SoftIron Bets On SONiC With Hyperscale Switches

sdxcentral | March 18, 2020

SoftIron Bets On SONiC With Hyperscale Switches
SoftIron today announced the availability of its latest top-of-rack switches that are built to run the open source SONiC network operating system and target hyperscale customers.“Networking is the most neglected integrated thing that exists in IT right now,” said SoftIron CEO Phil Straw in an interview with SDxCentral. “Networking has become this abstract thing that everyone plugs into … but it doesn’t really do anything for you. It provides connectivity; it doesn’t provide any services.” Straw wants to change that, and he says pairing his company’s hardware with the Software for Open Networking in the Cloud (SONiC) operating system is the way to do it. Initially developed by Arista, Broadcom, Dell, Mellanox, and Microsoft, SONiC was contributed to the Open Compute Project in 2016. SoftIron is now betting that the open source project will give it a tailwind as it expands beyond storage into the networking space.

Spotlight

Project Pacific is a re-architecture of vSphere with Kubernetes as its control plane. To a developer, Project Pacific looks like a Kubernetes cluster where they can use Kubernetes declarative syntax to manage cloud resources like virtual machines, disks and networks.

Related News

Ericom Software Launch New Ericom Application Isolator Gives Existing VPNs and Networks a Simple, Cost-Effective Zero Trust Security Boost

Ericom Software | August 11, 2020

Ericom Software, a leader in secure web and application access solutions, announced today the introduction of Ericom Application Isolator, a new solution that integrates with existing remote access VPNs and Next Generation Firewalls to secure corporate applications and data from the security risks associated with excessive access rights inside a network. The Standard Edition of the software is available for free and can be downloaded from Ericom’s website.

Read More

Corsa Security Platform Selected by Spider Digital for Large National Network

Corsa Security | May 14, 2020

Corsa Security today announced that their Network Security Virtualization Platform has been deployed by Spider Digital, a specialized System Integrator, into several telecommunications networks to provide traffic inspection and monitoring. The Corsa Security solution, combined with Palo Alto Networks VM-100 Series next generation firewalls, allows the network to scale their traffic inspection quickly and easily - from 10 Gbps to many 100 Gbps of inspection - across more than 30 sites throughout the nation. This rapid deployment is critical for the network as it needs to address increasing traffic volumes for the country’s communications systems.

Read More

SECURITY

Ransomware Study: Two Thirds of Security Professionals Believe Ransomware and Terrorism Threats are Equal

Venafi | December 27, 2021

Venafi, the inventor and leading provider of machine identity management, announced the findings of a global survey of more than 1,500 IT security decision makers that reveals that almost two-thirds (60%) of security almost two-thirds (60%) believe ransomware threats should be prioritized at the same level as terrorism. These opinions echo the U.S. Department of Justice, which raised the threat level of ransomware following the Colonial Pipeline attack earlier this year. The study also found that less than one-third of respondents have implemented basic security controls that break the ransomware kill chain. Other key findings include: Over two thirds (67%) of respondents from organizations with more than 500 employees experienced a ransomware attack over the last 12 months—a figure that rises to 80% for respondents from organizations with 3,000-4,999 employees. Over a third (37%) of respondents would pay the ransom but more than half of these (57%) would reverse that decision if they had to publicly report the payment, as required by the Ransomware Disclosure Act, a U.S. Senate bill that would require companies to report ransomware payments within 48 hours. Despite the rising number of ransomware attacks, more than three-quarters (77%) say they are confident the tools they have in place will protect them from ransomware attacks. Australian IT decision makers have the most confidence in their tools (88%), compared with 71% in the U.S. and 70% in Germany. Twenty two percent believe paying a ransom to be “morally wrong.” Seventeen percent of those breached admitted they paid the ransom, with U.S. respondents paying most often (25%) and Australian companies paying least often (9%). The fact that most IT security professionals consider terrorism and ransomware to be comparable threats tells you everything you need to know; these attacks are indiscriminate, debilitating and embarrassing. Unfortunately, our research shows that while most organizations are extremely concerned about ransomware, they also have a false sense of security about their ability to prevent these devastating attacks. Too many organizations say they rely on traditional security controls like VPNs and vulnerability scanning instead of modern security controls, like code signing that are built-in to security and development processes.” Kevin Bocek, Vice President ecosystem and threat intelligence at Venafi The study shows that most organizations are not using security controls that break the ransomware kill chain early in the attack cycle. Many ransomware attacks start with phishing emails that include a malicious attachment—but just 21% restrict the execution of all macros within Microsoft Office documents. Less than a fifth (18%) of companies restrict the use of PowerShell using group policy, and only 28% require all software to be digitally signed by their organization before employees are allowed to execute it. About the research Conducted by Sapio Research, Venafi’s survey evacuated the opinions of 1,506 IT security officers across the U.K., Australia, France, Germany, Benelux and the U.S. About Venafi Venafi is the cybersecurity market leader in machine identity management, securing machine-to-machine connections and communications. Venafi protects machine identity types by orchestrating cryptographic keys and digital certificates for SSL/TLS, SSH, code signing, mobile and IoT. Venafi provides global visibility of machine identities and the risks associated with them for the extended enterprise—on premises, mobile, virtual, cloud and IoT—at machine speed and scale. Venafi puts this intelligence into action with automated remediation that reduces the security and availability risks connected with weak or compromised machine identities while safeguarding the flow of information to trusted machines and preventing communication with machines that are not trusted. With over 30 patents, Venafi delivers innovative solutions for the world's most demanding, security-conscious Global 5000 organizations and government agencies, including the top five U.S. health insurers; the top five U.S. airlines; the top four credit card issuers; three out of the top four accounting and consulting firms; four of the top five U.S. retailers; and the top four banks in each of the following countries: the U.S., the U.K., Australia and South Africa.

Read More

Spotlight

Project Pacific is a re-architecture of vSphere with Kubernetes as its control plane. To a developer, Project Pacific looks like a Kubernetes cluster where they can use Kubernetes declarative syntax to manage cloud resources like virtual machines, disks and networks.