Archivo de la etiqueta: security

Kii and KDDI say their joint platform will make IoT safe on cloud

Secure cloudJapanese telco KDDI is working with Internet of Things (IoT) cloud platform provider Kii to create a risk averse system in which enterprises can develop mobile apps.

The KDDI cloud platform service (KCPS) is described as a mobile back end as a service (mBaaS) offering that uses Kii’s software to create mobile and IoT apps on a private network. The two companies have worked together on ways to apply cloud disciplines for efficient sharing of resources, contained within the confines on an Intranet environment. The object of the collaboration is to allow companies to develop machine to machine systems, without exposing them to the public cloud while they are in development.

According to KDDI, the KCPS uses the telco’s Wide Area Virtual Switch to integrate a number of different virtual network layers with Kii’s software. Together they create a new level of fast connections across the Intranet. KCPS also provides a service environment for intranet-conscious customers who need high standards of security and enterprise functions without resorting to the public Internet, according to the vendor.

KDDI claims this is the first instance in which both Intranet and Internet services can work seamlessly with any mobile application developed on the KCPS platform.

KDDI’s application development support will allow developers to build better quality, lower priced applications in a short period of time, it claims. The platform is designed to help developers manage application development, devices and data, while providing essential features like push notifications and geo-location information. KCPS should be compatible with mobile apps on Android and iOS, according to KDDI.

“As the IoT gains mass acceptance, we see tremendous value helping mobile app developers get more IoT devices into the hands of consumers,” said Kii CEO Masanari Arai, “our collaboration will use the cloud to build the backend support of these apps in Japan.”

Cloud industry shaken by European Safe Harbour ruling

Europe US court of justiceThe Court of Justice of the European Union has ruled the Safe Harbour agreement between Europe and the US, which provides blanket permission for data transfer between the two, is invalid.

Companies looking to move data from Europe to the US will now need to negotiate specific rules of engagement with each country, which is likely to have a significant impact on all businesses, but especially those heavily reliant on the cloud.

The ruling came about after Austrian privacy campaigner Max Schrems asked to find out what data Facebook was passing on to US intelligence agencies in the wake of the Snowden revelations. When his request was declined on the grounds that the safe harbour agreement guaranteed his protection he contested the decision and it was referred to the Court of Justice.

This decision had been anticipated, and on top of any legal contingencies already made large players such as Facebook, Google and Amazon are offered some protection by the fact that they have datacentres within Europe. However the legal and logistical strain will be felt by all, especially smaller companies that rely on US-based cloud players.

“The ability to transfer data easily and securely between Europe and the US is critical for businesses in our modern data-driven digital economy,” said Matthew Fell, CBI Director for Competitive Markets. “Businesses will want to see clarity on the immediate implications of the ECJ’s decision, together with fast action from the Commission to agree a new framework. Getting this right will be important to the future of Europe’s digital agenda, as well as doing business with our largest trading partner.”

“The ruling invalidating Safe Harbour is seismic,” said Andy Hardy, EMEA MD at Code42, which recently secured $85 million in Series B funding. “This decision will affect big businesses as well as small ones. But it need not be the end of business as we know it, in terms of data handling. What businesses need to do now is safeguard data. They need to find solutions that keep their, and their customer’s, data private – even when backed up into public cloud.”

“Symantec respects the decision of the EU Court of Justice,” said Ilias Chantzos, Senior Director of Government Affairs EMEA at Symantec. “However, we encourage further discussion in order to create a strengthened agreement with the safeguards expected by the EU Court of Justice. We believe that the recent ruling will create considerable disruption and uncertainty for those companies that have relied solely on Safe Harbour as a means of transferring data to the United States.”

“The issues are highly complex, and there are real tensions between the need for international trade, and ensuring European citizen data is treated safely and in accordance with data protection law,” said Nicky Stewart, commercial director of Skyscape Cloud Services. “We would urge potential cloud consumers not to use this ruling as a reason not to adopt cloud. There are very many European cloud providers which operate solely within the bounds of the European Union, or even within a single jurisdiction within Europe, therefore the complex challenges of the Safe Harbor agreement simply don’t apply.”

These were just some of the views offered to BCN as soon as the ruling was announced and the public hand-wringing is likely to continue for some time. From a business cloud perspective one man’s problem is another’s opportunity and companies will be queuing up to offer localised cloud services, encryption solutions, etc. In announcing a couple of new European datacentres today Netsuite was already making reference to the ruling. This seems like a positive step for privacy but only time will tell what it means for the cloud industry.

Rackspace launches managed security and compliance service for enterprise cloud clients

Security concept with padlock icon on digital screenRackspace has announced new managed security and compliance assistance services to protect businesses and mitigate the risk of cyber threats. These services will give Rackspace clients ‘holistic’ coverage across cover complex, multi-cloud environments, it claims.

The service will provide consultation and tailored security using Rackspace’s inhouse expertise. It can both improve security while cutting the cost of vigilance, Rackspace claimed.

The Rackspace Managed Security offering is to be backed by round the clock support from the Customer Security Operations Center (CSOC) at Rackspace headquarters and will open in October. The service comprises four elements: host and network protection, vulnerability management, threat intelligence and compliance assistance.

Host and Network Protection will protect against zero-day and non-malware attacks as well as traditional compromise tactics. Security Analytics uses a security information and event management (SIEM) system paired with big data analytics to collect and analyse security data from the customer’s environment. As part of its Vulnerability Management service Rackspace will scan its clients’ environments and tailor its responses to estimated threats. Meanwhile, its Threat Intelligence will use fuse information from 20 feeds with Rackspace’s own internal data to constantly redraw the changing threat landscape.

All this information will help clients meet their governance objectives, as part of Rackspace’s Compliance Assistance service, which offers detailed proof of configuration hardening and monitoring, patch monitoring and user observance, the service provider said.

This information, in tandem with detail about file integrity, will help cloud service managers and CIOs to keep on top of their mounting compliance challenge, claimed Brian Kelly, chief security officer at Rackspace.

“Cyber-attacks are the new normal for companies,” said Kelly. It will be a lot cheaper and quicker to use Rackspace to manage cloud services, said Kelly. “We have 16 years of first-hand knowledge managing IT infrastructure and direct experience with today’s complex threats.”

Hitachi Data Systems unveils new automated IoT policing system

A new IoT system can predict crime by reading social media and analysing the public’s movements, claims Hitachi data Systems (HDS).

Hybrid cloud systems designed by HDS are to offer new automated policing systems, including predictive crime analytics and video management systems. The new public safety technologies were unveiled yesterday by HDS at the ASIS International Annual Seminar and Exhibits in Anaheim, California.

The new Hitachi Visualization Suite (HVS) (version 4.5) now includes Predictive Crime Analytics (PCA) and version 2.0 of the Video Management Platform (VMP).

The PCA predicts crime by analysing live social media and Internet data feeds to gather intelligent insights which enable the users of the system to make ‘highly accurate crime predictions’, claims HDS. Both social media and video camera data will be analysed for both historical crime and to predict potential incidents.

The HVS is a hybrid cloud-based platform that integrates disparate data and video assets from public safety systems, such as computer-aided emergency services dispatch, number plate readers and gunshot sensors. The real time info is then presented geospatially to monitors at law enforcement agencies in order to improve intelligence, support their investigations and make policing more efficient, says HDS. The geospatial visualizations will also provide better historical crime data, by presenting information on crime in several forms, including heat maps.

Blending real-time event data from public safety systems with historical and contextual crime data allows agencies to conduct more thorough analysis, using spatial and temporal prediction algorithms, that could help solve many hitherto unsolvable crimes. It could also provide underlying risk factors that generate or mitigate crime, says HDS.

The system uses natural language processing for topic intensity modelling using social media networks which, HDS claims, will deliver highly accurate crime predictions.

The systems will ultimately create faster police response times when situations develop, according to Mark Jules, HDS’s VP of Public Safety and Data Visualization. “Today, we are empowering them with the ability to take a proactive approach to crime and terrorism,” said Jules, “Public safety is a fundamental pillar of our vision for smart cities and societies.”

Imperva Inc.’s New Senior Vice President of Cloud Services

Imperva Inc., a company dedicated to protecting critical data and applications throughout the cloud, has recently announced that Meg Bear will become the company’s Senior Vice President of Cloud Services. Bear is responsible for increasing the company’s range of cloud services on an international level. In general, Bear is very qualified for this position. She has over twenty years of experience in a multitude of aspects within the software business. She also holds eleven patents for innovations in data management, social business, recruitment and talent management. Bear is a pivotal figure in the transition to cloud based business models. Bear was previously the Group Vice President for Social Cloud at Oracle responsible for delivering an integrated global social suite and held many other leadership roles at Oracle, including Vice President of Human Capital Management (HCM) Development and Senior Director of Development for Oracle PeopleSoft.

meg bear

“Hiring Meg is one more example of our continued investment in our rapidly growing cloud business, and we are thrilled to bring her on board,” said Anthony Bettencourt. “With the 98% year-over-year increase in subscription revenue reported in our Q2 earnings, we are well positioned with Meg’s experience and leadership to maintain momentum and take advantage of mounting cloud opportunities, adoption rates, and technological innovations.”

“Customers today need more than traditional endpoint and network security solutions that clearly don’t go far enough, given recent high-profile data breaches,” said Bear. “The cloud is an engine of innovation for many companies, and that requires new views on security. I look forward to working with the world class Imperva cloud teams to address those challenges, all with the aim of helping customers protect their business critical data and apps.”

In addition to all previously mentioned qualifications, she also is an Advisory Board Member at Unitive and Brand Amper, and previously served as Advisory Board Member at Storyvite. She has held a plethora of advisory roles with many different organizations, such as Watermark.  Bear graduated with a Degree in Economics and Entrepreneurship from the University of Arizona. Clearly, Bear has a lot to offer to Imperva, the leading provider of cyber security solutions in a business setting.

The post Imperva Inc.’s New Senior Vice President of Cloud Services appeared first on Cloud News Daily.

Cloudera announces tighter security measures for Hadoop

Cloud securityCloudera has announced a new open source project that aims to use real-time analytical applications in Hadoop and an open source security layer for unified access control enforcement.

Kudu, an in-memory store for Hadoop, aims to give developers more choice and stop them from having their options limited. Currently developers must choose between fast analytics with HDFS or updating data with HBase. Combining the two, according to Cloudera, can be potentially fatal for any developers that try, since the systems are both highly complex.

Cloudera says Kudu eliminates the complexities involved in processes like time series analysis, machine data analytics and online reporting. It does this by supporting high-performance sequential and random reads and writes, enabling fast analytics on changing data.

Cloudera co-authored Kudu with Intel, which helped it make better use of in-memory hardware and Intel’s 3D XPoint technology. Other contributors included Xiaomi, AtScale, Splice Machine and Zoomdata.

“Our infrastructure team has been working with Cloudera to develop Kudu, taking advantage of its unique ability to support columnar scans and fast inserts and updates to continue to expand our Hadoop ecosystem footprint,” Baoqiu Cui, chief architect at smartphone developer Xiaomi, told CIO magazine. “Using Kudu, alongside interactive SQL tools like Impala, has allowed us to build a next-generation data analytics platform for real-time analytics and online reporting.”

Meanwhile a new core security for Hadoop has been launched. RecordService aims to provide unified access control enforcement for Hadoop by enforcing role based access controls. It acts as a new layer that sits between Hadoop’s storage and computing engines and aims to consistently enforce the role-based access controls defined by Sentry. RecordService also provides dynamic data masking across Hadoop, protecting sensitive data as it is accessed.

“Security is a critical part of Hadoop, but for it to evolve the security needs to become universal across the platform. With RecordService, the Hadoop community fulfils the vision of unified fine-grained access controls for every Hadoop access path,” said Mike Olson, co-founder and chief strategy officer at Cloudera.

Internap and Akami Pair Up

Recently, Internap Corporation, which provides high performance Internet infrastructure services, and Akamai Technologies, Inc., the current global leader in Content Delivery Network services, have announced that they are teaming to provide their customers with Internap’s cloud, data center, and network services in conjunction with Akamai’s cloud security and data protection services. Underneath this alliance, Internap shall offer the Akami Cloud Security solutions to industries that require infrastructure availability, reliability, and scalability, such as the healthcare industry. The combination of these two companies will result in optimal performance for customers.

“Organizations that demand optimal web and application performance simply can’t afford the potentially business-impacting outages and downtime associated with DDoS attacks,” said Michael Ruffolo, Internap’s president and CEO. “We believe this alliance is a logical and powerful combination that uniquely addresses this problem for our joint customers. Akamai will be our sole DDoS mitigation provider, bringing market-leading security capabilities to Internap’s state-of-the-art data center facilities and to our expertise in delivering high-performance cloud, colocation and networking services.”

Internap-logo-22B0B3C6BC-seeklogo.com

Akamai works to protect websites and other internet based applications from threats such as data theft. The Akamai Cloud Security solutions, constructed on the Akamai Intelligent Platform, are designed to protect against the threat of web application attacks while still providing maximum performance. In addition, the capability of adapting to shifting tactics and attack vectors is offered.

“We view the combination of Internap’s high-performance Internet infrastructure services and Akamai’s cloud security solutions as a natural extension to what has been a very synergistic alliance between our two companies,” said Brad Rinklin, Chief Marketing Officer and SVP – Global Alliances, Akamai. “Faced with an ever-changing threat landscape, organizations require comprehensive security solutions that address many different protection scenarios. These include securing mission?critical Web properties and applications from attack, as well as protecting enterprise IP applications across a data center. With this expanded alliance, Internap and Akamai are providing joint customers with both high-performing cloud and security capabilities.”

The post Internap and Akami Pair Up appeared first on Cloud News Daily.

Cloud security start up Cloudflare gets $110 million in venture funding

Secure cloudGoogle, Microsoft and chip maker Qualcomm are among the investors to collectively stake $110 million in networking and cyber security start up CloudFlare, according to a report in Fortune.

Cloudflare offers services that speed up cloud systems and web sites while beefing up security. Its main market proposition is to speed up the functioning of any services used by enterprises at the edge of their networks. By doing so it provides a cheaper alternative to the traditional model of on-premise appliances.

Cloudflare claims enterprises can quickly set up cloud-based firewall, load balancing, WAN optimization, distributed denial of service (DDoS) mitigation, content delivery and domain name services services worldwide without needing any hardware. It claims that in one day it saved Chinese users more than 243 years of time that would have been collectively spent waiting for web content to load.

Last week Cloudflare finalized a joint venture with Chinese Internet giant Baidu that allows both US-based companies and Chinese-based companies to use CloudFlare’s website performance service while adhering to Chinese data laws.

Although CloudFlare maintains no physical operations in China, it has worked with Baidu to set up technology within Baidu’s facilities that mimic CloudFlare’s services elsewhere, Prince said.

The funding round was led by Fidelity Investments with Google Capital, Microsoft, Baidu and Qualcomm Ventures, the investment arm of Qualcomm all contributing funds. CloudFlare now has $182 million in total funding.

Matthew Prince, CEO of the start up, said Cloudflare didn’t need the funding as much as it needed the credibility that comes with top brand association. The confidence that comes with the backing of Google and Microsoft could convince nervous buyers that this is a solid investment when the company prepares itself for an initial public offering, it was reported. However, the IPO is unlikely to happen this year, said Prince, and he hinted that it would come no earlier than 2017.

IBM launches Cloud Security Enforcer to counter employee data leakage failures

Security concept with padlock icon on digital screenIBM has created a Cloud Security Enforcer service to give companies a more commanding view of all third-party cloud apps used by their employees and new powers to secure them. The Enforcer aims to give companies more control over granting access to corporate data and applications.

Most companies can only see a fraction of the cloud applications used by their workforce, according to IBM’s research. An Ipsos poll, conducted on behalf of IBM in July, found that one-third of employees at Fortune 1000 companies are sharing and uploading corporate data on third-party cloud apps. These employees increasingly engage in risky practices on these tools, such as signing in with their personal email addresses, using weak passwords or re-using corporate log-in credentials, says IBM.

The cloud’s productivity dividend for companies is being undermined by the loss of control of corporate data and the lack of employee protection, it says. The Millennial generation (those born between 1982 and 2002) are the worst offenders and the biggest users of cloud apps, according to IBM’s study. By 2020 half the employees at Fortune 1000 companies will be millennials and of these 51 per cent use cloud services at work. One in four employees links these apps to his or her corporate log-in and password, leaving loopholes through which hackers can gain access to company networks.

Rogue activities on unsanctioned apps, known as ‘Shadow IT’, lead to a loss of control that IBM’s new cloud-based tool combats by scanning corporate networks, finding the apps that employees are using and providing a more secure way to access them. The system was built in partnership with file sharing app maker Box, which aims to strengthen the security of files shared over mobile devices and the web. IBM has also built secure connectors into Box’s file-sharing cloud app for Cloud Security Enforcer, as well as Microsoft Office 365, Google Apps and Salesforce with more apps connectors to be added to its catalogue.

The Cloud Enforcer users deep threat analytics from IBM X-Force Exchange, IBM’s global threat intelligence network, which is manned by a global network of security analysts which monitors the internet for malicious activity and analyses 20 billion global security events daily.

How IoT Security could change infrastructure forever

CybersecurityOn September 22nd and 23rd, the first-ever dedicated IoT Security conference and exhibition will take place in Boston.

While at first glance this may appear to concern a specific and rather specialized area, the relationship of the Internet of Things to the broad issue of human security may well prove much more far-reaching and fundamental.

After all, the development of the Internet itself was driven by a Cold War desire to create resilient computer networks that could withstand a nuclear attack. This threat inspired a whole new architecture for sharing and protecting information – one that was intentionally decentralized.

History suggests that precaution can be a key driver of technological innovation. In changing things to protect them, we often open up unforeseen new opportunities.

Which is why, if we return to 2015, there is something fascinating in seeing the same decentralized architectures applied to real-world infrastructures in the name of collective safety.

“When you apply this kind of Internet-type architecture to core infrastructure — whether it’s water or energy or transportation –  these systems start looking a lot more like the Internet,” says John Miri, Chief Administrative Officer at the Lower Colorado River Authority (LRCA) and a speaker at this month’s Boston event. “You start to see water systems, flood data systems and, hopefully, electric grids that are less centralized, more resilient and more difficult to disrupt.”

The LCRA is an 80-year-old institution with roots in the Great Depression, entrusted with providing reliable water, flood protection and electricity to Central Texas and beyond. The areas LCRA serves covers a number of the fastest growing cities in the United States, meaning LCRA faces some pretty substantial demands on its infrastructure.

“Providing the water and power to support growing communities and a growing business and industrial base is no small task,” Miri says. Indeed, LCRA has  broken ground on a quarter of a billion dollar new reservoir, the region’s first new water supply in decades.

Many of these additional demands make  safety and security more important than ever.

“LCRA is now the second largest electric transmission utility in Texas. Our high tension transmission lines go across a large portion of the state. Protecting the electric grid is a pretty hot topic,” Miri says.

These hypothetical threats encompass what Miri calls “bad actors,”  but also less hypothetical threats to the infrastructure.

“When you have a flood, we may have to intentionally shut down electric substations. Everyone knows electricity and water don’t mix – but even having the situational awareness to know that water is approaching a substation is very important to us in keeping the lights on. Using these kinds of smart networks to get a better picture of the threats and dangers to the power grid helps us protect it rather than just saying ‘build more,’” Miri says.

Similarly, a vast number of sensors throughout its Hydromet network enable LCRA to better monitor water levels – and to effectively manage floods.

“By adopting a new, more open, shared technology approach, we could expand the infrastructure we have for flood data collection at a 90% lower cost than if we had done it a traditional way. The technology  actually opens up our infrastructure to a very wide region that never considered it before. We can offer a level of flood monitoring across a wider region and  extend it rural and agricultural communities and other areas that might not have the resources to gain access to this technology.”

Looking ahead, Miri says, there are new opportunities to apply this decentralized, Internet-style architecture to other projects.

“I think when you look forward 10, 15 or 20 years, the whole infrastructure may work differently. It opens up new possibilities and business models that we didn’t have before. For instance, Texas is on the coast. As with any coastal area, we spend time thinking about desalination. Some of the work we’ve been doing on the Internet of Things  is making people think, maybe we don’t need a couple of giant desalination plants – which has been the approach in Australia and Israel – but a number of smaller plants that are networked together, and share the water more efficiently. In the longer term, IoT may actually change the infrastructure itself, which would be very exciting.”

It could be interesting to one day look back at this month’s inaugural IoT Security event and see how many of the topics discussed went on to fundamentally evolve and affect their wider respective domains.