Category Archives: Cloud Computing

Security in the public cloud explained: A guide for IT and security admins – ComputerWeekly.com

Who is responsible for security in the public cloud? This is a question businesses need to consider as they increasingly deploy more workloads and use cloud-based IT infrastructure, platform services and applications.

In Gartners How to make integrated IaaS and PaaS more secure than your own data center report, analysts discuss the benefits of adopting a cloud-native approach to IT security.

Gartner defines a cloud-native mindset as a way to consider IT infrastructure and applications in the cloud as modular and microservices-based. The report authors state that such an architecture is typically container-based, orchestrated and incorporates heavy use of application programming interfaces (APIs). In addition, Gartner says such IT infrastructure is updated using an immutable infrastructure approach.

However, the analysts warn that such an approach does not work well for on-premise IT. The on-premise architectural patterns and their associated tools are poorly suited for the public cloud and will likely frustrate the needs of developers and business units adopting public cloud for its dynamic and ephemeral nature, they note in the report.

Gartner urges IT security leaders responsible for cloud security to be open to embracing new approaches, patterns, products and best practices, and consider alternative IT security technology providers when adopting public cloud.

While largely a benefit, the public cloud also leaves organisations open to public cloud security risks, particularly when they allow users to access on-demand services from various locations using different devices. Beji Jacob, who is on the ISACA emerging trends working group, describes cloud security as technology and techniques engineered to prevent and mitigate threats to an organisations cyber security.

Companies must implement cloud computing security to support both digital transformations and the use of cloud-based tools to protect assets, he says, adding that cloud security works by combining several technologies, all designed to tighten cyber defences for off-premise data and applications.

Rob Dartnall, CEO of SecAlliance, regularly conducts threat-led penetration tests (TLPT) that are part of regulatory frameworks, such as the Bank of Englands CBEST targeted assessment and the UK governments intelligence-led simulated attack framework, GBEST, in the UK.

A key component of the threat intelligence element of these tests is called targeting intelligence, he says. Essentially, it is hostile reconnaissance of an entity that includes many things, but importantly, the reconnaissance of the perimeter and cloud services of an entity to look for weaknesses that could be used to gain a foothold.

In Dartnalls experience, although technical exploitation of a perimeter service by the red teamer is rare against mature entities such as banks, the discovery of shadow services, intellectual property ranges and domains that the entity was not aware of is certainly not rare.

He says there is a direct correlation between those entities that suffer a breach and those that have deployed external attack surface management (EASM). This is an approach to perimeter security where an internal team or external security service provider continuously looks at the perimeter and beyond, not only looking at what is running, versions, services and ports, security controls and misconfigurations, but also at new shadow services, usually accidentally set up by rogue developers, engineers or architects. These shadow IT services, he says, consistently lead to security incidents and data breaches.

There is a role for artificial intelligence (AI) and machine learning (ML), which can operate at a large scale, utilising learning, and can adapt to an organisations data protection needs. By increasing automation, decision-making can be sped up, and data bound for, or already deployed, in the cloud, can be assessed and appropriately protected more rapidly, according to Scott Swalling, a data and cloud security expert at PA Consulting.

Swalling says cloud tools such as Google BigQuery and Amazon Macie use AI and ML to provide capabilities that help organisations better manage their data in public clouds and mitigate the exposure of sensitive data.

AWS Config, Azure Policy, or Google Clouds Security and Command Centre also help automate the monitoring and enforcement of security policies. Implementing continuous monitoring solutions will detect and alert on misconfigurations, suspect access requests and other security incidents in real time.

In addition to automated monitoring and enforcement, Swalling points out that the implementation of well-managed and regularly reviewed threat management allows organisations to be more proactive and agile in their response to threats.

Identity and access management is a core component of proactive IT security management. However, Carlos De Sola Caraballo, senior principal analyst at Gartner, warns that traditional asset-centric approaches to identity management will fail to provide the necessary visibility in cloud environments.

He recommends that IT security leaders focus on user identities and their associated permissions, establishing baselines for normal behaviour and configuring alerts to detect anomalies.

This approach enhances the ability to track and manage incidents across the cloud infrastructure, ensuring a more comprehensive and timely response, he says.

Whether an organisation is beginning its journey of migrating key services to the cloud or launching a cloud-native evergreen project, involving security specialists with a deep understanding of the cloud security model is an important factor.

Elliott Wilkes, chief technology officer (CTO) at Advanced Cyber Defence Systems, touches on the cloud shared responsibility model, whereby cloud providers are responsible for certain elements of each of the services. He says they need to monitor, defend and protect these elements, which include physical infrastructure and access controls at datacentres, resilient power backups and the like. All of the things youd typically expect a datacentre to provide, the CSPs [cloud service providers] will provide, he says.

Knowing what parts of the public cloud infrastructure are managed by the cloud service provider enables IT teams to develop a plan for how to tackle the security gaps they need to address.

Gartners Caraballo recommends that IT security leaders engage governance, risk and compliance (GRC) and legal teams early in the process of selecting a CSP.

Wilkes agrees, saying: Explicit contract stipulations are necessary to ensure robust incident response support from the CSP.

Caraballo recommends that IT security leaders consider overall business resilience when developing a strategy to respond to security incidents that occur in cloud environments. He notes that this requires a broader approach, which involves not only technical responses, but also strategic planning, such as digital supply chain redundancies and robust legal contracts. He urges IT security leaders to ensure their incident response plans are comprehensive, incorporating cloud-specific considerations and aligning with overall business continuity and disaster recovery strategies.

According to Caraballo, the transition to cloud environments necessitates a fundamental shift in incident response strategies. He urges IT security leaders to reassess and upgrade their incident response procedures, leveraging automation, proactive collaboration and identity-centric security to meet the unique challenges of the cloud.

The dynamic nature of cloud security demands equally dynamic and flexible incident response strategies, ensuring that organisations can respond swiftly and effectively to emerging threats, he adds.

The good news, at least from Swallings perspective, is that cloud providers have the ability to assess vast amounts of data and threats. This, he points out, means public cloud services are currently superior in leveraging AI than simpler on-premise security tooling.

See original here:
Security in the public cloud explained: A guide for IT and security admins - ComputerWeekly.com

Hybrid and Multi-Cloud technologies in 2024: Developments, challenges, and Innovations – Sify

The future of cloud computing is a fine balance between the flexibility of the cloud and the protection of data, where hybrid and multi-cloud form the music of continued innovation.

Consider running an internet discussion with thousands of users while it requires immense stability and protection, it also needs to be able to adapt to the increasing number of users in a matter of seconds. However, sudden surges in the number of attendees during live sessions place great stress on their on-premises servers, to the point that the courses become frustrating to manage. Thats the cloud conundrum for business today.

This is where hybrid and multi-cloud technologies provide the prerequisite solution. To effectively address the demands of large audiences, the organisation uses a public cloud for live streaming and chat during times of maximum attendance while preserving the confidentiality of data in a private cloud. Scalability and security go hand in hand with this strategy, making it a great combination for any global event.

Lets now examine the most recent developments, challenges, and innovations influencing hybrid and multi-cloud solutions in 2024.

One of the biggest changes that will be observed in hybrid and multi-cloud technologies by 2024 is better integration. Currently, cloud providers are working towards providing synchronous compatibility between different environments of clouds. For example, Microsoft Azure Arc helps organizations maintain and govern resources in on-premises, edge, and multi-cloud spaces. This makes it more efficient to run the cloud services and it gets rid of the hassle of dealing with different cloud services. A real-time example is Nokia, which is a multinational firm that applies Azure Arc to govern the firms IT resources irrespective of their location, as well as ensure the smooth functioning of the IT systems.

As organisations transition to hybrid and multi-cloud systems, security continues to be a top priority. With improved encryption standards, AI security analysis, and the zero-trust architecture, cloud security in 2024 will be even more strengthened. Such solutions as IBM Cloud Pak for Security are instrumental in this by presenting companies such as IBM with extensive security analytics across hybrid and multi-cloud settings. For example, the worlds largest bank, BNP Paribas, uses IBMs tight security to protect its financial data and adheres to stringent legislation in multiple clouds.

AI & ML are now embedded in hybrid and multi-cloud environments in todays world. These technologies enable predictive algorithms, control of resources, and improvement of organizational processes. For example, the Google Cloud AI Platform offers solutions that cover the entire machine learning development process and deployment across different clouds. This capability enables the formulation of crucial conclusions and the application of automation across an organization.

One of the best use cases of AI and ML cooperation can be discussed concerning GE Healthcare, where Google Cloud AI and ML are implemented in the companys medical imaging products. Using these technologies, GE Healthcare has enhanced imaging algorithms that aid radiologists in better and faster diagnosis of a condition. This integration benefits the patient by improving their health while at the same time enhancing the efficiency of operations in healthcare institutions, thus highlighting the effectiveness of AI & ML in hybrid and multi-cloud models.

Indeed, hybrid and multi-cloud are a perfect solution for businesses, although orientation in such a topology is not easy. Here are the key challenges that organisations need to address effectively:

It can be challenging when an organization is using multiple cloud environments that have different tools interfaces and billing structures. The IT teams require skills in managing the different cloud management platforms, security solutions, and orchestration services for a seamless functioning across the hybrid and multi-cloud ecosystem. For instance, a company may use AWS to host resources, Microsoft Azure to host data, and a private cloud especially for storing financial information. While working with different platforms, it is revealed that each has a unique management console and billing system, and IT personnel need to be acquainted comprehensively with these interfaces for handling the inventory, solving problems, and controlling expenses.

The ability to maintain uniform security across several cloud domains is one of the fundamental challenges. Therefore, for all types of clouds, businesses must create and put into place strict security procedures that include encryption, access rights, risk assessment, and compliance with legal requirements. This is especially true when working with a multi-cloud environment, where data can be located on different providers platforms with various levels of protection. For instance, a healthcare provider may allow patient records to be stored on the private cloud due to privacy concerns but may use the public cloud for analytics. So, it is important to keep an equal level of encryption, access control, and periodic security checks in both settings to avoid compromising patient information and medical records.

Still, vendor lock-in is a potential concern when it comes to multi-cloud. The rationale behind multi-cloud is to avoid being overly reliant on a single vendor, but even here this issue persists. This means that organizations can end up locked in with particular cloud providers for particular services or employments, and it can be inconceivable and costly to shift to another provider in the future. For example, an enterprise may rely on several computing applications that are not available on a server provided by a typical cloud provider. When they consider changing providers in the future, they may have a problem transferring their applications to another serverless provider because of proprietary functions or interfaces. The key to avoiding being locked into a particular cloud provider is to research and effectively determine which providers can offer the services needed now and in the future without requiring a change in providers.

Hybrid and multi-cloud architectures are being enhanced by edge computing, as it offloads computation and storage closer to data origin. This innovation helps lower the latency and enhances the response time for applications that require real-time output. Tech giants like AWS are already providing solutions like AWS Outposts to bring the AWS infrastructure services into the customers premises. A clear example is in self-driving cars, where edge computing comes in handy to process data and make decisions in real time, which is vital to operations.

Kubernetes and the use of containers are emerging as a new solution to deploy and manage applications in hybrid and multi-cloud environments. Kubernetes offers a foundation for automatically deploying, scaling, and managing application containers across the clusters of hosts. This technology is backed by prominent cloud providers such as Google Cloud Anthos that apply consistent management across the hybrid or multi-cloud setup. For example, the fintech firm PayPal deploys Kubernetes to guarantee the high availability and horizontal scalability of its services when deploying onto a variety of cloud platforms to support its global payment processing needs.

Serverless computing is a form of cloud computing in which the cloud provider manages the execution of all application code in response to events while providing limited computing resources for the code to run. This innovation makes the development process less complex and improves scalability among the applications. Azure Functions and AWS Lambda are examples of Serverless Computing that enables businesses to upload code which runs in response to particular events and these can automatically scale up or down. An example of this is Netflix, the video streaming company that utilizes AWS Lambda for managing content and delivery to viewers across the globe.

The future of cloud computing is a fine balance between the flexibility of the cloud and the protection of data, where hybrid and multi-cloud form the music of continued innovation. AI-based security solutions and serverless architecture, which are relatively new concepts, have opened the door to a new level of organizational efficiency and business scalability. But its not easy to simplify this complex system, which is why sophisticated IT players, the real choreographers are needed. Thereby, the limitations of a single cloud are history. The stage is set for businesses to unlock a new level of efficiency and scalability; the only question is, are you ready for your curtain call? For more detailed information on trends such as hybrid and multi-cloud, visit Sify Technologies and explore their comprehensive resources on cloud solutions.

Read the original here:
Hybrid and Multi-Cloud technologies in 2024: Developments, challenges, and Innovations - Sify

Microsoft (MSFT) Up 18.9% YTD on Cloud Strength: Time to Buy? – Zacks Investment Research

Microsoft (MSFT Quick QuoteMSFT - Free Report) has seen its stock price climb 18.9% year to date, outpacing the Zacks Computer Software industry and S&P 500 index, which have returned 15.2% and 14.7%, respectively. This impressive performance can be largely attributed to the company's strong positioning in two key areas cloud computing and artificial intelligence (AI).

MSFT projects a 15.2% net sales increase for fiscal 2024 that showcases the strength of its cloud-centric strategy. Intelligent Cloud, which includes Azure, server products and enterprise services, generated a robust $26.7 billion in revenues, in the fiscal third quarter, marking a 21% year-over-year increase.

For the fiscal fourth quarter, Microsoft expects Intelligent Cloud revenues between $28.4 billion and $28.7 billion. Our model estimate for Intelligent Cloud revenues is currently pegged at $28.5 billion, indicating 19% growth from the figure reported in the year-ago quarter.

Looking forward, we expect cloud services and AI innovations to remain a key growth driver for Microsoft.

Image Source: Zacks Investment Research

Azure continues to be a major growth driver, demonstrating the sustained demand for cloud services across industries. In the third quarter of fiscal 2024, Azure and other cloud services revenues grew 31% year over year (up 31% at cc), including roughly 7 points from AI services.

In the global cloud infrastructure market, Azure has solidified its position as the second-largest provider, reaching a record 25% market share in the first quarter of 2024, according to Synergy Research Group. This narrows the gap with market leader Amazon (AMZN Quick QuoteAMZN - Free Report) -owned Amazon Web Services (31%) while outpacing Alphabet (GOOGL Quick QuoteGOOGL - Free Report) -owned Google Cloud (11%). The "Big Three" now control 67% of the expanding cloud sector. Azure Arc, Microsoft's hybrid cloud offering, has been a key differentiator among competitor offerings. It allows its customers DICKS Sporting Goods and World Bank to run Azure services across on-premises, multi-cloud, and edge environments. Arc now has 33,000 customers, up more than twofold year over year.

MSFTs strategy of developing industry-specific cloud solutions, such as Azure for Healthcare and Azure for Financial Services, has proven effective in penetrating key verticals.

Microsoft has become the hyperscale platform of choice for SAP and Oracle workloads, with Conduent and Medline moving their on-premises Oracle estates to Azure, and Kyndryl and LOreal migrating their SAP workloads to Azure.

Beyond Azure, Microsoft's cloud dominance extends to its analytics platform, Microsoft Fabric, which has attracted over 11,000 paid customers. The integration of Fabric with Azure AI Studio and Power BI showcases Microsoft's comprehensive approach to cloud services, now serving more than 350,000 paid customers across its ecosystem.

As digital transformation accelerates and demand for AI, machine learning and secure cloud solutions grows, Microsoft's Azure platform is well-positioned to capitalize on these trends, driving continued growth and innovation in the cloud computing space. In Azure, MSFT expects revenue growth at cc between 30% and 31% for the fourth quarter of fiscal 2024.

Microsoft's Azure platform is spearheading the company's AI-driven growth strategy. The integration of OpenAI's GPT-4 into Bing and Edge showcases Azure's capabilities in delivering advanced AI experiences.

The Azure OpenAI Service has become a pivotal tool for developers, facilitating the incorporation of generative AI across diverse applications. The collaboration with OpenAI on an advanced data center project further cements Azure's position as a leader in AI infrastructure.

In the fiscal third quarter, the company reported impressive adoption of Azure AI, boasting over 53,000 customers, with more than a third being new to Azure in the past year. More than 65% of the Fortune 500 now use Azure OpenAI Service. MSFT continues to innovate and partner broadly to bring customers the best selection of frontier models and open-source models, including large language models and small language models.

More than half of Azure AI customers use the companys data and analytics tools. Customers are building intelligent applications running on Azure PostgreSQL and Cosmos DB, with deep integrations with Azure AI.

Microsoft's launch of AI-powered copilot templates for retailers demonstrates Azure's versatility in creating industry-specific solutions. These developments highlight Azure's central role in Microsoft's AI strategy, driving innovation and market expansion.

Given the promising long-term prospects, maintaining a position in Microsoft, which has a Zacks Rank #3 (Hold) appears prudent at present. You can see the complete list of todays Zacks #1 Rank (Strong Buy) stocks here.

The Zacks Consensus Estimate for MSFTs fiscal 2024 revenues is pegged at $244.41 billion, indicating 15.3% growth year over year. The consensus mark for earnings per share is pegged at $11.77, which has moved up by a penny in the past 60 days, indicating 20% growth year over year.

Image Source: Zacks Investment Research

Moreover, MSFT is trading at a premium with a forward 12-month P/S of 13.59X compared with the industrys 9.42X and higher than the median of 11X, reflecting a stretched valuation.

Image Source: Zacks Investment Research

Hence, investors looking to buy the stock should rather wait for a better entry point.

See the rest here:
Microsoft (MSFT) Up 18.9% YTD on Cloud Strength: Time to Buy? - Zacks Investment Research

Crafting a Robust Cloud Security Strategy in 2024 – MSSP Alert

As cloud computing has evolved, weve entrusted more and more of our data to it. Our everyday correspondence is in the cloud. Our favorite applications are in the cloud, and, more and more, our most sensitive data is in the cloud. To protect the integrity of your organizations assets, youll need a comprehensive cloud security strategy.

However, the cloud isnt a single piece of hardware or software. Its a complex ecosystem of computers, routers, apps, websites, files, services, and more. As such, your organizationssecurity posturehas to be just as versatile and flexible as the systems it protects.

Crafting a cloud security strategy in 2024 requires a clear understanding of modern threats, countermeasures, and best practices. With the right knowledge and tools at your disposal, you can educate your staff, secure your data, and take full advantage of what the cloud has to offer.

Because the cloud encompasses so many different systems, it can be difficult to pin down exactly what a modern cloud security strategy should look like. In broad terms, cloud security refers to any process thatsafeguards data in the cloud, whether that data is in an app, a file storage system, or a development platform. This means implementing smart security policies, and updating them over time as threats change.

Cloud computing hasbeen around since the 1960s, but didnt become widely available until the 1990s. As cloud computing has advanced, security protocols have had to keep pace with it. Early cloud security solutions could control access to remote systems and offer basic data protection, but not much else.

Over time, cloud security has become more sophisticated. Todays security solutions offer continuous monitoring, real-time incident response, and a focus on theshared responsibility model. Essentially, employees are responsible for keeping their own data secure, while organizations and service providers are responsible for keeping the systems that store the data secure.

While no two organizations will employ the exact same protocols, there are a few elements that every good cloud security strategy needs:

As of 2022,60% of all corporate datalives in the cloud and that number is not likely to go down anytime soon. As organizations shift their resources from local servers to cloud apps, company policies must evolve to address a different set of security risks. IT and security teams need to be aware of the latest cybersecurity threats as well as the countermeasures for them.

The world of cybersecurity moves fast. Security researchers find an average of72 new vulnerabilities per day. A good security suite can block most of these potential exploits but probably not all of them. To keep pace with emerging threats, your organization should be proactive. Resources such as theLookout Threat Intelligence Platformcan keep you apprised of new vulnerabilities as they emerge and help you analyze current patterns and trends. You should alsoassess your security postureregularly, and have solid, actionable plans in place to deal with threats of varying severity.

Depending on your organizations field, you may have to comply with governmental or industry regulations. The finance, manufacturing, education, retail, and transportation industries, for example, must hold their sensitive data toespecially strict standards. Organizations that do business in Europe have to follow GDPR guidelines, while theHealth Insurance Portability and Accountability Act (HIPAA)protects patient privacy in the United States. These regulations apply whether you store your data on premises or in the cloud.

There are two major threats to any cloud-based system: external threat actors and internal misuse. A sound cloud security strategy must account for both. To lay the foundation for a solid security posture, you should verify users constantly, restrict access to sensitive data, and protect data when its in use.

Not every employee needs to access every piece of data at your organization. The principle of least privilege grants employees the absolute minimum level of clearance they need to do their jobs. For example, an intern might only be able to access clerical data, a manager might be able to access sensitive records, and an IT specialist might be able to access just about everything. Minimizing privileges reduces the risk of unauthorized access, and limits how much damage an attacker could do with a compromised account.

Older cloud security systems focused on access control, or determining which users were authorized for certain systems. While access control is a good starting point, it doesnt help with accidental data leakage, misconfigured permissions, or compromised accounts.

Instead, your security team should adopt adata-centric approach. Data-centric solutions focus on classifying sensitive data appropriately, and either granting or limiting access on a file-by-file basis. Implementing a DLP policy can help you analyze data usage patterns, grant or deny access situationally, and encrypt files at every stage of the process.

Modern-day threat actors frequently use mobile devices as an entry point into corporate systems. Thats why any mobile device with access to your corporate resources needs to be secured. Many organizations usemobile device management (MDM)to keep track of corporate-owned devices, but MDM doesnt cover employees personal devices.Mobile endpoint securitycan complement your existing MDM while giving you more comprehensive coverage over corporate and personal devices.

Shadow IT refers to employees using unapproved technologies to do their jobs, rather than relying exclusively on company-issued tools. This issue has become even more pervasive with the rise of remote work andbring-your-own-device (BYOD) policies. While shadow IT isnt necessarily a bad thing, you do need to account for it in your cloud security strategies. Acloud access security broker (CASB)acts as an intermediary between your workers and the cloud, helping you identify and monitor third-party apps.

In the past, organizations favored virtual private networks (VPNs) and identity access management (IAM) services to facilitate remote work. However, these tools are binary: either a user is logged in, or theyre not. That makes VPNs and IAMs relatively easy to compromise, especially with a stolen device orsocially engineered credentials.

Zero trust network access (ZTNA)is a more nuanced and more secure option for remote access. With ZTNA, you can analyze user behavior and grant granular access to sensitive data. Depending on an employees device, location, and network security, a ZTNA solution could let them into your system right away, or require them to complete multiple login and multi-factor authentication (MFA) challenges.

Anything in the cloud is, by definition, on the internet, and storing files on theinternet presents different security risksthan storing them on a local machine. Cloud files are subject to social engineering attempts, compromised employee accounts, and malware kits. Asecure web gateway (SWG)can neutralize many of these threats by analyzing internet traffic, enforcing acceptable use policies, and blocking potentially dangerous URLs and IP addresses.

While your employees are your best defense against cybersecurity threats, they may also be your largest source of uncertainty. Their access patterns and endpoints can change rapidly from assignment to assignment. That could make improper data usage or worse, a compromised account hard to spot.User and entity behavior analytics (UEBA)can learn normal employee behavior over time and flag suspicious behavior based on login location, frequency of access, data sharing habits, and more.

Azero-trust modelassumes that anyone attempting to access your organizations systems could be a threat actor. Instead of logging in once and staying logged in, a zero-trust approach makes employees enter their usernames, passwords, and MFA credentials on every device, in every location, and on every network. While this adds a few extra minutes of work for employees each day, it also makes it incredibly difficult for stolen devices or compromised passwords to threaten your sensitive data.

With the right credentials in hand, a threat actor may need only a few minutes to pull off a complicated attack. Real-time monitoring allows you to flag and analyze incidents as they happen, rather than after the fact. Ensure that your security solution provides monitoring features, and have a plan in place to report, contain, and neutralize incidents as they happen. Be sure that this plan includes a way to restore normal operations as quickly as possible.

Unless you test your systems, you wont know for sure whether they can actually deter a cyber attack. Perform regular security assessments that test your organizations access controls, encryption, network segmentation, and intrusion detection capabilities. Frequentvulnerability management, where you scan for and patch known vulnerabilities, can help your assessments succeed.

You should also perform regular security audits. Rather than testing your systems directly, audits review your security control settings and address any instances of noncompliance. Communicating the results of these audits is also a good way to let the rest of your organization know what youre doing to promote cybersecurity behind the scenes.

Teach your employees about common cybersecurity threats, including phishing, password spraying, and unsolicited downloads. Ensure your workers know how to craft strong passwords and change them frequently. Learn about the data permissions they need to do their jobs and explain how they can responsibly store, modify, and share that data.

You should also have a system in place for reporting security issues. Once your employees know what to look for, they should be able to spot phishing attempts, internal vulnerabilities, and malicious websites. Not only will this help keep your data safe, but your staff may also feel more invested in your organizations cybersecurity practices.

Cloud computing is a huge, complex, and occasionally unwieldy concept. As such, your organizations cloud security strategy needs to be robust, versatile, and adaptable. However, relying on dozens of different tools is time-consuming and can result in an inconsistent security posture. Asecurity service edge (SSE)solution combines SWG, ZTNA, and CASB technologies into a comprehensive platform. TheLookout Cloud Security Platformis a data-centric SSE solution with built-in DLP and UEBA capabilities.

For more information on how to manage and protect your data in the cloud, read the Lookout report onHow to Build an Effective Data Security Strategy. In it, youll learn why cloud computing has become so popular and why this popularity makes it a tempting target for threat actors. The report suggests five practical steps to safeguard your organizations data, from performing continuous risk assessment to identifying unsanctioned apps. Once you know the risks, your organization can leverage the clouds full potential.

Blog courtesy of Lookout. Regularly contributedguest blogsare part of MSSP Alertssponsorship program. Read more Lookout news and guest blogs here.

The rest is here:
Crafting a Robust Cloud Security Strategy in 2024 - MSSP Alert

Hybrid Cloud Market Growth, Overview with Detailed Analysis 2023-2029 – WhaTech

By the end of the forecast period, APAC is anticipated to hold more than 60% of the global market shares, dominating the hybrid cloud market. China has become the second-largest market in the world, after the United States, because to its notable advancements in cloud computing.

Hybrid CloudMarket Growth Or Demand Increase Or Decrease For What Contain:

The hybrid cloud market is witnessing substantial growth driven by the increasing need for scalable, flexible, and cost-effective IT infrastructure solutions. Organizations are increasingly adopting hybrid cloud models to balance the benefits of both public and private clouds, enhancing their ability to manage workloads dynamically while maintaining security and compliance.

Key factors contributing to this demand include the growing volume of data, the need for disaster recovery solutions, and the desire for improved business agility. Additionally, advancements in cloud technologies, enhanced security features, and the integration of artificial intelligence and machine learning are further propelling market growth.

The hybrid cloud model's capability to provide a seamless and efficient way to manage and deploy applications across different environments is making it a preferred choice for enterprises globally.

Hybrid CloudMarketCAGR Estimation:

The hybrid cloud market was estimated to be worth US$ 54.11 billion in 2022. From 2023 to 2029, it is anticipated that total hybrid cloud revenue will increase at a rate of 13.51%, or close to US$ 131.37 billion.

Explore additional details by clicking the link provided:www.maximizemarketresearch.com/requestple/24915/

Hybrid CloudMarket Segmentation:

by Component

Solution Services

Over the course of the projection period, the services segment is anticipated to develop at a CAGR of 8.7%. The use of hybrid clouds in business is expected to increase in the upcoming years because to its improved scalability, low cost, and secure deployment options.

It has become an essential part of company operations. Establishing a hybrid hosting environment with co-location, dedicated servers, and virtualized systems is becoming easier for businesses to combine.

by Service Model

Software as a service (SaaS) Infrastructure as a service (IaaS) Platform as a service (PaaS)

Over the course of the forecast period, the SaaS market is anticipated to expand at a CAGR of 9.7%. SaaS is quite popular because of its quick setup, easy maintenance, and variable pricing.

Over 70% of businesses are shifting the majority of their apps to SaaS platforms as more and more shift their operations to the cloud. The need for SaaS solutions that let collaborative teams access formerly centralized data and analytics has increased due to remote working.

by Organization Size

Large enterprises Small and medium enterprises

by Industry Vertical

IT & Telecom Healthcare BFSI Retail Government Media & entertainment Transportation & Logistics Manufacturing Others

Over the projection period, the BFSI segment is anticipated to increase at a CAGR of 8.2%. Cloud computing is a key component of the digital transformation that banks have deployed in response to the growth of internet banking in the BFSI sector.

Businesses in the BFSI sector have benefited from reduced costs, increased flexibility, improved client relations, and a climate of innovation thanks to cloud computing. The COVID-19 pandemic has changed how people communicate and do business.

One of the factors driving demand for the expansion of the BFSI segment is the usage of cloud services for client data storage and monitoring. gateways for payments,

Hybrid CloudMarket Overview:

The hybrid cloud market represents a pivotal shift in how businesses manage their IT infrastructure by integrating both public and private cloud environments. This model allows organizations to leverage the scalability and cost-efficiency of public clouds while retaining control over sensitive data and critical applications in private clouds.

Hybrid cloud solutions offer flexibility, enabling seamless workload management across multiple platforms and environments.

Key drivers of the hybrid cloud market include the increasing adoption of digital transformation strategies, the need for efficient data management solutions, and the demand for enhanced business agility. Organizations benefit from the ability to optimize resource allocation, scale IT operations as needed, and improve overall operational efficiency.

Explore additional details by clicking the link provided:www.maximizemarketresearch.com/requestple/24915/

Hybrid Cloud Market Growth Or Demand in which regions??

The growth and demand for hybrid cloud solutions are robust across various regions globally, driven by diverse factors influencing IT infrastructure modernization and digital transformation initiatives. In North America, particularly in the United States and Canada, the hybrid cloud market is mature and expanding rapidly.

This region benefits from a strong presence of leading cloud service providers, advanced technological infrastructure, and a high adoption rate among enterprises across various sectors, including technology, healthcare, and finance.

Europe is also a significant market for hybrid cloud adoption, with countries like the United Kingdom, Germany, and France leading in digital innovation and cloud services. The region's stringent data protection regulations, such as GDPR (General Data Protection Regulation), are driving enterprises to adopt hybrid cloud models that balance data sovereignty requirements with the scalability offered by public cloud platforms.

Asia-Pacific represents a burgeoning market for hybrid cloud solutions, fueled by rapid economic growth, increasing digitalization efforts, and the adoption of cloud-based technologies across industries. Countries like China, India, and Japan are witnessing substantial investments in cloud infrastructure and services, driven by expanding internet penetration, rising demand for data storage and management solutions, and government initiatives promoting digital transformation.

Hybrid CloudMarket Scope and Methodology:

The scope of the hybrid cloud market analysis encompasses a thorough examination of the adoption trends, technological advancements, and market dynamics associated with hybrid cloud solutions globally. Methodologically, this research employs a combination of primary and secondary research methods to gather comprehensive and reliable data.

Primary research involves conducting interviews and surveys with key stakeholders, including IT professionals, cloud service providers, and decision-makers in various industries. These insights provide firsthand information on adoption trends, challenges, and preferences regarding hybrid cloud deployments.

Secondary research entails the analysis of industry reports, market studies, academic publications, and regulatory frameworks related to cloud computing and data management. This helps validate and enrich the primary data, offering a broader perspective on market trends, competitive landscapes, and technological innovations.

For a deeper understanding, click on the link:www.maximizemarketresearch.com/requestple/24915/

Hybrid Cloud Market Key Players:

To access more comprehensive information, click here:www.maximizemarketresearch.com/market-ket/24915/

Key questions answered in the Hybrid Cloud Market are:

This email address is being protected from spambots. You need JavaScript enabled to view it.

Read this article:
Hybrid Cloud Market Growth, Overview with Detailed Analysis 2023-2029 - WhaTech

Northern Data Reportedly Weighs AI Unit IPO at Up to $16B Value – Mergers & Acquisitions

If you are a visitor of this website:

Please try again in a few minutes.

There is an issue between Cloudflare's cache and your origin web server. Cloudflare monitors for these errors and automatically investigates the cause. To help support the investigation, you can pull the corresponding error log from your web server and submit it our support team. Please include the Ray ID (which is at the bottom of this error page). Additional troubleshooting resources.

Follow this link:
Northern Data Reportedly Weighs AI Unit IPO at Up to $16B Value - Mergers & Acquisitions

Unlock the Power of Cloud Computing with Microsoft Azure’s 200+ Services – GeekSided

Microsoft Azure offers a collection of scalable and reliable services designed to run on the cloud. You can use all of the most popular languages to put them to work, including PHP, Python, .NET, and Java, and you can count on those applications to run 24/7, even during traffic spikes or issues.

There are more than 200 products and services for building, deploying, and managing your applications included in Microsoft Azure software. Give your apps AI capabilities, language understanding, enterprise-grade search capability, and more.

When you combine Azure with other products from Microsoft, like Microsoft Security, Microsoft 365, and Dynamics 365, you have a powerful and comprehensive set of tools that are difficult to duplicate elsewhere.

By utilizing Microsoft Azure, you can increase productivity. Cloud-based applications also enhance collaboration, and entire teams can work on a project at once without undergoing a steep learning curve.

With more than 8,500 global cybersecurity experts on the job, you can feel confident that Microsoft Azure app security is up to the task of keeping your apps secure and compliant with any standard, helping to keep you and your customers safe.

One of the greatest things about Microsoft Azure is that each of the tools completes a single task, so there is no need to spend a lot of time digging through everything Microsoft Cloud computing has to offer. Instead, you can get started immediately with a tool that you need right now.

For instance, you might begin with an AI-assisted search to help gather information about your target audience or competitors or a database to help you keep track of your accounting. Later, when you are ready to promote your product, you can make use of AI-assisted bots to help with social media and emails.

Azure has a huge selection of applications that you can use. The following list just gives some of the highlights with an example of what you might do with each, and you can get a complete list on the Microsoft Azure website.

Azure AI Bot Service allows developers to build and deploy intelligent bots that can interact naturally with users through websites, apps, Cortana, Microsoft Teams, Facebook Messenger, and more.

These make great chatbots that can answer questions people might have when they visit your website.

Azure AI Search offers advanced search capabilities over content in a web or mobile application. It can integrate with other Azure services, enabling developers to add sophisticated search functionalities without a lot of effort. The AI helps provide auto-complete, search suggestions, and more.

Azure AI Search is a great tool for improving the shopping experience of your guests by enabling customers to quickly and accurately find products.

Azure Analysis Services is a fully managed platform-as-a-service (PaaS) providing enterprise-grade data modeling in the cloud. It helps simplify data and enable fast decision-making through complex data models. It integrates easily with other services, like Azure SQL Database, for even more flexibility.

Azure Analysis Services is a great choice when you need a comprehensive and real-time overview of sales performance across various retail locations to enable quick strategic decisions.

Event Hubs is a data streaming platform and event ingestion service. It can handle millions of events per second and automatically scales up to meet demand. It supports various protocols, like HTTPS, Apache Kafka, and AMQP, making it versatile for different programming environments.

Use an Event Hub when you need to control and monitor several video cameras at once in your home or business security system.

Azure App Service is a fully managed platform for building, deploying, and scaling web apps. It supports multiple programming languages and provides a powerful cloud environment that eliminates the complexity of managing a server.

Azure App Service is the ideal choice for e-commerce web applications.

To get started with Microsoft Azure, you can sign up for a free 30-day trial, which turns into a pay-as-you-go model after that. However, many of the apps are free even with the basic plan, with costs accruing only after you reach a threshold, and the paid services are low-cost for smaller businesses with lower demands.

There is even a pricing calculator you can use to help get an estimate for costs to help you set up a budget.

Microsoft Azure can host a website using the app service, a virtual machine, static web apps, blob storage, or Kubernetes service. Each method has special advantages you might want to take advantage of. For instance, blob storage can be extremely cost-effective for static content that doesnt require any server-side code.

Microsoft provides various tools and services that make it possible to access and manage Azure resources from macOS, including the Azure Portal, Azure CLI (Command-Line Interface), Visual Studio Code, Azure SDKs, Docker and Azure Kubernetes Service, Azure Storage Explorer, and the mobile app.

Microsoft launched Azure on February 1, 2010.

As you can see, Microsoft Azure has a lot to offer, and these five services make up less than 2.5% of whats available without discussing Microsoft Security, Microsoft 365, or Dynamics 365, ensuring you can find whatever you need for whatever project you are working on regardless of scale. Go check out the whole list of services over at Microsoft and get started.

Follow Geeksided to leave comments, ask questions, and get faster access to news and guides.

Here is the original post:
Unlock the Power of Cloud Computing with Microsoft Azure's 200+ Services - GeekSided

Sysdig rolls out improved cloud-native investigation tools – SC Media

Sysdig announced that it is looking to address the fragility of cloud infrastructure layers through enhanced cloud-native investigation tools that are designed to drastically reduce incident analysis time to five minutes, Security Boulevard reports.

Attackers often infiltrate cloud environments by exploiting software vulnerabilities or stolen credentials, and upon a successful breach, they then seek other user identities or misconfigurations to access more valuable systems. Sysdigs solution automates the collection and correlation of events, posture, and vulnerabilities to identities, which serves to rapidly detect ongoing searches by attackers within the system while also significantly accelerating threat detection and response.

Traditional security solutions like endpoint detection and response/extended detection and response and security information and event management platforms lack the necessary cloud context, which slows down investigations and limits effectiveness. Sysdig's approach centralizes data, enabling security and platform teams to collaborate more effectively and share insights seamlessly. Additionally, the Sysdig Cloud Attack Graph visualizes incidents, showing relationships between resources, and helping analysts understand the attack chain and potential lateral movements. By correlating cloud and workload events to identities, Sysdig highlights unusual logins, malicious IP addresses, and other indicators of compromise.

Link:
Sysdig rolls out improved cloud-native investigation tools - SC Media

Automox Recognized as Trusted Cloud Provider by Cloud Security Alliance – GlobeNewswire

AUSTIN, TX, June 25, 2024 (GLOBE NEWSWIRE) -- Automox, the leader in cloud-based IT endpoint management solutions, is now a trusted cloud provider via the Cloud Security Alliance (CSA), the worlds leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.

The CSA is the worlds leading organization focused on defining and raising awareness about best practices to ensure a secure cloud computing environment. With this trustmark, Automox stands out among secure cloud computing providers, affirming its commitment to safety, reducing complexity and cost, and providing IT teams more time for strategic work.

We are thrilled to be one of CSAs recognized trusted cloud providers as the company leads the industry when it comes to cloud security, said Tom Bowyer, Director of Security at Automox. Our acceptance as a trusted cloud provider showcases our strengths in cloud endpoint management automation. We are incredibly proud to partner with the CSA in growing the future of cloud security.

By joining CSAs Trusted Cloud Provider program, Automox can better demonstrate its holistic approach to security, serving as a reference for customers seeking cloud providers aligned with their security needs.

We are excited to recognize Automoxs commitment as a Trusted Cloud Provider with the CSA trustmark," said Jim Reavis, CSA CEO and co-founder. "This endorsement highlights Automoxs dedication to advancing secure cloud computing standards and practices.

Automox claiming its spot in CSAs Trusted Cloud Provider program allows the company to demonstrate its commitment to holistic security. It serves as a reference point for customers looking to identify cloud providers aligned with the CSAs security requirements.

About the Cloud Security Alliance The Cloud Security Alliance (CSA) is the worlds leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events, and products. CSAs activities, knowledge, and extensive network benefit the entire community impacted by the cloud from providers and customers to governments, entrepreneurs, and the assurance industry and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem. For further information, visit us at http://www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.

About Automox

Automox is the IT automation platform for modern organizations. Groundbreaking automation empowers IT professionals to prove vulnerabilities are fixed, slash cost and complexity, win back hours in their days, and delight end users. 350+ Automox Worklet automation scripts make it easy for IT to save time, reduce risk, and thoughtfully automate OS, third-party software, and configuration updates on Windows, macOS, and Linux desktops, laptops, and servers. Join thousands of IT heroes automating confidence across millions of endpoints with Automox.Learn more at http://www.automox.com, connect with theAutomox Community, or connect with us onTwitter/X,Threads,LinkedIn,Facebook,Reddit, orInstagram.

2024 Automox Inc. All rights reserved. Automox, Automox Worklet, and the Automox logo are registered or unregistered trademarks of Automox Inc.

Here is the original post:
Automox Recognized as Trusted Cloud Provider by Cloud Security Alliance - GlobeNewswire

Amazon in Europe: Committing to German Cloud & AI Expansion – Technology Magazine

Additionally, research teams at Amazons Development Centre in Berlin will benefit from lab expansions to develop and enhance AI and robotics capabilities.

With our teams continually focused on innovation, were helping German customers transform the way they work, live, connect and thrive, says Rocco Bruniger, Amazon Germany Country Manager. Our teams work hand-in-hand with state-of-the-art technologies to deliver for small businesses and customers, while AWS enables organisations of all sizes in Germany to grow their businesses and innovate using the cloud.

As part of this latest investment, AWS is planning to invest 8.8bn (US$9.43bn) by 2026. This will be to continue building, maintaining, and operating its cloud infrastructure for the AWS Europe (Frankfurt) region, which has been based in the Frankfurt Rhein-Main area since 2014. This will help meet growing customer demand for AWS technologies in Germany, including AI.

Digital transformation is set to rapidly continue across Europe, with increasing numbers of companies investing to build greater partnerships with existing companies within the region. The UK, France and Germany are currently the leading nations receiving foreign direct investment (FDI) for digital technology projects, according to a 2024 EY survey.

Cloud and AI will continue to surge across Europe as it contributes to greater operational efficiency and cost-saving measures. According to McKinsey in April 2024, more than 90% of European companies ranked their cloud programmes as a priority moving forward.

Greater AI software in cloud environments can help users enjoy greater interconnectivity and ultimately enhance overall productivity.

******

Make sure you check out the latest edition of Technology Magazine and also sign up to our global conference series - Tech & AI LIVE 2024

******

Technology Magazine is a BizClik brand

Read the original here:
Amazon in Europe: Committing to German Cloud & AI Expansion - Technology Magazine