Moving enterprise workloads to the cloud

itproportal | June 27, 2019

Moving enterprise workloads to the cloud is all about utilising an infrastructure that you can shape instantly as demands change, and only pay for what you need. Rather than being locked into a fixed, on-site environment, the cloud offers a degree of flexibility that ensures greater efficiency and lower overall costs. Along the way, being in the cloud also lets you take advantage of the unique innovations and capabilities that public cloud services offer. So why do we still see only ten per cent of all the virtual machines that are available actually being utilised at the top three public clouds.

Spotlight

VMware’s seventh annual Global Incident Response Threat Report analyzes how attackers are manipulating reality to reshape the modern threat landscape.

The report found a drastic rise in destructive attacks, where adversaries deploy advanced techniques to deliver more targeted, sophisticated attacks that distort digital reality. Examples include business communications compromise (BCC) or the manipulation of time. However, defenders are struggling to counter these complex attacks and gain visibility into new environments, such as the cloud, containers and business communication applications. This is leading to an embrace of active defense techniques as incident responders deal with the extreme stress of their jobs.

Spotlight

VMware’s seventh annual Global Incident Response Threat Report analyzes how attackers are manipulating reality to reshape the modern threat landscape.

The report found a drastic rise in destructive attacks, where adversaries deploy advanced techniques to deliver more targeted, sophisticated attacks that distort digital reality. Examples include business communications compromise (BCC) or the manipulation of time. However, defenders are struggling to counter these complex attacks and gain visibility into new environments, such as the cloud, containers and business communication applications. This is leading to an embrace of active defense techniques as incident responders deal with the extreme stress of their jobs.

Related News

VIRTUAL DESKTOP STRATEGIES

OpsMx Extends Argo CD With Deployment Controls and Visibility for Enterprise GitOps

OpsMx | September 21, 2022

OpsMx, the leader in intelligent continuous delivery, today announced at ArgoCon 2022 a suite of software and services to enable more scalable and secure enterprise GitOps. The new OpsMx Enterprise for Argo and OpsMx Intelligent Software Delivery (ISD) for Argo products extend the capabilities provided by Argo, a Cloud Native Computing Foundation (CNCF) open source project for continuous software delivery in Kubernetes environments. OpsMx also brings to the Argo community best practices for "CD at Scale" gained from existing OpsMx customers such as Cisco, Google, and other Fortune 100 global enterprises. OpsMx now offers the first and only open platform to automate application deployments to any target platform – containers, virtual machines, and functions – on-premises and in public cloud. "Developers already love the flexibility and ease of use of Argo, With this announcement, operations teams and SREs get the tools they need to keep production deployments under control without slowing down their developers or the business." Demand for Argo continues to grow as organizations migrate applications to Kubernetes and containers. The CNCF User Survey published February 10, 2022 found that production use of Argo increased by 115% over the prior year. Gopal Dommety, CEO and co-founder of OpsMx Enterprise Argo users with an immediate need for greater production security can use OpsMx Enterprise for Argo (OEA) for free. OEA is an open source distribution of Argo CD, Argo Workflow, Argo Rollouts, and Argo Events that has been subjected to additional security testing and hardening. OpsMx makes security patches continually available as new vulnerabilities are discovered. An enhanced Argo installer simplifies security integrations, such as SSO and secrets management, as well as future Argo upgrades. OpsMx also offers fee-based 24 x 7 enterprise support. OpsMx Intelligent Software Delivery (ISD) for Argo provides unified management across the multiple Argo clusters in an enterprise deployment. Applications can be tracked end-to-end across their lifecycle with a few clicks, from dev to test to staging to production. Gates, both manual and automated, can be added to the delivery process to enforce security policies, change controls, and application readiness. AI/ML on data collected from 70+ integrations with leading DevOps tools drives intelligence in the process. All this can be centrally reported and audited. OpsMx Argo Deployment Services enable users to quickly get to a production-ready Argo deployment. This can include refactoring pipelines from legacy CD environments into Argo workflows. OpsMx SaaS offerings eliminate the need to manage infrastructure and upgrades. OpsMx is also expanding support for the Argo open source community to encourage more users to see what Argo can offer. A new Argo Sandbox provides a free SaaS-delivered open source Argo environment for hands-on exploration. Upcoming education events include free webinars featuring Argo users from Adobe and Splunk, along with OpsMx experts, talking about the challenges of continuous delivery. OpsMx is proud to be a Platinum Sponsor of ArgoCon 2022. Together, these Argo additions bring Kubernetes-native capabilities to the OpsMx open CD architecture, creating the first and only open platform for best-in-class deployments to both Kubernetes environments and virtual machine / multi-cloud environments. About OpsMx OpsMx simplifies and intelligently automates software delivery, enabling hundreds of thousands of developers at Google, Cisco, Western Union, and other leading global enterprises to ship better software faster. Incorporating open source Argo and Spinnaker, OpsMx is the first open, unified platform for deploying applications in container, virtual machine, and multi-cloud environments. The company's 150 employees serve customers from offices in Silicon Valley, Hyderabad, and Bengaluru, with funding from Dell Technologies Capital and Foundation Capital.

Read More

VIRTUAL DESKTOP TOOLS

Dell Technologies Strengthens Cyber Resiliency with Multicloud Data Protection and Security Innovations

Dell Technologies | November 18, 2022

Dell Technologies is expanding its industry leadership in data protection appliances and software1 to help customers protect their data on premises, in public clouds and at the edge. The Dell PowerProtect Data Manager Appliance leads a series of advancements for multicloud data protection that are simple to use and easy to consume. Dell innovation in AI-powered resilience and operational security accelerates the adoption of Zero Trust architectures, helping protect organizations from the increasing threat of cyberattacks. The new solutions help address rising data protection challenges facing organizations. According to the 2022 Dell Global Data Protection Index (GDPI) survey, organizations have experienced higher levels of natural and modern disasters than in previous years, resulting in more data loss, downtime and recovery costs. In the past year, cyberattacks accounted for 48% of all disasters (up from 37% in 2021), leading all other causes of data disruption. The survey also revealed 85% of organizations using multiple data protection vendors see a benefit in reducing their number of vendors. Furthermore, it revealed that organizations using a single data protection vendor incurred 34% less cost recovering from cyberattacks or other cyber incidents than those who used multiple vendors. "With virtually everything connected to the internet in today's digital world, the need to protect valuable data is more important than ever, This digital landscape requires a modern data protection and security strategy to address cyber threats. Point solutions don't go deep or wide enough to help protect organizations. Dell helps customers strengthen cyber resiliency by offering integrated data protection software, systems and services to help ensure data and applications are protected and resilient wherever they live." Jeff Boudreau, president and general manager, Infrastructure Solutions Group, Dell Technologies The GDPI survey found that 91% of organizations are either aware of or planning to deploy a Zero Trust architecture – a cybersecurity model that shifts how organizations approach security from relying solely on perimeter defenses to a proactive strategy that only allows known, authorized traffic across system boundaries and data pipelines. However, only 23% are deploying a Zero Trust model and 12% are fully deployed. With embedded security features designed into the hardware, firmware and security control points, Dell's holistic approach helps organizations achieve Zero Trust architectures to strengthen cyber resiliency and help reduce security complexity. The simplest path to modern data protection Dell continues to deliver innovation for its data protection software, Dell PowerProtect Data Manager, to help organizations simplify their IT operations and reduce risk. PowerProtect Data Manager software addresses the increasing need for cyber resiliency and supports Zero Trust principles with new built-in operational security capabilities, such as multifactor authentication, dual authorization, and role-based access controls. The Dell PowerProtect Data Manager Appliance offers a simple path to adopt modern data protection. The debut system is ideal for small and mid-sized use cases with support that scales from 12 to 96 terabytes of data. The appliance offers customers a: Modern, software-defined architecture: Allows automated discovery and protection of assets and delivers unique VMware protection with Transparent Snapshots to ensure the availability of all VMs without business disruption. Secure, cyber resilient solution: Provides more secure access to restricted functions with Identity and Access Management to strengthen cyber resiliency. Simple, unified user experience: Delivers software-defined data protection, making it easy to deploy and use. "Dell PowerProtect Data Manager simplifies our backup environment, giving us the business agility needed to protect our data as we digitally transform," said James McNair, vice president, distributed systems manager, Trustmark Bank. "With the new PowerProtect Data Manager Appliance, we can more simply deploy Data Manager across our infrastructure, helping us be more efficient and strengthening our cyber resiliency." Dell expands cyber recovery for fast, easy-to-deploy public cloud vaults PowerProtect Cyber Recovery for Google Cloud enables customers to deploy an isolated cyber vault in Google Cloud to more securely separate and protect data from a cyberattack. Unlike standard cloud-based backup solutions, access to management interfaces is locked down by networking controls and can require separate security credentials and multi-factor authentication for access. Organizations can use their existing Google Cloud subscription for purchasing PowerProtect Cyber Recovery through the Google Cloud Marketplace, and the service can be acquired directly from Dell and its channel partners. The new offering marks the latest expansion of Dell's cyber recovery capabilities for public clouds, following this year's introduction of Dell PowerProtect for Microsoft Azure and CyberSense for Dell PowerProtect Cyber Recovery for AWS. Dell APEX simplifies backup storage with flexible consumption options Dell APEX Data Storage Services is expanding to offer a Backup Target option to provide more secure backup storage in a pay-per-use, flexible consumption model. The Backup Target service is easy for customers to adopt and streamlines the process of purchasing, deploying and maintaining backup storage. Building on Dell's leadership in data protection appliances and software1, the Backup Target helps reduce a customer's storage footprint and can increase data availability. The new Dell APEX Data Storage Services Backup Target offer will support the increasing reliance on as-a-Service offerings to help overcome data protection challenges. Nearly every GDPI respondent (99%) identified at least one as-a-Service offering as a high priority to help overcome challenges for their organization. Storage as-a-Service (44%), Cyber Recovery as-a-Service (41%), and Backup as-a-Service (40%) ranked as the top three as-a-Service priorities. Dell expands Future-Proof Program with new Cyber Recovery Guarantee With cyber threats increasing and data becoming more valuable than ever, Dell plans to introduce in January a new Cyber Recovery Guarantee2 to provide assurance to customers that their data will be recoverable following a cyberattack. Dell will provide customers up to $10 million in reimbursement for qualifying expenses to assist in the recovery of data from ransomware and other cyber incidents in the event restoring data is not possible with Dell solutions. The guarantee is designed to increase customer comfort and confidence in choosing Dell Data Protection Solutions, whether for data in production or, more securely, in a cyber vault. This new cyber recovery guarantee expands the Dell Technologies Future-Proof Program, which also includes a Data Protection Deduplication Guarantee3. Additional quote Seife Teklu, senior solutions architect, Arrow Electronics "The integrated Dell PowerProtect Data Manager Appliance is easy to use and quick to deploy. This system will be a compelling option for our small to medium-sized customers needing to modernize data protection to help reduce risk and ensure business continuity." Availability Dell PowerProtect Data Manager Appliance is globally available this month in more than 30 countries across North America, Latin America, Europe and Asia Pacific. Dell PowerProtect Data Manager software is globally available today. Dell PowerProtect Cyber Recovery for Google Cloud Platform is globally available today. Dell APEX Data Storage Services Backup Target will be globally available in the first quarter of 2023 in 16 countries across North America, Europe and Asia Pacific. Dell's new Cyber Recovery Guarantee will be available in the US starting in January 2023. About Dell Technologies Dell Technologies helps organizations and individuals build their digital future and transform how they work, live and play. The company provides customers with the industry's broadest and most innovative technology and services portfolio for the data era.

Read More

VIRTUAL DESKTOP STRATEGIES

Castle Shield Holdings, LLC Updates the Post-Quantum Cryptography (PQC) Algorithms for Its Data-in-Motion Aeolus VPN Solution

Castle Shield Holdings, | October 14, 2022

Castle Shield Holdings, LLC., a leader in Zero Trust and cybersecurity solutions, today announced that its Aeolus VPN solution now supports additional post-quantum cryptography (PQC) algorithms selected by the National Institute of Standards and Technology (NIST). Last year, prior to the conclusion of the third round of the NIST PQC Standardization, we announced the successful integration of the Saber algorithm into Aeolus VPN. Reference our October 11, 2021, press release. NIST has now selected two primary PQC algorithms for most use cases: CRYSTALS-KYBER and CRYSTALS-Dilithium. In addition, the signature schemes FALCON and SPHINCS+ were standardized as well. Kyber and Dilithium were both selected for their strong security and excellent performance, and NIST expects them to work well in most applications. Therefore, we have integrated Kyber (i.e., Kyber1024) and Dilithium (i.e., Dilithium5) algorithms into Aeolus VPN as well. Aeolus VPN protects data between two or more network points. It offers a streamlined approach to privacy which results in more stability and lower latency that is a perfect addition to enterprise data-in-motion security for both classic and post-quantum computing environments. Aeolus VPN offers point-to-point asymmetric PQC and symmetric encryption for UDP and TCP on Windows, Linux and macOS platforms. “At Castle Shield, we are encryption agnostic. As NIST selects new PQC standards, we will add them to our suite of solutions that further demonstrates the cryptographic agility of our products. Our primary focus is to seamlessly integrate the best encryption algorithms available with our solutions to protect our customer’s data for today and tomorrow,” Dr. Milton Mattox, Chief Technology Officer at Castle Shield, Holdings, LLC Aeolus VPN with PQC continues to be available today for testing, proofs of concept, and production installations. About Castle Shield Holdings, LLC Founded in 2019, Castle Shield offers a complete range of enterprise-grade cybersecurity solutions that protects enterprises and consumers against all internal and external cyber threats. Our quantum-resistant solutions (Fides) stand strong as the last line of defense for enterprise and consumer data in the emerging quantum computing threat landscape. Legion, our Security Information Event Management or (SIEM) product portfolio and Fides work together to strengthen your overall data security. We monitor and address threat vectors through our scalable, multi-tenant SIEM platform, protecting enterprise systems and data in an efficient, cost-effective manner. In addition, we utilize an advanced compliance platform (Senate) and expert analysis with an in-depth understanding of dynamic compliance standards and industry best practices to highlight cyber risk factors. Our Senate system provides comprehensive ratings for third party vendors based on technical risk scores, compliance, and financial impact in the event of a breach. Our 360° proactive security solutions are what sets Castle Shield apart independent of your IT backbone whether cloud, hybrid or premise based.

Read More