Flexential’s DNA has deep roots in the southeast and the west. For nearly 20 years, both Peak 10 and ViaWest helped data-intensive organizations transform IT from a cost center to an asset that helps achieve innovation and improve speed to market while also lowering risk. We joined forces in August of 2017, and rebranded as Flexential in January of 2018. Our comprehensive suite of hybrid IT solutions, coupled with the depth of our team’s experience and expertise in developing tailored solutions to meet the specific needs of our customers, are what set Flexential apart. Wherever you are in your IT transformation journey, Flexential is your partner to optimize and evolve your workloads’ performance, reliability and security.
Monthly Archives: April 2019
A guide for database as a service providers: How to stand your ground against AWS – or any other cloud
Last August, Redis Labs introduced a Commons Clause license for its popular in-memory database to prevent cloud providers like Amazon Web Services, Microsoft Azure and Google Cloud Platform (GCP) from “taking advantage of the open source community for years by selling (for hundreds of millions of dollars) cloud services based on open source code they didn’t develop.”
NoSQL database platform MongoDB followed suit in October 2018 announcing a Server Side Public License (SSPL) to protect “open source innovation” and stop “cloud vendors who have not developed the software to capture all of the value while contributing little back to the community.” Event streaming company, Confluent issued its own Community License in December 2018 to make sure cloud providers could no longer “bake it into the cloud offering, and put all their own investments into differentiated proprietary offerings.”
What prompted these open source firms to introduce such restrictive licensing terms? While global database management systems revenues hit $37 billion in 2017, analyst firm Gartner projects that the database platform as a service (dbPaaS) segment alone will reach $10 billion by 2021.
While the dbPaaS segment is one of the fastest growing areas in the overall database market, much of the dbPaaS adoption is being driven and captured by cloud providers. The three leading cloud platforms (AWS, Azure, and GCP) offer a range of relational, non-relational, time series, in-memory and graph database engines to meet every conceivable enterprise need.
The big fight: Commercial open source database vendors vs. cloud platforms
These licensing changes from commercial open source vendors have ignited heated debates about the very definition of open source software, the need for a special license to block cloud providers from piggybacking on popular open source tools and how to create sustainable (and profitable) open source organizations.
In related developments, MongoDB failed to gain approval for the SSPL from the Open Source Initiative (OSI) in January 2019 and Redis introduced the Source Available License as a permissive open source license in February 2019. While these licensing disputes are still ongoing, here are three strategies that open source players can use to compete and win against hyperscale cloud providers in a crowded database market:
Launch and market the heck out of your database platform as a service
Gartner predicts that global SaaS revenues will touch nearly $100 billion in 2020, at a four-year compounded annual growth of 14%. There’s a strong appetite among enterprise buyers for truly multitenant, highly scalable and cost-effective dbPaaS.
Instead of letting cloud providers steal market share with their managed database products, open source vendors should deliver the most compelling managed database platform experience with strong data governance, robust security, continuous backups, and automated patching. Database vendors should build their offerings in a cloud-agnostic way for both hybrid and multi-cloud scenarios so that their dbPaaS can work well across on-prem workloads and different cloud providers.
Despite all the gloom and doom over cloud providers strip-mining open source jewels, MongoDB’s fully managed cloud database, Atlas registered a 400% annual growth and generated 34% of their 2018 revenues, grossing $100 million in annual recurring revenues. Other database vendors like Confluent, Elasticsearch, InfluxDB and Redis have also introduced database-as-a-service offerings to help customers manage production-ready and mission-critical workloads on their cloud service.
Offer more professional and managed services
Most enterprise customers want to focus more on their core business and invest less in either dedicated IT infrastructure or expensive DBAs for provisioning and maintaining databases. Database vendors should bring in their best solution consultants and implementation architects to deliver the right advice on moving on-prem data to a cloud service.
They should also supplement consulting services with recommended blueprints, developer-friendly documentation, robust APIs and automated migration tools. These providers should also build a service provider ecosystem that can share insights on which workloads to migrate, offer hand-holding during migration and ongoing services to optimise database health.
Enhance and maximise database performance
While cloud monitoring tools like Amazon CloudWatch, Azure Monitor and Google Stackdriver offer basic metrics for database monitoring, commercial database vendors have an unfair advantage when it comes to ensuring the availability and uptime of their managed database as a service. These vendors can deliver platform services that offer comprehensive monitoring and smart alerting as well as perform upgrades, backups and recovery, for higher availability, better maintenance and faster scaling.
Conclusion: It’s too early to declare winners
Veteran software industry executive and technology columnist, Matt Asay has closely reported on the widening mutual distrust between open source companies and cloud providers. Asay’s diagnosis is grim: “This conflict is made worse by the fact that AWS, Microsoft, and Google are so much better at turning software into the services that companies increasingly want…Or put even more bluntly: Cloud vendors are selling what enterprises actually want.”
While cloud providers have assembled a diverse array of managed database offerings, commercial open source companies have more than a fighting chance to turn the tables on their opponents. Instead of introducing restrictive licensing terms or blocking cloud providers from contributing code, database vendors should focus on delivering a superior and differentiated cloud service that becomes the gold standard for ease of operations, seamless deployment and increased productivity.
Interested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases? Attend the Cyber Security & Cloud Expo World Series with upcoming events in Silicon Valley, London and Amsterdam to learn more.
Why IT security solutions spending will reach $133.8 billion
Cybersecurity investment continues to be a top priority for most IT organizations. Worldwide spending on security-related hardware, software, and services is forecast to reach $103.1 billion in 2019 — that's an increase of 9.4 percent over 2018. The pace of growth will continue as industries invest heavily in IT security solutions to meet a wide range of cyber threats.
According to the latest market study by International Data Corporation (IDC), worldwide spending on IT security solutions will achieve a compound annual growth rate (CAGR) of 9.2 percent over the 2018-2022 forecast period and total $133.8 billion in 2022.
IT security market development
Three industries will spend the most on security solutions in 2019 — banking, discrete manufacturing, and federal or central government — will invest more than $30 billion combined. Three other industries (process manufacturing, professional services, and telecommunications) will each see spending greater than $6 billion this year.
The industries that will experience the fastest spending growth over the forecast period will be state or local government (11.9 percent CAGR), telecommunications (11.8 percent CAGR), and the resource industries (11.3 percent CAGR). This spending growth will make telecommunications the fourth largest industry for security spending in 2022 while state or local government will move into the sixth position ahead of professional services.
"When examining the largest and fastest growing segments for security, we see a mix of industries – such as banking and government – that are charged with guarding highly sensitive information in regulated environments. In addition, information-based organizations like professional services firms and telcos are ramping up spending, said Jessica Goepfert, program vice president at IDC.
Managed security services will be the largest technology category in 2019 with firms spending more than $21 billion for around-the-clock monitoring and management of security operations centers. Managed security services will also be the largest category of spending for each of the top five industries this year.
The second largest technology category in 2019 will be network security hardware, which includes unified threat management, firewalls, and intrusion detection and prevention technologies. The third and fourth largest investment categories will be integration services and endpoint security software.
The technology categories that will see the fastest spending growth over the forecast will be managed security services (14.2 percent CAGR), security analytics, intelligence, response and orchestration software (10.6 percent CAGR), and network security software (9.3 percent CAGR).
From a geographic perspective, the United States will be the single largest market for IT security solutions with spending forecast to reach $44.7 billion in 2019. Two industries – discrete manufacturing and the federal government – will account for nearly 20 percent of the U.S. total.
The second largest market will be China where security purchases by three industries — state or local government, telecommunications, and central government – will comprise 45 percent of the national total. Japan and the UK are the next two largest markets with security spending led by the consumer sector and the banking industry respectively.
Outlook for IT security application growth
Large and very large businesses will be responsible for roughly two-thirds of all IT security-related spending in 2019. These two segments will also see the strongest spending growth over the forecast with CAGRs of 11.1 percent for large businesses and 9.4 percent for very large businesses.
Medium and small businesses will spend nearly $26 billion combined on IT security solutions in 2019. Across the globe, consumers are forecast to spend nearly $5.7 billion on security-related products and services this year.
Interested in hearing industry leaders discuss subjects like this and sharing their experiences and use-cases? Attend the Cyber Security & Cloud Expo World Series with upcoming events in Silicon Valley, London and Amsterdam to learn more.
Slack gains boosted Microsoft Office 365 integrations
Slack has introduced a new suite of Microsoft Office 365 integrations, connecting the collaboration platform with many of Office’s features, such as email, calendar and OneDrive.
Although the ability to share files with cloud-based platforms such as Google Drive and Box has existed for a while within the Slack communication tool, its enhanced integration with OneDrive enables users to import and search for files stored in the cloud, directly from Slack.
If you want to share files stored in OneDrive with others using Slack, you can now just click the + icon, choose OneDrive and select the file you want to share. If you add the file to a message stream in a channel or direct chat, everyone can discuss it.
You can also preview Slack files stored in OneDrive, whether you want to view a presentation, Excel document or Word file without needing to download it. This means you can quickly check a spreadsheet, view changes in a presentation or approve a Word document with a single click.
For Outlook users, Slack has tagged on the ability to send or forward emails to a Slack channel. For example, if a customer or partner emails you, but you need a response from the appropriate team before replying, you can just forward the email to the Slack channel to get a collaborative response.
Slack also now integrates more closely with Outlook calendars. If you’re invited to an event, such as a meeting, it’ll be forwarded to your Slack stream, where you can instantly reply. You’ll also get reminders, can join Skype meetings if the meeting is virtual and if you’re in the meeting, your Slack availability will be updated as “in a meeting” so you’re not disturbed.
“By using apps to connect Outlook and OneDrive with Slack, repetitive tasks such as checking your calendar or sharing email attachments with a group can be done right from your workspace,” Slack said. “Each little improvement to these workflows adds up to a whole lot more time for you and your team to do your best work.”
Announcing @10ZiGTechnology to Exhibit at @CloudEXPO | @CitrixReady #ThinClient #ZeroClient #Cloud #Citrix #VDI #DataCenter
10ZiG Technology is a leading provider of endpoints for a Virtual Desktop Infrastructure environment. Our fast and reliable hardware is VMware, Citrix and Microsoft ready and designed to handle all ranges of usage – from task-based to sophisticated CAD/CAM users.
10ZiG prides itself in being one of the only companies whose sole focus is in Thin Clients and Zero Clients for VDI. This focus allows us to provide a truly unique level of personal service and customization that is a rare find in the industry. We offer a multitude of custom embedding options and hardware configurations to ensure our devices are tailor-made to fit seamlessly into the environments of our customers.
Android phones become Google’s most secure form of MFA
Google Cloud has revealed that Android devices can now be used as a Titan authentication key in what’s seen as a major push to protect user accounts from online scams.
Working much like Google’s Titan key, which is built in accordance with FIDO standards, your phone can now act as the most secure version of multi-factor authentication (MFA) yet.
Other MFA methods, such as confirmation texts and mobile apps, have come under scrutiny as they can still be exploited by phishers who can trick users into helping them access their accounts.
The key is able to keep a log of phishing websites that Google is aware of and, if you visit one, the security key built into your Android phone will block you from handing over login credentials to phishers.
Google calls the new security standard ‘phone-as-a-security-key’ (PaaSK); the phone connects to your device via the Google-built standard, which itself is built on top of Bluetooth to create a three-pronged layer of protection.
The security also works through proximity, and so long as your phone is connected to your device, say a laptop, then the device will recognise you as both the user attempting to log in and the owner of the account’s corresponding security key. Instead of waiting for a text, a security screen will automatically appear on your phone requiring you to either hold down a volume button if using a Google phone or press an on-screen button for any other Android device.
The advantage of this is that although attackers can get you to hand over your phone number to access an SMS-based 2FA protection barrier, an attacker would find it much harder to get their hands on your phone and stay in close proximity to your computer.
Google has said that only Android devices running version 7.0 or later will support the new PaaSK platform at launch, but it can be used on all major computer operating systems including Windows, MacOSX, and Chrome OS.
“We’re focussed on Android first, but it’s not out of the realms of possibility that in the future there will be something for iOS, at least for Google accounts,” said Sam Srinivas, product management director at Google Cloud.
You’ll be able to associate as many Google accounts with the PaaSK as you wish but the user must be logged into the correct key on the phone first before making the login attempt on a browser.
Although Google says it blocks 99.9% of all fraudulent log-in attempts on its users’ accounts, there is still a 0.1% issue regarding cases of phishing, keylogging and data breaches – cases where the attacker has the correct password, making it difficult to differentiate between a genuine and fraudulent attempt.
Google chose to implement FIDO in its most recent push against phishing attacks because out of all the other MFA methods, namely SMS/voice, backup code and authenticator apps, FIDO has proved the only phishing-resistant method.
According to Google’s own assessments, user accounts becomes 10x more vulnerable if credentials are used in a data breach, 40x more vulnerable when threatened by keylogging, and 500x more vulnerable if compromised by a phishing scam.
Google Cloud doubles down on security at Next
Google has announced 30 security features for its Google Cloud Platform (GCP) at Google Cloud Next 2019, building on a two-year-long commitment to making its platforms more robust.
Prior to today’s announcement, Google Cloud had invested heavily into its security systems, launching more than 70 products and services in 2018 and with it now adding to that tally.
The company split its announcements over three different sectors:
- Security of the cloud: referring to the infrastructure that keeps GCP secure such as datacentres, network cables and its Titan chip
- Security in the cloud: features that allow customers to build secure applications for their businesses in their cloud environment e.g. encryption key management
- Security services: direct security-as-a-service solutions that Google is starting to provide
Security of the cloud
“One of the things we deeply believe in at Google is that transparency breeds trust,” said Michael Aiello, product management director at Google Cloud, adding that Google wants to reduce the number of mechanisms that customers have to trust Google with.
Access Transparency has been in GCP for some time now but it’s now released in beta for G-suite. This involves providing the customer with near real-time logs whenever a Google engineer authorises access to their environment to correct an issue they reported. Previously, a Google engineer, in this case, could self-authorise access to the environment but now they must get authorisation from the customer.
Security in the cloud
According to Gartner, 95% of all cloud security breaches are caused by customer misconfigurations such as firewalls with misconfigured buckets. Just last week a massive data trove was found to be left exposed because of an improperly configured AWS S3 bucket. The WWE, Accenture and even the NSA have fallen victim to this type of security incident and Google has recognised that.
Google’s Cloud Security Command Centre will now go to general availability (GA) after a successful beta phase. It’s a single app that provides a complete overview of your organisation’s cloud resources and the security threats that are presented to them.
Using machine learning, the app learns all the different access attempts over time and uses that intelligence to grant permissions and make smart recommendations on cloud configurations to increase overall security.
“It will give you a full rundown of all of your assets and from there you can apply security analytics and threat intelligence to best protect your GCP environment,” said Jess Leroy, product management director at Google Cloud.
After some customer requests from the beta phase, the command centre will now feature more export options to Docs and Sheets and even a custom export option for Splunk Web. New threat intelligence integrations with third-parties such as Tenable and McAfee will also be supported in the GA release.
G-suite also gets a security makeover with advanced phishing and malware protection – something Google dedicated lots of resources to. Among other things such as new controls being made available to admins against phishing attacks such as domain spoofing, Gmail will be getting a sandbox mode.
The sandbox mode aims to tackle the threat of malware spread over email and because the only way to see what a malicious program does is to run it. As such, virtual environments will now be embedded into Gmail so you can know with certainty what an executable program does before downloading it.
Security services
Aside from security features added to GCP specifically for GCP customers, Google announced a set of services that can be used on other platforms such as AWS or Azure as well as its own cloud platform.
One of the most common ways that companies will discover threats is by scanning through all of the logs in their environments. Event Threat Detection is a service that scans logs for suspicious activity and can consolidate logs from private clouds, traditional datacentres, even from other cloud platforms into GCP.
After the logs have been consolidated, they will be scanned and fed through the command centre to find vulnerabilities and users can then remediate them and even manipulate the data through BigQuery.
Security has been quite the theme here at Next – Google also announced that Android phones can now become a user’s Titan key, the only phish-resistant method of multi-factor authentication.
CFP Deadline For @DXWorldEXPO Silicon Valley | #HybridCloud #CIO #Blockchain #AI #AIOps #MachineLearning #DigitalTransformation
Now is the time for a truly global DX event, to bring together the leading minds from the technology world in a conversation about Digital Transformation. DX encompasses the continuing technology revolution, and is addressing society’s most important issues throughout the entire $78 trillion 21st-century global economy.
DXWorldEXPO® has organized these issues along 10 tracks, 22 keynotes and general sessions, and a faculty of 222 of the world’s top speakers.
Google Cloud Next: Cloud Run stateless cloud environment enters beta stage
Google Cloud’s serverless compute platform Cloud Run has entered a beta phase and aims to prevent the vendor lock-in problem faced by enterprises looking to go serverless.
Revealed at Google Cloud Next 2019 in San Francisco, the Cloud Run environment is stateless, which will tackle the issue that developers face when making the choice between the ease of serverless or the flexibility of containers.
With a serverless environment, developers need not worry about configuring the underlying infrastructure and how much resources they will need to power their applications.
As such, with a stateless environment, enterprises can commit to a vendor for some of their serverless products, let’s say Dell, but not have to worry about being restricted only to the vendor’s software partners.
Cloud Run is fully serverless and automatically scales up or down with your website’s traffic within seconds, meaning that you’ll only pay for the resources that you need.
“What’s beautiful about the system is that you’re paying by the hundred-millisecond for what you use only and it scales up horizontally to many, many thousands of cores in just a few seconds,” said Oren Teich, director product management at Google Cloud.
It’s already and being deployed by some of the world’s biggest firms. Veolia, the waste management giant praises the ease and cost-effectiveness of the new environment.
“Cloud Run removes the barriers of managed platforms by giving us the freedom to run our custom workloads at lower cost on a fast, scalable, and fully managed infrastructure,” said Hervé Dumas, group CTO at Veolia. “Our development team benefits from a great developer experience without limits and without having to worry about anything.”
The Cloud Run environment can be used on its own or integrated with your company’s existing Kubernetes cluster; merging the two will also offer you some specific enhancements to your stack.
Using Cloud Run on Kubernetes grants access to Google’s other cloud products such as Custom Machine Types on its Compute Engine networks, which provides users with the ability to create scalable virtual machines tailored for each process that are configurable for optimal pricing.
Cloud Run on Kubernetes, the industry standard for container management, also allows you to run side-by-side with other networks deployed in the same cluster. Airbus Aerial, the aerospace company’s satellite imagery arm is already using Cloud Run on Kubernetes to process and stream aerial images.
“With Cloud Run on GKE, we are able to run lots of compute operations for processing and streaming cloud-optimized aerial images into web maps without worrying about library dependencies, auto-scaling or latency issues,” said Madhav Desetty, chief software architect at Airbus Aerial.
Cloud Run is also based on Google’s Knative open API which lets users run workloads on Google Cloud Platform, on a Google Kubernetes Engine (GKE) cluster or on a company’s own self-managed Kubernetes cluster. The underlying Knative API makes it easier for businesses to start on Cloud Run and then move to Cloud Run on GKE later on.
There are some operational constraints to Cloud Run which Teich detailed in a press conference. It runs at a maximum of 1Gb memory size instance, you get a single core per instance so it’s horizontal scale and not vertical scale. Each process must also respond to an HTTP 1.1 request in a maximum time of 15 minutes.
SUSE to Present at @KubeSUMMIT | @SUSE #CloudNative #DevOps #AIOps #Serverless #OpenStack #Docker #Kubernetes
Take advantage of autoscaling, and high availability for Kubernetes with no worry about infrastructure. Be the Rockstar and avoid all the hurdles of deploying Kubernetes. So Why not take Heat and automate the setup of your Kubernetes cluster? Why not give project owners a Heat Stack to deploy Kubernetes whenever they want to?
Hoping to share how anyone can use Heat to deploy Kubernetes on OpenStack and customize to their liking.
This is a tried and true method that I’ve used on my OpenStack clusters and I will share the benefits, bumps along the way and the lessons learned.