Forty Months of Hyper-Digital Transformation | @CloudExpo #IoT #Cloud #DigitalTransformation

Forty months is not a lot of time to design, develop and deliver something monumental. Consider that it took 182 years to build the Notre Dame Cathedral in Paris, 20 years to build the Great Pyramid of Giza and 10 years to build the Panama Canal. Executives from digital-leading companies, however, tell us that in just over three years – the year 2020 – 17 different digital technologies will dramatically impact the way they work, and transform the work that gets done, so we don’t have much time.

read more

iTrend Names @ThingsExpo ‘Top #WebRTC Influencer’ | #RTC #IoT #IIoT #AI

@ThingsExpo has been named the ‘Top WebRTC Influencer’ by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts – and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @ThingsExpo ranked as the number one ‘WebRTC Influencer’ followed by @DevOpsSummit at 55th.

read more

Simplify the Cloud | @CloudExpo #IoT #Cloud #DigitalTransformation

As digital transformations gather pace across the enterprise, companies are faced with a range of difficult challenges to overcome. Maintaining security in the face of cloud adoption, a flood of personal mobile devices in the workplace, and the sharp rise in internet-connected devices can seem daunting. These technology trends are maturing and businesses are looking for ways to combine them and differentiate themselves in the marketplace.

read more

[video] @PentaSecSystems Data Security | @CloudExpo #AI #Cybersecurity

«There’s a clear point of entry for web attacks. Everyone knows where it is. If we could get smart about inspecting what’s coming in through that ‘door,’ we could not only get a lot of security benefits, it’s also a better way to do business,» explained Jaeson Yoo, Senior Vice President of Business Development at Penta Security Systems Inc., in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.

read more

How to Use @IBMBluemix | @CloudExpo @IBMCloud #IoT #DevOps #AI #BigData

With artificial intelligence and big data making prominent waves in industries everywhere, IBM is offering several new cloud services that will pair with their BlueMix service. It will offer better organization, smoother data generation, and accelerated migration to the cloud. Ultimately, businesses can experience greater effectiveness in every department.

read more

[slides] #DevOps and #Microservices Security | @CloudExpo @Aporeto #CD

DevOps and microservices are permeating software engineering teams broadly, whether these teams are in pure software shops but happen to run a business, such Uber and Airbnb, or in companies that rely heavily on software to run more traditional business, such as financial firms or high-end manufacturers. Microservices and DevOps have created software development and therefore business speed and agility benefits, but they have also created problems; specifically, they have created software security issues.

read more

[slides] @SerenaSoftware Infomercial | @CloudExpo #Cloud #ITaaS #BigData

Leading cloud-centric IT organizations are establishing core capabilities to improve productivity, control costs and provide a highly responsive end-user experience. Key steps along this journey include creating an end-user cloud services catalog, automating workflows and provisioning, and implementing IT showback and chargeback. In his session at 19th Cloud Expo, Mark Jamensky, executive vice president of Products at Embotics, walked attendees through an in-depth case study of enterprise IT management products provider Serena Software and its journey to enhancing ITaaS and IT cost visibility capabilities. The session shared best practices, lessons learned and key technologies used along the way.

read more

Holiday Cooking with AllRecipes.com on the Cloud

Are you one of those people who want to make something special during the holiday season for your near and dear ones? Well, in that case, you’re sure to have browsed recipes from AllRecipes.com – one of the most popular and comprehensive database of food recipes for any season. This holiday season got even better as AllRecipes.com has turned to Microsoft Azure, a popular cloud platform, for sharing its recipes with millions of visitors like you.

AllRecipes.com is a food site owned by Meredith Corp, and has been in operation since 1997. Over these two decades, it has transformed the way people search for recipes, and in fact, has helped billions of people around the world to make any kind of dish. If you translate this to numbers, it services more than 1.5 billion people every year, and these visitors view about 95 recipes per second. Over the last few years, 66 percent of its visitors connect to it through their mobile device. These numbers are growing as more people around the world are exploring food beyond their comfort zone.

Typically, traffic to AllRecipes.com is cyclical. For example, the number of visitors on a Sunday afternoon is almost 60 percent more when compared to Monday morning. Likewise, traffic peaks during Thanksgiving and Christmas season as more people look for recipes to serve their family. A detailed study of its traffic pattern shows that eight weeks in November and December, especially during the holidays and the day before the Super Bowl generate the maximum traffic.

Since it’s traffic is cyclical and predictable, it makes sense for AllRecipes.com to move to the cloud. This way, it can choose a scalable plan that will handle its traffic during the peak season, and will expand during the off-seasons to help the company save some money. Without the cloud, this company would have to invest in large infrastructure, which would have not just cost not just a ton more money, but would also be underused during the off season. With cloud, AllRecipes.com has the option to expand or scale back, according to its needs.

Another important reason to move to the cloud is the expected responsiveness. Most chefs who visit the site are looking for ideas while dropping their kids at soccer practice or while shopping at the grocery stores. Sometimes, they may be at a place where the network is not great, and yet they may want to have an idea of what to make for dinner once they’re back. To cater to these customers, who incidentally form the largest customer base, it’s important that the site is fast, responsive, and takes as little data as possible. Again, this can be best achieved on a cloud platform like Microsoft Azure rather than on a data center that could be located miles away from the visitor’s location.

So, why did the company choose Azure, and not anything else? The simple answer is this site is built on C#, so Azure was the natural choice!

All this means is you’re sure going to spend a lot less time waiting for the site to load, and a lot more time cooking and having fun with your family and friends.

Merry Christmas!

The post Holiday Cooking with AllRecipes.com on the Cloud appeared first on Cloud News Daily.

Security through visibility: Seeing into virtual and cloud networks

(c)iStock.com/alashi

Imagine an IT security team as a navy crew at sea. A torpedo blasts the ship’s side below the water line. As the water floods in, they can’t even see the hole, let alone fix it. Instead, everyone turns to the pumps to keep the ship afloat.

This is the state of many security programs today. Despite a plethora of point solutions, security teams lack visibility into what they’re trying to protect, their most pressing risks and the security tools at their disposal. Thus security teams operate in constant reactionary mode, while a strategic, proactive security program remains elusive.

The growing popularity of virtual networks further complicates visibility issues. Virtual machines are spun up at a moment’s notice, and security groups and tags are assigned – but not necessarily in line with broader security policies. Network security teams may have no access to management consoles and limited insight as to how changing network architectures affect their attack surface.

But with comprehensive network modeling extending into virtual networks, network security engineers can gain the needed visibility to unify security and compliance processes across their hybrid hardware and virtual environments.

Verifying access

A major challenge to policy and access verification in hybrid environments is complexity. The mixture of physical, virtual and cloud networks with their various security groups and tags, as well as traditional ACLs, makes manual comparison and analysis almost impossible. But by normalising this data and combining hybrid network policies, network access can be analysed end to end and visualised within the model.

Microsegmentation challenges

Historically, data centres have been protected by perimeter security technologies analysing north-south traffic –traffic into and out of the data centre. Traditional data centre designs assume that all east-west traffic – traveling within the data centre – occurs in trusted, well-protected zones. Recent data breaches, however, have shown that this assumption is no longer valid. Microsegmentation is capable of dividing east-west traffic within the data centre into smaller, more protected zones; but without security visibility into how microsegmentation is implemented, it’s difficult to verify policy is adhered to across the network.

By combining and modeling north-south and east-west policies network security teams can gain end-to-end access visibility throughout their hybrid network. Model-driven visibility also provides a more realistic view of applied policy at the host level rather than verifying access only at “chokepoints” or gateways to the virtual network.

Vulnerability detection in virtual networks

One added benefit of modeling virtual and cloud environments is scanless vulnerability detection. Security analytics applied to the model can deduce vulnerabilities using product configuration and version information. This can significantly decrease reliance on active or third-party scans which are harder to operate on virtual and cloud networks. Incorporating vulnerability intelligence gives a fuller picture of how these networks impact overall risk.

Visualisation

By unifying hybrid IT environments in one model and normalising their data, organisations can break down the barriers that traditionally existed between physical, virtual and cloud networks for comprehensive, streamlined security management.

This information can be further distilled into a simple picture of the organisation’s unique attack surface. Using attack surface visualisations, CISOs to “in-the-trenches” security practitioners to board members can quickly see the interconnectedness of their IT infrastructure and where their most critical security exposures lurk. Attack surface visibility gives an intuitive and deeply analytical tool to make fast, informed decisions regarding incident response, operations and security investments. It provides a common language and reference to stop reacting to symptoms and start treating root causes of security issues, creating a proactive, holistic security program.

Security through visibility: Seeing into virtual and cloud networks

(c)iStock.com/alashi

Imagine an IT security team as a navy crew at sea. A torpedo blasts the ship’s side below the water line. As the water floods in, they can’t even see the hole, let alone fix it. Instead, everyone turns to the pumps to keep the ship afloat.

This is the state of many security programs today. Despite a plethora of point solutions, security teams lack visibility into what they’re trying to protect, their most pressing risks and the security tools at their disposal. Thus security teams operate in constant reactionary mode, while a strategic, proactive security program remains elusive.

The growing popularity of virtual networks further complicates visibility issues. Virtual machines are spun up at a moment’s notice, and security groups and tags are assigned – but not necessarily in line with broader security policies. Network security teams may have no access to management consoles and limited insight as to how changing network architectures affect their attack surface.

But with comprehensive network modeling extending into virtual networks, network security engineers can gain the needed visibility to unify security and compliance processes across their hybrid hardware and virtual environments.

Verifying access

A major challenge to policy and access verification in hybrid environments is complexity. The mixture of physical, virtual and cloud networks with their various security groups and tags, as well as traditional ACLs, makes manual comparison and analysis almost impossible. But by normalising this data and combining hybrid network policies, network access can be analysed end to end and visualised within the model.

Microsegmentation challenges

Historically, data centres have been protected by perimeter security technologies analysing north-south traffic –traffic into and out of the data centre. Traditional data centre designs assume that all east-west traffic – traveling within the data centre – occurs in trusted, well-protected zones. Recent data breaches, however, have shown that this assumption is no longer valid. Microsegmentation is capable of dividing east-west traffic within the data centre into smaller, more protected zones; but without security visibility into how microsegmentation is implemented, it’s difficult to verify policy is adhered to across the network.

By combining and modeling north-south and east-west policies network security teams can gain end-to-end access visibility throughout their hybrid network. Model-driven visibility also provides a more realistic view of applied policy at the host level rather than verifying access only at “chokepoints” or gateways to the virtual network.

Vulnerability detection in virtual networks

One added benefit of modeling virtual and cloud environments is scanless vulnerability detection. Security analytics applied to the model can deduce vulnerabilities using product configuration and version information. This can significantly decrease reliance on active or third-party scans which are harder to operate on virtual and cloud networks. Incorporating vulnerability intelligence gives a fuller picture of how these networks impact overall risk.

Visualisation

By unifying hybrid IT environments in one model and normalising their data, organisations can break down the barriers that traditionally existed between physical, virtual and cloud networks for comprehensive, streamlined security management.

This information can be further distilled into a simple picture of the organisation’s unique attack surface. Using attack surface visualisations, CISOs to “in-the-trenches” security practitioners to board members can quickly see the interconnectedness of their IT infrastructure and where their most critical security exposures lurk. Attack surface visibility gives an intuitive and deeply analytical tool to make fast, informed decisions regarding incident response, operations and security investments. It provides a common language and reference to stop reacting to symptoms and start treating root causes of security issues, creating a proactive, holistic security program.