Security

A10 Networks Brings "Harmony" to Management of Secure Application Services Across Multiple Clouds and Data Centers

Grazed from A10 Networks

A10 Networks introduced a new strategic solution that offers multi-cloud, multi-service management that brings to life its ongoing vision of harmonizing application delivery and security.

The new developments center on the A10 Harmony Controller, built on microservices and container technologies, offering a multi-tenant, highly scalable controller architecture that incorporates real-time analytics at a per-app level and central management and orchestration of secure application services across hybrid environments - from physical data centers to public, private and hybrid clouds.

The new A10 Harmony Controller and analytics capabilities fundamentally change the way secure application services are delivered, protected, and managed. Because the A10 Harmony application delivery and security controller uniquely spans traditional data centers and clouds, it is now the industry's only controller-based platform that can deliver analytics, configuration and orchestration across such hybrid application environments.

Is the Cloud Safe for Hosting Images?

Have you ever heard the saying "ignorance is bliss"? Well, you can correctly assume that the phrase is even more relevant whenever you are speaking about online safety. It is very important that you, as an online user, are always aware and alert. So, if you have yet to jump on the cloud computing train, you may be wondering how safe and secure it is when it comes to storing data and images for your auction templates and other online activities.

The Basics of Cloud Computing

There is a high probability that you have been using cloud computing for a while without even knowing it. The cloud powers things like webmail for Yahoo and Google, social media sites, blogs, Google Docs, online gaming, and online storage.

How Cloud Call Centers Are Taking Steps to Improve on Security

We think of the Cloud as this wonderful way to store data and information that is then accessible to us any time, and in any place. Cloud applications are able to reach across all different industries and be used in unique ways. With that said, the Cloud isn't perfect, in fact security issues have become quite the topic where the Cloud is concerned. One area where that is particularly true is with Cloud call centers. It has led people to ask what steps are being taken by these call centers to improve upon security.

Call Centers - Nothing New

Call centers themselves are nothing new. These have been used for decades in order to provide customers and clients with support when needed and assistance when needed. The ability to talk to a live operator is attractive for many people.

Key trends in cloud infrastructure: Hybrid, smart storage, security, and more

Grazed from CloudTech. Author: Aaron Shelley.

The past decade has brought much change to the IT infrastructure industry as enterprise IT companies scale up their data consumption to unprecedented levels. Today’s enterprise IT giants require far more speed, power and bandwidth to successfully run their businesses and this is only possible via enhancements to the underlying infrastructure.

Infrastructure develops so quickly that industry practices in 2020 will likely be unrecognisable from what they were 10 years ago. Infrastructure has become more powerful, faster and more secure - and we have still only just scratched the surface of what’s possible. This article will examine some of the current trends within the industry as it stands, as well a look at what the future holds for IaaS in 2017...

Read more from the source @ https://www.cloudcomputing-news.net/news/2017/apr/05/key-trends-cloud-infrastructure-hybrid-smart-storage-security-and-more/

Oracle secures ISO 27001, HIPAA and SOC certifications for its cloud portfolio

Grazed from CloudTech. Author: James Bourne.

Oracle has announced its public cloud services have achieved various security and compliance certifications, including ISO 27001, HIPAA, SOC1 and SOC2, in what the company describes as ‘continued momentum’ for its products. The Redwood giant’s platform as a service (PaaS) and infrastructure as a service (IaaS) has received Service Organisation Control (SOC) attestations across a variety of key services, while its Fusion software as a service (SaaS) is HIPAA-accredited and the ISO 27001 was awarded for ‘the proper management and security of assets such as financial information, intellectual property, employee details or information entrusted to an organisation by third parties’.

The move puts Oracle alongside its various industry competitors; for example, Microsoft’s SOC1 and SOC2 information can be found here – copies of the report are only available to customers who have signed an NDA – while ISO 27001 can be found here. The Oracle accreditations were administered by Schellman & Co...

Read more from the source @ https://www.cloudcomputing-news.net/news/2017/apr/03/oracle-secures-iso-27001-hipaa-and-soc-certification-its-cloud-portfolio/

NeuVector Launches New Approach to Continuous Docker Container Security

Grazed from NeuVector

NeuVector today announced the launch and immediate availability of a new approach to securing Docker containers. With constant behavioral learning automatically applied to security policies for containers, NeuVector secures containers where they have been most vulnerable: in production environments where they are constantly being deployed, updated, moved, and scaled across hosts and data centers. Companies with production Docker deployments (or who are evaluating container-based applications) can quickly test-drive NeuVector's answer to stronger and faster container security here.

NeuVector's solution for container security is itself a container. The application automatically learns and whitelists normal behavior to protect environments even as containers scale up and down. Through this built-in continuous application and network intelligence, NeuVector is providing application layer segmentation that completely isolates container traffic. Any abnormal connections can then be proactively and automatically detected and blocked before causing harm. NeuVector completes its solution with runtime vulnerability scanning across all running containers and hosts, and includes threat detection for attacks such as DDoS, DNS, and others.
 

Cloud Computing: Building your data castle - Protecting from ransomware and restoring data after a breach

Grazed from CloudTech. Author: David Trossell.

The data centre is the castle. You can pull up the drawbridge, fill up the moat, or pull down the portcullis. But at some point, you have to let data in and out, and this opens up the opportunity for ransomware attacks. No longer is it a matter of pride and peer recognition in the hacker community for circumnavigating and exposing the security of an organisation because it is now a fully-fledged industry in its own right with the use of ransomware.

That cybersecurity company Herjavec Group estimates to top a $1 Billon in 2016. In the past, those under siege used to flood the moats, pull up the drawbridges and drop the portcullis to protect themselves but with the modern data centre organisations life blood is the movement of data in and out of the data centre...

Cloud Computing: AWS Quietly Acquired Cybersecurity Firm Harvest.ai

Grazed from MSPMentor. Author: Chris Burt.

Amazon Web Services (AWS) acquired San Diego-based cybersecurity firm harvest.ai for a reported $19 million sometime in early 2016, investor Fred Wang has confirmed. Wang, a general partner with harvest.ai investor Trinity Ventures, declined to confirm the terms of the deal, but told GeekWire “it was a good win for the investors and for the management team.”

“The company works in an area called data-leakage prevention,” Wang said. “At one time a lot of companies got into it, but most of them didn’t get much traction. Harvest.ai automated looking at file-access patterns to detect which are normal and which are not.” It does this by using neural nets, natural-language processing, and other AI algorithms, and tracking data storage and access, and components, applications, and users on the network...

Cloud Computing: Preparing for a year of ‘unknown unknowns’ in cyber security

Grazed from CloudComputing. Author: Mike East.

Today’s threat landscape is constantly evolving. In 2016 in particular, we’ve seen a huge shift with adversaries penetrating organisations from the DNC to WADA and gaining access to sensitive documents that were later leaked to embarrass individuals. Yet, while many believe that this trend starts and ends with a contentious election, it’s not something that’s going away in 2017.

In fact, we’re starting to see continued and varied threats, most recently with DDoS attacks taking down the likes of the EU commission. Overall, the pace and variation of exploits driven by technically astute adversaries, will only gain momentum in the coming year if not managed effectively...

Read more from the source @ http://www.cloudcomputing-news.net/news/2016/dec/07/preparing-year-unknown-unknowns-cyber-security/

VMware Unveils Key Findings from Cloud Research on IT Management and Security

Grazed from VMware

VMware, Inc. today announced key findings from a cloud study conducted by Vanson Bourne on IT management. The study dove deeper into the topic explored by the recent VMware-sponsored survey by The Economist Intelligence Unit (EIU) and found that 69 percent of respondents to the Vanson Bourne survey agree that the management of IT has become increasingly decentralized in the past three years. Findings also revealed that IT isn't ready for this transition and it may be causing more harm to businesses than good, specifically around security, with 57 percent of respondents agreeing that decentralization has resulted in the purchasing of non-secure solutions.

Business models are being disrupted and digital transformation is critical in enabling organizations to remain innovative, competitive and agile. Cloud computing has been key to this transformation, but IT is struggling to keep up and so responsibility has shifted away from IT. Lines of business are now purchasing IT 'as a service' to drive innovation within their domains. With this decentralization comes both opportunities and challenges. While it could empower all business units to drive innovation and ease pressure on IT, it also creates numerous management, security and compliance issues.