How To Analyze Text with Amazon Comprehend

virtualizationreview | July 15, 2019

You can perform real-time analysis on text to derive customer sentiment, pick out key phrases that get used often and determine which entities (people, places and so on) are being discussed. If a business is to be successful, one of the things that it absolutely must do is make itself aware of what's being said about it online. User-generated content such as customer reviews, social media posts, and YouTube videos can make or break a company. I recently stumbled upon an Amazon Web Services (AWS) natural language processing service that seems to be designed to help companies address this very challenge. It's called Amazon Comprehend. The basic idea behind how it works is that the engine can analyze large volumes of text, derive customer sentiment, pick out key phrases that get used often and determine which entities (people, places and so on) are being discussed.

Spotlight

VMware View 5 leverages many of the improvements present in vSphere 5 from a virtual machine perspective. The central focus on View 5 appears to be in improving the end user’s experience to near-native, allowing for greater flexibility in both how the virtual desktops are presented and in the actual capabilities within these desktops. These changes include enhancing the performance of the PC over IP protocol (PCoIP) to connect users to their virtual desktops, allowing much greater optimization on throttling and caching than there was in the previous version. VMware states that these changes alone can result in up to 75% bandwidth reduction over the previous version. There are also numerous improvements to how virtual desktops are managed and provisioned.

Spotlight

VMware View 5 leverages many of the improvements present in vSphere 5 from a virtual machine perspective. The central focus on View 5 appears to be in improving the end user’s experience to near-native, allowing for greater flexibility in both how the virtual desktops are presented and in the actual capabilities within these desktops. These changes include enhancing the performance of the PC over IP protocol (PCoIP) to connect users to their virtual desktops, allowing much greater optimization on throttling and caching than there was in the previous version. VMware states that these changes alone can result in up to 75% bandwidth reduction over the previous version. There are also numerous improvements to how virtual desktops are managed and provisioned.

Related News

VIRTUAL DESKTOP TOOLS

StorMagic SvSAN Validated with HPE ProLiant MicroServer Platform

StorMagic | November 16, 2022

StorMagic, solving the world’s edge data problems, today announced that StorMagic SvSAN has been validated with Hewlett Packard Enterprise (HPE) ProLiant MicroServer Gen10 Plus platform. The combination of HPE’s most compact ProLiant server and StorMagic’s hyperconverged software brings simplicity of management and 100 percent uptime to any application, even in the smallest edge locations. “The HPE ProLiant MicroServer Gen10 Plus server delivers a powerful platform in a tiny form factor that is perfect for customers looking to save space at small sites,” said Maciek Szczesniak, Vice President and General Manager of SMB & Mid-Market at HPE. “StorMagic SvSAN on HPE servers delivers a robust, powerful all-in-one architecture for edge computing environments, with no server rack required. Solutions like this will help us deliver on our SMB strategy to deliver simplified offerings to fuel business growth.” StorMagic SvSAN runs on any hypervisor as a guest virtual machine to enable complete, highly-available shared storage and virtualization with only two MicroServer servers per site. Its shared storage executes active-active synchronous mirroring to create a copy of data on both servers, eliminating downtime. HPE ProLiant MicroServer is easy to install, scale and manage. The solution delivers the reliability demanded by edge computing customers, has low power requirements and provides users with key features like high availability clustering, rolling software upgrades and data security, all in a compact unit. “StorMagic is thrilled to further expand its partnership with HPE through the validation of their most compact ProLiant server ever, Our joint customers will benefit from this footprint reduction at their small sites as well as the 100 percent uptime delivered by SvSAN.” Brian Grainger, president of StorMagic Inc. and CRO, StorMagic StorMagic is an active member of the HPE Complete Partner Program and the HPE Partner Ready for Technology Partner Program. HPE ProLiant MicroServer and HPE Edgeline systems validated with SvSAN are available today from HPE or StorMagic’s global network of reseller partners. About StorMagic StorMagic is solving the world’s edge data problems. We help organizations store, protect and use their data at and from the edge. StorMagic’s Forever Data solutions ensure data is always protected and available, no matter the type or location, to provide value anytime, anywhere. StorMagic’s storage, surveillance and security products are flexible, robust, easy to use and cost-effective, without sacrificing enterprise-class features, for organizations with one to thousands of sites.

Read More

VIRTUAL DESKTOP STRATEGIES

Castle Shield Holdings, LLC Updates the Post-Quantum Cryptography (PQC) Algorithms for Its Data-in-Motion Aeolus VPN Solution

Castle Shield Holdings, | October 14, 2022

Castle Shield Holdings, LLC., a leader in Zero Trust and cybersecurity solutions, today announced that its Aeolus VPN solution now supports additional post-quantum cryptography (PQC) algorithms selected by the National Institute of Standards and Technology (NIST). Last year, prior to the conclusion of the third round of the NIST PQC Standardization, we announced the successful integration of the Saber algorithm into Aeolus VPN. Reference our October 11, 2021, press release. NIST has now selected two primary PQC algorithms for most use cases: CRYSTALS-KYBER and CRYSTALS-Dilithium. In addition, the signature schemes FALCON and SPHINCS+ were standardized as well. Kyber and Dilithium were both selected for their strong security and excellent performance, and NIST expects them to work well in most applications. Therefore, we have integrated Kyber (i.e., Kyber1024) and Dilithium (i.e., Dilithium5) algorithms into Aeolus VPN as well. Aeolus VPN protects data between two or more network points. It offers a streamlined approach to privacy which results in more stability and lower latency that is a perfect addition to enterprise data-in-motion security for both classic and post-quantum computing environments. Aeolus VPN offers point-to-point asymmetric PQC and symmetric encryption for UDP and TCP on Windows, Linux and macOS platforms. “At Castle Shield, we are encryption agnostic. As NIST selects new PQC standards, we will add them to our suite of solutions that further demonstrates the cryptographic agility of our products. Our primary focus is to seamlessly integrate the best encryption algorithms available with our solutions to protect our customer’s data for today and tomorrow,” Dr. Milton Mattox, Chief Technology Officer at Castle Shield, Holdings, LLC Aeolus VPN with PQC continues to be available today for testing, proofs of concept, and production installations. About Castle Shield Holdings, LLC Founded in 2019, Castle Shield offers a complete range of enterprise-grade cybersecurity solutions that protects enterprises and consumers against all internal and external cyber threats. Our quantum-resistant solutions (Fides) stand strong as the last line of defense for enterprise and consumer data in the emerging quantum computing threat landscape. Legion, our Security Information Event Management or (SIEM) product portfolio and Fides work together to strengthen your overall data security. We monitor and address threat vectors through our scalable, multi-tenant SIEM platform, protecting enterprise systems and data in an efficient, cost-effective manner. In addition, we utilize an advanced compliance platform (Senate) and expert analysis with an in-depth understanding of dynamic compliance standards and industry best practices to highlight cyber risk factors. Our Senate system provides comprehensive ratings for third party vendors based on technical risk scores, compliance, and financial impact in the event of a breach. Our 360° proactive security solutions are what sets Castle Shield apart independent of your IT backbone whether cloud, hybrid or premise based.

Read More

VIRTUAL SERVER INFRASTRUCTURE

Code42 Incydr Supports Leading Desktop-as-a-Service Offerings and Virtual Desktop Infrastructure Solutions

Code42 | September 26, 2022

Code42 Software, Inc., the Insider Risk Management (IRM) leader, today announced its Incydr product fully supports all major Desktop-as-a-Service (DaaS) and Virtual Desktop Infrastructure (VDI) environments. The Code42® Incydr™ product detects when valuable and sensitive files are moved to untrusted locations, including personal email and cloud accounts, and removable media – and allows security teams to quickly respond in order to stop data leaks and theft. According to a recent survey of IT professionals published by Citrix, nearly 70% of organizations are planning to implement VDIs to accommodate hybrid or remote work strategies, with just under 60% accelerating the adoption of cloud tools. Though DaaS and VDI solutions help security teams better protect against vulnerabilities, malicious actors and other external threats, they do little to reduce the risk from insiders, as virtual environments inherently depend on cloud tools. “We’ve seen a notable uptick in the number of teams that have deployed DaaS and VDI solutions throughout their environments. Given the continued popularity of bring-your-own-device (BYOD) and remote work, coupled with an unstable hardware supply chain, we absolutely expect this trend to continue, In virtual-first organizations where there is pervasive use of cloud collaboration tools, such as Git, Salesforce, GDrive, OneDrive and iCloud, Incydr wraps a layer of protection around data put at risk by insiders, complementing solutions that focus on external threats and malicious actors.” Rob Juncker, CTO of Code42 Code42 Incydr: The Industry’s Leading Data Security Product for Exfiltration Detection and Response Incydr is an Insider Risk Management solution that provides the visibility, context and controls needed to stop data leak and IP theft. Organizations utilize Incydr to detect and respond to data exposure and exfiltration from corporate computer, cloud and email systems. It deploys in hours so security teams can address material risk to the business in a matter of days and drive the secure work habits needed to decrease how often employees put data at risk in the future. Code42 Instructor: Education-Led Insider Risk Response The Code42 Instructor™ micro-learning solution improves Insider Risk awareness by focusing on the creation of holistic, security-oriented cultures. The solution delivers actionable, hyper-targeted and bite-sized video lessons to end-users when they’re needed most, helping to change security behavior for the long term. The Instructor solution helps organizations rapidly mature their Insider Risk Management programs by incorporating data-driven Insider Risk behavioral guidance for end-users. Combining the Power of Incydr and Instructor Instructor works in tandem with Incydr, allowing security, compliance and education teams to immediately send corrective video lessons triggered by employee actions that create risk for the business. For example, when Incydr flags file movement to an untrusted location, like an unauthorized cloud application, an Instructor video specifically explaining the correct activity is sent to educate the employee in real-time through the Incydr solution. Code42 Services: Measure, Manage, Mitigate IRM technology is simpler and faster to deploy than other technologies, such as DLP and CASB, but it does require a strategy and mindset shift. Insider Risk Management isn’t only about data – it’s about a company’s employees and culture. Code42 IRM Services are designed to help organizations establish an efficient and effective IRM program rooted in transparency, training and technology. Code42’s services take a collaborative approach to helping organizations develop, operationalize, and mature an end-to-end IRM program. About Code42 Code42 is the leader in Insider Risk Management (IRM), offering end-to-end data loss detection and response solutions. The Code42 Incydr product is native to the cloud and rapidly detects data exposure, loss, leak and theft as well as speeds incident response – all without lengthy deployments, complex policy management or blocking employee productivity. Accelerating the effectiveness of Insider Risk programs are the Code42 Instructor microlearning solution, and Code42’s full suite of expert services. With Code42, security professionals can protect corporate data and reduce insider risk while fostering an open and collaborative culture for employees. Designed to meet regulatory control requirements, Code42’s IRM solution is FEDRAMP authorized and can be configured for GDPR, HIPAA, PCI and other compliance frameworks. Innovative organizations, including the fastest-growing security companies, rely on Code42 to safeguard their ideas. Founded in 2001, the company is headquartered in Minneapolis, Minnesota, and backed by Accel Partners, JMI Equity, NewView and Split Rock Partners. Code42 has played a defining role in developing a vision and requirements for the IRM category – now recognized by Gartner, IDC and Forrester – and is a founding member of the annual Insider Risk Summit and Insider Risk Community. The Company has several offices across the United States and its clients include large multinational organizations, such as Crowdstrike, Exabeam, BAYADA Home Health Care, Juniper Networks, Lending Club, MacDonald-Miller, MACOM, North Highland, Ping Identity, Shape Technologies, Snowflake, University of Georgia, User Testing, UTEX and Xactly.

Read More