How to avoid a Hatton Garden-style data centre heist in your organisation

(c)iStock.com/LanceB

In April 2015, one of the world’s biggest jewellery heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited access to the company’s secure vault for over 48 hours during the Easter weekend, breaking into one safety deposit box after another to steal an estimated $100m worth of jewelry.

So why weren’t the criminals caught? How did they have free reign into all of the safety deposit boxes? It turns out that the security systems only monitored the perimeter, not inside the vault. Despite the burglars initially triggering an alarm to which the police responded, no physical signs of burglary were found outside the company’s vault. So the perpetrators were able to continue their robbery uninterrupted. In other words, the theft was made possible by simply breaching the vault’s perimeter – once the gang was inside, they could move around undetected and undisturbed.

Most businesses do not have store gold, diamonds or jewelry. Instead, their most precious assets are data. And they’re not stored in reinforced vaults, but in data centres. Yet in many cases, both vaults and data centres are secured against breaches in similar ways. Organisations often focus on reinforcing the perimeter and less on internal security.

If attackers are able to breach the external protection, they can often move inside the data centre from one application to the next, stealing data and disrupting business processes for some time before they are detected – just like the criminal gang inside the Hatton Garden vault were able to move freely and undetected. In some recent data centre breaches, the hackers had access to applications and data for months, due to lack of visibility and internal security measures.

Security challenges in virtualised environments

This situation is made worse as enterprises move from physical data centre networks to virtualised networks – to accelerate configuring and deploying applications, reduce hardware costs and reduce management time. In this new data centre environment, all of the infrastructure elements – networking, storage, compute and security – are virtualised and delivered as a service. This fundamental change means that the traditional security approaches of securing the network’s perimeter is no longer suitable to address the dynamic virtualised environment.

The main security challenges are:

Traffic behaviour shifts: Historically, the majority of traffic was ‘north-south’ traffic, which crosses the data centre perimeter and is managed by traditional perimeter security controls. Now, intra-data centre ‘east-west’ traffic has drastically increased, as the number of applications has multiplied and those applications need to interconnect and share data in order to function. With the number of applications growing, hackers have a wider choice of targets: they can focus on a single low-priority application and then use it to start moving laterally inside the data centre, undetected. Perimeter security is no longer enough.

Manual configuration and policy changes: In these newly dynamic data centres, traditional, manual processes for managing security are too slow, taking too much of the IT team’s time – which means security can be a bottleneck, slowing the delivery of new applications. Manual processes are also prone to human errors which can introduce vulnerabilities. Therefore, automating security management is essential to enable automated application provisioning and to fully support data centre agility.

Until recently, delivering advanced threat prevention and security technologies within the data centre would involve managing a large number of separate VLANs and keeping complicated network diagrams and configuration constantly up-to-date using manual processes. In short, an unrealistically difficult and expensive management task for most organisations.

Micro-segmentation: Armed guards inside the vault

But what if we could place the equivalent of a security guard on every safety deposit box in the vault so that even if an attacker breaches the perimeter, there is protection for every valuable asset inside? As data centres become increasingly software-defined with all functions managed virtually, this can be accomplished by using micro-segmentation in the software-defined data centre (SDDC).

Micro-segmentation works by coloring and grouping resources within the data centre with communication between those groups applied with specific dynamic security policies. Traffic within the data centre is then directed to virtual security gateways.  The traffic is deeply inspected at the content level using advanced threat prevention techniques to stop attackers attempting to move laterally from one application to another using exploits and reconnaissance techniques.

Whenever a virtual machine or server is detected executing an attack using the above techniques, it can be tagged as infected and immediately quarantined automatically by the ‘security guard’ in the data centre: the security gateway. This way, a system breach does not compromise the entire infrastructure.

Once an application is added and evolves over time, it is imperative for the security policy to instantly apply and automatically adapt to the dynamic changes. Using integration to cloud management and orchestration tools, the security in the software defined data centre learns about the role of the application, how it scales and its location. As a result, the right policy is enforced enabling applications inside the data centre to securely communicate with each other. For example, when servers are added or an IP address changes, the object is already provisioned and inherits the relevant security policies removing the need for a manual process.

Just as virtualisation has driven the development of scalable, flexible, easily-managed data centres, it’s also driving the next generation of data centre security. Using SDDC micro-segmentation delivered via an integrated, virtualised security platform, advanced security and threat prevention services can be dynamically deployed wherever they are needed in the software-defined data centre environment. This puts armed security guards around inside the organisation’s vault, protecting each safety deposit box and the valuable assets they hold – helping to stop data centres falling victim of a Hatton Garden-style breach.

How to simplify Terminal Services configuration

Windows Terminal Services has been a part of business networks for many years. It was renamed Remote Desktop Services (RDS) with the release of Windows Server 2008 R2. While there are multiple server products available in the market, the Windows Server OS stands tall among them. According to a Netcraft 2016 survey, Microsoft is increasing […]

The post How to simplify Terminal Services configuration appeared first on Parallels Blog.

Winning the Digital Transformation Game | @CloudExpo #Cloud #BigData #DigitalTransformation

Mike described the overlay of Cloud, Mobile, Social and Big Data across the traditional legacy of hardware, software and telco services, constituting the ‘Third Platform’ and beginning around 2006.
He highlighted the general explosion of the technology innovation ecosystem, everything from 3D Printers through Augmented Reality to the Blockchain, are each executing major levels of disruptive change, in parallel to one another.
As they intersect and synthesize so even larger virtual market opportunities are opened up, from digital currencies to entirely new app sets for the public sector to new mass market gaming niches.

read more

Building Digital Capabilities | @CloudExpo #Cloud #BigData #DigitalTransformation

Most enterprises are struggling to innovate and are not investing enough into new technologies to counter disruptive measures. As a result, in a few years, their products are becoming irrelevant in the market. Examples of Blackberry, Nokia, Kodak, Blockbuster have been quoted numerous times. Technology has lowered the entry barrier to innovation, and new entrants can easily disrupt the entire business models in a matter of months. Geographical borders do not guarantee any competitive advantages anymore. Any breakthrough or new idea travels around the world in a matter of minutes.

read more

Two in three CIOs yet to formulate ‘comprehensive’ GDPR strategy

(c)iStock.com/Leonardo Patrizi

Businesses have been warned and they’ve been previously shown up for not having the required knowledge over the European Union General Data Protection Regulation (GDPR) – now, a new piece of research from mainframe firm Compuware argues that more than two thirds of organisations do not have a comprehensive plan in place for how they will act.

The research, which quizzed 400 CIOs across Europe and the US, found that just over half (55%) of European businesses believe they are ‘well-briefed’ on the GDPR, while 63% argued data complexity is a major hurdle in achieving compliance with the new regulations.

The new rules, which come into effect on May 25 2018, concern users’ ‘right to be forgotten’, as well as a right for them to know when their data has been hacked, as well as transferring data to another service provider without the fear of vendor lock-in. The former is a particular concern in the research; only 52% of companies said they could comply with it right now.

Perhaps most worryingly, 68% of those polled said they ‘can’t always know where customer data is’ due to the complexity of modern IT. The use of outsourcing and mobile technology makes it more difficult, the research notes, cited by 81% and 63% of respondents respectively. That said, over half (51%) of CIOs say they can locate all of an individual’s personal data quickly.

“To comply with the GDPR, businesses need to keep stricter control of where customer data resides,” said Dr Elizabeth Maxwell, Compuware EMEA technical director. “If they don’t have a firm handle on where every copy of customer data resides across all their systems, businesses could lose countless man-hours conducting manual searches for the data of those exercising their ‘right to be forgotten’.

“Even then, they may not identify every copy, leaving them at risk of non-compliance.”

Any UK businesses thinking that because of the Brexit EU vote they don’t have to comply with the new regulations will be in for a rude awakening. Speaking to this publication before June’s referendum, Jonathan Mepsted, UK managing director at Netskope, argued the legislation – if you are looking to do business in the European Union, you are in. The Compuware research also found that more than half (52%) of US businesses hold European customer data, meaning they are also liable.

Lack of vendor support hinders channel cloud push, research finds

(c)iStock.com/Serjio74

Even though almost all of the channel recognises the potential benefits of cloud computing, only two thirds of companies polled by the Cloud Industry Forum (CIF) and Intermedia say they are offering cloud services today.

The research, which was conducted by Vanson Bourne and polled 150 senior decision makers from managed service providers, value added resellers and systems integrators, found there were ‘significant’ barriers when it came to channel organisations selling cloud services today. 82% argue cultural changes within an organisation are a challenge, while staff skill shortages (81%) and cloud marketing and positioning (80%) were also cited.

78% of end user organisations are using at least one cloud-based service today, according to figures, up from 61% according to the CIF, but the channel has been unable to keep up down to a lack of vendor support, argues Alex Hilton, Cloud Industry Forum CEO.

“The channel is clearly struggling when it comes to cloud deployments and is missing out on major opportunities as a result,” said Hilton. “Resellers that do sell cloud services are reporting a wide range of benefits, from improved competitive edge to extended revenues and market reach. This puts channel resellers that haven’t yet made the move at a distinct disadvantage.”

“While the channel has recognised cloud’s potential, resellers, as made evident by these findings, aren’t getting the support they need to transition, said Eric Weiss, Intermedia SVP marketing.

“Beyond tailored levels of support and technical expertise, partners need help differentiating, which is why 82% of respondents incorporate value adds and 59% view white label programmes as critical or very important to their success. This is why Intermedia has put such an emphasis on its private label resale programme – so partners can create solutions customised to their customers’ needs while owning the relationship, pricing and branding.”

What’s New in Windows Server 2016

Executive Summary In the coming months, Windows Server® will start rolling out to company datacenters. Microsoft® made a significant investment in WS 2016 to address company needs for cloud requirements. As a result, this iteration includes support for containers, tighter integration with Microsoft’s Azure® cloud service, more security for Hyper-V® virtual machines, and improvements to […]

The post What’s New in Windows Server 2016 appeared first on Parallels Blog.

Financial Institutions Are Vulnerable to Cyber Attacks | @CloudExpo #Cloud #Cybersecurity

It is impossible to go outside and not notice banks offering consumers new ways to save, send, spend, and access their money at a bank. This trend-to ease access to funds – extends well beyond the retail banking sector and is equally prevalent among investment banks, private banks, hedge funds, mutual funds, ETF’s and just about any financial institution, large or small. It is arguably the single most compelling commercial driver in the financial services sector. Financial institutions compete aggressively and continuously for dominance in this regard and technology is, in all cases, is the single most important differentiator across institution, customer, and geography.

read more

Digital Transformation’s Impact on Value Chain | @CloudExpo #IoT #Cloud #DigitalTransformation

New forces are impacting the entire value chain of an enterprise. Availability of large amounts of digital data, automation of the production processes, inter-connectivity of the supply chains, and digitization of the customer experience is re-organizing entire industries leading to the transformation of business models.
Let’s look at the some of the critical pieces of the value chain and see the impact of the new technologies.

read more

Coexistence: Adopting an Optimal IT Infrastructure Model | @CloudExpo #IaaS #SaaS #Cloud

Some mainstream IT buyers might think that most cloud infrastructure vendors and service providers are essentially alike. But there are key differences. Besides, given the body of market research to the contrary, there’s clearly no such thing as a “one-size-fits-all” cloud solution.
Furthermore, if you believe that a hybrid cloud should support an IT agenda to transform a business, then a viable solution must consider the preexisting systems of record within the enterprise. That’s why forward-thinking CIOs often seek information and guidance on two fronts.
First, they want to know how to extract costs from their legacy IT investments. Second, they desire to use that assessment exercise to free-up budget and fund innovation via a DevOps model that would streamline new cloud-native technology deployments.

read more