Virtual Desktop Tools, Server Hypervisors
Business Wire | August 31, 2023
Meter, Inc., a leader in Network as a Service (NaaS) for businesses, today announced DNS Security, built in partnership with Cloudflare, the security, performance, and reliability company. Meter DNS Security is now widely available for all Meter Network customers, expanding Meter’s existing NaaS offering and saving teams both time and money, while also improving overall network performance and security, powered by Cloudflare’s Zero Trust platform.
“With the number of devices on a network expected to triple by 2030, modern businesses and organizations demand enterprise network controls to ensure safety and peak performance for business critical functions,” said Anil Varanasi, CEO and co-founder of Meter. “Meter DNS Security is the latest example of how we’re continuing to offer our customers enterprise level networks end-to-end. Through our partnership with Cloudflare, we’re enhancing our capabilities to meet the needs of IT professionals at industrial warehouses, educational institutions, security firms, and more.”
Meter DNS Security eliminates the hassle of having multiple vendors, by providing content filtering at several layers to all customers within the Meter Dashboard in partnership with one of the best providers in the world.
“We’re proud to have Meter leveraging Cloudflare’s Zero Trust platform in a new way, offering our DNS filtering feature natively built into their Meter Dashboard,” said John Graham-Cumming, CTO, Cloudflare. “By building on Cloudflare's platform, Meter enables customers to manage their team’s operations at scale, as well as effectively enforce global corporate policies across diverse corporate spaces, such as offices, schools, and warehouses.”
In addition to the ease and scalability of Meter DNS Security, users are ensuring security through enhanced compliance by blocking access to known malicious websites and bad actors. The integration and partnership with Cloudflare provides customers with faster DNS response times, while optimizing network performance by limiting access to high-bandwidth websites and services. Real world examples of this process include, but are not limited to:
Ensuring a safe browsing environment at schools by filtering out age inappropriate content
Optimizing network performance for warehouses by filtering high bandwidth activities like video streaming
Maintaining high security and compliance standards by filtering malicious or illegal content
“Tishman Speyer has successfully partnered with Meter to streamline the networking and Wi-Fi experience for our customers,” said Simon Okunev, Managing Director and Chief Information Officer, Tishman Speyer. “The addition of Meter’s DNS Security feature, powered by Cloudflare, will further benefit our customers by providing an additional layer of security.”
About Cloudflare
Cloudflare, Inc. is on a mission to help build a better Internet. Cloudflare’s suite of products protect and accelerate any Internet application online without adding hardware, installing software, or changing a line of code. Internet properties powered by Cloudflare have all web traffic routed through its intelligent global network, which gets smarter with every request. As a result, they see significant improvement in performance and a decrease in spam and other attacks. Cloudflare was awarded by Reuters Events for Global Responsible Business in 2020, named to Fast Company's Most Innovative Companies in 2021, and ranked among Newsweek's Top 100 Most Loved Workplaces in 2022.
Read More
Virtual Desktop Tools, Server Hypervisors
businesswire | July 28, 2023
ZEDEDA, the leader in edge infrastructure orchestration, today introduced ZEDEDA Edge Application Services, making it easier for customers to instantly gain granular control across all of their edge applications, including their modern AI-based applications.
The number of edge devices, along with the data they produce, is growing exponentially. Gartner® predicts that “by 2025, 75% of data will be generated outside these centralized [data centers or cloud regions] facilities.”1 Edge computing is required to manage and process that data, but the complexity of distributed environments can make it difficult for customers to get started quickly. Enabling access to core services can provide an on-ramp for organizations to benefit from an initial edge use case while also establishing a foundation for future growth, just as was seen previously with cloud adoption.
“Just as we saw occur with the cloud providers in the early days, it is time for the edge market to evolve beyond just infrastructure and begin to offer value-added services in addition,” said Said Ouissal, founder and CEO of ZEDEDA. “Now, with ZEDEDA Edge Application Services, we are able to offer our customers the ability to manage, configure and control their edge applications simply by leveraging the ZEDEDA ecosystem.”
ZEDEDA Edge Application Services are delivered using ZEDEDA’s market-leading edge orchestration solution, which reduces cost while increasing visibility, security and control. The new industry-leading suite of services provides remote access, inventory and configuration management, and Kubernetes management services tailored to the individual needs of each deployment and customer.
ZEDEDA Edge Access: A Simple and Secure Remote Access Solution
The first service in the suite, ZEDEDA Edge Access, enables IT administrators and platform operations teams to instantly access any remote device from any location at any time. It is a simple solution that provides secure access, control and audit tracing for edge deployments.
ZEDEDA Edge Access is secure out of the box, with built-in access controls that provide full encryption of user sessions, and requires no backend configuration or specialized skills. ZEDEDA Edge Access Service eliminates the overhead associated with conventional methods of remote access, providing a streamlined and efficient alternative.
ZEDEDA Edge Access Service also provides granular user control and access, enabling customers to provide third parties secure access to their edge infrastructure. For example, if there is a problem with a specific application, the software vendor or developer can securely access, audit and troubleshoot if needed. This service, and others like it, will ultimately enable ZEDEDA partners and OEMs to generate new revenue streams.
ZEDEDA’s open, distributed, cloud-native edge management and orchestration solution has attracted strategic OEM and customer relationships with Global 500 companies, including Emerson, Rockwell Automation, and VMware. The company continues to quadruple the number of edge nodes it has under management annually, scaling toward a hundred thousand edge nodes and has raised more than $55 million in capital from investors, including Coast Range Capital, Lux Capital, Energize Ventures, Porsche Ventures, Chevron Technology Ventures, Emerson Ventures, Juniper Networks, Rockwell Automation, Samsung Next and EDF North America Ventures.
About ZEDEDA
ZEDEDA makes edge computing effortless, open, and intrinsically secure — extending the cloud experience to the edge. ZEDEDA reduces the cost of managing and orchestrating distributed edge infrastructure and applications while increasing visibility, security and control. ZEDEDA delivers a distributed, cloud-native edge management and orchestration solution, simplifying the security and remote management of edge infrastructure and applications at scale.
Read More
VPN
Businesswire | July 18, 2023
The world’s efforts to secure digital communications from the threat posed by quantum computers took a significant leap forward today as a new standard for quantum-safe Virtual Private Networks (VPN) was ratified by the Internet Engineering Task Force (IETF).
The new protocol has already been used by Banque de France and Deutsche Bundesbank to secure payments messages, paving the way for full adoption by the Bank for International Settlements to secure communications between the world’s central banks.
‘Harvest Now Decrypt Later’ (HNDL) attacks currently represent the greatest quantum cybersecurity threat. These attacks see hostile actors steal encrypted data now which can be decrypted once a sufficiently mature quantum computer comes online. The new US Quantum Computing Cybersecurity Preparedness Act states that the HNDL risk presents the highest threat to humankind and stipulates that quantum migration must start now. Deploying a VPN based on new post quantum cryptography is the easiest way to protect data-in-transit from such attacks.
The new IETF standard specifies how VPNs can exchange communications securely in the quantum age. The novel approach prioritises interoperability by making it possible for multiple post-quantum and classical encryption algorithms to be incorporated into VPNs. Combining both old and new encryption is essential to ensure no disruption to the functioning of existing IT systems, and to protect data from attack by both classical and quantum computers.
This is a particularly important milestone for internet connectivity and security as we are transitioning from an era where the world relied upon just one or two algorithms (RSA and Elliptic Curve), to a situation where different nation states are deploying a wide variety of different post-quantum algorithms. This new IETF standard is the glue that allows parties using different public key encryption algorithms to talk with one another.
The new IETF standard was proposed and designed by Post-Quantum, a British cyber security company that’s built a portfolio of market-ready quantum-safe cyber security products. Post-Quantum’s own Hybrid PQ VPN uses the new IETF standard and is already in use by NATO to secure its communications from quantum attack, supporting interoperable communications between NATO members.
CJ Tjhai, CTO, Post-Quantum and original author of the new IETF standard said: “I’d like to thank all the technologists that collaborated with us on this IETF standard. Much of the focus has been on NIST’s new post quantum encryption algorithms themselves, but this is insufficient unless you have a protocol that defines how the connectivity is done. The easiest way to prevent Harvest Now Decrypt Later attacks is to deploy a PQ VPN based on the new IETF standard. NIST’s new algorithms are only useful if we have agreed standards for their use and mature products that can accommodate them.”
Andersen Cheng, Executive Chairman, Post-Quantum added: “CJ and his collaborators have completed important work that makes it possible for tech companies to build quantum-safe VPNs that communicate to one another. We are entering a period where different countries are now recommending different encryption algorithms, so engineering our communications infrastructure to be interoperable and backward compatible is absolutely crucial. That’s the value our own VPN is bringing to organisations like NATO, a diverse member organisation with a variety of post-quantum algorithms in use.
“In the commercial sector, we are pleased that Banque de France and Deutsche Bundesbank have also recently completed their project in transmitting payment messages using our protocol, which will pave the way for the Bank for International Settlements to build a complete chain of trust for central bank applications to counter any HNDL risks they already face today.”
José María Lucía Moreno, Lead Partner, EY Wavespace and a Post-Quantum partner added: “Our agreement with Post-Quantum is an important step in helping EY and its clients to become quantum-safe. We’re increasingly consulting with our clients to identify where they use traditional encryption that will need to be upgraded, and to help them prepare for the quantum era. Post-Quantum’s approach is particularly interesting because they have modular software-based products like the VPN, which can be implemented together, or as standalones within existing environments, to offer protection today.”
The IETF is the non-profit organisation with responsibility for developing the standards that define how the internet is built and used. Now that the IETF has ratified this work, VPN providers will adapt their protocols to match it, making this a defining standard for the future of cybersecurity as the world transitions from classical to new post-quantum encryption. Ratification represents the culmination of work dating back to 2017 when Post-Quantum took the lead in creating the original proposal for this standard.
About Post-Quantum
Post-Quantum is upgrading the world to next-generation encryption. Our quantum-safe platform includes modular software for Identity, Transmission and Encryption that protect organisations across their entire digital footprint. Products are interoperable, backward compatible and crypto-agile - ensuring a smooth transition to the next generation of encryption.
Post-Quantum works with organisations in defence, critical national infrastructure and financial services, including a multi-year relationship with NATO to ensure its communications are secure against quantum attack.
Read More
Virtual Desktop Tools, Server Hypervisors
prnewswire | July 20, 2023
RISC Zero, developer of leading general purpose zero-knowledge (ZK) virtual machine technology, has raised a $40 million Series A. The round was led by Blockchain Capital and joined by seed round lead Bain Capital Crypto, with participation from other notable investors including Galaxy Digital, IOSG, RockawayX, Maven 11, Fenbushi Capital, Delphi Digital, Aglaé Ventures, IOBC, Tribute Labs' Zero Dao, Figment Capital, and Alchemy Ventures.
RISC Zero's mission is to equip developers and infrastructure providers with novel cryptographic tools to power the next generation of trustless, scalable, and decentralized computation; both on and off-chain — allowing them to build solutions that defy common assumptions about the capabilities of blockchains and other federated and cooperative computing systems. Our innovative system enables users to confidently take control of their digital world by ensuring computational integrity and producing indisputable receipts of accurate program execution.
"Imagine a world where data privacy, security, and trust are no longer concerns, where software supply chains are transparent and verifiable, and where a new generation of applications can harness the power of zero-knowledge computing to solve some of the most pressing challenges of the digital age. This is the promise of zero-knowledge computing and the reason we are investing in RISC Zero" - Bart Stephens, Founder and Managing Partner at Blockchain Capital
RISC Zero's ZK Virtual Machine (zkVM) enables developers to build ZK-powered applications with the convenience of conventional programming languages such as Rust and C++. Utilizing advanced features such as continuations, RISC Zero's zkVM can run programs of arbitrary complexity and scope while utilizing off-the-shelf computing platforms — a first in the blockchain industry.
"We're honored to be supported by all of our incredible capital partners and the visionary leaders and teams that have signed on to help us build this revolution in computing capability. We're excited to play our part in building a more open and trusted foundation for the future of the internet." - Brian Retford, CEO & Co-founder
This funding round will enable RISC Zero to bring its Bonsai computing platform to market, supporting rapid application development and deployment in both cloud and decentralized environments. With Bonsai, developers can focus on writing their application instead of worrying about the complexities of proof orchestration and server infrastructure.
AboutRISC Zero
The RISC Zero platform will drive the coming decentralized computing revolution. We are bringing general purpose computing to the zero-knowledge ecosystem – enabling users to trust programs run anywhere, while allowing developers to use the tools they already know and love. Public key cryptography ushered in the modern internet era by fundamentally altering digital trust dynamics. Similarly, zero-knowledge computing will radically alter the way we interact digitally and enable entirely new classes of applications.
Read More