5 cloud security trends to watch in 2019

ALISON DENISCO RAYOME | December 11, 2018

article image
The majority of enterprises have moved critical workloads to the cloud, with providers like Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform vying for market share. However, many businesses remain unclear on which parties are responsible for which elements of cloud security, according to a Tuesday report from Palo Alto Networks Unit 42 threat research team. The Shared Responsibility Model of cloud security designates that cloud service providers are responsible for protecting the infrastructure that runs all the services offered in the cloud, the report noted. Meanwhile, the cloud customer is responsible for monitoring risky configurations, anomalous user activities, suspicious network traffic, and host vulnerabilities. The year 2018 saw multiple high-profile breaches involving public cloud environments. However, none of these breaches were due to negligence on the part of the cloud service providers, the report noted.

Spotlight

AppSense

AppSense is the leading provider of user virtualization solutions for the secure endpoint. The technology allows IT to secure and simplify workspace control at scale across physical, virtual and cloud-delivered desktops. AppSense solutions have been deployed by 3,600 enterprises worldwide to 9 million endpoints. The company is a subsidiary of LANDESK and has with offices around the world. For more information please visit www.appsense.com.

OTHER ARTICLES

Best Practices for vSphere 6.7 Tagging

Article | February 13, 2020

vSphere Tags were introduced in version 5.1 as a way to organize inventory objects such as VMs, Hosts, Datastores, etc., a much-needed feature for helping search for or group objects within vSphere. A Tag is basically a label that can be applied to vSphere inventory objects. When an administrator creates a tag, it is then assigned to a tag category. Categories allow the grouping of related tags. When a Category is created, you can specify associations of object types (such as; VM or Datastore) as well as whether more than one tag in a category can be applied to an object (ex; One Tag or Many Tags).

Read More

Inferencing at the Edge with HyperFlex

Article | March 3, 2020

While at this year’s Cisco Live! Barcelona, our staff interviewed many of the amazing thought leaders who joined us to demonstrate their work with Cisco. We’ll be sharing those interviews, and short blog post summaries, for the next few weeks.The first interview is about how Vispera, which makes visual intelligence solutions for retail, works with Cisco on inferencing at the edge with HyperFlex. As Erdem Yoruk, chief scientist at Vispera, explained, the company uses image recognition technology for its shelf monitoring and inventory management solution, Shelfsight. Cisco HyperFlex, together with Intel’s Xeon Scalable Processors, provides the compute power needed to perform inferencing at multiple retail locations. As they stood in front shelves with cereal and other products, Yoruk explained how Shelfsight, the latest product from Vispera, uses a camera solution for real-time shelf monitoring and in-store management. Running on Cisco HyperFlex Edge servers powered by scalable Intel Xeon processors, Shelfsight takes measurements from the shelves every 10 minutes. It recognizes every product visible on the shelf down to a granular level, generating KPI metrics and notifying store personnel of any non-compliance issues so that they can take immediate action and replenish the shelves as necessary.

Read More

Fortinet Forges FortiAI Security Service

Article | February 25, 2020

Fortinet lent overworked and understaffed security operations (SecOPs) teams a helping hand today with the launch of FortiAI, an artificial intelligence (AI)-powered threat detection and remediation service.“FortiAI is designed to optimize security operations, enhance the productivity of the security analysts, and to reduce the false-positive rate,” said Jonathan Nguyen-Duy, VP of Fortinet’s global field CISO team, in an interview with SDxCentral.To do this, FortiAI utilizes a “self-learning” deep neural network (DNN) to automate rote security tasks to accelerate threat detection and remediation.“The practical reality is the complexity is expanding beyond the ability of conventional security operations to keep pace and so artificial intelligence and its subsets in machine learning and deep learning are all designed to automate those more mundane tasks,” Nguyen-Duy explained.

Read More

Successful Cloud Migrations Made Easy

Article | March 16, 2020

TransAlta, an energy producer with gas, hydro, solar, wind, and coal facilities across the U.S., Canada, and Australia, leveraged data virtualization with the company’s cloud strategy. A few years ago, TransAlta decided to move 100% of its data to the cloud. The company centralized its data to reduce infrastructure, simplify data access, and scale storage. The biggest hidden challenge many companies face when trying to be completely cloud based is connecting the applications they accumulate over time. Whether they were developed and configured for on-premises environments, have specific security requirements, or are too old and complex to connect to data in the cloud, this presents a challenge.

Read More

Spotlight

AppSense

AppSense is the leading provider of user virtualization solutions for the secure endpoint. The technology allows IT to secure and simplify workspace control at scale across physical, virtual and cloud-delivered desktops. AppSense solutions have been deployed by 3,600 enterprises worldwide to 9 million endpoints. The company is a subsidiary of LANDESK and has with offices around the world. For more information please visit www.appsense.com.

Events