|
Nov 01, 2023
Network management and visualization vendor Splunk, which is set to be acquired by Cisco in a $28 billion deal, will cut about 560 jobs in a global restructuring, the company announced Wednesday in an SEC filing.
Splunk president and CEO Gary Steele said in the filing that employees in the Americas set to lose their jobs will be notified throughout today, and that the company plans to offer severance packages to laid-off employees, as well as healthcare coverage and job placement assistance for an undisclosed length of time.
To read this article in full, please click here
|
|
Oct 26, 2023
Increased network complexity, constant security challenges, and talent shortages are driving enterprises to depend more on channel business partners, including managed service providers, system integrators, resellers and other tech providers.
Greater use of partners by enterprises is expected to continue over the next few years, experts say. IDC in its research on the future of industry ecosystems found that by the end of 2023, almost 60% of organizations surveyed will have expanded the number of partners they work with outside of their core industry.
To read this article in full, please click here
|
|
Oct 25, 2023
Public cloud migration long ago wrested control over digital infrastructure from network and security teams, but now is the time for those groups to retake the initiative. Cloud operations and DevOps groups will never cede ground, but they will welcome self-service networking and security solutions that provide guardrails that protect them from disaster. Cooperation between traditional infrastructure teams and cloud teams is even more important as enterprises embrace multi-cloud architecture, where complexity and risk are increasing. In fact, my research has found that security risk, collaboration problems, and complexity are the top pain points associated with multi-cloud networking today.
To read this article in full, please click here
|
|
Oct 24, 2023
Versa Networks has bumped up its secure access service edge (SASE) software with a variety of features, including AI to help customers better manage LAN resources at the edge of their networks.
The company announced Versa SD-LAN, a software package that the company says will let customers integrate security, switching, routing, network and AI management services on approved white box Ethernet switches and access points.
"Versa Secure SD-LAN is built as an extension of Versa's Unified SASE platform, so it shares the same management console, policy repository, and data lake as our Versa Secure SD-WAN, cloud, and data center products," according to Kevin Sheu, vice president of product marketing with Versa.
To read this article in full, please click here
|
|
Oct 20, 2023
Driven primarily by cloud and cybersecurity investments, worldwide IT spending is projected to total $5.1 trillion in 2024, an increase of 8% from 2023, according to the latest forecast from Gartner.
The software and IT services segments will see double-digit growth in 2024, largely driven by cloud spending, according to Gartner.
Global spending on public cloud services is forecast to increase 20.4% in 2024. The source of growth will be a combination of cloud vendors' price increases and increased utilization, just as it was in 2023, wrote John-David Lovelock, a distinguished vice president analyst at Gartner.
Cybersecurity spending is also driving growth in the software segment. Roughly 80% of CIOs reported that they plan to increase spending on cyber/information security in 2024, according to Gartner's 2024 CIO and Technology Executive Survey.
To read this article in full, please click here
|
|
Oct 19, 2023
Palo Alto Networks has bolstered its cloud security software with features that help customers quickly spot suspicious behaviors and trace security issues to their source to better protect enterprise software-as-a-service (SaaS) applications.
The vendor has added a variety of new components, under the moniker Darwin, to its core cloud-security package, Prisma Cloud. The core platform already includes application-security features such as access control, advanced threat protection, user-behavior monitoring, and the ability to code security directly into SaaS applications. Managed through a single console, Prisma Cloud also includes firewall as a service, zero-trust network access (ZTNA), a cloud-access security broker (CASB), and a secure web gateway.
To read this article in full, please click here
|
|
Oct 19, 2023
AI-generating malware, deep fake identity spoofing, and state-sponsored ransomware are just a few of the latest methods that attackers are using to bypass traditional cybersecurity tools. Ritesh Agrawal, CEO of cybersecurity startup Airgap Networks, noticed that many of the attacks that compromise enterprise networks fail to penetrate telco and service provider networks.
"Even though they're deploying the same routers, switches, and firewalls, there's something fundamentally different about telco networks that shields them from many threats to enterprise LANs," Argawal said. Agrawal has 20 years of experience with cybersecurity, enterprise networking, and cloud computing, most of that time spent with Juniper Networks focusing on telco and large enterprise clients.
To read this article in full, please click here
|
|
Oct 18, 2023
Juniper Networks has expanded its security portfolio with an architecture design that includes AI-based predictive threat support and a new family of firewalls, all designed to protect distributed data center resources.
The central piece of the expanded portfolio is the new Juniper Connected Security Distributed Services Architecture. It's implemented in a new version of the vendor's core Junos operating system (version 23.4) and enables a variety of security features from zero trust policy enforcement to intrusion detection and prevention across distributed data center networks.
Since Junos runs across Juniper's entire product family, including QFX Series Switches, MX Series Universal Routers, SRX Series firewalls and more, all of those systems can be included in the Distributed Services Architecture. This enables customers to set up universal protection and policies for networks, data, and applications, and it's all controlled by the vendor's Security Director Cloud for setting and managing security policies.
To read this article in full, please click here
|
|
Oct 18, 2023
BackBox this week announced its Network Vulnerability Manager (NVM), a software add-on to its existing Network Automation Platform, that will enable network managers to automate operating system upgrades, network configuration updates, and various remediations across firewalls and other network and security devices.
"Common vulnerability management tools focus on endpoints and are designed for security teams rather than network teams," says Josh Stephens, CTO of BackBox. "BackBox's vulnerability management capabilities have been specifically engineered for network operations teams in the way that they operate and to accelerate their path toward network automation."
To read this article in full, please click here
|
|
Oct 18, 2023
AI will play a significant role in enterprise IT in the coming year, and the influence of generative AI will permeate other tech trends on the horizon. Smart robots, a rise in employee unionization, and growing power-availability concerns are among the top predictions for 2024 and beyond from research firm Gartner, which is hosting its annual IT Symposium/Xpo this week.
"This is the first full year with generative AI (GenAI) at the heart of every strategic decision, and every other technology-driven innovation has been pushed out of the spotlight," said Leigh McMullen, distinguished vice president analyst at Gartner. "GenAI has broken the mold and has kept building more excitement."
To read this article in full, please click here
|
|
Oct 18, 2023
AI will play a significant role in enterprise IT in the coming year, and the influence of generative AI will permeate other tech trends on the horizon. Smart robots, a rise in employee unionization, and growing power-availability concerns are among the top predictions for 2024 and beyond from research firm Gartner, which is hosting its annual IT Symposium/Xpo this week.
"This is the first full year with generative AI (GenAI) at the heart of every strategic decision, and every other technology-driven innovation has been pushed out of the spotlight," said Leigh McMullen, distinguished vice president analyst at Gartner. "GenAI has broken the mold and has kept building more excitement."
To read this article in full, please click here
|
|
Oct 17, 2023
AI technologies including generative AI and large language models are rapidly developing into business partners rather than just tools for rewriting content or pumping out cool recipes, Gartner analysts told the more than 8,000 IT executives at its IT Symposium/Xpo in Orlando, Florida, this week.
"GenAI is not just a technology or just a business trend. Machines are evolving from being our tools to becoming our teammates," said Mary Mesaglio, distinguished vice president analyst at Gartner. "We are moving from what machines can do for us to what machines can be for us."
To read this article in full, please click here
|
|
Oct 17, 2023
Cloud computing, hybrid work, and remote connectivity are amplifying the need for networking and security teams to be in lockstep. Increasingly, enterprises are considering consolidating the two groups - or at least boosting collaboration between teams, according to research from Cato Networks.
In a recent survey of 1,694 IT leaders worldwide, 44% of respondents said networking and security teams "must work together," and another 30% said they "must have shared processes." Another 8% said they're working to create one networking and security group.
The goal of shared processes could be a hefty challenge for some organizations. In the Cato Networks survey, 12% of respondents reported that their networking and security teams either have "turf wars or struggle working together," and another 34% said they "occasionally have problems working together." The remaining 54% reported that the two teams work well together now.
To read this article in full, please click here
|
|
Oct 16, 2023
AI and intelligent application-development trends will impact the enterprise the most in 2024, says research firm Gartner, which unveiled its annual look at the top strategic technology trends that organizations need to prepare for in the coming year.
"A lot of the trends are around AI development, but also in protecting the investment that organizations have already made. For example, they've invested in machine learning, natural language. And there's a ramp up in software engineering right now where people are building more things because they have access to that data and the development tools are getting better," said Chris Howard, distinguished vice president analyst and chief of research, during his presentation of this year's trends list at Gartner's flagship IT Symposium/Xpo conference in Orlando, Florida.
To read this article in full, please click here
|
|
Oct 11, 2023
In the rush to deploy generative AI, many organizations are sacrificing security in favor of innovation, IBM warns.
Among 200 executives surveyed by IBM, 94% said it's important to secure generative AI applications and services before deployment. Yet only 24% of respondents' generative AI projects will include a cybersecurity component within the next six months. In addition, 69% said innovation takes precedence over security for generative AI, according to the IBM Institute for Business Value's report, The CEO's guide to generative AI: Cybersecurity.
To read this article in full, please click here
|
|
Oct 10, 2023
Fortinet has expanded its campus network portfolio with two new switches that feature integration with Fortinet's security services and AIops management tool.
The FortiSwitch 600 is a multi-gigabit secure campus access switch that supports up to 5GE access and 25GE uplinks. The FortiSwitch 2000 is a campus core switch designed to support larger, more complex campus environments by aggregating high-performance access switches, including the FortiSwitch 600.
The new switches are integrated with Fortinet's FortiGuard AI-Powered Security Services and FortiAIOps management tool, which lets customers utilize security and operations features such as malware protection, device profiling and role-based access control.
To read this article in full, please click here
|
|
Oct 06, 2023
IBM is rolling out AI-based managed services that promise to help network and security operations teams more quickly and effectively respond to enterprise cyber threats.
Managed by the IBM Consulting group, the Threat Detection and Response (TDR) Services offering promises 24x7 monitoring, investigation, and automated remediation of security alerts from existing security tools as well as cloud, on-premises, and operational technology systems utilizing the enterprise network. The services can integrate information from more than 15 security event and incident management (SIEM) tools and multiple third-party endpoint and network detection and response packages, for example.
To read this article in full, please click here
|
|
Oct 05, 2023
There are baseline security and connectivity requirements for any SD-WAN service, and then there are optional, emerging product capabilities that indicate how the market is maturing and customer requirements are expanding. AI networking support - such as for proactive remediation and incident management - is one of those optional capabilities, according to Gartner, which just released its latest analysis of the SD-WAN vendor landscape.
There's a trend toward AI capabilities that enable networking decisions to be made with little or no human intervention. These capabilities can help enterprises to streamline network design, configuration and ongoing management as well as increase agility and improve performance, according to Gartner. The research firm predicts that by 2026, generative AI technology embedded in SD-WAN offerings will be used for 20% of initial network configuration, up from near zero in 2023.
To read this article in full, please click here
|
|
Oct 04, 2023
As National Cybersecurity Awareness Month kicks off, it's a good time to reflect on how secure the systems you manage are - whether they're running Linux, Windows or some other OS. While Linux is considered by many to be more secure due to its open-source nature and because privileges are clearly defined, it still warrants security reviews, and this month's focus on cybersecurity awareness suggests that an annual review is more than just a good idea.
The designation became official in 2004, when President George W. Bush and Congress declared October to be National Cybersecurity Awareness Month. Keep in mind that in 2004, security practice often involved little more than updating antivirus software. Today, cybersecurity practices are much more intense as the threats have grown to be far more significant and far more challenging.
To read this article in full, please click here
|
|
Oct 03, 2023
Kyndryl continues to fill out its stable of network security partners, most recently inking an alliance with Palo Alto Networks for cybersecurity, SD-WAN and secure access service edge (SASE) services.
As part of the deal, Kyndryl will integrate Palo Alto's security products and services into its own managed security services, which include security monitoring, incident response, and threat intelligence.
Palo Alto brings a wide range of security offerings, including a family of next-generation firewalls, the Prisma Cloud security platform for cloud-based applications and workloads, endpoint security, and operational automation support.
To read this article in full, please click here
|
|
Sep 26, 2023
Security networking startup Tailscale has partnered with Mullvad to make Mullvad's global network of VPN services available to Tailscale customers looking to maintain user privacy while browsing the internet.
Tailscale provides software that creates a peer-to-peer mesh VPN, which allows for customers to create direct connections between devices. Tailscale enables encrypted point-to-point connections using the opensource WireGuard protocol, which means only devices on a private network can communicate with each other. WireGuard is an open-source project that is designed for quick reconnections, which improves reliability. WireGuard is also supported by consumer-grade VPN provider Mullvad.
To read this article in full, please click here
|
|
Sep 26, 2023
IBM is rolling out a new DNS-based service that will let customers securely control connectivity between distributed multicloud environments.
NS1 Connect is one of the first fruits from IBM's acquisition of DNS specialist NS1 earlier this year. The service is aimed at helping organizations set up the best connection between clouds and end users to deliver applications optimized for performance, cost, security and availability.
Core to the NS1 Connect package, which will be available Oct. 17, is traffic-steering technology that intelligently distributes DNS traffic across the network. DNS is often described as the Internet's phone book, working in the background to match the names of web sites that users type into a search box with the corresponding IP address.
To read this article in full, please click here
|
|
Sep 26, 2023
Attacks related to Domain Name System infrastructure - such as DNS hijacking, DNS tunneling and DNS amplification attacks - are on the rise, and many IT organizations are questioning the security of their DNS infrastructure.
Most IT organizations maintain a variety of DNS infrastructure for public services (websites and internet-accessible services) and private services (Active Directory, file sharing, email). Securing both internal and external DNS infrastructure is critical due to a growing number of threats and vulnerabilities that malicious actors use to target them. Unfortunately, very few organizations are confident in their DNS security.
Enterprise Management Associates (EMA) recently examined the issue of DNS security in its newly published research report, "DDI Directions: DNS, DHCP and IP Address Management Strategies for the Multi-Cloud Era." Based on a survey of 333 IT professionals responsible for DNS, DHCP and IP address management (DDI), the research found that only 31% of DDI managers are fully confident in the security of their DNS infrastructure.
To read this article in full, please click here
|
|
Sep 21, 2023
Looking to significantly reinforce its security software portfolio, Cisco has struck a $28 billion cash deal to acquire enterprise and cloud protection company Splunk.
Founded in 2003, Splunk's software platform is known for its wide-reaching ability to search, monitor and analyze data from a variety of systems. Network security teams can use this information to gain better visibility into and gather insights about network traffic, firewalls, intrusion detection systems (IDSes), intrusion prevention systems (IPSes), and security information and event management (SIEM) systems, from on premise and or its cloud-based package, according to Splunk.
To read this article in full, please click here
|
|
Sep 21, 2023
For the last twelve years, 100% of CIOs have said that they expect to spend more on IT security, making security the only category that just keeps on absorbing investment. Every year in the last three years, over 80% of enterprises have said that their IT security still needed improvement. So, like death and taxes, is security spending growth inevitable? If we keep on the way we have, it sure seems like it. But what might change?
Let's start with what's important to users. External threats, meaning hacking, are a problem for every CIO. Internal threats, from badly behaving employees, are a problem for three out of four. Data theft is a universal fear, and malware that interferes with applications and operations is an important problem for over 90% of CIOs. As far as approaches or targets are concerned, 100% say access security on applications and data is essential and so is regular malware scanning. If you ask CIOs to pick a single thing they think is essential for IT security, it's access security.
To read this article in full, please click here
|
|
Sep 18, 2023
As the volume of IoT devices connecting to enterprise networks continues to climb, the number of security threats has been increasing in lockstep. Cybersecurity threats, alongside supply chain issues, chip shortages and geopolitical instability, are a major reason that IoT growth has been slower than many analysts had predicted.
Even so, the scale of the IoT security problem is great enough that 52 IoT startups raised a total of $840 million in the latest quarter, and even cautious analysts believe the IoT market will grow steadily in the coming years. In fact, research firm IDC predicts that the IoT market will expand to 55.7 billion connected IoT devices by 2025, with those devices generating 80B zettabytes (ZB) of data.
To read this article in full, please click here
|
|
Sep 15, 2023
As connectivity to cloud-based resources grows, cybercriminals are using valid, compromised credentials to access enterprise resources at an alarming rate.
That's one of the chief findings of the IBM X-Force Cloud Threat Landscape Report, which also found a 200% increase (about 3,900 vulnerabilities) in cloud-oriented Common Vulnerabilities and Exposures (CVE) in the last year.
"Over 35% of cloud security incidents occurred from attackers' use of valid, compromised credentials," wrote Chris Caridi, strategic cyber threat analyst with IBM X-Force, in a blog about the report. "Making up nearly 90% of assets for sale on dark web marketplaces, credentials' popularity among cybercriminals is apparent, averaging $10 per listing - or the equivalent of a dozen doughnuts."
To read this article in full, please click here
|
|
Sep 12, 2023
Cisco is adding a security module to its observability platform that promises to help enterprises assess threat risks and protect cloud-based resources.
The Cisco Secure Application module, available now, is part of the vendor's Full Stack Observability (FSO) platform, which is designed to correlate data from application, networking, infrastructure, security, and cloud domains to make it easier for customers to spot anomalies, preempt and address performance problems, and improve threat mitigation.
FSO is designed to make intelligent use of metrics, events, logs and traces. With it, organizations can consolidate to fewer tools, collect data from any source, correlate information, and enable AI-driven analysis to predict and prevent problems, Cisco said at the FSO launch event in June.
To read this article in full, please click here
|
|
Sep 06, 2023
In 2019, Gartner created the term secure access service edge (SASE) to describe a cloud-based service that combines networking and security in order to give remote workers safe access to internet-based resources.
Gartner had put its finger on a new set of challenges that enterprise IT faced as employees shifted to remote work during Covid and applications migrated to the cloud. But Gartner overshot the runway a bit; vendors were caught flatfooted and scrambled to cobble together full suites of SASE features.
On the customer side, a recent Gartner survey of CISOs revealed that "a majority of buyers are planning for a two-vendor strategy for SASE," with security and networking teams making separate buying decisions rather than opting for single-vendor SASE.
To read this article in full, please click here
|
|
Aug 30, 2023
VMware is advising customers to upgrade or patch its Aria for Network Operations software because of potential security problems.
VMware Aria is the vendor's multi-cloud management platform that integrates previously separate VMware services such as vRealize Automation, vRealize Operations, vRealize Network Insight, and CloudHealth. A single Aria Hub console provides centralized views and controls and lets customers see and manage the entire multi-cloud environment.
The vulnerabilities are in Aria Operations for Networks, a monitoring component that can find the cause of application delays based on TCP traffic latency and retransmissions and trigger alerts on the applications dashboard.
To read this article in full, please click here
|
|
Aug 29, 2023
Google Cloud has added a new service that promises to make it easier for enterprise customers to securely network multiple cloud-based resources.
The Cross-Cloud Network service consists of new and existing Google Cloud technology and includes a partner ecosystem to help organizations develop, build and support distributed enterprise applications across clouds.
"We know that 70-plus percent of our enterprises are going to adopt multicloud. [The] idea behind Cross-Cloud Network is that today many organizations operate bespoke networks with turnkey security to connect to those clouds that are operationally complex to manage and build, thereby resulting in a much higher total cost of ownership and soaring costs," said Muninder Sambi, vice president and general manager of networking for Google Cloud. "They set up private data centers to connect and secure the hybrid workforce to access cloud and on-prem resources and manage multiple CDN clouds to accelerate web apps. All of this can also lead to an inconsistent security posture and drives up total costs," Sambi said.
To read this article in full, please click here
|
|
Aug 29, 2023
Fortinet continues to enhance its Secure Access Service Edge (SASE) package by adding support for microbranches, extending wireless LAN protections, and improving data loss prevention (DLP) and end-user monitoring capabilities.
The vendor added the new features to its FortiSASE offering, which includes SD-WAN, secure web gateway, firewall as a service, cloud access security broker, and zero trust network access (ZTNA), all running on top of its FortiOS operating system. The package can be centrally managed via the firm's FortiManager software, which sets network and security policies across the Fortinet product line.
To read this article in full, please click here
|
|
Aug 28, 2023
The appeal of promising network technologies can be jaded by pressure to adopt untested ideas. When I look over the comments I've gotten from enterprise technologists this year, one thing that stands out is that almost three-quarters of them said that entrenched views held by company executives is a "significant problem" for them in sustaining their network and IT operations.
"Every story that comes out gets me a meeting in the board room to debunk a silly idea," one CIO said. I've seen that problem in my own career and so I sympathize, but is there anything that tech experts can do about it? How do you debunk the "big hype" of the moment?
For starters, don't be too dismissive. Technologists agree that a dismissive response to hype cited by senior management is always a bad idea. In fact, the opening comment that most technologists suggested is "I agree there's real potential there, but I think there are some near-term issues that need to be resolved before we could commit to it." The second-most-cited opening is "I've already launched a study of that, and I'll report back to you when it's complete." There's usually a grain (yeah, often a small grain) of truth underneath the hype pile, and the best approach is to acknowledge it somehow and play for time. Hype waves are like the tides; they come in and they go out, and many times management will move on.
To read this article in full, please click here
|
|
Aug 24, 2023
Cisco and Kyndryl have expanded their partnership to offer new services that are aimed at helping enterprise customers better detect and respond to cyber threats.
Specifically, Kyndryl will be integrating its own cyber resiliency offering with Cisco's overarching Security Cloud platform that includes security components such as Cisco's Duo access control, extended detection and response features, and Multicloud Defense, which orchestrates security and policy across private and public clouds.
Security Cloud operates as a layer on top of the infrastructure across a customer's cloud services - including Azure, AWS, GCP and private data-center clouds - to protect core applications, Cisco said. It features a unified dashboard, support for flexible trust policies, and open APIs to encourage third-party integrators. By correlating data and employing artificial intelligence and machine learning, Cisco Security Cloud can detect and remediate threats quickly throughout an organization, Cisco says.
To read this article in full, please click here
|
|
Aug 23, 2023
Versa is bolstering the AI security management features of its integrated Secure Access Service Edge (SASE) package to include improved malware detection for Advanced Threat Protection, network microsegmention and generative AI protection to help customers better detect and quickly mitigate threats to their networked service and applications.
The vendor supports AI in its integrated Versa SASE package that includes SD WAN, a next-generation and web application firewall, intrusion prevention, zero trust support and data loss prevention.
To read this article in full, please click here
|
|
Aug 15, 2023
As enterprise networks get more complex, so do the firewall deployments.
There are on-premises firewalls to manage, along with firewalls that are deployed in virtual machines and firewalls deployed in containers. There are firewalls for clouds and firewalls for data centers, firewalls for network perimeters, and firewalls for distributed offices. According to Gartner, by 2026, more than 60% of organizations will have more than one type of firewall deployment.
"A firewall used to be a box or a chasse with multiple cards," says Omdia analyst Fernando Montenegro. "Then we had a firewall in a virtual machine. And now we have a container form factor for a firewall because customers are deploying containers. And, oh, we need firewalls-as-a-service to support SASE."
To read this article in full, please click here
|
|
Aug 08, 2023
Aruba Networks is showing off some enhancements to its security platform - including new zero trust and sandboxing features - that promise to help customers advance fortification of their hybrid cloud and enterprise network environments.
Hewlett Packard Enterprise's network subsidiary is also detailing the progress it has made in integrating the security technology from its March purchase of Axis Security into Aruba's security service edge (SSE) platform with Aruba's SD-WAN and Secure Access Services Edge (SASE) offerings.
Some of the new features and directions will be demoed and discussed as part of Aruba's presence at this week's Black Hat 2023 event which will focus on everything security including AI, automation and threat intelligence issues.
To read this article in full, please click here
|
|
Aug 07, 2023
The last few years have seen an explosion of interest in Zero Trust Network Access (ZTNA). The zero trust approach replaces the perimeter defense model with a "least privilege" framework where users authenticate to access specific data and applications, and their activities are continuously monitored.
ZTNA gained a boost in the wake of the COVID-19 pandemic, with more employees working remotely. The old perimeter defense model, exemplified by VPNs, provides a secured internet connection that gives remote users privileges as if they were on an internal private network. This doesn't match up with a zero trust mindset; and to make things worse, many organizations found that their infrastructure couldn't handle the traffic loads created by large numbers of remote workers connecting via VPN.
To read this article in full, please click here
|
|
Aug 03, 2023
Fortinet has added new features to its SD-WAN software and a next-generation firewall series that promise to help customers better monitor and protect distributed enterprise resources.
On the SD-WAN front, Fortinet is introducing two services - a network underlay and overlay option to let customers better manage WAN traffic to remote sites.
The Underlay Performance Monitoring Service for SD-WAN utilizes the vendor's core central management system FortiManager and FortiGuard's database of hundreds of popular SaaS and cloud implementations, to offer visibility into the performance of the underlay network. The underlay network is typically made up if the physical network infrastructure supporting traffic between distributed cloud or remote office resources.
To read this article in full, please click here
|
|
Aug 01, 2023
Aiming to bolster its assessment of Internet traffic health, Cisco has acquired Code BGP, a privately held BGP monitoring startup, for an undisclosed amount.
Code BGP will slide into Cisco's ThousandEyes network intelligence product portfolio and bring a cloud-based platform that, among other features, maintains an inventory of IP address prefixes, peerings and outbound policies of an organization via configured sources, like BGP feeds. Border Gateway Protocol (BGP) tells Internet traffic what route to take, and the BGP best-path selection algorithm determines the optimal routes to use for traffic forwarding.
Then, the system lets customers see and interact with this inventory in real-time through an open API and bring real-time detection of BGP hijacking, route leaks, and other BGP issues according to the company. Adding such capabilities will let ThousandEyes further expand its BGP monitoring and incident analysis capabilities to maintain health of the Internet as well as key applications and services, according to Joe Vaccaro vice president of products for Cisco's ThousandEyes in a blog about the acquisition.
To read this article in full, please click here
|
|
Aug 01, 2023
Aiming to bolster its assessment of Internet traffic health Cisco said it would buy startup Border Gateway Protocol monitoring firm Code BGP for an undisclosed amount.
Privately held Code BGP will slide into Cisco's ThousandEyes network intelligence product portfolio and bring a cloud-based platform that among other features, maintains an inventory of IP address prefixes, peerings and outbound policies of an organization via configured sources, like BGP feeds. BGP tells Internet traffic what route to take, and the BGP best-path selection algorithm determines the optimal routes to use for traffic forwarding.
Then, the system lets customers see and interact with this inventory in real-time through an open API and bring real-time detection of BGP hijacking, route leaks, and other BGP issues according to the company. Adding such capabilities will let ThousandEyes further expand its BGP monitoring and incident analysis capabilities to maintain health of the Internet as well as key applications and services, according to Joe Vaccaro vice president of products for Cisco's ThousandEyes in a blog about the acquisition.
To read this article in full, please click here
|
|
Aug 01, 2023
Cisco has added ransomware detection and recovery support to its recently unveiled Extended Detection and Response (XDR) system.
The new features target recovery from ransomware attacks and come courtesy of integration with Cohesity's DataProtect and DataHawk offerings which offer configurable ransomware recovery and rescue support for systems assigned to a protection plan. Cohesity's platform can preserve potentially infected virtual machines for forensic investigation and protect enterprise workloads from future attacks.
Cisco said that the exponential growth of ransomware and cyber extortion has made a platform approach crucial to effectively counter adversaries. It also noted that during the second quarter of 2023, the Cisco Talos Incident Response team responded to the highest number of ransomware engagements in more than a year.
To read this article in full, please click here
|
|
Jul 25, 2023
A group of industry stalwarts is banding together to help enterprises, services providers and telcos fight cyber foes.
The Network Resilience Coalition includes AT&T, Broadcom, BT Group, Cisco Systems, Fortinet, Intel, Juniper Networks, Lumen Technologies, Palo Alto Networks, Verizon and VMware. Its aim is to deliver open and collaborative techniques to help improve the security of network hardware and software across the industry.
The coalition was brought together under the Center for Cybersecurity Policy & Law, a nonprofit organization dedicated to improving the security of networks, devices and critical infrastructure. The Center has a broad security mission, but at least for now, it wants the Resilience group to focus on routers, switches and firewalls that are older, may have reached end-of-life vendor support, or have been overlooked for security patching or replacement.
To read this article in full, please click here
|
|
Jul 18, 2023
Fortinet has released two new high-speed, next generation firewalls designed to protect data center assets.
The 387Gbps 3200F series and 164Gbps 900G series feature support for the vendor's AI-Powered Security Services, which blend AI and machine-learning technologies to make customers aware of cyber threats and act on protecting resources much more quickly, according to Nirav Shah, vice president of products and solutions at Fortinet.
FortiGuard AI-Powered Security Services use real-time data from Fortinet's threat researchers at FortiGuard Lab to monitor for new dangers. "We look at terabytes of data every day, and that's where we run our AI and machine learning to see different things - whether we need to enable AI-powered services with IPS, or utilize sandbox technologies to mitigate them," Shah said. "If you look at the cybersecurity industry, and the amount of data that we see, and the patterns and other things that we need to recognize to find the threats - [it] is extremely tough if you do it manually."
To read this article in full, please click here
|
|
Jul 17, 2023
Cisco announced a containerized firewall package for its venerable Catalyst switch family that's designed to help enterprise customers with mixed IT and OT systems more easily segment network resources and save money by consolidating network and security deployments.
Specifically, Cisco built a Docker-based container for its Secure Firewall Adaptive Security Appliance (ASA) that can be hosted on its Catalyst 9300 access switches. Cisco Secure Firewall ASA combines firewall, antivirus, intrusion prevention, encryption and virtual private network (VPN) support.
The firewall supports up to 10 logical interfaces, which can be used for segmentation. This segmentation helps limit the ability of an attacker to move laterally within the network by containing any breach to a specific zone, wrote Pal Lakatos-Toth, an engineering product manager with Cisco's security business group, in a blog about the news.
To read this article in full, please click here
|
|
Jul 14, 2023
Cisco is continuing its summer buying spree with the acquisition of security startup Oort for an undisclosed amount.
Oort offers an identity threat detection and response platform for enterprise security. Founded in 2019, Oort raised $15 million in Series A funding that included money from Cisco's venture capital arm.
"With Oort's API-driven, cloud-native, and agentless platform, they eliminate identity visibility gaps across disparate data sources, show misconfigurations, check for security vulnerabilities, and offer predictive identity analytics to proactively stop attacks," wrote Raj Chopra, senior vice president and chief product officer for Cisco Security, in a blog about the acquisition.
To read this article in full, please click here
|
|
Jul 13, 2023
Microsoft is jumping into the competitive Secure Service Edge (SSE) arena with a software package aimed at protecting its Windows and Azure customers as well as other cloud-based enterprise resources.
The new software is part of Microsoft's Entra identity and network access suite, and it features two new elements - Entra Internet Access and Entra Private Access - that will control and secure access to cloud-based resources. Those two new pieces, coupled with Microsoft's existing SaaS-focused cloud-access security broker (CASB), called Microsoft Defender for Cloud apps, comprise Microsoft's SSE package.
To read this article in full, please click here
|
|
Jul 12, 2023
Cisco unveiled a new version of its Secure Network Analytics (SNA) software aimed at making it easier to track more data flows and act faster on relevant security alerts. Enhancements in SNA release 7.4.2 include the ability to more efficiently gather, process and store data; advanced detection capabilities; improved telemetry support; and the ability to run on Cisco's high-performance UCS M6 hardware.
Cisco's network analytics software is designed to help organizations detect and respond to security threats by harnessing telemetry data from multiple sources and providing insights into network behavior to proactively identify risks, according to a blog post by Jay Bethea, product marketing manager with Cisco's secure email group.
To read this article in full, please click here
|
|
Jul 12, 2023
The market for managed security services is shifting as enterprises weigh their requirements for cloud-based security capabilities and vendors refine their feature sets and product integrations.
Converged security services can offer significant benefits to enterprises when it comes to manageability, scalability, security, and price, according to research firm Gartner, which introduced the term SASE, or secure access service edge. SASE is a network architecture that combines software-defined wide area networking (SD-WAN) and security functionality into a unified cloud service that promises simplified WAN deployments, improved efficiency and security, and application-specific bandwidth policies.
To read this article in full, please click here
|
|
Jul 11, 2023
Enterprises over the past several years have embraced SD-WAN for many reasons, including the flexibility of cloud architecture, enhanced security, centralized management of distributed locations, and improved application availability and performance. In turn, the popularity of SD-WAN has helped propel interest in secure access service edge (SASE), a network architecture that converges connectivity and security services.
To read this article in full, please click here
|
|
Jul 06, 2023
Network connectivity and security are key areas for IT investment as well as potential barriers to global success, according to new research.
Nearly half of CIOs claim that establishing and managing connectivity in new markets is the single most critical factor when it comes to ensuring successful global expansion, according to Expereo, which surveyed 650 large enterprise and mid-market CIOs across Asia, Europe and North America for its research. In addition, 49% of CIOs report that their board views global connectivity as "a business-critical asset to growth."
To read this article in full, please click here
|
|
Jun 30, 2023
To reduce the risk of service problems, Cisco is making it harder for organizations to use weak cryptographic algorithms when setting up authentication for OSPF packets on certain Catalyst Edge Platforms and Integrated Services Routers (ISR).
Newer versions of Cisco's IOS XE software (Release 17.11.1 and later) no longer support those algorithms—DES, 3DES, and MD5—by default, Cisco stated in a field Notice.
Specifically, the algorithms are no longer default options for the open shortest path first v 3 (OSPFv3) protocol, which uses the IPsec secure socket API to add authentication to OSPFv3 packets that distribute routing information.
To read this article in full, please click here
|
|
Jun 30, 2023
Virtualization technology provider VMware has announced that it is partnering with AMD, Samsung, and members of the RISC-V keystone community for the development and operations of confidential computing applications.
RISC-V is a hardware standards organization that is designing low-power processors; the Keystone Enclave is an open source project for building customizable trusted execution environments (TEEs).
The aim of the new partnership among VMware, AMD, Samsung and RISC-V participants is to collaborate to contribute to the open-source Certifier Framework project for confidential computing. The Certifier Framework is an open-source project started by VMware in 2022 to tackle the key barriers in the development of confidential computing applications.
To read this article in full, please click here
|
|
Jun 29, 2023
The software that runs Cisco's new Firewall 4200 Series now includes the ability to see into encrypted traffic without decrypting it, which the vendor says will allow enterprise customers to better protect hybrid and multicloud applications.
The enhanced Cisco Encrypted Visibility Engine (EVE) is part of the 7.4 version of the Secure Firewall operating system. Version 7.4 also includes zero-trust capabilities and improved application access control. The 4200 Series' operating system also helps improve overall firewall performance - it's twice as fast as previous high-end Cisco firewalls, the company says.
EVE, which has been available since version 7.2 of the software, takes things further than traditional firewalls because it now lets customers detect the client application within an encrypted tunnel, according to Rick Miles, vice president of product management, cloud and network security in Cisco's security business group.
To read this article in full, please click here
|
|
Jun 27, 2023
Cato Networks' new deep learning algorithms are designed to identify malware command and control domains and block them more quickly than traditional systems based on domain reputation, thanks to extensive training on the company's own data sets.
Cato, a SASE provider based in Tel Aviv, announced the new algorithmic security system today. The system is predicated on the idea that domain reputation tracking is insufficient to quickly identify the command servers used to remotely control malware. That's because most modern malware uses a domain generation algorithm (DGA) to rapidly generate pseudorandom domain names — which the deployed malware also has a copy of.
To read this article in full, please click here
|
|
Jun 26, 2023
The enterprise IT landscape is littered with supposedly paradigm-shifting technologies that failed to live up to the hype, and intil now, one could argue that AI fell into that category. But generative AI, which has taken the world by storm in the form of OpenAI's ChatGPT chatbot, just might be the real deal.
Chris Bedi, chief digital information officer at ServiceNow, says the release of ChatGPT last November was "an iPhone moment," an event that captured the public's attention in a way that "changed everything forever." He predicts that generative AI will become embedded into the fabric of every enterprise, and he recommends that CIOs and other IT leaders should begin now to develop their generative AI strategies.
To read this article in full, please click here
|
|
Jun 12, 2023
OK, it's not been a great first half for many companies, from end users to vendors and providers. The good news is that users sort of believe that many of the economic and political issues that have contributed to the problem have been at least held at bay.
There's still uncertainty in the tech world, but it's a bit less than before. Most of the companies I've talked with this year have stayed guardedly optimistic that things were going to improve. Over the last month, of the nearly 200 companies I've emailed with, only 21 were "pessimistic" about the outlook for their tech spending in the second half.
Lack of pessimism doesn't translate to optimism, though, and optimism is a bit non-specific for network and IT planners to build on. What are the user priorities for tech for the rest of the year? Do they think their budgets will shift, and if so from what to what? Are they looking to make major changes in their networks, change their vendors, be more or less open? I thought I knew some of the answers to these questions, but for some I was wrong.
To read this article in full, please click here
|
|
Jun 07, 2023
Looking to harness a decade of AI/ML development Cisco this week previewed generative AI-based features it will soon bring to its Security Cloud service and Webex collaboration offerings.
Cisco said it was looking meld the network and security intelligence it has amassed over the years with the large language models (LLMs) of generative AI to simplify enterprise operations and address threats with practical, effective techniques.
The first fruits of this effort will be directed at the Cisco Security Cloud, the overarching, integrated-security platform that includes software such as Duo access control and Umbrella security as well as firewalls and Talos threat intelligence access all delivered via the cloud.
To read this article in full, please click here
|
|
Jun 06, 2023
Cisco this week took the wraps off a security service edge (SSE) offering that aims to help enterprises securely connect growing edge resources, including cloud, private and SAAS applications.
Along with the SSE package, the vendor made two additional application security-related announcements at its Cisco Live! customer event. It unveiled Cisco Multicloud Defense, which is a new service designed to protect cloud service workloads, and it upgraded Panoptica, its cloud-native security application development software.
To read this article in full, please click here
|
|
Jun 06, 2023
Vehicle data and customer information were exposed for over eight years due to a cloud misconfiguration at Toyota Motor that impacted over 260,000 customers.
|
|
May 31, 2023
Cisco plans to buy Armorblox, a six-year-old AI vendor, to help create "an AI-first Security Cloud."
"Leveraging Armorblox's use of predictive and Generative AI across our portfolio, we will change the way our customers understand and interact with their security control points," wrote Raj Chopra senior vice president and chief product officer for Cisco Security in a blog announcing the pending acquistion.
While securing email was Armorblox's first application of its AI techniques, they might also be applied to attack prediction, rapid threat detection, and efficient policy enforcement, Chopra wrote. "Through this acquisition though, we see many exciting broad security use cases and possibilities to unlock."
To read this article in full, please click here
|
|
May 24, 2023
It's been 17 years and counting since Nemertes first wrote about the logic of integrating event response in the enterprise: bringing together the security operations center (SOC) and network operations center (NOC) at the organizational, operational, and technological levels. Needless to say, this has not happened at most organizations, although there has been a promising trend toward convergence in the monitoring and data management side of things. It's worth revisiting the issue.
Why converge?
The arguments for convergence remain pretty compelling:
Both the NOC and SOC are focused on keeping an eye on the systems and services comprising the IT environment; spotting and understanding anomalies; and spotting and responding to events and incidents that could affect or are affecting services to the business.
Both are focused on minimizing the effects of events and incidents on the business.
The streams of data they watch overlap hugely.
They often use the same systems (e.g. Splunk) in managing and exploring that data.
Both are focused on root-cause analysis based on those data streams.
Both adopt a tiered response approach, with first-line responders for "business as usual" operations and occurrences, and anywhere from one to three tiers of escalation to more senior engineers, architects, and analysts.
Most crucially: When something unusual happens in or to the environment (that router is acting funny), it can be very hard to know up front whether it is fundamentally a network issue (that router is acting funny - it has been misconfigured) or a security issue (that router is acting funny - it has been compromised) or both (that router is acting funny - it has been misconfigured and is now a serious vulnerability). Having fully separate NOC and SOC can mean duplicative work as both teams pick something up and examine it. It can mean ping-ponging inciden
|
|
May 24, 2023
It's been 17 years and counting since Nemertes first wrote about the logic of integrating event response in the enterprise: bringing together the security operations center (SOC) and network operations center (NOC) at the organizational, operational, and technological levels. Needless to say, this has not happened at most organizations, although there has been a promising trend toward convergence in the monitoring and data management side of things. It's worth revisiting the issue.
Why converge?
The arguments for convergence remain pretty compelling:
Both the NOC and SOC are focused on keeping an eye on the systems and services comprising the IT environment; spotting and understanding anomalies; and spotting and responding to events and incidents that could affect or are affecting services to the business.
Both are focused on minimizing the effects of events and incidents on the business.
The streams of data they watch overlap hugely.
They often use the same systems (e.g. Splunk) in managing and exploring that data.
Both are focused on root-cause analysis based on those data streams.
Both adopt a tiered response approach, with first-line responders for "business as usual" operations and occurrences, and anywhere from one to three tiers of escalation to more senior engineers, architects, and analysts.
Most crucially: When something unusual happens in or to the environment (that router is acting funny), it can be very hard to know up front whether it is fundamentally a network issue (that router is acting funny - it has been misconfigured) or a security issue (that router is acting funny - it has been compromised) or both (that router is acting funny - it has been misconfigured and is now a serious vulnerability). Having fully separate NOC and SOC can mean duplicative work as both teams pick something up and examine it. It can mean ping-ponging inciden
|
|
May 18, 2023
IBM is developing a SaaS package to help enterprises securely network heterogenous environments, including edge, on-prem and multicloud resources.
The IBM Hybrid Cloud Mesh is a SaaS service that implements a virtualized Layer 3-7 environment to rapidly enable secure connectivity between users, applications, and data distributed across multiple locations and environments, according to Andrew Coward, general manager of IBM's software defined networking group.
In a nutshell, Hybrid Cloud Mesh deploys gateways within the clouds - including on-premises, AWS or other providers' clouds, and transit points, if needed - to support the infrastructure, and then it builds a secure Layer 3-7 mesh overlay to deliver applications, Coward said. At the application level, the exposure to developers occurs at Layer 7, and the networking teams see Layer 3 and 4 activities, Coward said.
To read this article in full, please click here
|
|
May 15, 2023
Cisco is more tightly integrating its network- and application-intelligence tools in an effort to help customers quickly diagnose and remediate performance problems.
An upgrade to Cisco's Digital Experience Monitoring (DEM) platform melds the vendor's AppDynamics application observability capabilities and ThousandEyes network intelligence with a bi-directional, OpenTelemetry-based integration package. (Read more about how to shop for network observability tools)
The goal with DEM is to get business, infrastructure, networking, security operations, and DevSecOps teams working together more effectively to find the root cause of a problem and quickly address the issue, said Carlos Pereira, Cisco Fellow and chief architect in its Strategy, Incubation & Applications group.
To read this article in full, please click here
|
|
May 09, 2023
Ransomware protection for on-premises systems and hyperconverged infrastructure is the goal of the latest release from "smart infrastructure" vendor Nebulon.
|
|
May 03, 2023
Cisco today announced a new finance program that encourages customers to buy products and services now without having to start paying for them till 2024.
Specifically the Cisco Capital Business Acceleration Program will let customers purchasing Cisco products before July 29, 2023, and defer all payments until 2024. Payments deferred until 2024 would be based on the total amount financed and contract terms, the vendor stated.
Cisco said another flexible payment option is available for its partners to let their customers buy Cisco technology today, and pay later, the vendor said in a statement.
The entirety of Cisco's portfolio is eligible for the program, including hardware, software, and services, as well as select partner services and third-party hardware. In addition the Cisco Refresh portfolio of Cisco certified remanufactured products is also eligible for organizations that want to acquire used gear, the vendor stated.
To read this article in full, please click here
|
|
May 03, 2023
Amazon Web Services has launched a service that secures user access to its cloud applications without requiring a VPN.
AWS Verified Access, which the company previewed last November, validates every application request using Zero Trust principles before granting access to applications. Since AWS previewed the networking service, it has added two new features: AWS Web Application Firewall (WAF) and the ability to pass signed identity context to customers' application endpoints.
To read this article in full, please click here
|
|
Apr 28, 2023
Security, AI, and network-as-a-service (NaaS) were top of mind for Aruba Networks execs at their Atmosphere customer conference this week.
"Ten years ago for most network operators their main job was making sure connectivity was reliable and security was someone else's problem. It was outside their perimeter," said David Hughes, senior vice president, chief product and technology officer with Aruba. "But today all perimeters have dissolved and the network has expanded," .
"The networking team is now responsible for making sure connectivity is secure from the start. Bolting it on somewhere won't cut it anymore, it needs to be built into the network," Hughes said.
To read this article in full, please click here
|
|
Apr 26, 2023
Here's bad news: It's easy to buy used enterprise routers that haven't been decommissioned properly and that still contain data about the organizations they were once connected to, including IPsec credentials, application lists, and cryptographic keys.
"This leaves critical and sensitive configuration data from the original owner or operator
To read this article in full, please click here
|
|
Apr 26, 2023
Akamai's Prolexic network cloud firewall now offers the ability to customize access control lists and deploy them at network edges.
|
|
Apr 24, 2023
Arista Networks has rolled out a SaaS-based service aimed at helping enterprises more network access control (NAC) more easily.
The service, called CloudVision Guardian for Network Identity (CV-AGNI) uses real-time telemetry from Arista's network products, combines it with data from its CloudVision management platform, and uses artificial intelligence to evaluate the information and implement security policies.
The service can also onboard new devices, authenticate existing users, segment devices on the network, or help troubleshoot problems from a cloud-based system, according to Pramod Badjate, group vice president and general manager, of Arista's Cognitive Campus group.
To read this article in full, please click here
|
|
Apr 24, 2023
Cisco is taking its first major step into Extended Detection and Response (XDR) with a SaaS-delivered integrated system of endpoint, network, firewall, email and identity software aimed at protecting enterprise resources.
Cisco's XDR service, which will be available July, brings together myriad Cisco and third-party security products to control network access, analyze incidents, remediate threats, and automate response all from a single cloud-based interface. The offering gathers six telemetry sources that Security Operations Center (SOC) operators say are critical for an XDR solution: endpoint, network, firewall, email, identity, and DNS, Cisco stated.
To read this article in full, please click here
|
|
Apr 21, 2023
Left unmitigated, the vulnerabilities could lead to unauthorized remote access, denial of service attacks, or privilege escalation.
|
|
Apr 18, 2023
Cisco's Talos security intelligence group issued a warning today about an uptick in highly sophisticated attacks on network infrastructure including routers and firewalls.
The Cisco warning piggybacks a similar joint warning issued today from The UK National Cyber Security Centre (NCSC), the US National Security Agency (NSA), US Cybersecurity and Infrastructure Security Agency (CISA) and US Federal Bureau of Investigation (FBI) that noted an uptick in threats in part utilizing an exploit that first came to light in 2017. That exploit targeted an SNMP vulnerability in Cisco routers that the vendor patched in 2017.
To read this article in full, please click here
|
|
Apr 13, 2023
The upcoming cloud system will provide an added layer of network and data handling security for companies working on national security and defense projects and collaborating through the Webex app.
|
|
Apr 11, 2023
Data backup and management company Cohesity today announced plans to offer an Azure OpenAI-backed chatbot as both a security analysis tool and line-of-business assistant, along with tighter integration with Active Directory, Sentinel and Purview, as part of an expanded partnership with Microsoft.
To read this article in full, please click here
|
|
Apr 11, 2023
The transition from software-defined WAN (SD-WAN) to secure access service edge (SASE) is proving to be difficult for many enterprises, according to new research from Enterprise Management Associates (EMA).
If you're a network or security professional, you're probably familiar with SASE, a new class of solutions that integrates SD-WAN, secure remote access, and cloud-delivered, multi-function network security. Many enterprises are now evolving their SD-WAN implementations into a SASE solution, either by adopting their SD-WAN providers' SASE capabilities or integrating their SD-WAN with third-party, cloud-based network security solutions.
To read this article in full, please click here
|
|
Apr 04, 2023
Tighter integration between Fortinet's SASE and SD-WAN offerings is among the new features enabled by the latest version of the company's core operating system.
FortiOS version 7.4 also includes better automation across its Security Fabric environment, and improved management features.
FortiOS is the operating system for the FortiGate family hardware and virtual components, and it implements Fortinet Security Fabric and includes firewalling, access control, Zero Trust, and authentication in addition to managing SD-WAN, switching, and wireless services.
To read this article in full, please click here
|
|
Mar 30, 2023
Kyndryl, the managed IT services provider that spun out of IBM, has announced layoffs that could affect its own internal IT services.
"We are eliminating some roles globally — a small percentage — to become more efficient and competitive," said a Kyndryl spokesperson, without giving the exact number of employees affected due to the layoffs.
"These actions will enable us to focus our investments in areas that directly benefit our customers and position Kyndryl for profitable growth," the spokesperson said, adding that the company was in the process of undergoing transformation to streamline and simplify its processes and systems.
Bloomberg first reported about the layoffs.
To read this article in full, please click here
|
|
Mar 14, 2023
Akamai report highlights how widespread malware threats remain, noting the dangers of threats specific to DNS infrastructure.
|
|
Mar 10, 2023
The company's marketing vendor suffered a security failure in January and exposed CPNI data that included first names, wireless account numbers, wireless phone numbers, and email addresses.
|
|
Mar 10, 2023
The technique used in the attack on SonicWall devices are consistent with earlier attacks from a Chinese campaign.
|
|
Mar 09, 2023
Aruba Networks plans to prioritize development of a short list of key networking technologies - including data-center switching, private 5G, and secure access service edge (SASE) - that it finds are top of mind for enterprise customers.
Hewlett Packard Enterprise's network subsidiary is fresh off a successful first quarter that saw revenue climb 31% year over year. Aruba general manager Phil Mottram attributes the record revenue in large part to the company's Intelligent Edge strategy, which includes technologies to help customers adopt and manage network and application resources.
To read this article in full, please click here
|
|
Mar 07, 2023
VMware has revamped its Workspace One mobile and virtual desktop platform by boosting performance, making it more service-oriented and easy to manage.
Workspace One is VMware's endpoint-management package for delivering, managing and securing application access to any device across the a cloud or distributed on-premises enterprise. The highly-integrated suite includes device management, single sign-on, remote access control, endpoint security, analytics, automation and virtualization.
The company workers usin and accessing applications from multiple devices prompted the over-arching need to change Workspace One and how its services are delivered.
To read this article in full, please click here
|
|
Mar 07, 2023
UNDER EMBARGO UNTIL TUESDAY, MARCH 7 AT 9AM ET
Fortinet has added features that broaden the range of management and security tools for its secure access service edge (SASE) package.
The company has added a feature to its Secure Private Access that ties SASE resources together with SD-WAN-based applications through a Fortinet SD-WAN hub located in a nearby point-of-presence (PoP). The idea is to support larger hybrid environments and simplify anywhere access to corporate applications, said Nirav Shah, vice president of products with Fortinet.
To read this article in full, please click here
|
|
Mar 07, 2023
Akamai Hunt combines the company's historic DNS, WAF, and DDoS data with Guardicore's segmentation and telemetry to detect and eliminate evasive threats.
|
|
Mar 07, 2023
As the security model becomes the preferred security strategy, it's worth looking at what it is and what it takes to achieve.
|
|
Mar 06, 2023
The name Royal Caribbean conjures up images of luxury cruise ships, top-notch entertainment, fine dining, sandy beaches, breathtaking sunsets, tall tropical beverages.
"Our mission is to create fabulous vacations with great experiences and great memories for our crew and our guests," says John Maya, vice president of operational excellence at Miami-based Royal Caribbean Group.
Beyond the glitz and glamour, however, Royal Caribbean has the same internal systems as any company in the travel/hospitality industry - corporate offices, sales, marketing, reservations, call centers, baggage handling, etc.
Maya describes his IT infrastructure as hybrid cloud, with some resources hosted on Amazon AWS and Microsoft Azure, but also some core systems, such as the mission critical reservations application, running on an IBM AS-400 server in an Equinix data center in Virginia.
To read this article in full, please click here
|
|
Mar 03, 2023
HPE plans to expand its Aruba SASE platform with Axis Security's Atmos, delivering a comprehensive edge-to-cloud, network and security solution as a service.
|
|
Mar 02, 2023
IBM and data security and backup provider Cohesity have formed a new partnership, calling for Cohesity's data protection functionality to be incorporated into an upcoming IBM storage product suite, dubbed Storage Defender, for better protection of end-user organizations' critical information.
The capabilities of Cohesity's DataProtect backup and recovery product will be one of four main feature sets in the Storage Defender program, according to an announcement from IBM Thursday.
The Storage Defender suite is designed to bring together IBM and third-party products in order to unify primary, secondary replication, and backup management, said IBM. It's an as-a-service offering that features a single-pane-of-glass interface, SLA-driven policy automation and the ability to work with a wide variety of data sources, including physical storage, cloud hypervisors, and an assortment of different database types.
To read this article in full, please click here
|
|
Mar 02, 2023
The top five exploited vulnerabilities in 2022 include several high-severity flaws in Microsoft Exchange, Zoho ManageEngine products, and virtual private network solutions from Fortinet, Citrix and Pulse Secure.
|
|
Mar 01, 2023
IBM said this week it will soon roll out an AI-infused, hybrid-cloud oriented version of its z/OS mainframe operating system.
Expected in the third quarter, z/OS 3.1 will support technologies intended to enable deployment of AI workloads co-located with z/OS applications, IBM said in a customer preview letter.
The new OS will work best with the newest version of the Big Iron, the z16, but it will support z14 models and above, IBM says.
The z16 includes an AI accelerator built onto its core Telum processor that can do 300 billion deep-learning inferences per day with one millisecond latency and includes what IBM calls a quantum-safe system to protect organizations from anticipated quantum-based security threats.
To read this article in full, please click here
|
|
Feb 27, 2023
One year after Russia's invasion of Ukraine, the country's overall resilience and defiance has been inspiring, but telecommunications and internet connectivity has grown much more difficult.
Initially the country's internet network mostly withstood with some outages and slowdowns, but that has changed over time as the aggressors devote more effort in destroying physical locations and deploying malware and other cybersecurity weapons.
For example, researchers at Top10VPN recently reported some distressing analysis including:
To read this article in full, please click here
|
|
Feb 24, 2023
The CDN provider's new DDoS scrubbing offering impersonates the customer's network to phase out malicious traffic, and employs advanced IP masking at source to prevent direct-to-origin attacks.
|
|
Feb 22, 2023
A malicious campaign against data centers stole the access credentials of some of the world's biggest companies — including Amazon, Apple, Goldman Sachs, and Microsoft — according to reports.
|
|
Feb 17, 2023
The new V3G4 variant of Mirai, which creates botnets for DDoS attacks, exploited 13 different vulnerabilities in three campaigns over a six-month period, Palo Alto Network's Unit 42 team reports.
|
|
Feb 13, 2023
Observability may be the latest buzzword in an industry loaded with them, but Cisco will tell you the primary goal of the technology is to help enterprises get a handle on effectively managing distributed resources in ways that have not been possible in the past.
The idea of employing observability tools and applications is a hot idea. Gartner says that by 2024, 30% of enterprises implementing distributed system architectures will have adopted observability techniques to improve digital-business service performance, up from less than 10% in 2020.
"Today's operational teams have tools for network monitoring, application monitoring, infrastructure monitoring, call monitoring, and more, but they rarely intermingle to provide a cohesive view of what's going on across the enterprise," according to Carlos Pereira, Cisco Fellow and chief architect in its Strategy, Incubation & Applications group.
To read this article in full, please click here
|
|
Feb 13, 2023
Nigel Williams-Lucas, director of Information Technology at Maryland-based footwear retailer DTLR, faced a challenge that most IT execs will recognize: the business was pushing hard on digital transformation, and the IT infrastructure was struggling to keep pace.
Store managers were seeking better data analytics and business intelligence from backend systems like inventory and sales. The business wanted IT systems to support customers ordering online and picking up at a physical store within two hours.
The network needed to securely support real-time, bandwidth-intensive IP security cameras. And Williams-Lucas wanted to roll out beaconing technology, in which the network gathers information about customer in-store activity via Bluetooth or Wi-Fi, and can send discount offers to a customer's phone based on where they are in the store and what they appear to be interested in.
To read this article in full, please click here
|
|
Feb 09, 2023
After the FBI and CISA on Wednesday released a recovery script for organizations affected by a massive ransomware attack targeting VMWare ESXi servers worldwide, reports surfaced that the malware evolved in a way that made earlier recovery procedures ineffective.
The attacks, aimed at VMware's ESXi bare metal hypervisor, were first made public February 3 by the French Computer Emergency Response Team (CERT-FR), and target ESXi instances running older versions of the software, or those that have not been patched to current standards. Some 3,800 servers have been affected globally, CISA and the FBI said.
To read this article in full, please click here
|
|