Virtualization in Industrial Automation Market is Rapidly Growing in 2019-2026

Market Report gazette | December 17, 2019

Virtualization is a technology that makes use of software to create multiple simulated environments from a single hardware system. Hypervisor is a software that disengages virtual machines (VMs) from host servers and assigns computer resources to the VMs. The conventional industrial automation systems consist of tightly coupled application software, operating systems, and hardware. However, virtualization in industrial automation has helped in decoupling the physical hardware from the operating system and facilitates the functioning of different operating systems and applications within the physical hardware. By running virtualization software in individual partitions, virtualization is actuated, making them VMs.

Spotlight

Enterprises are prioritizing edge computing, but finding roadblocks. ESG analyst Bob Laliberte breaks down key findings and market statistics to explain edge compute challenges – including data security and inadequate IT skillsets – and provide a few ideas about how to overcome them.

Spotlight

Enterprises are prioritizing edge computing, but finding roadblocks. ESG analyst Bob Laliberte breaks down key findings and market statistics to explain edge compute challenges – including data security and inadequate IT skillsets – and provide a few ideas about how to overcome them.

Related News

VIRTUAL DESKTOP STRATEGIES

SecureAuth Announces Arculix Universal Authentication Fabric™ to Strengthen Passwordless Continuous Authentication

Arculix | November 21, 2022

SecureAuth, a leader in access management and authentication, today announced its Arculix Universal Authentication Fabric to further strengthen the technology to enable organizations for passwordless continuous authentication. Arculix Universal Authentication Fabric is a technology framework that delivers authentication driven by AI/ML behavioral modeling, continuous risk scoring and eliminates logging in making passwords obsolete. For users, it’s a one-and-done event for accessing their relevant apps, VDI or SSO. For companies, it’s a robust authentication with continuous authentication in the background without any friction to the user. “Historically, a single source to define and administer policy and processes for all users has been absent, Fraud, credential stuffing and attacks will continue to evolve as bad actors thwart existing security approaches. SecureAuth’s Universal Authentication Fabric delivers the first risk-based analytics approach as a consolidated backbone for continuous, multi-factor, and passwordless authentication with the highest level of security as well as a frictionless experience for users.” Paul Trulove, CEO of SecureAuth Between authenticating to the workstation, an SSO portal or federated web apps, VDIs, VPN, and PAM solutions, the typical user authenticates 16 times a day using three different sets of username and password. This is simultaneously insecure and a poor user experience. With Arculix Universal Authentication Fabric, users can login once and securely access the applications needed to do their job. Arculix Universal Authentication Fabric allows users to attain a level of assurance needed to authenticate with its patented behavioral AI/ML risk analytics engine. To ensure there is no account takeover (ATO), it generates a score at the beginning of a user logging in that is used to grant access to web apps, servers and services without requiring another factor check. This removes the need for siloed systems to authenticate users. “SecureAuth’s Arculix Universal Authentication Fabric is the underlying element for the new 360-degree cybersecurity perimeter that every enterprise needs: Continuous, Holistic and Adaptive,” said Alfredo Estirado, CEO of Grupo TRC. “As a key partner of SecureAuth, we are excited to offer this to our customers across various geographies.” Key capabilities include expansion of passwordless features into endpoints, including access to persistent and non-persistent VDIs, in the same passwordless way a user authenticates to a standard machine. This enables a passwordless authentication journey whether in or out of the office. This Universal Authentication Fabric also supports our device trust support for seamless passwordless authentication for transient virtual desktops and physical desktops. About SecureAuth Corporation SecureAuth is a next-gen access management and authentication company that enables secure and passwordless continuous authentication experience for employees, partners and customers. With the only solution that can be deployed in cloud, hybrid and on-premises environments, SecureAuth manages and protects access to applications, systems and data at scale, anywhere in the world.

Read More

VPN

ExpressVPN confirms security of its desktop apps with three new independent audits

ExpressVPN | November 24, 2022

Leading consumer privacy and security company ExpressVPN has validated the security posture of all its desktop apps through three new independent audits by respected cybersecurity firms, Cure53 and F-Secure. The three new audits come just weeks after KPMG's audit of ExpressVPN's no-logs policy, underlining ExpressVPN's dedication to third-party privacy and security verifications. Cure53 tested both ExpressVPN's macOS and Linux desktop apps through white-box penetration tests and source code audits. The assessments confirm that the apps are secured against cyber security threats from malicious adversaries. This also validates the extensive work done by ExpressVPN's engineering and security experts in building a safer, more open internet for millions of people worldwide. F-Secure also reviewed ExpressVPN's Windows v12 app through penetration testing and source code auditing, and found no significant weaknesses. The audit verifies that ExpressVPN's latest Windows desktop app cannot be manipulated to leak information, such as a user's IP address, outside the VPN tunnel. It also confirms that the app is not susceptible to remote code execution attacks. Having all of ExpressVPN's desktop apps audited means that users can go online with the assurance that their privacy is protected, and do so confidently. The full audit report by Cure53 for macOS can be found here and Linux here. F-Secure's audit of ExpressVPN's Windows v12 app is available here. "As part of our continuous trust and transparency efforts, we're proud to announce that all of our desktop apps have now been audited, These audits are a testament to the efforts we put into improving and securing our product, and we're glad to receive the validation from Cure53 and F-Secure. We're committed to delivering audits on our mobile apps soon, and will continue to ensure privacy and security at every touchpoint of our product." Brian Schirmacher, penetration testing manager at ExpressVPN About ExpressVPN Since 2009, ExpressVPN has empowered millions of users to take control of their internet experience. The company's award-winning consumer VPN service is backed by its open-source VPN protocol Lightway, delivering user privacy in just a few clicks. ExpressVPN's Keys password manager and Aircove router make digital privacy and security easy and accessible for all. With a commitment to transparency, ExpressVPN products have been audited by PwC, Cure53, and others.

Read More

VIRTUAL DESKTOP TOOLS

Dell Technologies Strengthens Cyber Resiliency with Multicloud Data Protection and Security Innovations

Dell Technologies | November 18, 2022

Dell Technologies is expanding its industry leadership in data protection appliances and software1 to help customers protect their data on premises, in public clouds and at the edge. The Dell PowerProtect Data Manager Appliance leads a series of advancements for multicloud data protection that are simple to use and easy to consume. Dell innovation in AI-powered resilience and operational security accelerates the adoption of Zero Trust architectures, helping protect organizations from the increasing threat of cyberattacks. The new solutions help address rising data protection challenges facing organizations. According to the 2022 Dell Global Data Protection Index (GDPI) survey, organizations have experienced higher levels of natural and modern disasters than in previous years, resulting in more data loss, downtime and recovery costs. In the past year, cyberattacks accounted for 48% of all disasters (up from 37% in 2021), leading all other causes of data disruption. The survey also revealed 85% of organizations using multiple data protection vendors see a benefit in reducing their number of vendors. Furthermore, it revealed that organizations using a single data protection vendor incurred 34% less cost recovering from cyberattacks or other cyber incidents than those who used multiple vendors. "With virtually everything connected to the internet in today's digital world, the need to protect valuable data is more important than ever, This digital landscape requires a modern data protection and security strategy to address cyber threats. Point solutions don't go deep or wide enough to help protect organizations. Dell helps customers strengthen cyber resiliency by offering integrated data protection software, systems and services to help ensure data and applications are protected and resilient wherever they live." Jeff Boudreau, president and general manager, Infrastructure Solutions Group, Dell Technologies The GDPI survey found that 91% of organizations are either aware of or planning to deploy a Zero Trust architecture – a cybersecurity model that shifts how organizations approach security from relying solely on perimeter defenses to a proactive strategy that only allows known, authorized traffic across system boundaries and data pipelines. However, only 23% are deploying a Zero Trust model and 12% are fully deployed. With embedded security features designed into the hardware, firmware and security control points, Dell's holistic approach helps organizations achieve Zero Trust architectures to strengthen cyber resiliency and help reduce security complexity. The simplest path to modern data protection Dell continues to deliver innovation for its data protection software, Dell PowerProtect Data Manager, to help organizations simplify their IT operations and reduce risk. PowerProtect Data Manager software addresses the increasing need for cyber resiliency and supports Zero Trust principles with new built-in operational security capabilities, such as multifactor authentication, dual authorization, and role-based access controls. The Dell PowerProtect Data Manager Appliance offers a simple path to adopt modern data protection. The debut system is ideal for small and mid-sized use cases with support that scales from 12 to 96 terabytes of data. The appliance offers customers a: Modern, software-defined architecture: Allows automated discovery and protection of assets and delivers unique VMware protection with Transparent Snapshots to ensure the availability of all VMs without business disruption. Secure, cyber resilient solution: Provides more secure access to restricted functions with Identity and Access Management to strengthen cyber resiliency. Simple, unified user experience: Delivers software-defined data protection, making it easy to deploy and use. "Dell PowerProtect Data Manager simplifies our backup environment, giving us the business agility needed to protect our data as we digitally transform," said James McNair, vice president, distributed systems manager, Trustmark Bank. "With the new PowerProtect Data Manager Appliance, we can more simply deploy Data Manager across our infrastructure, helping us be more efficient and strengthening our cyber resiliency." Dell expands cyber recovery for fast, easy-to-deploy public cloud vaults PowerProtect Cyber Recovery for Google Cloud enables customers to deploy an isolated cyber vault in Google Cloud to more securely separate and protect data from a cyberattack. Unlike standard cloud-based backup solutions, access to management interfaces is locked down by networking controls and can require separate security credentials and multi-factor authentication for access. Organizations can use their existing Google Cloud subscription for purchasing PowerProtect Cyber Recovery through the Google Cloud Marketplace, and the service can be acquired directly from Dell and its channel partners. The new offering marks the latest expansion of Dell's cyber recovery capabilities for public clouds, following this year's introduction of Dell PowerProtect for Microsoft Azure and CyberSense for Dell PowerProtect Cyber Recovery for AWS. Dell APEX simplifies backup storage with flexible consumption options Dell APEX Data Storage Services is expanding to offer a Backup Target option to provide more secure backup storage in a pay-per-use, flexible consumption model. The Backup Target service is easy for customers to adopt and streamlines the process of purchasing, deploying and maintaining backup storage. Building on Dell's leadership in data protection appliances and software1, the Backup Target helps reduce a customer's storage footprint and can increase data availability. The new Dell APEX Data Storage Services Backup Target offer will support the increasing reliance on as-a-Service offerings to help overcome data protection challenges. Nearly every GDPI respondent (99%) identified at least one as-a-Service offering as a high priority to help overcome challenges for their organization. Storage as-a-Service (44%), Cyber Recovery as-a-Service (41%), and Backup as-a-Service (40%) ranked as the top three as-a-Service priorities. Dell expands Future-Proof Program with new Cyber Recovery Guarantee With cyber threats increasing and data becoming more valuable than ever, Dell plans to introduce in January a new Cyber Recovery Guarantee2 to provide assurance to customers that their data will be recoverable following a cyberattack. Dell will provide customers up to $10 million in reimbursement for qualifying expenses to assist in the recovery of data from ransomware and other cyber incidents in the event restoring data is not possible with Dell solutions. The guarantee is designed to increase customer comfort and confidence in choosing Dell Data Protection Solutions, whether for data in production or, more securely, in a cyber vault. This new cyber recovery guarantee expands the Dell Technologies Future-Proof Program, which also includes a Data Protection Deduplication Guarantee3. Additional quote Seife Teklu, senior solutions architect, Arrow Electronics "The integrated Dell PowerProtect Data Manager Appliance is easy to use and quick to deploy. This system will be a compelling option for our small to medium-sized customers needing to modernize data protection to help reduce risk and ensure business continuity." Availability Dell PowerProtect Data Manager Appliance is globally available this month in more than 30 countries across North America, Latin America, Europe and Asia Pacific. Dell PowerProtect Data Manager software is globally available today. Dell PowerProtect Cyber Recovery for Google Cloud Platform is globally available today. Dell APEX Data Storage Services Backup Target will be globally available in the first quarter of 2023 in 16 countries across North America, Europe and Asia Pacific. Dell's new Cyber Recovery Guarantee will be available in the US starting in January 2023. About Dell Technologies Dell Technologies helps organizations and individuals build their digital future and transform how they work, live and play. The company provides customers with the industry's broadest and most innovative technology and services portfolio for the data era.

Read More