns and trends. You should alsoassess your security postureregularly, and have solid, actionable plans in place to deal with threats of varying severity.

Depending on your organizations field, you may have to comply with governmental or industry regulations. The finance, manufacturing, education, retail, and transportation industries, for example, must hold their sensitive data toespecially strict standards. Organizations that do business in Europe have to follow GDPR guidelines, while theHealth Insurance Portability and Accountability Act (HIPAA)protects patient privacy in the United States. These regulations apply whether you store your data on premises or in the cloud.

There are two major threats to any cloud-based system: external threat actors and internal misuse. A sound cloud security strategy must account for both. To lay the foundation for a solid security posture, you should verify users constantly, restrict access to sensitive data, and protect data when its in use.

Not every employee needs to access every piece of data at your organization. The principle of least privilege grants employees the absolute minimum level of clearance they need to do their jobs. For example, an intern might only be able to access clerical data, a manager might be able to access sensitive records, and an IT specialist might be able to access just about everything. Minimizing privileges reduces the risk of unauthorized access, and limits how much damage an attacker could do with a compromised account.

Older cloud security systems focused on access control, or determining which users were authorized for certain systems. While access control is a good starting point, it doesnt help with accidental data leakage, misconfigured permissions, or compromised accounts.

Instead, your security team should adopt adata-centric approach. Data-centric solutions focus on classifying sensitive data appropriately, and either granting or limiting access on a file-by-file basis. Implementing a DLP policy can help you analyze data usage patterns, grant or deny access situationally, and encrypt files at every stage of the process.

Modern-day threat actors frequently use mobile devices as an entry point into corporate systems. Thats why any mobile device with access to your corporate resources needs to be secured. Many organizations usemobile device management (MDM)to keep track of corporate-owned devices, but MDM doesnt cover employees personal devices.Mobile endpoint securitycan complement your existing MDM while giving you more comprehensive coverage over corporate and personal devices.

Shadow IT refers to employees using unapproved technologies to do their jobs, rather than relying exclusively on company-issued tools. This issue has become even more pervasive with the rise of remote work andbring-your-own-device (BYOD) policies. While shadow IT isnt necessarily a bad thing, you do need to account for it in your cloud security strategies. Acloud access security broker (CASB)acts as an intermediary between your workers and the cloud, helping you identify and monitor third-party apps.

In the past, organizations favored virtual private networks (VPNs) and identity access management (IAM) services to facilitate remote work. However, these tools are binary: either a user is logged in, or theyre not. That makes VPNs and IAMs relatively easy to compromise, especially with a stolen device orsocially engineered credentials.

Zero trust network access (ZTNA)is a more nuanced and more secure option for remote access. With ZTNA, you can analyze user behavior and grant granular access to sensitive data. Depending on an employees device, location, and network security, a ZTNA solution could let them into your system right away, or require them to complete multiple login and multi-factor authentication (MFA) challenges.

Anything in the cloud is, by definition, on the internet, and storing files on theinternet presents different security risksthan storing them on a local machine. Cloud files are subject to social engineering attempts, compromised employee accounts, and malware kits. Asecure web gateway (SWG)can neutralize many of these threats by analyzing internet traffic, enforcing acceptable use policies, and blocking potentially dangerous URLs and IP addresses.

While your employees are your best defense against cybersecurity threats, they may also be your largest source of uncertainty. Their access patterns and endpoints can change rapidly from assignment to assignment. That could make improper data usage or worse, a compromised account hard to spot.User and entity behavior analytics (UEBA)can learn normal employee behavior over time and flag suspicious behavior based on login location, frequency of access, data sharing habits, and more.

Azero-trust modelassumes that anyone attempting to access your organizations systems could be a threat actor. Instead of logging in once and staying logged in, a zero-trust approach makes employees enter their usernames, passwords, and MFA credentials on every device, in every location, and on every network. While this adds a few extra minutes of work for employees each day, it also makes it incredibly difficult for stolen devices or compromised passwords to threaten your sensitive data.

With the right credentials in hand, a threat actor may need only a few minutes to pull off a complicated attack. Real-time monitoring allows you to flag and analyze incidents as they happen, rather than after the fact. Ensure that your security solution provides monitoring features, and have a plan in place to report, contain, and neutralize incidents as they happen. Be sure that this plan includes a way to restore normal operations as quickly as possible.

Unless you test your systems, you wont know for sure whether they can actually deter a cyber attack. Perform regular security assessments that test your organizations access controls, encryption, network segmentation, and intrusion detection capabilities. Frequentvulnerability management, where you scan for and patch known vulnerabilities, can help your assessments succeed.

You should also perform regular security audits. Rather than testing your systems directly, audits review your security control settings and address any instances of noncompliance. Communicating the results of these audits is also a good way to let the rest of your organization know what youre doing to promote cybersecurity behind the scenes.

Teach your employees about common cybersecurity threats, including phishing, password spraying, and unsolicited downloads. Ensure your workers know how to craft strong passwords and change them frequently. Learn about the data permissions they need to do their jobs and explain how they can responsibly store, modify, and share that data.

You should also have a system in place for reporting security issues. Once your employees know what to look for, they should be able to spot phishing attempts, internal vulnerabilities, and malicious websites. Not only will this help keep your data safe, but your staff may also feel more invested in your organizations cybersecurity practices.

Cloud computing is a huge, complex, and occasionally unwieldy concept. As such, your organizations cloud security strategy needs to be robust, versatile, and adaptable. However, relying on dozens of different tools is time-consuming and can result in an inconsistent security posture. Asecurity service edge (SSE)solution combines SWG, ZTNA, and CASB technologies into a comprehensive platform. TheLookout Cloud Security Platformis a data-centric SSE solution with built-in DLP and UEBA capabilities.

For more information on how to manage and protect your data in the cloud, read the Lookout report onHow to Build an Effective Data Security Strategy. In it, youll learn why cloud computing has become so popular and why this popularity makes it a tempting target for threat actors. The report suggests five practical steps to safeguard your organizations data, from performing continuous risk assessment to identifying unsanctioned apps. Once you know the risks, your organization can leverage the clouds full potential.

Blog courtesy of Lookout. Regularly contributedguest blogsare part of MSSP Alertssponsorship program. Read more Lookout news and guest blogs here.

The rest is here:
Crafting a Robust Cloud Security Strategy in 2024 - MSSP Alert

Read More..

Microsoft (MSFT) Up 18.9% YTD on Cloud Strength: Time to Buy? – Zacks Investment Research

Microsoft (MSFT Quick QuoteMSFT - Free Report) has seen its stock price climb 18.9% year to date, outpacing the Zacks Computer Software industry and S&P 500 index, which have returned 15.2% and 14.7%, respectively. This impressive performance can be largely attributed to the company's strong positioning in two key areas cloud computing and artificial intelligence (AI).

MSFT projects a 15.2% net sales increase for fiscal 2024 that showcases the strength of its cloud-centric strategy. Intelligent Cloud, which includes Azure, server products and enterprise services, generated a robust $26.7 billion in revenues, in the fiscal third quarter, marking a 21% year-over-year increase.

For the fiscal fourth quarter, Microsoft expects Intelligent Cloud revenues between $28.4 billion and $28.7 billion. Our model estimate for Intelligent Cloud revenues is currently pegged at $28.5 billion, indicating 19% growth from the figure reported in the year-ago quarter.

Looking forward, we expect cloud services and AI innovations to remain a key growth driver for Microsoft.

Image Source: Zacks Investment Research

Azure continues to be a major growth driver, demonstrating the sustained demand for cloud services across industries. In the third quarter of fiscal 2024, Azure and other cloud services revenues grew 31% year over year (up 31% at cc), including roughly 7 points from AI services.

In the global cloud infrastructure market, Azure has solidified its position as the second-largest provider, reaching a record 25% market share in the first quarter of 2024, according to Synergy Research Group. This narrows the gap with market leader Amazon (AMZN Quick QuoteAMZN - Free Report) -owned Amazon Web Services (31%) while outpacing Alphabet (GOOGL Quick QuoteGOOGL - Free Report) -owned Google Cloud (11%). The "Big Three" now control 67% of the expanding cloud sector. Azure Arc, Microsoft's hybrid cloud offering, has been a key differentiator among competitor offerings. It allows its customers DICKS Sporting Goods and World Bank to run Azure services across on-premises, multi-cloud, and edge environments. Arc now has 33,000 customers, up more than twofold year over year.

MSFTs strategy of developing industry-specific cloud solutions, such as Azure for Healthcare and Azure for Financial Services, has proven effective in penetrating key verticals.

Microsoft has become the hyperscale platform of choice for SAP and Oracle workloads, with Conduent and Medline moving their on-premises Oracle estates to Azure, and Kyndryl and LOreal migrating their SAP workloads to Azure.

Beyond Azure, Microsoft's cloud dominance extends to its analytics platform, Microsoft Fabric, which has attracted over 11,000 paid customers. The integration of Fabric with Azure AI Studio and Power BI showcases Microsoft's comprehensive approach to cloud services, now serving more than 350,000 paid customers across its ecosystem.

As digital transformation accelerates and demand for AI, machine learning and secure cloud solutions grows, Microsoft's Azure platform is well-positioned to capitalize on these trends, driving continued growth and innovation in the cloud computing space. In Azure, MSFT expects revenue growth at cc between 30% and 31% for the fourth quarter of fiscal 2024.

Microsoft's Azure platform is spearheading the company's AI-driven growth strategy. The integration of OpenAI's GPT-4 into Bing and Edge showcases Azure's capabilities in delivering advanced AI experiences.

The Azure OpenAI Service has become a pivotal tool for developers, facilitating the incorporation of generative AI across diverse applications. The collaboration with OpenAI on an advanced data center project further cements Azure's position as a leader in AI infrastructure.

In the fiscal third quarter, the company reported impressive adoption of Azure AI, boasting over 53,000 customers, with more than a third being new to Azure in the past year. More than 65% of the Fortune 500 now use Azure OpenAI Service. MSFT continues to innovate and partner broadly to bring customers the best selection of frontier models and open-source models, including large language models and small language models.

More than half of Azure AI customers use the companys data and analytics tools. Customers are building intelligent applications running on Azure PostgreSQL and Cosmos DB, with deep integrations with Azure AI.

Microsoft's launch of AI-powered copilot templates for retailers demonstrates Azure's versatility in creating industry-specific solutions. These developments highlight Azure's central role in Microsoft's AI strategy, driving innovation and market expansion.

Given the promising long-term prospects, maintaining a position in Microsoft, which has a Zacks Rank #3 (Hold) appears prudent at present. You can see the complete list of todays Zacks #1 Rank (Strong Buy) stocks here.

The Zacks Consensus Estimate for MSFTs fiscal 2024 revenues is pegged at $244.41 billion, indicating 15.3% growth year over year. The consensus mark for earnings per share is pegged at $11.77, which has moved up by a penny in the past 60 days, indicating 20% growth year over year.

Image Source: Zacks Investment Research

Moreover, MSFT is trading at a premium with a forward 12-month P/S of 13.59X compared with the industrys 9.42X and higher than the median of 11X, reflecting a stretched valuation.

Image Source: Zacks Investment Research

Hence, investors looking to buy the stock should rather wait for a better entry point.

See the rest here:
Microsoft (MSFT) Up 18.9% YTD on Cloud Strength: Time to Buy? - Zacks Investment Research

Read More..

Hybrid Cloud Market Growth, Overview with Detailed Analysis 2023-2029 – WhaTech

By the end of the forecast period, APAC is anticipated to hold more than 60% of the global market shares, dominating the hybrid cloud market. China has become the second-largest market in the world, after the United States, because to its notable advancements in cloud computing.

Hybrid CloudMarket Growth Or Demand Increase Or Decrease For What Contain:

The hybrid cloud market is witnessing substantial growth driven by the increasing need for scalable, flexible, and cost-effective IT infrastructure solutions. Organizations are increasingly adopting hybrid cloud models to balance the benefits of both public and private clouds, enhancing their ability to manage workloads dynamically while maintaining security and compliance.

Key factors contributing to this demand include the growing volume of data, the need for disaster recovery solutions, and the desire for improved business agility. Additionally, advancements in cloud technologies, enhanced security features, and the integration of artificial intelligence and machine learning are further propelling market growth.

The hybrid cloud model's capability to provide a seamless and efficient way to manage and deploy applications across different environments is making it a preferred choice for enterprises globally.

Hybrid CloudMarketCAGR Estimation:

The hybrid cloud market was estimated to be worth US$ 54.11 billion in 2022. From 2023 to 2029, it is anticipated that total hybrid cloud revenue will increase at a rate of 13.51%, or close to US$ 131.37 billion.

Explore additional details by clicking the link provided:www.maximizemarketresearch.com/requestple/24915/

Hybrid CloudMarket Segmentation:

by Component

Solution Services

Over the course of the projection period, the services segment is anticipated to develop at a CAGR of 8.7%. The use of hybrid clouds in business is expected to increase in the upcoming years because to its improved scalability, low cost, and secure deployment options.

It has become an essential part of company operations. Establishing a hybrid hosting environment with co-location, dedicated servers, and virtualized systems is becoming easier for businesses to combine.

by Service Model

Software as a service (SaaS) Infrastructure as a service (IaaS) Platform as a service (PaaS)

Over the course of the forecast period, the SaaS market is anticipated to expand at a CAGR of 9.7%. SaaS is quite popular because of its quick setup, easy maintenance, and variable pricing.

Over 70% of businesses are shifting the majority of their apps to SaaS platforms as more and more shift their operations to the cloud. The need for SaaS solutions that let collaborative teams access formerly centralized data and analytics has increased due to remote working.

by Organization Size

Large enterprises Small and medium enterprises

by Industry Vertical

IT & Telecom Healthcare BFSI Retail Government Media & entertainment Transportation & Logistics Manufacturing Others

Over the projection period, the BFSI segment is anticipated to increase at a CAGR of 8.2%. Cloud computing is a key component of the digital transformation that banks have deployed in response to the growth of internet banking in the BFSI sector.

Businesses in the BFSI sector have benefited from reduced costs, increased flexibility, improved client relations, and a climate of innovation thanks to cloud computing. The COVID-19 pandemic has changed how people communicate and do business.

One of the factors driving demand for the expansion of the BFSI segment is the usage of cloud services for client data storage and monitoring. gateways for payments,

Hybrid CloudMarket Overview:

The hybrid cloud market represents a pivotal shift in how businesses manage their IT infrastructure by integrating both public and private cloud environments. This model allows organizations to leverage the scalability and cost-efficiency of public clouds while retaining control over sensitive data and critical applications in private clouds.

Hybrid cloud solutions offer flexibility, enabling seamless workload management across multiple platforms and environments.

Key drivers of the hybrid cloud market include the increasing adoption of digital transformation strategies, the need for efficient data management solutions, and the demand for enhanced business agility. Organizations benefit from the ability to optimize resource allocation, scale IT operations as needed, and improve overall operational efficiency.

Explore additional details by clicking the link provided:www.maximizemarketresearch.com/requestple/24915/

Hybrid Cloud Market Growth Or Demand in which regions??

The growth and demand for hybrid cloud solutions are robust across various regions globally, driven by diverse factors influencing IT infrastructure modernization and digital transformation initiatives. In North America, particularly in the United States and Canada, the hybrid cloud market is mature and expanding rapidly.

This region benefits from a strong presence of leading cloud service providers, advanced technological infrastructure, and a high adoption rate among enterprises across various sectors, including technology, healthcare, and finance.

Europe is also a significant market for hybrid cloud adoption, with countries like the United Kingdom, Germany, and France leading in digital innovation and cloud services. The region's stringent data protection regulations, such as GDPR (General Data Protection Regulation), are driving enterprises to adopt hybrid cloud models that balance data sovereignty requirements with the scalability offered by public cloud platforms.

Asia-Pacific represents a burgeoning market for hybrid cloud solutions, fueled by rapid economic growth, increasing digitalization efforts, and the adoption of cloud-based technologies across industries. Countries like China, India, and Japan are witnessing substantial investments in cloud infrastructure and services, driven by expanding internet penetration, rising demand for data storage and management solutions, and government initiatives promoting digital transformation.

Hybrid CloudMarket Scope and Methodology:

The scope of the hybrid cloud market analysis encompasses a thorough examination of the adoption trends, technological advancements, and market dynamics associated with hybrid cloud solutions globally. Methodologically, this research employs a combination of primary and secondary research methods to gather comprehensive and reliable data.

Primary research involves conducting interviews and surveys with key stakeholders, including IT professionals, cloud service providers, and decision-makers in various industries. These insights provide firsthand information on adoption trends, challenges, and preferences regarding hybrid cloud deployments.

Secondary research entails the analysis of industry reports, market studies, academic publications, and regulatory frameworks related to cloud computing and data management. This helps validate and enrich the primary data, offering a broader perspective on market trends, competitive landscapes, and technological innovations.

For a deeper understanding, click on the link:www.maximizemarketresearch.com/requestple/24915/

Hybrid Cloud Market Key Players:

To access more comprehensive information, click here:www.maximizemarketresearch.com/market-ket/24915/

Key questions answered in the Hybrid Cloud Market are:

This email address is being protected from spambots. You need JavaScript enabled to view it.

Read this article:
Hybrid Cloud Market Growth, Overview with Detailed Analysis 2023-2029 - WhaTech

Read More..

Proton Drive: It’s like Google Docs, but with end-to-end encryption – Mashable

Those who might want to get out from under Google's ecosystem got some good news from Proton on Wednesday.

Specifically, the privacy-focused software company's Proton Drive suite of products got a new one in the form of a shared text editor called Proton Docs. Proton Drive's text editor looks very similar to Google Docs, in that multiple people can edit a document together in real-time with robust editing tools. But, per Proton, this editor has end-to-end encryption on everything, including cursor movements.

Mashable Light Speed

Proton claims this is the first "major document editor" with E2E encryption turned on by default. The announcement blog post also has bolded text to warn that data you store in something like Google Drive "may even be used to train AI in the future." While Google doesn't currently use your Docs to train its AI models (per The Verge), Proton seems to be positioning itself as a company that will never do that, as opposed to one that might someday.

Regardless, Proton Docs is free as long as you make a Proton Drive account.

Read more here:
Proton Drive: It's like Google Docs, but with end-to-end encryption - Mashable

Read More..

Proton Is Launching Encrypted Documents to Take On Google Docs – WIRED

Yen says Proton has been internally using the system for the last month and is now ready to roll it out to consumers. I feel it is relatively polished, Yen says. To compete with other online document editors, he says, the team also built in collaboration functionality from the beginning. This includes real-time editing by multiple people, commenting, and showing when someone else is viewing the document.

In April, Proton acquired encrypted note-taking app Standard Notes, which is a separate product from Docs. It's actually not take Standard Notes and stick it into Proton, Yen says, adding that the encryption architecture of the two were different, and Proton Docs is more or less a ground-up, clean build in Protons ecosystem on our software stack. (WIRED was unable to test the Docs before it was launched).

The big difference Proton is adding when compared to Google Docs is the encryptionsomething that is challenging to do at scale and also harder when a document has multiple people editing it at the same time. Yen says it's not just the contents of documents that are being encrypted, so are other elements like keystrokes, mouse movements, and file names and paths.

The company, which last month announced it is moving toward a nonprofit status, uses open source encryption, and Yen says building the Docs system required encryption key exchange and synchronization to happen across multiple users. Part of this was possible, Yen says, because last year the company added version history for documents stored in its Drive system, which the Docs are built on top of.

There are relatively fewif anymajor end-to-end encrypted document editors online. Other existing services, which WIRED has not tried, include CryptPad and various note-taking or notepad-style apps. There are also apps that encrypt files locally on your machine, such as Cryptee and Anytype.

Recently, Proton has been moving quickly to launch new encrypted productsadding cloud storage, a VPN, a password manager, and calendar alongside its original ProtonMail email service. The company has also faced scrutiny over some information it has provided to law enforcement, such as recovery emails that have been added to accounts. It changed some of its policies in 2021 after being ordered to collect some user metadata. While the company is based outside of the US and EU, it still responds to thousands of Swiss law enforcement requests.

Ultimately, Yen says, the company is trying to offer as many private alternatives to Big Tech services, particularly Google, as it can. Everything Googles got, weve got to build as well. That's the road map. But the challenge, of course, is the order in which you do it, Yen says. In some sense, taking privacy to a more mainstream audience also requires going further afield, trying different things, and being a bit more adventurous in the things that we build and things that we launch.

Read the original post:
Proton Is Launching Encrypted Documents to Take On Google Docs - WIRED

Read More..

Proton Drive gets collaborative Docs with end-to-end encryption and no AI training – 9to5Mac

After gaining private and secure photo backup in iOS and advanced file sharing earlier this year, Proton Drive is gaining its latest capability. Collaborative Docs brings all the handy features you want while retaining end-to-end encryption and preventing AI models from training on your data.

Proton announced the launch in a blog post this morning:

Billions of people use online document editors like Google Docs or Microsoft 365 to write reports, collaborate on projects, and keep track of meeting notes. But there is a growing concern about Big Tech platforms having access to your content, tracking you across the web, and collecting data to train privacy-invading AI models.

Today were announcinga new end-to-end encrypted, collaborative document editorthat puts your privacy first. Docs in Proton Drive are built on the same privacy and security principles as all our services, starting with end-to-end encryption. Docs let you collaborate in real time, leave comments, add photos, and store your files securely. Best of all, its all private even keystrokes and cursor movements are encrypted.

Proton has aimed to build Docs with a clean, simple experience. Here are the features and capabilities:

Proton Drive Docs is available starting today with the company highlighting it should become available to everyone over the next couple of days. It also recommends updating your Proton Drive app to the latest version for the best experience.

Proton Driveis free for anyone with 5 GB of storage included and paid plansare available up to 3TB.

FTC: We use income earning auto affiliate links. More.

See more here:
Proton Drive gets collaborative Docs with end-to-end encryption and no AI training - 9to5Mac

Read More..

Encrypted and secure cloud storage can be yours FOR LIFE for 70% off, and you don’t need to use Microsoft, Apple, or … – Windows Central

Keeping your files on the cloud allows you to sync content across devices, access your files anywhere, and have a backup of your data. Several big tech giants have cloud storage solutions, including Microsoft's OneDrive, Apple's iCloud, and Google Drive. But what if you don't want your files managed by one of those tech giants? What if you prefer paying a flat lifetime fee rather than a subscription? What if you want end-to-end encryption on your files? One solution that covers all those questions is pCloud, which has several deals at the moment, including a lifetime plan with 2TB of storage for $279.

Right now, you can save up to 70% off pCloud lifetime plans. The most affordable option is $199 for 1TB of storage, which is at a 70% discount. Spending a bit more will double your storage to 2TB for $279. If you need 10TB of storage, you can get a lifetime plan for $890 (58% off).

Desktop applications for pCloud are available on Windows, macOS, and Linux. You can also access the service on Android or iOS. The mobile pCloud apps support automatic uploading, much like other popular cloud storage applications.

Our colleagues at TechRadar reviewed pCloud earlier this year. The cloud storage service earned a 4 out of 5, receiving praise for its integration with social media, lifetime plan options, and media-focused features:

"pCloud is a straightforward application offering typical cloud storage services. The current pricing plans are very affordable, especially for lifetime subscriptions. However, the product is not as polished as some competitors, and 2TB of storage may not be enough by today's standards. Adding client-side encryption for $4.99 a month is reasonable, but it's disappointing that it and the 'Extended File History' feature are not included in all lifetime plans for free. Due to its great value and extensive features, we confidently recommend pCloud for personal use, but businesses may require more flexibility."

TechRadar also highlighted how pCloud's web interface handles media files. The service has built-in audio and video players, which aren't rare among cloud storage apps, but TechRadar enjoyed pCloud's implementation of the feature.

"While a web browser that can play media is hardly sensational, we noticed that during our tests that when we opened a file from an audiobook, the interface automatically created a playlist. There's also a dedicated audio section in the pCloud web interface where you can manage your albums and playlists."

Several encryption options are available through pCloud. The current bundles include pCloud Encryption at no additional cost. The company has a page breaking down the technical aspects of its encryption tech, but the end result is that you can have select files protected by end-to-end encryption. That means even pCloud does not have a key or a way to access those encrypted files. If you'd like, you can also have files left unencrypted, which enables certain functionality, such as generating thumbnails and playing media files in the cloud.

View post:
Encrypted and secure cloud storage can be yours FOR LIFE for 70% off, and you don't need to use Microsoft, Apple, or ... - Windows Central

Read More..