Addressing the hurdles of cloud security: Why you may be setting yourself up for failure

(c)iStock.com/kmlmtz66

Security is trumpeted as a top concern for organisations, especially with increased investment in new technologies like mobile, cloud, and the Internet of Things. As new technologies are introduced and adversaries become more sophisticated, the threat landscape and the attack surface within organisations continues to grow. This means that not only do organisations need protection from threats, they need to protect their data and they also need to protect their reputation and brand. However, not all companies are taking the threat as seriously as perhaps they should.

Just last week, two new industry reports on this subject caught my attention. The first report indicates that UK companies are still failing to protect their sensitive information against cyber-attacks. According to PwC, there has been a 38% increase in detected information security incidents this year, with these incidents now costing an average of £1.7m. PwC’s report found that businesses are failing to take cyber security seriously, despite noting a 24% rise in security budgets this year.

Corero Network Security also recently launched its mid-year report on the current state of DDoS attacks based on the experience of its global customers. In the report Corero stated that attackers are leveraging sub-saturating DDoS attacks with growing frequency and the attackers are using shorter attack durations to evade defences. DDoS scrubbing solutions can cause disruption in a network and are often used to distract victims while other malware penetrates networks and steals customer information and company data.

With DDoS attacks on the up (the report by Corero showed that customers experienced about 4.5 DDoS attacks per day in Q2 2015, a 32 percent increase on Q1) and malware continuing to increase (it has doubled in the first half of 2015), now more than ever companies need a safe and secure place to store sensitive data.  This also means that as companies continue to try and combat the increasing onslaught of cyber-attacks, including DDoS, so they are turning more and more to their service providers to help them achieve this.

Just a couple of weeks ago we released our latest Enterprise Cloud Services – Advanced Security Solution (EC-AS) combining our existing VMware vCloud platform and our management console with advanced security features including vulnerability scanning, whole disk encryption, event and log analysis, antivirus and malware and intrusion detection. We did this because both our customers – and the market – were telling us they needed more sophisticated security solutions to help them achieve cloud security and compliance. The Corero report substantiates the need for more sophisticated security solutions and in particular highlights customer demand for higher levels of security from service providers.

We find that today cloud initiatives are increasingly stalling or getting cancelled altogether because the security risks are deemed to be too high. This results in an uncomfortable situation for IT leaders as lines of business in their organisations are still demanding the agility, scalability and cost savings that cloud computing can deliver. IT leaders know they can’t abandon cloud altogether, the benefits are too high – and yet they also know whose head will be on the line if an outage, data loss or hacking incident was traced to a cloud workload.  So what can they do?

One ECS-AS feature that our customers are particularly excited about is on-demand security reporting. At the click of a button, our customers can get a report showing the security of their cloud resources, data and applications across all of their security parameters. This report can be used to show executives the security status of the organisation’s cloud workloads (thereby quelling any residual fears they have about cloud security) as well as show compliance to auditors as required.

To provide further assistance to the mid-market we have also released a compliance services offering which helps companies meet compliance requirements for industry regulations such as SOC2 and PCI-DSS. Additionally our certified compliance team helps customers interpret reports, provide supporting documentation, answer auditors’ questions, align to ITIL frameworks and so on. Achieving compliance can be a game changer for customers in the mid-market and pave the way for growth acceleration. As a result, this is opening up a whole new level of cloud usage to the mid-market – especially in industries that require stringent security and compliance like Healthcare, Insurance and Finance.

That said, the threat landscape and attack surface is only set to get worse and unfortunately, despite the scale of threats, many businesses are still not doing enough to protect themselves from what could be a financially crippling attack. My advice is make sure that you are working with a cloud service provider that can help you address security and protect your cloud workload, otherwise you could  be setting your cloud projects up for failure.

Data Centers: Wearables, Connected Cars and Smart Homes | @ThingsExpo #IoT #M2M

With the exponential growth of network traffic slowing down data transmission, companies are looking for solutions. Recently, a solution has emerged that can help improve your data speed with data centers on the edge. These micro data center solutions can simplify the lives of many data center owners and operators because they are self-contained, secure computing environments, assembled in a factory and shipped in one enclosure which includes all the necessary power, cooling, security, and management tools. Their flexibility opens up a wave of new applications, made possible through reduced latency, increased security and cost efficiency.

read more

Testing WebRTC Services | @ThingsExpo #RTC #WebRTC #Microservices

WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services.
In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, will review the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.

read more

Microservices: Digital Cloud Architecture | @CloudExpo #API #Microservices

In a VentureBeat article the author describes ‘the future of enterprise tech‘, describing how pioneering organizations like Netflix are entirely embracing a Cloud paradigm for their business, moving away from the traditional approach of owning and operating your own data centre populated by EMC, Oracle and VMware.

Instead they are moving to ‘web scale IT’ via on demand rental of containers, commodity hardware and NoSQL databases, but critically it’s not just about swapping out the infrastructure components.

read more

We Now Live in an API World ‘Power Panel’ at @CloudExpo | #API #Cloud

Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today’s multi-cloud environments and hybrid clouds possible.
In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists will address the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true change and transformation possible.

read more

VW Emissions Scandal and IoT | @ThingsExpo #IoT #M2M #InternetOfThings

If the calibration engineer does the calibration incorrectly – or a malefactor intentionally introduces a miscalibration – then the end result would be off. Every time. Even though there was nothing wrong with the sensor data, no security breach between the sensor and emissions device, and furthermore, every line of code in the device was completely correct.

In fact, the only way to detect a calibration attack is by running an independent analog test. In other words, someone would have to get their own exhaust particulate measuring device and run tests on real vehicles to see if the emissions device was properly calibrated.

read more

IBM cloud service revenue up despite 14th quarterly revenue decline

IBM2IBM has posted an unexpectedly large drop in revenue and cut its full-year profit forecast, blaming the strong US dollar for dampening demand from China and emerging markets. Though cloud, big data, mobile and other strategic markets are growing, their rise is not enough to arrest a long term trend of decline.

IBM, which gets more than half its business from overseas, says it has been affected as the dollar is currently 17% up on its standing against a basket of currencies compared to this time last year.

Chinese sales were particularly affected, with fewer big deals being registered. As a consequence revenue from China fell 17%, IBM’s chief financial officer Martin Schroeter told analysts. Sales in Brazil, Russia, India and China combined were down 30%.

The company’s total revenue fell 13.9% to $19.28 billion in the quarter, below analysts’ average forecast of $19.62 billion.

It was the 14th quarter in a row that IBM has posted a reduction in revenue. As IBM divests itself of low-margin businesses it has failed to make up the shortfall, yet, through cloud computing, according to analysts.

“This is another example of the massive headwinds that traditional tech stalwarts are seeing in this ever-changing environment, as more customers move to the cloud,” said FBR Capital Markets analyst Daniel Ives.

According to IBM CFO Martin Schroeter, weakness in IBM’s consulting and storage businesses account for the revenue shortfall, rather than the performance of its cloud services.

“I would characterize it as the consulting and systems integration business moving away from these large, packaged applications and the storage business moving to flash and to the cloud,” Schroeter told Reuters in an interview.

Revenue from IBM’s ‘strategic imperatives’, cloud and mobile computing, data analytics, social and security software, rose 17 per cent in the third quarter ending on Sept 30th.

IBM’s net income from continuing operations fell to $2.96 billion, or $3.02 per share, from $3.46 billion, or $3.46 per share, a year earlier.

At the close of trading yesterday (Monday) IBM’s shares had fallen 7 per cent this year.

VMware Blog: Top 3 Mobility Concerns for Today’s Healthcare Organizations

This post originally appeared on VMware’s AirWatch blog and was authored by Scott Szymanski. Be sure to check VMware’s blog for more great content.

 

mobilityMobile devices have been a huge hit for healthcare. In fact, a recent report from Research and Markets expects mobility in healthcare to grow from $24 billion this year to $84 billion in 2020. From accessing medical records to real-time translation services, doctors and nurses are seeing an incredible transformation in how they administer care using mobility.

While this is exciting for patients and doctors alike, healthcare IT teams must reconcile the government red tape and employee concerns inevitable with new technologies. These teams must meet HIPAA compliance and maintain patient trust without creating a labyrinth of security that medical staff find difficult to navigate regularly.

Fortunately, many healthcare organizations, including Florida-based Adventist Health System, have delivered successful mobile transformations across their teams. Watch the Adventist Health System video to learn how mobility is transforming healthcare. Then, take a look at the top three healthcare concerns to consider when researching mobility.

Security

There’s hardly anything more cringe-worthy in healthcare than security. From electronic medical records to staff communications, there is a lot of sensitive client and staff information that needs protecting. And if this information is left in the open, it could have devastating repercussions. According to IDC Health Insights, 50% of healthcare organizations will have experienced anywhere from 1-5 cyberattacks—and one-in-three attacks will be successful.

Luckily, security and mobility can work together. Look for enterprise mobility management (EMM) solutions that can track devices, push applications, enforce security policies and more without getting in the way of physicians. Some solutions can even wipe lost or stolen devices remotely, ensuring IT can quickly react when problems arise. Keeping information safe starts with strong security.

 

Simplicity

While security is primary, don’t forget the importance of simplicity. Mobile devices are redefining how medical staff diagnose, treat and report on patient health, and the last thing doctors need is another “helpful tool” that hinders timely and effective patient care. Devices that are difficult to use generally aren’t used at all, and worse than that, they could be used incorrectly in ways that might circumvent the security you worked hard to put in place.

Remember: sometimes less steps equal greater success. Simplifying the sign-in process to devices and applications might encourage a doctor to check a patient’s records twice before ordering a prescription. Tablets and smartphones could reduce training and the number of troubleshooting incidents serviced by IT, leading to independent but connected physicians across your entire medical network.

 

Patient Engagement

No matter how you use mobility, remember who physicians care about most: patients. Delivering timely and accurate information to patients is one of the most important elements of quality healthcare. Patients want to know their treatments and why they are receiving them. Unfortunately, according to a study done at the North Shore University Hospital in New York, less than half of patients surveyed were able to state their doctors’ diagnoses, an issue that could affect patient health and trust.

With connected mobile devices, you could deliver up-to-date patient information to physicians in real-time. Not only could this contribute to more accurate diagnoses, patients might feel safer sharing information with their doctors, ultimately leading to better care. Mobile devices are also more interactive than traditional computers and paper charts, and they could help doctors better illustrate medical procedures or conditions in ways patients actually understand. More informed patients are happier patients, and mobility could be the solution in your organization.

 

GreenPages has strong AirWatch expertise. If you have any questions or need any help on AirWatch projects, be sure to reach out!

VMware Blog: Top 3 Mobility Concerns for Today’s Healthcare Organizations

This post originally appeared on VMware’s AirWatch blog and was authored by Scott Szymanski. Be sure to check VMware’s blog for more great content.

 

mobilityMobile devices have been a huge hit for healthcare. In fact, a recent report from Research and Markets expects mobility in healthcare to grow from $24 billion this year to $84 billion in 2020. From accessing medical records to real-time translation services, doctors and nurses are seeing an incredible transformation in how they administer care using mobility.

While this is exciting for patients and doctors alike, healthcare IT teams must reconcile the government red tape and employee concerns inevitable with new technologies. These teams must meet HIPAA compliance and maintain patient trust without creating a labyrinth of security that medical staff find difficult to navigate regularly.

Fortunately, many healthcare organizations, including Florida-based Adventist Health System, have delivered successful mobile transformations across their teams. Watch the Adventist Health System video to learn how mobility is transforming healthcare. Then, take a look at the top three healthcare concerns to consider when researching mobility.

Security

There’s hardly anything more cringe-worthy in healthcare than security. From electronic medical records to staff communications, there is a lot of sensitive client and staff information that needs protecting. And if this information is left in the open, it could have devastating repercussions. According to IDC Health Insights, 50% of healthcare organizations will have experienced anywhere from 1-5 cyberattacks—and one-in-three attacks will be successful.

Luckily, security and mobility can work together. Look for enterprise mobility management (EMM) solutions that can track devices, push applications, enforce security policies and more without getting in the way of physicians. Some solutions can even wipe lost or stolen devices remotely, ensuring IT can quickly react when problems arise. Keeping information safe starts with strong security.

 

Simplicity

While security is primary, don’t forget the importance of simplicity. Mobile devices are redefining how medical staff diagnose, treat and report on patient health, and the last thing doctors need is another “helpful tool” that hinders timely and effective patient care. Devices that are difficult to use generally aren’t used at all, and worse than that, they could be used incorrectly in ways that might circumvent the security you worked hard to put in place.

Remember: sometimes less steps equal greater success. Simplifying the sign-in process to devices and applications might encourage a doctor to check a patient’s records twice before ordering a prescription. Tablets and smartphones could reduce training and the number of troubleshooting incidents serviced by IT, leading to independent but connected physicians across your entire medical network.

 

Patient Engagement

No matter how you use mobility, remember who physicians care about most: patients. Delivering timely and accurate information to patients is one of the most important elements of quality healthcare. Patients want to know their treatments and why they are receiving them. Unfortunately, according to a study done at the North Shore University Hospital in New York, less than half of patients surveyed were able to state their doctors’ diagnoses, an issue that could affect patient health and trust.

With connected mobile devices, you could deliver up-to-date patient information to physicians in real-time. Not only could this contribute to more accurate diagnoses, patients might feel safer sharing information with their doctors, ultimately leading to better care. Mobile devices are also more interactive than traditional computers and paper charts, and they could help doctors better illustrate medical procedures or conditions in ways patients actually understand. More informed patients are happier patients, and mobility could be the solution in your organization.

 

GreenPages has strong AirWatch expertise. If you have any questions or need any help on AirWatch projects, be sure to reach out!

The Business of Internet of Things | @ThingsExpo @EmbeddedExperts #IoT

Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.

read more