Category Archives: Cloud Servers
Developers recall career ‘aha’ moments that have shaped their Docker experience – SiliconANGLE News
They are called aha moments, flashes of insightthat can spark unexpected solutions to tough problems. And two developers with extensive experience in the Docker Inc. container world have encountered enough of these moments for a lifetime.
Elton Stoneman(pictured, left), container consultant and trainer, came across one such moment with a client who was a major Windows user with a large number of environments. He went in discuss what containers would look like if they became part of the clients operation.
I said, You can take your applications, you can wrap them up to run these things in containers, youre still going to get the isolation, but you can run loads more of them on the same hardware that youve got, Stoneman recalled. You dont pay a Windows license for each of those containers, you pay a license for the server theyre running on. The head of information technology said, Thats going to save us millions of dollars. That was his aha moment.
Stoneman spoke with Julie Lerman(pictured, right), software coach at The Data Farm, as part of theCUBEs coverage of DockerCon Live. They discussed previous and new enhancements to Dockers interface with Microsoft Corp.s tools, containers impact on enterprise security, how orchestration supports developers, and the importance of continuous education. (* Disclosure below.)
Not all moments of sudden insight in the container space will save millions of dollars, but they can add up to an understanding about ways to navigate important tasks in the data-driven enterprise while saving time and extra work. For many developers, this has been especially true where the focus is on moving data.
Im very involved in getting data in and out of applications, Lerman said. My aha moment was four years ago after Microsoft moved SQL Server over to Linux and then put it inside a Docker image. Holy smokes! SQL Server was already installed, and the container was up like that.
Aha moments can also come with the latest news. On Wednesday, Docker announced that it had extended its collaboration with Microsoft to make code to cloud application creation easier for developers.
We had an aha moment this week with the announcement that you can use your Docker Compose files and Docker commands to spin stuff up running in Azure and container instances, Stoneman noted. You just write a Dockerfile, and youve got your 15-year-old application running in a container and you can run that in the cloud with no changes to code. Thats super powerful for lots of people.
Expanding use of containers can also help developers with much-needed improvements in confidence among security professionals that potential IT infrastructure weaknesses are being addressed. A GitLab survey of over 4,000 software professionals found that while 69% of developers indicated they were expected to write secure code, half of security professionals struggled to get developers to make protection against vulnerabilities a top priority.
Earlier in May, Docker announced a partnership with Snyk Ltd. to help make security part of app development for developers.
When security people first get their head around containers, they get worried that if someone can compromise the app in the container, they might be able to break out and get to all the other containers, Stoneman explained. Its so much easier to get defense in depth when youre building containers. You can sign your images so that your platform doesnt run anything that isnt signed, and you have a full history that whats in source code is exactly whats in production. Theres all sorts of ways you can layer on security there.
A Portworx survey released in 2019 found that for three years in a row, container adoption was all about driving developer efficiency. Increased speed and efficiency, agility, and use on multiple cloud platforms were the three top drivers, according to the results.
The first time I really started orchestrating was yet another aha moment, Lerman said. Now I use Docker as a really important tool during development and test. I was ready because I had already gotten used to using the tooling and really understanding what was going on with the container.
Lermans in-depth understanding of container technology highlights the important role developers play in educating colleagues in the community. Aha moments can also mean returning to the time when containers for some represented black boxes of indecipherable tools. This is why Stoneman and Lerman spend a significant portion of their time, including during DockerCon, on the education of others.
I know a lot of times when people are deeply expert in something, they forget what it was like not to understand it, said Lerman, during the discussion with her colleague. One of the really important things, especially for people like you and I who are also teachers, is to try to really remember that moment. I still have held onto that.
Watch the complete video interview below, and be sure to check out more of SiliconANGLEs and theCUBEs coverage of DockerCon Live. (* Disclosure: TheCUBE is a paid media partner for DockerCon Live. Neither Docker Inc., the sponsor for theCUBEs event coverage, nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)
Show your support for our mission with our one-click subscription to our YouTube channel (below). The more subscribers we have, the more YouTube will suggest relevant enterprise and emerging technology content to you. Thanks!
Support our mission: >>>>>> SUBSCRIBE NOW >>>>>> to our YouTube channel.
Wed also like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we dont have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary onSiliconANGLE along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams attheCUBE take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
If you like the reporting, video interviews and other ad-free content here,please take a moment to check out a sample of the video content supported by our sponsors,tweet your support, and keep coming back toSiliconANGLE.
Excerpt from:
Developers recall career 'aha' moments that have shaped their Docker experience - SiliconANGLE News
CloudBolt Releases Version 9.3 of Its Award-Winning Cloud Management Platform – Container Journal
Available to enterprises now, latest platform release features significant UX enhancements, improved Microsoft Azure support, and new third-party integrations
NORTH BETHESDA, Md., May 28, 2020 (GLOBE NEWSWIRE) CloudBolt Software, the enterprise cloud management platform leader, today announced the general availability of CloudBolt 9.3. Recently namedBest Cloud Management Solutionby the 2020 SIIA CODiE Awards, this platform release builds on the companys promise of delivering unparalleled time-to-value for enterprise IT and developers. New features in this release include improved user navigation, expanded support for Microsoft Azure, and deep integrations with Veeam, SolarWinds, and Cisco UCS.
We continue to listen to our customers and enhance the cloud management platform of their choice with updates to address their pain points, said Rick Kilcoyne, chief product officer of CloudBolt. The significant increase in 9.3s self-service capabilities, accelerated networking and provisioning, new integrations with multiple in-demand platforms, and elimination of many manual processes empower CloudBolt users to better allocate resources to drive more business value. 9.3 continues CloudBolts tradition of always innovating and adapting with the needs of our users top of mind.
The CloudBolt platform already supports management of 20+ private and public cloud environments through a single pane of glass, accelerates workload delivery with self-service provisioning, and enables consistent, standardized governance through centralized automation and orchestration. The new features and capabilities in the 9.3 release build on this solid foundation to address a wide range of cloud management challenges. These new capabilities include:
Try CloudBolt 9.3 Now
CloudBolt 9.3 is now generally available.Download CloudBoltfor free, learn more aboutCloudBolt 9, or contact your customer success manager to upgrade to CloudBolt 9.3.
About CloudBolt
CloudBolt is the leading cloud management platform for the enterprise. Deployed in minutes, CloudBolt helps IT unify orchestration and automate provisioning of their hybrid cloud resourcesquickly, cost-effectively, and securelywhile providing developers with anywhere, anytime access to those resources through a self-service catalog. Today, CloudBolt is deployed in the worlds largest enterprises, across all industries including financial services, government, healthcare, manufacturing, retail, technology services, and more. For more information, visitwww.cloudbolt.io.
P
Related
Read more:
CloudBolt Releases Version 9.3 of Its Award-Winning Cloud Management Platform - Container Journal
Kaminario offers cut-price virtual SAN in the cloud – ComputerWeekly.com
Flash storage pioneer turned software-defined storage specialist Kaminario has taken its SAN storage capability to the cloud.
Its VisionOS, which can build a server and its shelves of flash drives into a SAN pool, is now available as a virtual offering on the big three cloud providers: Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP).
And it is much cheaper than the native block storage offered by the big three, the company said.
Our Flex orchestrator and Clarity predictive analytics take charge of the online storage pool as if they were on-site. It makes it trivial to upload data to the cloud and even to move it from one cloud to another, said Kaminario CEO Dani Golan to ComputerWeekly.coms French sister site LeMagIT during an event that formed part of the IT Press Tour.
According to Kaminario, having storage arrays function in hybrid mode allows for rapid scaling to the cloud when theres a need to burst capacity beyond the datacentre.
It also makes it easy to rapidly put datacentre-developed applications on the internet. These include those with block-based storage needs such as databases and legacy applications in virtual machine format that havent been refactored to the cloud.
Kaminarios big selling point is that,for upwards of 100TB (terabytes) of capacity, its virtual SANs in the cloud come in on average 30% cheaper than the block storage services offered by the cloud giants themselves.
The benefit of our pricing comes from the thin provisioning in VisionOS you only pay for what you use and not for what you reserve, said Kaminario chief technology officer (CTO) Derek Swanson.
He was keen to point out that thin provisioning amounts to over-allocating storage. Users believe they have access to a certain capacity, but thats actually only allocated to them gradually, as they write data to it.
In addition, Kaminario makes snapshots of these cloud holdings, but pointed out they are heavily compressed to occupy less space.
According to the vendors presentation, using Kaminarios cloud SAN will cost less than one-third what it would from the big three cloud providers.
Using virtual disk in the cloud and reserving 256TB would cost $70,500 per month, plus $9,500 per month for associated snapshots, with those providers. To do the same with Kaminario, it said, would cost $20,000 per month all-in.
Commercially speaking, Kaminarios hybrid cloud will take the form of a new offering called Cloud Data Platform with automated cloud migration functionality.
But the catalogue is rather confusing. It is possible that what we are talking here about Data Pods in the Public Cloud function and that Cloud Data Platform is the new name of the global offering. This has been called Data Plane Virtualisation in recent weeks, Composable Storage last year and even Cloud Fabric the year before that.
In the world of storage, other suppliers also offer their arrays as virtual instances in the cloud, but none follow quite the same model.
Pure Storage, with its Cloud Block Store (only on AWS) is the closest. Meanwhile, NetApp offers NAS functionality on AWS, Azure and GCP. Dell EMC is set to offer its new PowerStore arrays as virtual instances but may, as it has done with its Unity VSA arrays, confine them to private cloud use.
Link:
Kaminario offers cut-price virtual SAN in the cloud - ComputerWeekly.com
4 types of mobile security models and how they work – TechTarget
Organizations have become increasingly reliant on mobile security vendors to protect devices, and there are several types of mobile security approaches that can help them optimize their mobile defense.
The first line of defense in keeping malware off mobile devices is to use approved app stores for iOS and Android. However, even mobile apps in legitimate app stores can harbor malware. Apple Store and Google Play are battling to keep these malicious apps out of their stores, but administrators can minimize their risk by limiting unknown mobile downloads from users.
Organizations should also deploy a managed environment from an enterprise mobility management or unified endpoint management platform that helps administrators address the basic security profiles of mobile devices.
These profiles enable IT to install a mobile security agent on a device. IT can also activate embedded enhanced security tools that may be available on the device itself, such as Samsung Knox in the Android Enterprise program.
Deploying an add-on mobile-specific security tool from a variety of vendors -- such as Lookout, BlackBerry Cylance, Zimperium and Symantec -- can provide additional defense against malware. No mobile security tool is 100% effective, but they are an important step given how much sensitive corporate data is available on mobile devices these days.
There are four different types of mobile security models used by vendors.
The traditional signature file antivirus model creates a signature file on the device that all apps and documents are compared to. This doesn't work very well for mobile devices, however. Today, many organizations employ the hybrid-AI approach noted below.
This type of mobile security tool studies the files users download and install on their devices. It's a similar model to search engines where the community contributes samples that improve the overall experience.
No mobile security tool is 100% effective, but they are an important step given how much sensitive corporate data is available on mobile devices these days.
Analyzing these files and applications in the cloud helps security tools identify the warning signs of malicious intent. Once AI identifies any malicious files, it prevents users from downloading and opening them. The tools enforce these policies through a local app that updates with the latest information about the safety of files.
This cloud-based analysis approach works very well for mobile devices because it doesn't require large amounts of local processing. With relatively fast connections, the lag in checking a file type against the files on a cloud server is minimal.
However, this type of mobile security approach isn't great at finding zero-day attacks due to the time lag inherent with gathering data, testing and returning intelligence to the on-device agent. The next type of security model also uses the cloud and essentially acts as an intermediary service.
Under this model, any files a user receives or downloads to the device are automatically uploaded to the cloud service for testing and comparison to determine if they're malware or security threats. The files are loaded to the device only if these files are approved.
This intermediary approach also works well for mobile devices, but it can sometimes cause a lag in performance if the mobile devices are on a slow network. Fortunately, the general availability of fast 4G, 5G and LTE makes this less of an issue.
For mobile security vendors, this approach means they can run very fast and extensive processes on high-powered cloud servers, eliminating the restrictions of on-device resources. The following type of mobile security monitors the behavior of the apps or files on the device.
With this approach, an AI-based preloaded app prevents malicious activity by flagging suspicious behavior. There is still a cloud-based component to this approach; the agent occasionally downloads new suspicious behaviors to flag on the device, but most of the work is done locally.
Mobile behavioral analysis is the best way to find zero-day exploits. This approach uses crowd sourcing to obtain and test files, but it is more behavior-based than the simple penetration testing associated with a traditional signature file antivirus approach.
Many tools are hybrids of these types of mobile security models, and they aren't purely signature-, AI- behavior- or cloud intermediary-based. In fact, many argue that combining models can provide superior security compared to the use of a single model.
Unfortunately, threat actors are becoming more sophisticated even as mobile security applications gain capabilities. Security add-ons should still be a standard practice for users -- especially enterprise users with sensitive corporate data.
Go here to read the rest:
4 types of mobile security models and how they work - TechTarget
Increased cybersecurity for the transportation industry – Commercial Carrier Journal
Malicious hackers are always on the lookout for opportunities to launch an attack, and the coronavirus pandemic has provided one.
According to cybersecurity agency Mimecast, transportation was one of the three most targeted sectors by cyberattackers during the first 100 days of the pandemic, and the firm said theres a greater than 95% chance that cyberattacks will increase after the event.
Cybersecurity was a topic of discussion Thursday during CCJs online Symposium, Upshift. Panelists for Breaches & Ransom! Why Hackers Think Fleets are Easy Targets included B-H Transfer Vice President of Administration John Wilson; Matt Cacace, Dasekes senior vice president of business systems; and Bob Verret, Chief Information Office for Dupr Logistics.
This is a very emotional time, Verret of the pandemic, and when youre emotional, you tend to be distracted.
Its a generally accepted concept that a companys greatest cyberthreats come from within, Cacace said.
You and I and others get several emails per day or per week that entice you to click on links to take you to websites where well just say bad things can happen, he said. Anyone with a network has a firewall that is probably attacked several times an hour with various bad actors trying to get into your system.
Wilsons Georgia-based company has been the target of attackers a few times, most recently in February, just as coronavirus made headlines but before anyone knew what lay ahead. The companys anti-virus platform diagnosed and shut down the malware attack before it was able to launch, but Wilson noted the initial attack turned out to only be the first wave.
They decided to wreak a little more havoc the only way they could, he said of the attacker. Somehow, they got into our backup on that one, deleted it, and on the way out turned on Microsofts BitLocker encryption.
In encrypting the carriers files, that effectively wiped the entire server out, Wilson said. We couldnt get on it, of course. We didnt have that 42-bit key. B-H Transfer was able to recover the files with minimal disruption to the operation, but it took almost two weeks to untangle the mess the frustrated hacker left behind.
Partnering with a third-party security provider, which B-H Transfer has done, can be helpful andVerret suggested a layered approach to security that includes monitoring and measuring protocols as things change very rapidly in the environment.
Keeping your own internal people well-educated on awareness that these things are out there and these things can happen and its only a point and click away, Cacace added.
Daseke uses quarterly training and Verret said the company is a firm believer in social engineering, a security layer in which the company sends controlled phony phishing emails that provide instant feedback on employees that need enhanced training.
We basically had a social engineering go out, pretty much, the day after we instituted our work-from-home policy, he said.
Verret said the first step in thwarting a cyberattack is to not click links embedded in emails if theres a reason to suspect the email itself isnt legitimate. Then, contact the IT department or service desk. Never reply to the email. Verret said if the recipient needs to verify the sender, they should call them directly.
A quick and easy-to-implement security layer, Cacace said, is to protect the companys email system via cloud-based service, which distributes a companys email over a number of cloud servers which have a high level of security around them, as opposed to have a server sitting in your own server room, he said.
A replay of the panel discussion, titled Breaches & Ransom! Why Fleets are Easy Targets for Hackers Right Now, will be available for download next week at the following link: http://www.ccjsymposium.com/downloads.
Here is the original post:
Increased cybersecurity for the transportation industry - Commercial Carrier Journal
Cloud-Based Firewalls Are Key to Protecting Employees While Working Remotely – Security Boulevard
The business environment has changed due to the global coronavirus pandemic. To combat the spread of this virus, many businesses transitioned their employees from working in office locations to working from home. As businesses have now settled into a new remote-working cadence, internet security remains a high priority, causing IT teams to reconsider their on premises network security deployments and look toward cloud-based solutions.
Traditionally, businesses build their network security infrastructure on premises, allowing them to have more hands-on access to physical hardware or manage internal security policies. With an on premises firewall, the sole responsibility of maintenance and updates fall on internal IT teams or, in some cases, a managed service provider. On premises firewalls are key when employees have a centralized place to meet, work, and collaborate, securing every device connected to the network at a headquarter or branch office. However, now that many businesses have shifted to extending their remote working policies, cloud-based firewalls have increased in popularity. A cloud-based firewall enables organizations to maintain secure and productive Internet connections for their employees while providing remote access to their digital assets.
The benefit of cloud computing is it provides a centralized core for negotiating dozens of endpoints as they interact with the network, improving business agility and scalability. Transitioning to cloud based applications has allowed businesses to have greater flexibility on how information and data is accessed for all employees. With so many employees working remotely, authorized access to corporate applications, company data, and other business tools can be based on VPN connectivity and authorized access, without the limits of being physically tethered to the office.
Just as many employees have transitioned to working from home, deploying IT infrastructure in the cloud allows the IT administrator to also work from anywhere, without having to be on site in the office server room.
Many businesses transitioning to cloud services will need to explore the options of security within the cloud. Deploying a cloud-based next generation firewall in popular cloud service providers, such as Amazon Web Services, Microsoft Azure, or Google Cloud, gives businesses the ability to provide consistent, secure connectivity to employees across the company.
There are a few steps network administrators can take to ensure their cloud-based firewall provides robust connectivity and a secure environment for employees:
Working within the cloud, many vendors offer Firewall-as-a-Service (FWaaS) models for cloud environments. FWaaS provides a simple and flexible architecture to provide connectivity to all employees, no matter where they are working. Employees can leverage centralized policy management, content filtering, malware and threat protection, and other unified threat management capabilities.
It is crucial that network administrators choose a VPN technology that is fast, secure, and can be fully managed. The means, network administrators have more control over VPN profiles, including mobile device management, and can seamlessly connect remote workers without installing software on every end user device.
Adding multi-factor authentication for access to business applications is another layer of security that IT teams can leverage with remote employees. As each employee has to log into their VPN or cloud-based applications, it should be standard policy that a secondary form of identification, usually an SMS text or bio-identifier like a fingerprint, is also used to log in. This secondary form of authentication protects against unauthorized access to the network or the use of stolen credentials.
As the business environment has changed to adapt to the needs of employees during the coronavirus pandemic, it will change further in ways we might not yet be able to predict. Many businesses who may not have considered having employees work outside the office may continue to work this way in the future. Businesses may find that their employees are just as productive, or more so working in this manner. Many businesses may open up their hiring policies to hire more people in different geographical locations in the future. Whether a business decides to continue to function with employees working remotely in the future, or whether all employees ultimately return to the office, a Firewall / Unified Threat Management solution deployed in the cloud will be a robust future proof solution.
Recent Articles By Author
*** This is a Security Bloggers Network syndicated blog from Untangle authored by jjakobsson@yahoo.se. Read the original post at: https://www.untangle.com/inside-untangle/cloud-based-firewalls-are-key-to-protecting-employees-while-working-remotely/
Originally posted here:
Cloud-Based Firewalls Are Key to Protecting Employees While Working Remotely - Security Boulevard
Cloud storage 101: File, block and object storage in the cloud – ComputerWeekly.com
Cloud storage is increasingly sophisticated and flexible. The initial appeal of storing data in the cloud was flexibility and cost, and to achieve that, the majority of cloud services based their products around object storage, most famously Amazon Web Services (AWSs) S3.
AWSs use of the term bucket for its cloud-based Simple Storage Service is an excellent metaphor for how it works. Users effectively throw their data in, and AWSs object technology takes care of the rest.
But object storage or at least, object storage in isolation cannot fulfil all an organisations data storage needs, and that has prompted the big three cloud service providers AWS, Microsoft Azure and Google Cloud Platform to introduce an increasingly rich menu of storage options.
These include mainstream storage architectures with file, block and object storage, and services such as archiving and backup.
By fine-tuning their storage offerings, the big three aim to give their customers flexibility as well as a viable alternative to local storage.
Block storage such as Googles Persistent Disk provides an alternative to the datacentre for virtual machine (VM) storage.
Meanwhile, AWSs Elastic File System is an NFS file-based system that can combine cloud and on-premise. Azure also offers cloud-based file shares via SMB.
Each of the three suppliers offers its own flavour of object, block and file. The benefits include application support, a range of performance and price options, and the ability to scale up or down on demand.
Against this, CIOs need to weigh up potential costs. Cloud storage is by no means always cheap, and performance-based storage, in particular, can become expensive. There are also the potential performance hits for moving data into the cloud and the fact that data cannot (yet) be moved seamlessly between the three providers.
The trade-offs between cloud and local storage also depend as much on how an organisation needs to manage its data, as on its choice of platforms.
Microsoft Azure may have a head start among CIOs for its (perceived) support for Windows operating systems, but its file-based storage is multi-platform. Amazon, for its part, offers FSx for Windows File Server, another SMB-based system. Windows, or SMB, compatibility is a useful tool to span storage across local and cloud installations, although it is not the only way to do so.
Storage architectures, too, are less rigid than they were. The large cloud providers, along with a host of smaller, specialist storage companies, are increasingly using hardware or technologies such as software-defined storage to bridge the gap between applications and storage architectures.
Nonetheless, there are still some clear use cases for different cloud storage implementations.
Object storage is the system of choice for archiving, backup and analytics, which are all applications that need to store large volumes of data and where the efficiencies and resilience of object come to the fore.
As performance improves, though, object storage is moving into areas such as the internet of things (IoT), running websites, and potentially enterprise applications. The nature of object storage also makes it easier for suppliers to offer storage tiers based on performance, cost and frequency of access.
Against this, block and file can seem less versatile, although this is not always the case.
Block storage is closely tied to the growth in cloud-based virtual machines, and this is its main use case.
Azure Disk, for example, works with Azure VMs, and comes with performance tiers. Googles Persistent Disk operates in a similar way, with Google Cloud VMs, while Amazons Elastic Block Store (EBS) integrates with Amazons EC2 compute resources. Workloads can move to the cloud, but block storage is not typically shared between cloud and local instances.
Microsoft suggests that its Ultra Disk is suitable for SAP Hana, SQL, Oracle and other IOPS-intensive applications.
File-based storage can give more flexibility about where data is located. Amazons EFS is designed to combine cloud and on-premise volumes, but brings the flexibility of the cloud.
Google and Microsoft have their own take on harnessing file-based storage to bring the elastic nature of the cloud to local applications. An additional mention should go to NetApp, as a storage technology provider with tight and multi-supplier integration with the cloud.
File-based cloud storage is not usually application- (or even OS-) specific. Instead, buyers can choose performance levels to match their capacity and IOPS requirements.
And, although performance for cloud-based file shares is increasing, higher-performance stores will usually cost more.
AWS
File: Amazons Elastic File System (EFS) is an NFS-based file system that operates on cloud and local storage. AWS provides this as a Standard storage class and EFS IA (infrequent access). EFS throughput is more than 10GBps. FSx For Windows File Server is storage dedicated to that platform.
Block: Elastic Block Store works with Amazon Elastic Compute Cloud. General purpose SSD volumes offer a base performance of 3 IOPS/GB. Provisioned IOPS SSD volumes support up to 64,000 IOPS and 1,000MBps throughput.
Object: S3 is AWSs object storage offering with a claimed 11 nines availability.
Azure
File: Azure Files uses SMB and allows concurrent file share mounting in the cloud or on premise. Support for Windows, Linux and MacOS. Maximum storage capacity is 4PB, ingress 25Gbps and egress 50Gbps.
Block: Azure Disk provides managed disks for Azure virtual machines, with five nines availability and a maximum disk size of 65,536GB for Ultra disk, with 160,000 down to 32,76GB for standard disk, with 2,000 IOPS.
Object: Azure Blob offers petabyte-scale object storage with 16 nines availability.
Google Cloud Platform
File: Cloud Filestore provides NAS for Google Compute Engine and Kubernetes Engines, with storage offered as standard and premium. Standard ranges from 1TB to 10+TB with 1000 IOPS and 180MBps read throughput for 10+TB systems. Premium starts at 3.5+TB with a read throughput of 1.2GBps and 60,000 IOPS.
Block: Persistent disk block storage runs up to 64TB and offers standard persistent disks, persistent SSDs, and local SSDs and NVMe storage. Write IOPS range from 15,000 to 30,000 and read IOPS from 15,000 to 100,000.
Object: Google object or blob storage provides different locations based on performance and redundancy requirements. The main storage tiers are Standard, Nearline, Coldline and Archive. GCPs Object Lifecycle Management tool automatically moves storage to a lower-cost tier, according to user-specified rules.
Cloud services need not work in isolation. The main suppliers are also adding hardware options, to allow data to span local and cloud locations and to help with data migration.
Amazon offers its Snow range, from the portable Snowball Edge device, which supports up to either 42TB of block or object storage or 80TB for data transfer, to Snowmobile, which comes in a 45ft shipping container. AWS Outposts is its hybrid offering.
Google also offers a transfer service, and Anthos for data storage, although the supplier also works with a number of third parties, including Komprise for hybrid cloud management.
Microsoft provides ARC and Stack as building blocks for hybrid cloud, and data migration. On-premise Kubernetes clusters and Azure data services can both be managed from Azure.
See the original post:
Cloud storage 101: File, block and object storage in the cloud - ComputerWeekly.com
Cloud Transition During the COVID-19 Exposing the Enterprise Vulnerabilities – EnterpriseTalk
Why is cloud ERP going to be the preferred solution in low business times?
Cloud ERP software is going to be the preferred solution in low business times because it brings a predictable cost model for operating ERP software. With the cloud, IT expenses to move from capital expenses to operational expenses. The cost of maintaining servers, other hardware, disaster recovery, back-ups, even keeping the air-conditioning running in the server room go away. Once that predictable cost model is in place, distributors benefit from greater efficiency as their IT resources can spend more time prioritizing the business and driving real strategic value, rather than getting stuck in administrative tasks. IT teams dont have to spend time worrying about an expensive server replacement looming ahead.
Without Intelligent Automation, 60% of the Automation Dreams Will Turn into Nightmares
By standardizing technology investments in the cloud with a few or single trusted service providers, distributors simplify their application and infrastructure strategy to one that is able to scale as required by business needs.
Some of our distributors have had to deal with several vendors for their hardware and their applications to manage their ERP operations. With the cloud, they can replace them with a single enterprise solution- giving them one hand to shake.
Letting an expert service provider manage the administrative aspects of running IT, keeping systems updated, and keeping the business current with the latest technologies, means their IT team can refocus on the highest value business projects. Distributors that choose cloud deployed ERP solutions will be the ones that can stay focused through industry change, and maintain an advantage against competitors who would otherwise get distracted.
AI and Automation Enabling Remote Working During the COVID-19 Crisis
Furthermore, Epicor recently interviewed over 2,000 professionals in our ecosystem as part of the Epicor 2019 Global Growth Index survey and found 84% saw the cloud as playing an essential role in their growth strategy, 90% run cloud applications today (with 31% saying they use cloud significantly), and 92% are planning to invest in cloud applications this year. When looking at industry trends like this, its clear that the cloud is here, and distributors see it as the type of investment that can generate quantifiable returns.
Will the upgrade of Prophet 21 provide added security functionalities since that seems to be the biggest enterprise challenge today?
We had customers come to us saying, Our servers are at end-of-life, so we need to replace them. Id rather avoid the cost. Im also worried about securing them. By upgrading to a cloud environment, companies are reducing the cost and risk of data loss, compliance, and overall cybersecurity with capabilities like antimalware, 247 system monitoring, powerful threat intelligence, best-practice backup, disaster recovery practices, and high-quality solutions. This is to ensure business continuity, and in the event of a component failure, they can recover their data quickly and minimize disruption. Today this is a must-have.
In the current mass remote working scenario, how does a cloud ERP solution help in higher efficiencies?
Given the need today for remote work or wherever a distributors team is, they need reliable and secure communication tools to drive business continuity and rapidly respond, especially to customers or suppliers that are critical or essential to the business. Having a cloud-based ERP that runs in a browser from any device, from anywhere, without the hassle of a VPN, is important to a businesss future-proof strategy.
Cloud-based ERP solutions provide real-time availability of data, but how do they assure the security of that data? How does azure help?
Some of our on-premises customers have shared that they have been hit by ransomware, or they know that their competitors and suppliers have been. They come to us telling us they need help to protect their systems better.
IoT How to Utilize it for Successful Business Operations?
Just recently, weve seen that in times of economic and business uncertainty, cybercriminals are taking full advantage of the situation. If you dont have adequate security measures in place, you are vulnerable. In fact, one of the most popular ways that cybercriminals will infiltrate an organization is through email. Phishing is widely cited as the most popular cyber-attack, and if your company runs its email on the same servers or network as your business applications, that is the perfect highway for a hacker to get in and bring down your business. VPNs are even proven to be vulnerable. You need a smart isolation strategy that separates your business applications like ERP software, from your email.
The rest is here:
Cloud Transition During the COVID-19 Exposing the Enterprise Vulnerabilities - EnterpriseTalk
The Role of Artificial Intelligence in Ethical Hacking | EC-Council Official Blog – EC-Council Blog
Artificial intelligence has influenced every aspect of our daily lives. Nowadays,thousands of tech companies have developed state-of-the-art AI-powered cybersecurity defense solutions specifically designed and programmed by ethical hackers and penetration testers. The Artificial Intelligence used in such solutions helps prevent cyberattacks from even happening by predicting the potential risks.
Every tech app or service we use contains at least some type of Artificial Intelligence or smart learning technology, at least in most cases. It is now of a high possibility of connecting almost every electrical device to the internet to create our own personalized smart environments, all thanks to the recently announced 5th generation speed networks and rapid advancement in machine learning. In order to improve the overall efficiency and performance of the tasks these IoT devices are set to, they have to communicate and exchange information with each other repeatedly.
With the use of AI, most of the tasks are automated, and these AI-powered apps are used in every sector like healthcare, education, military, etc. The data from these smart devices is collected from a set of sensors such as heat, light, weight, speed, or noise. The machine learning technology is directly connected with the security of digital devices and our data/information. There has been an extensive progression in the artificial intelligence sector. And in todays modern age, where all our devices are connected either to the internet or some other modes of networks, the risks of security issues and the need for Artificial Intelligence solutions have skyrocketed.
Different Artificial Intelligence solutions help when our devices are involved in heavy communication under the connection of networks, automatically sending our data securely to the remote cloud servers where all the data and information are gathered and analyzed by the robotic process in order to understand, visualize and extract useful information. Now the challenge arises in safely sending this confidential data to servers as there are many potential threats and risks of hackers stealing this data, which can, in turn, lead a device to be used illegitimately, leaving a privacy risk. Therefore, we must have a way of securing these devices and overcoming these risks in the form of a solution that involves high usage of AI-powered applications.
Since we all use the web regularly, the most common medium we use to access it is an internet browser. And cybercrooks, due to their malicious nature, have found several mechanisms to deceive the innocent and unsuspecting users into providing sensitive information through phishing. This method works when a cybercrook makes a fake SMS, video, phone call, or shopping site that offers goods, products, or services at very unbelievable prices. But when a user enters their personal information, like credit card or other payment information, it goes straight into the hands of web-hackers who then use this for their very own personal usage. Then the innocent buyer never receives anything that they ordered. However, cyber professionals have deemed artificial intelligence as a countermeasure for this hacking method. The AI-powered web-based filters and firewall applications are now available that upon deployment on a users device like their computer;it protects the users by now even letting the user open a website that raises flags of a little bit of insecure and suspicious. Machine learning coded into Artificial Intelligence helps learn the new patterns of scams over time, and these AI-powered firewalls learn automatically new ways to protect users against advanced cyber risks. When users install these anti-scams firewalls into their digital devices like mobile phones, then the chances of phishing related scams are extremely reduced.
Data leaks and identity theft nowadays are on the rise, as the passing time has very much revealed the shocking fact that the number of such cyber-attacks is only increasing over time. As humans, we are not perfect, and we also keep forgetting very important things in our lives. The same goes for when it comes to the protection of data/information like our passwords for our different accounts, including social media, bank accounts, and so on. Since we keep the usage of the same passwords for too long that the chances of it being break/cracked by cyber-crooks increase. Or simply sometimes we keep a device logged-in with our info, and someone else physically takes the device and can see our private information. But with the use and implementation of AI, this problem is hugely reduced as Artificial Intelligence automatically determines that a password of an account is being used for too long, and it is time to change, keeping the user reminding that changing-passcodes regularly is vital for information-safeguarding. Similarly, if an account is open and someone tries to change, edit or modify info/data the Artificial Intelligence parameters are automatically triggered that asks the users to re-verify their passcodes, hence protecting the user from ID/data theft
Lets face it, everyone uses the internet, and for using the internet we need a web-browser. Its common knowledge that there are billions of people who use the internet everyday and for hours. We use browsers on every device we own no matter its our smartphone, tab, laptops. The Internet is a crucial part of our lifestyle; there is no denying this fact. However, Artificial Intelligence only has the power to predict potential cybersecurity risks and take feasible countermeasures and to block them even before time. However, practicing privacy enhancement methods plays a vital role in developing secure habits that can save us, users from any malicious attack attempt on our IoT devices. Obtaining the EC-Council Certified Ethical Hacker (CEH) Certification would give you the critical base-knowledge of implementing Artificial Intelligence into a cybersecurity environment.
FAQs
How does Artificial Intelligence help cyber security?
Read more: https://becominghuman.ai/why-you-should-use-artificial-intelligence-in-cybersecurity-204dbe33326c
Will Artificial Intelligence take over cyber security?
Read more: https://www.circadence.com/blog/will-artificial-intelligence-replace-cyber-security-jobs/
What is the future for cyber security?
The ability to leverage machine learning and artificial intelligence is the future of cybersecurity. There is no doubt Artificial Intelligence can become the future of security. Data is exponentially increasing. Automation and machine learning have catapulted us beyond the limitations of human skill.
Read more: https://www.disruptordaily.com/future-of-cybersecurity/
Read the original here:
The Role of Artificial Intelligence in Ethical Hacking | EC-Council Official Blog - EC-Council Blog
Shelves are well-stocked with cloud-native tools, but simplicity remains a moving target – SiliconANGLE
Cloud-native technologies have become ubiquitous. The latest survey from the Cloud Native Computing Foundation shows that more than half of graduated projects have achieved more than 50% use in production, with Kubernetes leading the way at 84% in 2020.
But todays developers are confronted with a growing number of tools to navigate an increasingly complex cloud-native infrastructure. There are plenty of items on the shelves, and the challenge becomes how to know which tool to use for each problem that needs to be solved.
Its like walking through an aisle at Home Depot, said Kelsey Hightower(pictured, left), staff developer advocate of the Google Cloud Platform at Google. You can pick the tools that you need, you can safely ignore the ones you dont need, and maybe something looks interesting and you study it. For most people, if you dont have that problem that a tool solves, you should be happy. No one needs every project.
Hightower spoke with Shaun Connelly, executive strategist at AccelG2M, as part of SiliconANGLEs and theCUBEs coverage of DockerCon Live. He was joined by Michelle Noorali(pictured, center), senior software engineer at Microsoft Corp., and Chris Aniszczyk(pictured, right), chief technology officer and chief operating officer of the Cloud Native Computing Foundation, vice president of developer relations at The Linux Foundation, and executive director of the Open Container Initiative.
They discussed new developer tooling to improve workflow application visibility and coding, progress in workloads for serverless, resources available to participants in the cloud-native space and infrastructure challenges still to be addressed. (* Disclosure below.)
Recent tool deployments appear focused on helping make the lives of developers and operations staff easier. These include dashboards, included in tools, like recently graduated CNCF project Helm or Kiali, which provide monitoring and metrics.
Anything with a dashboard I love these days, Noorali said. One of the goals of the Helm project was to make it easier to deploy an application on Kubernetes so you could see what the finished product looks like. Ive been passionate about this kind of stuff for a while now, and I love seeing projects which come into this space that have the same goal and just iterate and make things easier.
Another example of tools to make development and deployment less complex is Codespaces, a cloud-based code editor unveiled earlier this month by GitHub Inc. Developers can preload tools they need and save multiple steps oftenrequired to configure an environment.
I was blown away, said Aniszczyk, who received a Codespaces demo from GitHub. You go to a project, open it up, and behind the scenes they have a container that is set up for the environment you need to build. As we continue to move up the stack, youre going to see an incredible amount of improvement around developer tooling and developer experience powered by a lot of this cloud-native technology behind the scenes.
In moving up the stack, one area of focus within the cloud-native community has been serverless computing. The goal is to let developers focus on what theyre doing and not necessarily how to do it underneath, according to Hightower.
Serverless is not quite there yet for every type of workload, Hightower said. Serverless apps? Check. Event-driven workflows? Check. But its not necessarily for machine learning and more traditional workloads that enterprises want to run.
When it comes to extending tool features that simplify the development and deployment process, CNCF has chosen to leave the heavy lifting up to the market. The foundation did step in last year to merge two competing projects that focused on metrics and telemetry in a cloud-native world,Aniszczyknoted, but it otherwise has preferred a community-driven approach.
We dont force things, Aniszczyksaid. We want our community of end users and vendors to decide which technology is best in the long term, and we support that.
This community-based approach has propelled the cloud-native world for a number of years. CNCF provides resources for practitioners interested in finding new solutions to what may well be old problems.These include special interest groups where users can select a vertical market of interest and case studies on the CNCF website.
It will give you a broad overview of the challenges people are trying to solve with the technology in this space, Noorali said.
For Hightower, one of those key challenges remains getting to a place where, like todays internet, people are focused on how to use it as opposed to building it out.
Were just not there yet with infrastructure stuff; were so in the weeds, said Hightower, who noted that the mobile space offered an instructive example. You put a software development kit in one place, and 100 million people can download it at the same time with no DevOps team. When can we do that for server-side applications? Thats going to be something Ill find really innovative.
Heres the complete video interview, part of SiliconANGLEs and theCUBEs coverage of DockerCon Live. (* Disclosure: TheCUBE is a paid media partner for DockerCon Live. Neither Docker, the sponsor for theCUBEs event coverage, nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)
Show your support for our mission with our one-click subscription to our YouTube channel (below). The more subscribers we have, the more YouTube will suggest relevant enterprise and emerging technology content to you. Thanks!
Support our mission: >>>>>> SUBSCRIBE NOW >>>>>> to our YouTube channel.
Wed also like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we dont have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary onSiliconANGLE along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams attheCUBE take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
If you like the reporting, video interviews and other ad-free content here,please take a moment to check out a sample of the video content supported by our sponsors,tweet your support, and keep coming back toSiliconANGLE.