VMware NSX incorporates NSX integration with Palo Alto Networks

Ustrademedia | July 24, 2019

Palo Alto Networks has incorporated its cutting edge firewall into the VMware NSX organize virtualization overlay programming. The joined advances bring computerized, propelled security highlights and visibility to virtual system overlays. The NSX firewall incorporation incorporates Palo Alto’s Panorama firewall the board programming and it’s VM Series of virtual firewalls. John Kindervag, head investigator for Cambridge, Mass. – based Forrester Research Inc. said, “We’re going not far off of system virtualization and programming characterized systems – and coordinating them now with security is significant,” said “Such a large number of individuals are contemplating the systems networking part of [SDN] and not the security part.”At the point when VMware NSX interfaces with Panorama, it can consequently embed Palo Alto’s virtual firewalls on all the server hosts associated with the virtual system.

Spotlight

Rajat Ghai, CTO of Benu Networks, talks about virtualization in Wi-Fi and new service and revenues opportunities. An excerpt from Wi-Fi Now 2016 in Vienna, Va.


Other News
VIRTUAL DESKTOP TOOLS

Former VMware Cybersecurity Leader Tom Kellermann Joins Contrast Security as Senior Vice President of Cyber Strategy

Contrast Security | August 26, 2022

Contrast Security (Contrast), the leader in code security that empowers developers to secure as they code, today announced the appointment of Tom Kellermann, who will serve as the company's Senior Vice President of Cyber Strategy. As a Contrast leader, Kellermann will be responsible for developing and overseeing the company's government and financial sector strategy, which will include advising government agencies, standard bodies, financial institutions, insurers and regulators. In addition, Kellermann will facilitate a new, industrywide approach to sharing strategic, software-layer cyberintelligence. "While there has been some progress to increase the information sharing of cyberintelligence between the private and public sectors, as an industry we are still missing a significant opportunity to really strengthen the collective position against software attacks, One of Tom's personal missions is to work towards the advancement and proactive defense of both the nation's critical infrastructure and financial sector. I believe his addition to the team will help us accelerate the impact of Contrast's offerings and increase our ability to be a great partner in those sectors." Alan Naumann, Chairman of the Board and Chief Executive Officer at Contrast Security Kellermann has more than 23 years of experience, which will be critical as Contrast expands its work with the government and financial sectors. Prior to joining Contrast, he held the positions of Head of Cybersecurity Strategy for VMware and Chief Cybersecurity Officer for Carbon Black Inc. In 2020, he was appointed to the Cyber Investigations Advisory Board for the United States Secret Service and was appointed a commissioner on the Commission on Cyber Security in 2008 for the 44th president of the United States. "In 2022, the digital transformation of organizations has been hijacked due to the surge in application attacks and attacks on APIs. In order to combat growing threats, we must not only shift left in cybersecurity but build security into the entire SDLC [Software Development Life Cycle] in order to defend from within," said Tom Kellermann, Senior Vice President of Cyber Strategy at Contrast Security. "I am proud to join Contrast Security, and Jeff Williams — who I believe is a pioneer in the industry — to lead cyber strategy and drive our mission of protecting code security and ultimately the software that we rely on daily." To find out more about Contrast and its Secure Code Platform, please visit https://www.contrastsecurity.com/platform. About Contrast Security: Contrast Security secures the code that global business relies on. It is the industry's most modern and comprehensive code security platform, removing security roadblock inefficiencies and empowering enterprise developers to write and release secure application code faster. Embedding code analysis and attack prevention directly into software with instrumentation, the Contrast platform automatically detects vulnerabilities while developers write code, eliminates false positives, and provides context-specific how-to-fix guidance for easy and fast vulnerability remediation. Doing so enables application and development teams to collaborate more effectively and to innovate faster while accelerating digital transformation initiatives. This is why a growing number of the world's largest private and public sector organizations rely on Contrast to secure their applications in development and extend protection to cloud and on-premise applications in production.

Read More

VIRTUAL DESKTOP TOOLS

Ekinops' SixSq joins 5G-EMERGE to build solutions for the satellite-enabled 5G media market

Ekinops | July 11, 2022

The 5G-EMERGE project aims at developing an integrated satellite and terrestrial system based on open standards to enable high-quality content distribution services over multi-layer IP infrastructures. Telecommunications satellites will efficiently deliver high-demand content, including streaming of live events, as close as possible to the end user – to the 'edge'. The project includes demonstrations in 5G base stations, users' homes and vehicles. A consortium of 20 companies from six European countries will collaborate on developing the distributed edge technology and service-delivery features. SixSq's contribution includes leading the demonstration work package and providing the edge-to-cloud software infrastructure based on its Nuvla.io B2B SaaS platform and marketplace of containerised applications, as well as its open source NuvlaEdge software. "leveraging satellite broadcast and 5G is a great opportunity to deliver the right high-density content at the right location with the right customization. However, this requires fine-tuned orchestration of the entire value chain and this is what SixSq edge-to-cloud software provides. We are no stranger to big challenges posed by ESA and EBU and are looking forward to pushing the boundaries of edge-to-cloud, bringing together the space sector, 5G and multi-media content delivery." SixSq CEO Marc-Elian Bégin "The 5G-Emerge project is yet another example of Ekinops' long commitment towards software innovation as a mean to add value to the telecommunications sector," commented Vincent Munière, Group Chief Technology Officer & VP R&D at Ekinops. "We are looking forward to helping set the bar in 5G services and content delivery." For SixSq, this project is a unique opportunity to showcase its edge computing software's ability to orchestrate complex scenarios for a range of new commercial use-cases, ranging from maritime, vehicle, public transport, 5G and building applications. Working with market leaders in their domain, Nuvla.io will manage apps across the edge-to-cloud continuum.

Read More

VIRTUAL DESKTOP TOOLS

HUMAN Names Climb Channel Solutions as Preferred Distributor

Climb Channel Solutions | July 27, 2022

Climb Channel Solutions, an international specialty technology distributor and wholly-owned subsidiary of Wayside Technology Group, Inc. (NASDAQ: WSTG) was named preferred distributor with HUMAN’s enterprise defense platform enabling resellers to round out their security stack. “With a full suite of products focused on defending customer data and exposure to fraudulent activity Climb Channel Solutions is proud to be named HUMAN’s preferred distributor, The IT channel will soon be leaning on HUMAN’s products and solutions to help detect fraud within security, inventory, account management, and even marketing.” Dale Foster, CEO at Climb Recent reports have indicated that 77% of all digital attacks are bot-based, and bots and cybercriminals become increasingly sophisticated year after year. Today, HUMAN verifies the humanity of more than 15 trillion digital interactions per week, offering enterprises a platform with unmatched visibility into fraudulent activity across the internet. HUMAN achieves this scale with a suite of products to protect the complete digital customer journey: BotGuard for Applications, BotGuard for Growth Marketing, MediaGuard, and Bot Insights Services. As new partners and enterprises leverage the HUMAN Defense Platform, they benefit collectively from HUMAN’s Modern Defense Strategy, which is built on best-in-class visibility and network effect powered by collective protection and disruptions. “We are thrilled to add Climb Channel Solutions as our preferred distribution partner for North America as we continue to build HUMAN’s channel ecosystem,” said HUMAN Vice President of Channel Sales Ron Wagner. “Climb’s expertise as a value-added distributor along with their focus on emerging and disruptive technology makes them an ideal partner. We look forward to working with Climb and their vast network of resellers to realize HUMAN’s mission of safeguarding the integrity of the internet from bot attacks and fraud to keep digital experiences human.” About HUMAN HUMAN is a cybersecurity company that safeguards enterprises and internet platforms from sophisticated bot attacks and fraud to keep digital experiences human. Our modern defense strategy is enabled by internet visibility, network effect powered by collective protection, and disruptions, enabling enterprises to increase ROI and trust while decreasing customer friction, data contamination, and cybersecurity exposure. Today we verify the humanity of more than 15 trillion interactions per week for some of the largest companies and internet platforms. Protect your digital business with HUMAN.

Read More

VPN

Banyan Security Research Uncovers Primary Considerations Influencing Zero Trust Network Access (ZTNA) Adoption

Banyan Security | June 28, 2022

Banyan Security, a leading provider of Zero Trust Network Access (ZTNA) solutions, today revealed new research highlighting organizations’ preferences and hesitations for adopting modern remote access solutions. The independent survey was conducted by Sapio Research and engaged over 400 senior decision makers from mid- to large-sized companies in the U.S. and Canada, who are responsible for IT security and are aware of both virtual private networks (VPN) and ZTNA. The key findings from this study include: Over half (54%) of VPN owners stated that secure remote access is a priority at this time. VPN usage is still prevalent among a majority (90%) of security teams who have highlighted cost, time, and difficulty as reasons to not move forward with ZTNA adoption. Almost all organizations (97%) say that adopting a zero trust model is a priority, with 93% of organizations having committed a budget to enhance their VPN or move toward ZTNA within the next year or two. More than half (53%) of respondents have already started rolling out zero trust solutions. Personal Devices and VPNs Do Not Mix The last two years have shifted how we work, producing a new remote workforce that was essentially created overnight. As highlighted in this study, this has resulted in most workers – in this case 51% of respondents – using a combination of corporate and personal devices to connect to business applications and resources. Personal devices often used by less security-conscious family members. This creates a very risky environment as personal devices are easy targets for threat actors especially since IT teams cannot fully monitor activity on these devices. Additionally, personal devices are often used by other family members – particularly children – which make them even more susceptible to malware and other viruses. Despite known security issues, VPN usage continues to thrive, with 90% of respondents currently using a VPN in some capacity for secure remote access. When access is permitted on a personal device, it creates a risky situation for not only the user, but the entire organization. VPNs lack many of the application-level access controls and integrated security that are common in ZTNA solutions. As a result, cybercriminals will often target VPNs because a single set of compromised credentials can provide all of the access needed to carry out a data breach, ransomware incident, or other attacks. “As this study shows, VPN usage continues to be prevalent, often viewed as ‘good enough’ for remote access among organizations simply because that is what they have always used, What this doesn’t account for is the poor administrative and end user experience, not to mention that on-premises access must be handled with separate, siloed tools. We have plenty of evidence to show that legacy VPNs no longer adequately protect nor provide consistent and easy access to corporate resources for today’s ‘work from anywhere’ workforce.” Jayanth Gummaraju, CEO & Co-Founder of Banyan Security Key Drivers for ZTNA A majority of the respondents (97%) stated that adopting a zero trust model is a priority for their organization, where 44% said they have plans to roll out zero trust but are in the early stages, while 53% said they have already begun to roll out zero trust solutions. For organizations who have begun to roll out ZTNA solutions, the survey revealed that secure remote access (48%), improving the end user experience (34%) and eliminating exposure to VPN vulnerabilities (34%) were the top three drivers in their decision to choose ZTNA. Unlike VPNs, ZTNA provides access on a case-by-case basis, which is decided based on user, device, and application-level access and security controls. What’s Holding VPN Users Back from Making the Switch? Over two thirds of organizations (69%) believe implementing a ZTNA strategy would require a large undertaking. Aside from the general familiarity and comfortable usage of their traditional VPN solution, organizations stated that cost/budget constraints are the biggest barriers (62%) for VPN users to adopt ZTNA. Thirty percent of VPN owners said that it would be difficult to implement ZTNA infrastructure in their current security environment; however, 82% of respondents stated they would likely implement ZTNA if there was an easily deployable, inexpensive option. Apathy also appears to be one of the biggest barriers preventing VPN owners from adopting ZTNA solutions with 46% of respondents stating that modern, secure remote access is not a priority at this time. “While it is good to see that awareness of ZTNA solutions amongst IT security professionals continues to grow, the actual implementation of a ZTNA architecture is still considerably low, with just over 17% of respondents having truly begun to roll out a ZTNA strategy,” continued Gummaraju. “As we look toward a future where remote and hybrid work are the standard for most organizations, it’s encouraging to see that IT teams are looking beyond VPNs at more comprehensive zero trust network access solutions.” Research Methodology The survey was conducted among 410 Senior Decision Makers from mid- to large-sized companies in the U.S. and Canada, who are responsible for IT security and are aware of both VPN and ZTNA. The interviews were conducted online by Sapio Research in April 2022 using an email invitation and an online survey, with results accurate to ± 4.8% at 95% confidence limits. About Banyan Security Banyan Security provides secure, zero trust “work from anywhere” access to infrastructure and applications for employees, developers, and third parties without relying on network-centric legacy VPNs. Deep visibility provides actionable insight while continuous authorization with device trust scoring and least privilege access deliver the highest level of protection with a great end user experience. Banyan Security protects tens of thousands of employees across multiple industries, including finance, healthcare, manufacturing, and technology.

Read More

Spotlight

Rajat Ghai, CTO of Benu Networks, talks about virtualization in Wi-Fi and new service and revenues opportunities. An excerpt from Wi-Fi Now 2016 in Vienna, Va.

Resources