Category Archives: Cloud Servers

Micron Technology (MU) Stock Surges 4% In A Five Days: Is It The Best Stock Of The Week? Own Snap – Own Snap

Last Monday, Micron Technologys price, which designs, manufactures, and sells memory and storage products worldwide, was traded at $71.26. Nevertheless, during the week it is moving upward moderately by achieving 4% profit. On Tuesday, September 28, the company will report earnings after the market close. The data storage chip maker is estimated to have made a profit of $2.33 per share on revenue of $8.23 billion for the fourth quarter of the fiscal year 2021.The company operates in four segments: the Computing and Network Division, the Mobile Division, the Data Storage Division, and the Embedded Division. It offers memory and storage technologies, including DRAM, NAND, NOR, and 3D XPoint memory, under the Micron and Crucial brands and private trademarks. The company provides memory products for cloud servers, enterprise, client, graphics, and network markets, also for smartphones, and other mobile device markets, as well as memory and storage products for the automotive, industrial, and consumer markets.

Business and Tech Reporter

Read more:
Micron Technology (MU) Stock Surges 4% In A Five Days: Is It The Best Stock Of The Week? Own Snap - Own Snap

The Best SIEM Tools and Vendors for 2021 and Beyond – Solutions Review

Solutions Reviews listing of the Security Information and Event Management (SIEM) tools is an annual mashup of products that best represent current market conditions, according to the crowd. Our editors selected the best SIEM products based on each solutions Authority Score, a meta-analysis of real user sentiment through the webs most trusted business software review sites, and our own proprietary five-point inclusion criteria.

The editors at Solutions Review continually research the most prominent and influential SIEM tools to assist buyers in search of the tools befitting the needs of their organization. Choosing the right vendor and solution can be a complicated process; it requires constant market research and often comes down to more than just the solution and its technical capabilities. Yet its essential; Security Information and Event Management can help bridge gaps in security monitoring, threat hunting, and incident response for businesses struggling to fill their IT security teams.

Solutions Review picked out the Best SIEM Tools for 2021 and beyond. Vendors and solutions are listed in alphabetical order.

AT&T Cybersecurity aims to help businesses of all sizes stay ahead of threats. The AlienVault Unified Security Management (USM) platform combines SIEM and log management capabilities with other essential security toolsincluding asset discovery, vulnerability assessment, and intrusion detection (NIDS and HIDS)to provide centralized security monitoring of networks and endpoints across cloud and on premises environments from a single pane of glass.

CYBERShark, powered by BlackStratus, is a SIEM technology and service focused solution provider headquartered in New Jersey, provides reliable and innovative security event correlation, compliance, and log management capabilities. CYBERShark offers a huge portfolio of solutions with offerings including LogStorm, SIEMStorm, and SOC-As-A-Service. CYBERShark is a cloud-based SIEM-as-a-service designed for digital transformations.

Cygilants origins lie in the analysis of enterprise log files across web servers, file servers, firewalls, and other network devices. The company seeks to reduce cyber risk and enable enterprises to implement comprehensive strategies to combat cyber risk by combining security programs with insurance coverage. The SOCvue solution provides 24/7 security operations designed to singularly meet enterprises regulatory and industry compliance objectives.

Cysiv operates in the field of security operations center-as-a-service (SOCaaS). It works with enterprises to reduce the risk of a damaging cyber-attack or data breach by providing 24/7 threat detection and response. Its team of experts operates as a seamless extension to your IT security team to accelerate and improve the process of detecting, investigating, hunting for, and responding to actionable threats across the complete IT application environment.

empow is the developer of an SIEM system that detects cyber-attacks and automatically orchestrates adaptive investigation and mitigation actions in real-time, without the need for human-written rules. empows i-SIEM platform automatically understands the fundamental nature or intent of threats, finds the actual attacks hidden in the noise, and marshals the right security tools to respond when those attacks occur.

Exabeam offers its Security Intelligence Platform as a collection of components that can be selected and deployed separately. The vendors Log Manager component handles the data management, including collection and storage, and can collect from both local endpoints and cloud-based applications. Its Advanced Analytics component is a stand-alone UEBA tool. The threat hunting component, appropriately called Threat Hunter, is built on user-based timelines instead of the customary queries.

Fortinets platform FortiSIEM provides SIEM, file integrity monitoring (FIM), configuration management database (CMDB), and availability and performance capabilities. Analytics-driven IT operations and cloud management are provided, helping companies manage and monitor network performance, security, and compliance requirements. FortiSIEM detects network services and profiles network traffic from sources such as network flows and firewall logs.

IBM Securitys QRadar Platform offers log and risk management that can be deployed as an appliance, a virtual appliance, or an Infrastructure as a Service(IaaS); this makes them well-suited to different IT environments. Theyalso deliver a hybrid option, with on-premises QRadar deployment combined with a SaaS solution hosted on their IBM Cloud. This includes optional remote monitoring from their managed security service operations centers

Lacework automates security and compliance across AWS, Azure, GCP, and private clouds, providing a comprehensive view of risks across cloud workloads and containers. Laceworks unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance. Lacework was noted as an Emerging Security Vendor to Know in 2019 by CRN.

Logentries offers a real-time log management and analytics service built for the cloud. These SIEM solutions securely collect log data while preventing unencrypted sensitive data from leaving your IT environment without consent from the security team. Logentries SIEM products include search and analysis tools, alerts to identify security threats and investigate malicious activity, and allows users to send files to an Amazon long-term cloud server.

LogPoint extracts security events and incidents from logs existing in IT infrastructures and environments of any size. Filtered and correlated real-time results are displayed in dashboards that can be configured based on the specific roles and responsibilities of each user. LogPoint also creates real-time, actionable insights from raw machine data to help increase operational efficiency and streamline compliance for regulatory mandates; this strengthens enterprises overall security posture.

LogRhythms SIEM solution consists of several unified components: the Event Manager, Log Manager, Advanced Intelligence Engine (AI Engine), and Console. LogRhythm combines SIEM capabilities with endpoint monitoring, forensics, and management abilities to ease enterprise-level deployments and maintenance. Its other solutions can serve as optional add-ons for network and host monitoring or FIM functioning.

Logsign Next-Gen SIEM provides comprehensive visibility and control of data lakes. It allows security analysts to collect, store, and backup unlimited data, and investigate and detect threats and anomalies in real time. Focusing on comprehensive and security analytics-oriented visibility, Logsign supports many log collection methods such as SYSLOG, SMB, WMI, FTP, SFTP, LEA, SQL, ORACLE, and Flow. Logsign classifies and normalizes data and enriches with embedded threat intelligence services in real-time.

ManageEngine Log360 simplifies IT management with an affordable software solution that offers the ease-of-use smaller enterprises need and the powerful features the largest enterprises demand. Log360 features the ManageEngine EventLog Analyzer whichcollects, analyses, archives, and reports on event logs from distributed Windows host and syslogs from myriad data sources including UNIX hosts, routers, and switches.

McAfees Enterprise Security Manager (ESM) consolidates, correlates, assesses, and prioritizes security events for both third-party and Intel Security solutions. McAfee also provides integrated tools for configuration and change management, case management, and centralized management of policy to improve workflow and efficiency. McAfees Advanced Correlation Engine is designed for dedicated correlation and risk and behavior-based correlation.

Micro Focus offers two SIEM solutions: Micro Focus ArcSight and Micro Focus Sentinel. The latter incorporates NetIQ brand technologies, but it is ArcSight that serves as their primary SIEM platform; ArcSights portfolio includes Enterprise Security Manager (ESM) software for large-scale, SEM-focused deployments. Micro Focus also offers ArcSight Express, which is an appliance-based solution for the SIEM midmarket with preconfigured monitoring and reporting.

Rapid7 InsightIDR, a cloud SIEM solution for modern threat detection and response,seeks to unify your security data with cloud-based log and event management. Rapid7 aims to assist with enterprise compliance, detect the behavior behind breaches, and monitor lateral movement. Specifically, Rapid7 monitors for lateral movement involving stolen credentials by traffic manipulation and hash extraction and facilitates the searching and visualizing of your security data

RSAs NetWitness suite provides visibility from logs, full network packet, NetFlow, and endpoint data capture. The NetWitness Logs facilitates the automated collection, analysis, alerting, auditing, reporting, and secure storage of all logs. Alerts can be delivered through the intuitive user interface, via SMS or email, and auditors can even be granted read-only access to the enVision platform so that they can access the reports whenever they need them.

Securonix offers the Snypr Security Analytics solution as its SIEM platform. Their capabilities include a library of threat signatures, UEBA functionality, and event and data collection. Other functions include configuration, indexing via Search Service, data parsing and normalization via enrichment services, and correlation services. Securonix supports advanced threat hunting and incident investigation capabilities.

Splunks security intelligence platform provides event and data collection with visualization options and use-case agnostic data analysis capabilities for IT operations. Splunk also provides out-of-the-box support for the most common security data sources including network security, endpoint solutions, malware and payload analysis, network and wire data, identity and asset management systems, and threat intelligence to accelerate deployment.

Sumo Logic enables enterprises to build analytical power that transforms daily operations into intelligent business decisions. It offers customers cloud-to-cloud integrations to simplify setup and deliver business operational insights. Sumo Logics purpose-built cloud-native service scales to over 4 petabytes of data. Above all, Sumo Logics greatest asset is its log aggregation capabilities, especially concerning big data security analytics and machine data logging.

Tenable offers SIEM which leverages the log management capabilities of their Log Correlation Engine (LCE) to collect all logs, software activity, user events, and network traffic across the entire IT environment. Tenable analyzes data for correlated events and impacts on security and compliance posture. Event context and threat-list intelligence about any system is provided by Tenable Nessus vulnerability and configuration scans and real time monitoring with the Tenable Passive Vulnerability Scanner (PVS).

Trustwaves Managed SIEM services provide threat intelligence, efficiency, and automation to organizations of all sizes. The service includes the Payment Card Industry Data Security Standard (PCI DSS). Trustwave works with point-of-sale (POS) vendors to develop specific logging support for in-store payment solutions. The company offers capabilities for additional correlation, reporting, and ad-hoc analysis, both locally on the appliance and via services provided through their Security Operations Centers.

Our Buyers Guide for SIEM helps you evaluate the best solutions for your business use case and features profiles of the leading profiles, as well as a category overview of the marketplace and a Bottom Line Analysis for each vendor profile.

Dan is a tech writer who writes about Cybersecurity for Solutions Review. He graduated from Fitchburg State University with a Bachelor's in Professional Writing. You can reach him at dhein@solutionsreview.com

Read more:
The Best SIEM Tools and Vendors for 2021 and Beyond - Solutions Review

Executive Roundtable: The Chip Shortage and Data Center Supply Chain – Data Center Frontier

Welcome to our 24th Data Center Executive Roundtable, a quarterly feature showcasing the insights of thought leaders on the state of the data center industry, and where it is headed. Our Third Quarter 2021 roundtable offers insights on four topics: The semiconductor shortage and the state of the data center supply chain, how recent weather disasters are impacting site selection and operations, the opportunities and challenges created by software-defined everything, and technologies that can drive long-term sustainability solutions.

Heres a look at our distinguished panel:

The conversation is moderated by Rich Miller, the founder and editor of Data Center Frontier. Each day this week we will present a Q&A with these executives on one of our key topics. We begin with a look at our panels take on trends in data center rack density and cooling.

Data Center Frontier:The semiconductor shortage is among the examples of how the supply chain can impact business timetables. How would you assess the state of the data center supply chain, and how it has impacted the industry?

Peter Panfil, Vertiv: The supply chain issues that resulted from the pandemic are being addressed, but it will take time for the necessary capacity to come online. In the interim, we need to work together to buy ourselves that time. From a manufacturers perspective, we integrate a lot of chip-based intelligence into our systems, so weve had to work closely with our suppliers to understand how component and material availability would affect production schedules and new product introductions, and then proactively communicate with our customers so there are no surprises.

Everyone is aware of the issues, which are global and not limited to our industry, so planning, communication and collaboration become the keys to making the best of a difficult situation. From an operators perspective, its more important than ever to make investments that can extend equipment life, such as preventive maintenance and remote monitoring.

Nancy Novak, Compass Datacenters and iMasons:While weve seen increased costs in some areas for things like steel, the data center industry has probably been less effected by supply chain issues. While the chip shortage may ultimately ripple through to impact the availability of components like PDUs, ATS units and generators, it has not resulted in supply problems for data center building components anywhere near the extent that is has the things like servers that reside within the buildings themselves.

If there is a supply issue from a data center construction perspective, it is found on the labor side of the equation. Contractors and sub-contractors, like many businesses around the country are continually searching for qualified personnel. While there are a number of factors contributing to these shortages, the simple fact is that we are simply not doing enough to find and train the volume of people we need in the skilled trades.

Lenaik Andrieux, Kohler Power Systems: Tense is the word that comes to mind for global supply chains currently. Recent months have seen sharp increases in raw material (copper, iron) combined with serious production capacity limitations for key industries supplying the data center market. This has included semiconductors, but more broadly and significantly the transportation industry itself. It is leading to key components shortages, increased costs, uncertainty of project execution, increased lead-times and ultimately uncertainty in the execution of data center projects. This is a tough situation in an industry that has innovation, speed of execution and volume leverage as part of its DNA.

So how did we get here, beyond the simple of fact of very significant growth in data markets? This time the supply chain tension impacts many other markets, such as the automotive industry to name an obvious one, and the world economic growth in general. Since the 2007 financial crisis, the data industry has been the fastest growing market when more traditional markets like oil and gas, mining, and infrastructure have been soft or even depressed.

These markets are generally recognized as strong profitability drivers for the manufacturing footprint. Over this last 10 to 15 years, this has led a number of key suppliers to rationalize their production and supply chain capacities. At the same time that some operations were reducing, an increased percentage of production was made available to the data center industry. Over the last 18 months, the COVID phenomena has accelerated this gap between the worlds hunger for data and more traditional industries and markets. The recovery for all has been sudden, though, leading to the current tension.

So what to do? This does not seem to be a short term situation. The first obvious answer is that increased transparency and collaboration through the supply chain is a must. Sharing project plans much earlier with all key players enables supply positions, and guarantees better planning and project execution. It also matters who you are partnering with. Financial strength is extremely relevant here. Deep expertise and focus in the data center industry seems critical, rather than choosing more generic multi-industry entities that may have to share and allocate their production capacity with all other markets. Collaboration and focus could be the winning formula.

Rob Rockwood, Sabey Data Centers:Semiconductors, having found their way into equipment beyond just computers, are affecting the data center supply chain at several levels. For projects initiating in the second half of 2021, the industry is experiencing schedules extended by 5% to 10%. I expect, as suppliers adjust to the situation, that schedules will have returned to pre-shortage levels by the end of 2022.

Having learned from this situation, suppliers will ensure that the supply chain shows greater resiliency, with project schedules decreasing to slightly below pre-shortage durations by 2023.

NEXT: How recent weather disasters are impacting data center site selection and operations.

Keep pace with the fact-moving world of data centers and cloud computing by following us onTwitterandFacebook, connecting with DCF onLinkedIn, and signing up for our weekly newspaper using the form below:

Visit link:
Executive Roundtable: The Chip Shortage and Data Center Supply Chain - Data Center Frontier

Ready to move into IT management? Learn the skills you need for a promotion – TechRepublic

You can acquire all of the skills and secrets that will allow you to breeze through IT management responsibilities and job interviews without taking time off from your job.

fizkes, Getty Images/iStockphoto

Whether you're trying to turbocharge your career trajectory by racking up impressive certifications to shine up your resume, or even if you're already an IT manager, the self-paced Ultimate 2021 IT Manager Survival Training Bundle can smooth out your job and your career advancement. It consists of 10 courses that will prep you for certification exams on cloud computing, networking, security and more, plus team and project management training and in-depth coverage of specific platforms.

Tech companies around the globe recognize CompTIA certifications as reliable indicators of skill. This bundle has the prep to help you pass CompTIA Cloud Essentials+ (CLO-002), CompTIA Security+ (SY0-601), and CompTIA Network+ N10-007 exams. The Certified Cloud Security Professional CCSP course would also be excellent training for anyone interested in moving into the elite cybersecurity field.

If your work includes Cisco technologies, or you'd like a job that does, the Cisco 200-301: Cisco Certified Network Associate (CCNA) course, as well as the Cisco 350-401: Implementing Cisco Enterprise Network Core Technologies (ENCOR) (CCNP) class could be very valuable.

On the other hand, the skills required for working with giant cloud-computing platforms Amazon Web Services and Microsoft Azure are also always in high demand. So it would likely be beneficial to take the Microsoft AZ-900 Microsoft Azure Fundamentals and AWS - Introduction and Deep Dive courses.

Of course, management skills are every bit as important as tech skills in IT management, so you'll need to know how to effectively manage both projects and people. That's why this bundle includes three courses to bring you fully up to speed with the latest methods and techniques: Managing Different Personality Types, AGILE/Scrum and Become a Scrum Master.

All of the courses in this bundle are offered by ITU Online Training, a company well-known for providing practical knowledge that is equal to the excellence of its exam preparation. It has garnered multiple awards, such as Best in Biz and Cybersecurity Excellence. Before you know it, you'll be ready to start thinking about applying for new positions with higher salaries. Make sure to employ thesebest resume and interview tips.

Don't miss this opportunity to acquire successful IT management skills and certifications that can continue to advance your career well into the future. Grab The Ultimate 2021 IT Manager Survival Training Bundle now while it's available for just $39.99(normally $1,089).

Prices subject to change.

Read the rest here:
Ready to move into IT management? Learn the skills you need for a promotion - TechRepublic

5 reasons why Java is still the best programming language – TheServerSide.com

A new, long-term support Java release is just around the corner. As Java passes the 25-year mark, let's step back and look at some of the reasons why Java remains the best programming language for modern software development.

Every programming language comes with a learning curve, but Java shares many similarities with C, C++ and JavaScript. Anyone with experience in any of those languages will pick up Java syntax quickly.

Java also has a very rigid and predictable set of rules that govern code structure. This contrasts starkly with other, untyped scripting languages where it seems like anything goes. When you try to master a new programming language, a clear set of consistently enforced rules makes learning easier.

Furthermore, when things don't make sense, programmers new to Java can find a strong support network of YouTube videos, websites like StackOverflow and online forums like CodeRanch to find answers to a multitude of questions.

The Java API is extensive. The standard JDK comes with over 200 built-in packages containing Java APIs that allow for everything from parsing XML to translating between time zones. When developers add on the Jakarta EE APIs, they have an even more extensive library of APIs that allow for the development of complex, middle-tier applications and cloud-native microservices.

But the rich ecosystem of Java APIs extends far beyond those sanctioned by Oracle or provisioned through Jakarta.

For data persistence, there's the JBoss Hibernate project. For cloud-native microservices development in Java, there's the full suite of Spring Boot APIs. And of course there's a multitude of open source Apache API projects that address a wide range of software development use cases, from aggregating error messages with log4j to solving complicated problems with HashMaps and fail-safe Iterators through the Apache Commons Collections API.

The rich set of Java APIs available to developers aid in the development of strong, error-free applications.

The application development landscape is filled with software development tools written in Java -- by Java developers -- that are designed to simplify and streamline the development, deployment and even decommissioning of Java applications. A few examples of tools written in Java include:

This is by no means an exhaustive list of Java's tool ecosystem. Other examples of tools and technologies written in Java include application servers like Tomcat to Red Hat's popular, Kubernetes-native Java stack named Quarkus.

Few other programming languages enjoy the same level of tooling support that Java does, which helps cement itself as the best programming language.

Android is the world's most popular mobile phone OS and Java is the de facto programming language for Android application development.

While Android's version of Java isn't exactly the same as what you'd find on the JDK, Google did copy over 11,500 lines of code from the Java Standard Edition when they built their Java clone. As a result, developers can expect that the version of Java they see on Android is pretty close to the original.

If you know can write Java code for desktop or server-side applications, you'll pick up Android development very quickly. The low-level differences between the JVM and the Dalvik Android Runtime will all be pleasantly abstracted away from you after a brief learning curve. When developers learn Java, the entire Android ecosystem will be at their disposal.

Java evolves slowly, but it does evolve. With over 25 years of evolution, Java has plenty of evolutionary improvements to be proud about.

From the bulletproof modularity system that was delivered as part of Project Jigsaw, to the recently added ability of functional programming in Java with lambda functions, Java continues to implement big changes that the community demands.

Incremental additions in non-LTS releases, such as the the addition of the new Record data typeand garbage collectors for improved memory management, showcase that the JDK is also constantly evolving.

But in the enterprise software development world, backwards compatibility is just as important as adding new features. Java has always made this a top priority for the stewards of the language. Very rarely does a comprehensive update or feature addition create issues with code written against older releases.

I personally compiled and packaged some complicated code that was written 20 years ago, and it ran without any issues on the latest Java 17 release. When enterprise clients know that things won't break when they perform a JVM upgrade, it gives just another reason why they choose to stick with Java as the best programming language.

View original post here:
5 reasons why Java is still the best programming language - TheServerSide.com

Datto Continuity for Microsoft Azure protects MSPs and their clients’ data in the public cloud – Help Net Security

Datto announced the commercial availability of Datto Continuity for Microsoft Azure, a comprehensive Business Continuity and Disaster Recovery (BCDR) solution that protects MSPs and their clients data in the public cloud in the event of malicious ransomware attacks, security breaches, and vendor outages.

Datto Continuity for Microsoft Azure is architected to leverage the secure Datto Cloud to address a critical and unmet need for MSPsthe added protection and recovery of data in the public cloud through multi-cloud replication. This comprehensive data protection, management, and streamlined recovery is delivered at a predictable cost and without the need for MSPs to piece together individual technologies or depend solely on Microsofts data backup services.

An increasing number of Small and Medium Businesses (SMBs) are opting to host their infrastructure and applications in the public cloud, with worldwide end-user spending on public cloud services forecasted to grow 23.1% in 2021 to total $332.3 billion, up from $270 billion in 2020, according to a forecast from Gartner, Inc. This has been a key growth area for MSPs as they support their clients and shift to Infrastructure-as-a-Service (IaaS) models.

Microsoft Azure has been proven to be the leading public cloud provider over other large providers for businesses in the beginning to middle-stages of public cloud adoption, such as MSPs. Azure provides reliable cloud services for building, deploying, and managing intelligent applications. While Microsoft is responsible for the security of the physical hosts, network, and data centers, its Shared Responsibility Model states that the customer is responsible to secure and protect all applications, data, and endpoints contained within Azure. In this model, MSPs carry the responsibility to ensure they have reliable business continuity solutions in place to protect their clients workloads across on-premises servers and the public cloud.

Datto Continuity for Microsoft Azure performs more frequent backups than other solutions and reduces the risk of data loss or prolonged system downtime due to ransomware and public cloud outages. Further, MSPs can now eliminate single-cloud risk by having the ability to restore data from either Microsoft Azure or the immutable, private Datto Cloud as secondary system protection. With this solution, MSPs can offer their clients the scalability and efficiency of the public cloud while feeling confident their clients cloud data is backed up and can be recovered within minutes even if there is an Azure outage.

Purpose-built to help MSPs scale and grow their business, Datto Continuity for Microsoft Azure delivers a predictable pricing model. One easy-to-understand, flat-fee bill accounts for all associated BCDR costs all achieved with zero egress costs for MSPs. This solution creates a durable margin opportunity, eliminates the need to estimate public cloud service costs or handle unexpected charges, and reduces the total cost of ownership for MSPs. In addition, Datto Continuity for Microsoft Azure is cloud-native to enable MSP partners to quickly scale endpoints, while providing high levels of security and reliability.

MSPs have direct access to Dattos award winning 24/7/365 support team and will no longer need to manage multiple vendors or integrate third-party technologies. The flexible turnkey solution requires minimal training and enables MSPs to manage both on-premises and cloud backup workloads from a single multi-tenant dashboard.

The ongoing cyberwar against ransomware underscores the importance of closing the gap in security for MSPs utilizing the public cloud, said Radhesh Menon, Chief Product Officer at Datto. We architected Datto Continuity for Microsoft Azure from the ground up with the key design goals of providing comprehensive protection and rapid recovery, and an extra layer of protection through multi-cloud replication to Dattos private cloud. In addition, Datto is able to deliver predictability on margin to bring confidence to MSPs that their time and investments in hybrid cloud protection are both secure and profitable.

Key features and benefits of Datto Continuity for Microsoft Azure include:

The driving force behind our clients desire to migrate to the public cloud is two or threefold, said Rick Topping, VP of Operations at Ceeva, Inc, an MSP in Pennsylvania and beta customer of Datto Continuity for Microsoft Azure. Companies understand their responsibility to ensure data is available to employees at all times and realize it needs to be kept as safe and secure as possible in todays environment. Our clients sometimes find it difficult to host an on-premises system and receive the same features and functionality available with a cloud-based system. Datto Continuity for Microsoft Azure provides those capabilities. As we help our clients on their journey to the cloud, this solution gives us the same data protection and business continuity that were used to with Datto SIRIS and provides the reliability and trust known with Datto.

Datto Continuity for Microsoft Azure is available immediately in the United States, Canada, UK, Ireland, Australia, and New Zealand through an Early Access Program that includes introductory pricing until December. Global availability with additional integrations and feature enhancements is expected by the end of 2021.

See original here:
Datto Continuity for Microsoft Azure protects MSPs and their clients' data in the public cloud - Help Net Security

Cloud adoption on the right track in Hungary – BBJ – Budapest Business Journal

Lszl Marton, chief operating officer of Invitech

The growing need for cost-efficiency, sustainability, and resilience, as well as the increasing number of shared services and outsourcing, all fuel the adoption of cloud-based business solutions in Hungary. Although Hungary is still below the EU average in cloud computing, its use is expanding in almost all business sectors as locals increasingly have good personal experiences to draw on, Lszl Marton, chief operating officer of ICT provider Invitech, tells the Budapest Business Journal.

BBJ: Where is the Hungarian market in the journey between on-site and cloud-based solutions?

Lszl Marton: Market players in Hungary have generated a considerable improvement recently and developed a basic, initial knowledge of cloud services. Undoubtedly, every business procedure has specific fields where cloud frameworks can deliver higher sustainability, resilience, and flexibility. I am positive that almost all large- and medium-sized firms have engaged in some ways with the cloud, if only through their mailing system. Of course, many are going further in adopting a wide range of cloud-based business solutions. Others have no cloud experience at all. I would not call the latter laggards or conservatives; their technological microenvironment and business goals are simply not in line with the benefits of cloud solutions. If we think about the Hungarian assembly unit of a foreign auto parts manufacturer, we can all admit that they are not in urgent need of cloud-based services. E-commerce firms in the retail sector, on the other hand, have already identified its importance, especially in running their online webshops; besides the everyday workflow, cloud computing remarkably facilitates plans for shipping capacities as well. Cloud penetration, in general, is on the right track in Hungary. This is a shared journey where clients, as well as service providers, go side-by-side.

BBJ: What are the main driving factors for migration?

ML: There is an array of different types of capabilities the cloud can deliver for businesses. I would mention improved agility, resilience, and flexibility. When it comes to the latter, we need to spotlight business-related driving factors next to more common technological ones. The cloud, for instance, helps business environments meet market needs more effectively. Businesses can respond faster to potential expansion, and it also assists firms in faster market entry. In addition, it is easier to change or open new sales channels in cloud frameworks. Lets also mention here data and cyber security. Migrating either a partial or entire backup environment to the cloud gives extra safety. We have learned from the pandemic that providing remote workers with access to usual capacities is indispensable, which is much easier via the cloud than via on-premises infrastructure. Just as in the European Union or the United States, business process modeling is becoming increasingly popular in Hungary. And modeling requires capacities. Among the most effective driving factors, however, are AI and self-learning systems being accessible in the cloud. The value of a company primarily depends on its product and service portfolio, but sustainable workflows and environmental awareness also trigger business value. According to a study compiled by consulting firm Accenture, migrating to the cloud through consolidated IT environments cuts CO emissions by at least 80%.

BBJ: How do you differentiate yourself against competitors?

ML: Invitech tries to position itself and its entire infrastructure as a professional mentor and a consultancy firm helping its clients in their migration. Invitech can combine its products and services with those of giants such as Amazon or Microsoft. We strive for this hybrid approach in our strategy.

BBJ: Is there any mistrust among customers in terms of cyber security and data protection?

ML: Despite ISO standards and countless guarantees from service providers, company data assets, client information, and know-how stored outside of the companies premises naturally generates lingering concerns on the market. Some companies in various areas will never migrate to a cloud server. Many other business processes, however, are a perfect fit for the cloud with essential security certifications. Large international public service providers are also facing some sort of mistrust from the fact that customer data is usually stored in servers beyond the customers homeland, often at the other side of the world. Invitech data centers are placed in Hungary, eliminating exposure to international privacy risks.

BBJ: Is education still necessary?

ML: Yes, absolutely. Invitechs strategy is very highly based on educational purposes, which are not necessarily technical, much more businesslike. We must educate our clients in various fields, explaining that migrating business workflows will bring added value to their operation. The technical advantages, in general, have been acknowledged by customers. Education is more about business. Why? Because it is tough to define relevant metrics and KPIs around results. We do not have existing solutions to measure the benefits of the migration of, for example, invoicing and product development systems into the cloud. It is very hard to create standardized measuring systems, as different customers use different KPIs.

BBJ: How do you see future trends?

ML: I think that the future will bring solid development in Software as a Service (SaaS), especially for functionality-based business models. When customers want to develop a CRM system, they still like to contact software manufacturers instead of defining business functionality goals and inviting various service providers in a tender. I think that the future will help migrate relevant functionalities to the cloud too. Another subsequent aspect is that customers will reconsider existing implementations, start thinking about how they can make things better, and identify areas where development is necessary. At the same time, I project that large-scale public service providers will extend further on the market in partnership with local firms as, no doubt, cloud computing remains a good business.

This article was first published in the Budapest Business Journal print issue of September 10, 2021.

Read this article:
Cloud adoption on the right track in Hungary - BBJ - Budapest Business Journal

SentinelOne Secures Amazon EKS Anywhere with SentinelOne Singularity – Business Wire

MOUNTAIN VIEW, Calif.--(BUSINESS WIRE)--SentinelOne (NYSE: S), an autonomous cybersecurity platform company, today announced its participation as a launch collaborator for Amazon Elastic Kubernetes Service (EKS) Anywhere. Amazon EKS Anywhere is a new deployment option for Amazon EKS that enables easy creation and operation of Kubernetes clusters on-premises, including on virtual machines (VMs) and bare metal servers. The SentinelOne Singularity Cloud extends security and visibility to assets running in public clouds, private clouds, and data centers via a single console, delivering a fully managed security solution for containerized environments.

Amazon EKS Anywhere brings unprecedented flexibility and agility for Kubernetes workloads by offering true hybrid cloud container orchestration, said Guy Gertner, Vice President of Product Management, SentinelOne. The SentinelOne Singularity Platform delivers protection and EDR to Kubernetes and containerized workloads, wherever they are deployed whether on premises or on AWS.

While Kubernetes is popular in the DevOps community, if improperly secured, it presents an attractive target for adversaries. According to IDC1, 98% of companies have experienced a cloud data breach in the last 18 months, with Kubernetes becoming an increasingly popular attack vector for threat actors interested in data theft, cryptomining, and denial of service attacks. SentinelOne mitigates this risk by delivering a cloud security solution with the same level of management and automation as Amazon EKS Anywhere delivers for Kubernetes.

Flexibility and choice are paramount to why we selected AWS. Using SentinelOne to secure AWS, we can prevent incidents in seconds, stopping attacks in their tracks before they can progress, said Jason Spencer, Vice President of Global IT at R.R. Donnelley.

"Containers are one of the fastest growing ways for companies to deploy and manage applications. Customers run their containers on AWS because of its secure, reliable infrastructure and wide breadth of performant services for containers including Amazon EKS, Amazon ECS, and Amazon Fargate," said Bob Wise, General Manager for Kubernetes at AWS. "Regardless of the service used, security is our top priority at AWS. As AWS grows services like EKS and ECS Anywhere, AWS Outposts, and AWS Wavelength, our customers are using AWS to run containerized applications across the cloud, data centers, and at the edge. We're excited by this collaboration with SentinelOne to provide our customers with an additional layer of consistent workload protection across container services and environments."

Singularity Cloud is a single console for multi-cloud management. It enables security teams to manage both Linux and Windows servers in Amazon Elastic Compute Cloud (EC2) and Docker or Kubernetes containers from the same console in which they secure enterprise attack surfaces. SentinelOne agents deliver AI-driven runtime protection, detection, and response at machine speed across an entire hybrid cloud estate, from Docker containers to self-managed and managed Kubernetes services like Amazon EKS, Amazon EKS Anywhere, Amazon Elastic Container Service (ECS), and Amazon ECS Anywhere.

The SentinelOne agent is DevOps-friendly auto-deployed as a single, resource-efficient Kubernetes agent that protects the Kubernetes worker, its pods, and containers without impacting performance or introducing complexity.

SentinelOne is available in AWS Marketplace. For more information on the SentinelOne Singularity Marketplace, visit http://www.sentinelone.com/partners/singularity-marketplace.

About SentinelOne

SentinelOnes cybersecurity solution encompasses AI-powered prevention, detection, response and hunting across endpoints, containers, cloud workloads, and IoT devices in a single autonomous XDR platform.

________________________1 State of Cloud Security 2021, an Ermetic report based on a funded research study by IDC

Read more from the original source:
SentinelOne Secures Amazon EKS Anywhere with SentinelOne Singularity - Business Wire

IBM Introduces Next Generation IBM Power Server for Hybrid Cloud – Database Trends and Applications

IBM is introducing the new IBM Power E1080 server, the first in a new family of servers based on the new IBM Power10 processor, designed specifically for hybrid cloud environments.

The IBM Power10-equipped E1080 server is engineered to be one of the most secured server platforms and is designed to help clients operate a secured, frictionless hybrid cloud experience across their entire IT infrastructure, according to the vendor.

When we were designing the E1080, we had to be cognizant of how the pandemic was changing not only consumer behavior but also our customer's behavior and needs from their IT infrastructure," said Dylan Boday, VP of product management for AI and hybrid cloud. "The E1080 is IBMs first system designed from the silicon up for hybrid cloud environments, a system tailor-built to serve as the foundation for our vision of a dynamic and secure, frictionless hybrid cloud experience."

The new IBM E1080 was designed to introduce several key features including:

IBM is also introducing Power Expert Care, which offers a tiered approach to service including Advanced and Premium Expert Care tiers.

The simple service tiers and pricing facilitate straightforward support options for the IBM Power E1080 server, and additional add-ons such as hardware and software system health checks and regular security updates are designed to ensure that the systems stay protected against the latest cybersecurity threats, while also providing software and hardware coherence and higher systems availability.

For more information about this news, visit http://www.ibm.com.

Excerpt from:
IBM Introduces Next Generation IBM Power Server for Hybrid Cloud - Database Trends and Applications

How to Automatically Delete Backed-up Photos and Videos on Android – The Android Soul

For several years, Google has allowed users to automatically back up pictures and videos from their phone over to the cloud directly using Google Photos Back up & sync functionality. Although the backup process happens well on its own, users were limited to deleting all the backed-up content manually. This meant that you had to open the Google Photos app and use its Free up device storage option every time you wanted to delete files that you had already backed up.

The company is now providing a new way to free up storage on your phone by letting you delete your backed-up media automatically after a certain period. This comes in the form of an update to the Files by Google app which now has a new Smart Storage option. In this post, well explain what Smart Storage is all about and how you can use it to delete backed-up media from your Android smartphone.

Google has released a new Smart Storage feature for its Files by Google app on Android that allows you to permanently delete media from your phone that has already been backed up to Google Photos. Smart Storage can thus help you clear your phones local storage by deleting media that has already been uploaded to Google Photos cloud servers.

When you turn on Smart Storage, the app will delete all the pictures and videos that have been backed up to Google Photos but are still available on your device locally for more than 60 days after the backup was complete.Because of the 60-day limit, your media doesnt get deleted as soon as youve backed it up but stays on your phone for up to 60 days in original quality before getting deleting.

This is important as many users back up their pictures and videos in reduced quality to upload as much stuff as possible but may need the backed-up media in original quality on their phones for some time so they can share it with others or on social media.

The automatic deletion will also occur if your devices free storage is less than 25% of its total capacity, according to this Google Help page. This means, your backed-up media may get deleted even if theyve been saved on your phone for less than 60 days if your phones storage is running low.

Once your backed-up media has been deleted from the location storage of your phone, you will still be able to access your pictures and video inside the Google Photos app or on the web but it will only be available in your chosen quality of backup.

Smart Storage is a new feature that isnt natively present on Android but is instead only available on the Files by Google app. So, before you proceed to do anything, make sure you have the latest version of the Files by Google from the Google Play Store, first and foremost. Once thats out of the way, you still need to ensure you have the following things:

Once youve made sure you have all that you need to use the new Smart Storage feature, you can start using it on your Pixel device to free up some storage from your phone. To get started, open the Files by Google app on Android and tap on the Hamburger menu button (the one marked by three horizontal lines) at the top left corner.

In the sidebar that appears on the left, select the Settings option.

On the next screen, enable the Smart Storage feature by tapping the toggle adjacent to it under Hidden suggestions.

A prompt will appear asking you whether you wish your backed-up media to be deleted automatically. Here, tap on OK.

The Smart Storage feature will now be enabled and you should now see a notification at the bottom confirming this.

The Files by Google app will now delete your backed-up media on its own when your pictures and videos are at least 60 days or older or if your phones free storage is under 25% of its total capacity.

Thats all you need to know about automatically deleting backed-up media on Android.

RELATED

Read this article:
How to Automatically Delete Backed-up Photos and Videos on Android - The Android Soul