AWS Security Incident Response Guide

June 26, 2019

Security is the highest priority at AWS. As an AWS customer, you benefit from a data center and network architecture that is built to meet the requirements of the most security-sensitive organizations. The AWS Cloud has a shared responsibility model. AWS manages security of the cloud. You are responsible for security in the cloud. This means that you retain control of the security you choose to implement. You get access to hundreds of tools and features to help you to meet your security objectives. These capabilities help you establish a security baseline that meets your objectives for your applications running in the cloud.

Spotlight

Arcserve

Arcserve provides exceptional solutions to protect the priceless digital assets of organizations in need of full scale, comprehensive data and ransomware protection. Established in 1983, Arcserve is the world’s most experienced provider of business continuity solutions that safeguard multi-generational IT infrastructures with applications and systems in any location, on premises and in the cloud. Organizations in over 150 countries around the world rely on Arcserve’s highly efficient, integrated technologies and expertise to eliminate the risk of data loss and extended downtime while reducing the cost and complexity of backing up and restoring data by up to 50 percent. Arcserve is headquartered in Minneapolis, Minnesota with locations around the world.

OTHER WHITEPAPERS
news image

Core principles of cyber hygiene in a world of cloud and mobility

whitePaper | February 15, 2022

Cybersecurity is a top concern at the highest levels of government and industry worldwide. More than ever, government and corporate leaders – from Senators and Members of Parliament to CEOs and Board Directors – are deeply engaged in ensuring effective cybersecurity strategies are in place at government agencies and companies.

Read More
news image

Top Ten Considerations for Your Nextgeneration SD-WAN

whitePaper | September 7, 2022

The need for organizations to change to meet evolving business environments is not a new concept. However, what is new in our current moment is the pace of change. Organizations across all industries now have to adapt to a rapidly evolving IT and application environment. These changes have been accelerated by a global pandemic that is forcing employees to work remotely and by the adoption of modern applications that are distributed across corporate data centers, multiple public clouds, and increasingly, edge locations. Unfortunately, both of these efforts create more IT complexity.

Read More
news image

vSphere Security - VMware vSphere 6.7

whitePaper | December 25, 2019

A companion document, Platform Services Controller Administration, explains how you can use the Platform Services Controller services, for example, to manage authentication with vCenter Single Sign-On and to manage certificates in your vSphere environment. The vSphere Security Configuration Guide contains guidelines on security settings that can or should be set by the customer, and security settings delivered by VMware that should be audited by the customer to ensure that they are still set to default.

Read More
news image

Cisco ACI Multi-Site Architecture

whitePaper | August 3, 2021

With the increasing adoption of Cisco® Application Centric Infrastructure (Cisco ACI®) as a pervasive fabric technology, enterprises and service providers commonly need to interconnect separate Cisco ACI fabrics. Business requirements (business continuance, disaster avoidance, etc.) lead to the deployment of separate data center fabrics, and these need to be interconnected with each other. Depending on the deployment option used (and as explained in this document), these fabrics may be called pods or fabrics and sites.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | October 12, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

THE TELECOMMUNICATIONS INDUSTRY EMBRACES CLOUD-NATIVE ENGINEERING

whitePaper | September 12, 2022

Cloud-based or cloud-native applications have long been the standard for most enterprises. However, 5G networks have become the focus for communications service providers (CSPs) over cloud-native applications in vertical applications, as they leverage technology and modeling approaches such as network function containerization, service-oriented architecture, software-defi ned networking, network-as-a-service, cloudifi cation, etc

Read More

Spotlight

Arcserve

Arcserve provides exceptional solutions to protect the priceless digital assets of organizations in need of full scale, comprehensive data and ransomware protection. Established in 1983, Arcserve is the world’s most experienced provider of business continuity solutions that safeguard multi-generational IT infrastructures with applications and systems in any location, on premises and in the cloud. Organizations in over 150 countries around the world rely on Arcserve’s highly efficient, integrated technologies and expertise to eliminate the risk of data loss and extended downtime while reducing the cost and complexity of backing up and restoring data by up to 50 percent. Arcserve is headquartered in Minneapolis, Minnesota with locations around the world.

Events