Data security is not optional. Organizations owe it to their clients to protect sensitive client data. And market forces in the form of reputation damage, revenue loss and hefty fines (for regulated data) ensure that there is plenty of incentive to do so.
As organizations move to address increasingly sophisticated security threats, they are often caught off guard by the many hidden costs of security and compliance, realizing (too late) that safeguarding data from current and future threats is more resource-intensive than first imagined—and is growing more so with each passing day.
In part 1 of this series, I’ve outlined five hidden costs of security and compliance that organizations often encounter when embarking upon data integration and management projects.
- New tools are helping to transform cybersecurity frameworks, yielding holistic, integrated safeguards against cyberattacks
- Cloud computing has had a significant impact on technology innovation in the past decade, and it is increasingly central to secure interconnected digital ecosystems
- The Internet of Things are expected to increase the stakes for securing cloud-based networks as the number of internet connected devices continues to surge to greater than 30 billion by 2020
- There was a 38% increase in detected information security incidents, as well as a 24% boost in security budgets observed in 2015
NEW YORK, NY – Year after year, cyberattacks continue to escalate in frequency, severity and impact. However, prevention, detection methods and cybersecurity innovation are on the rise as forward-leaning business leaders focus on solutions that reduce cybersecurity risks and improve business performance. The Global State of Information Security® Survey 2016 released today by PwC US in conjunction with CIO and CSO examines how executives are looking towards new innovations and frameworks to improve security and mitigate enterprise risk.
As cyber-risks become increasingly prominent concerns in the C-suite and boardroom, business leaders are increasingly rethinking cybersecurity practices, focusing on a nexus of innovative technologies that can reduce enterprise risks and improve performance. The vast majority of organizations – 91% – have adopted a security framework, or more often, an amalgam of frameworks. These technologies are yielding considerable opportunities to improve cybersecurity and produce holistic, integrated safeguards against cyber-attacks.
"We are seeing more of what we once saw as a risk, being turned into possible solutions," said David Burg PwC’s Global and US Advisory Cybersecurity Leader. "For example, many organizations are embracing advanced authentication as a cloud service in place of solely password based authentication."
The adapting of traditional cybersecurity measures to an increasingly cloud-based world is an example of this effort with considerable investments being made to develop new network infrastructure capabilities that enable improved intelligence gathering, threat modeling, defense against attacks and incident response. According to the report, 69% of respondents said they use cloud-based security services to help protect sensitive data and ensure privacy and the protection of consumer information.
Connected to the emergence of cloud-based systems, Big Data and the Internet of Things are each ascendant technologies that present a host of cyber challenges and opportunities. In the case of Big Data, often considered a cyber liability, 59% of respondents are leveraging data-powered analytics to enhance security by shifting security away from perimeter-based defenses and enable organizations to put real-time information to use in ways that create real value.
As the number of internet connected devices continues to surge, the Internet of Things will inevitably increase the stakes for securing cloud-based networks. Investment intended to address these issues doubled in 2015, but at this point only 36% of survey respondents have a strategy specifically addressing the Internet of Things.
“There is no one-size-fits-all model for effective cybersecurity. It’s a journey toward a future state that starts with the right mix of technologies, processes, and people skills,” added Burg. “With those components in place, cybersecurity potentially serve as an indispensable ongoing business enabler.”
Over the past three years, the number of organizations that embrace external collaboration has steadily increased. Sixty-five percent of respondents report they are collaborating with others to improve security. As more businesses share more data with an expanding roster of partners and customers, it makes sense that they also would swap intelligence on cybersecurity threats and responses.
“An advanced and enhanced information security program will not only enable companies to better defend against cyberthreats, it will also help create competitive advantages and foster trust among customers and business partners,” said Bob Bragdon, VP/publisher of CSO.
Additional notable findings this year include:
- Information security spending increases: Respondents boosted information security spending significantly, reversing last year’s slight drop in security spending. This year respondents boosted their information security budgets by 24% in 2015.
- Evolving Cybersecurity Roles: 54% of respondents have a CISO in charge of the security program. The most frequently cited reporting structure is the CEO, CIO, Board and CTO, in that order.
- Increasing Board Involvement: 45% of boards participate in the overall security strategy. This deepening of Board involvement has helped improve security practices in numerous ways.
- Mobile Payments Going Mainstream: 57% of respondents have adopted mobile payments systems - but the ecosystem continues to rapidly evolve as new partnerships are formed among a constellation of technology, financial, retail and telecommunications firms.
- Investing in Insurance: Technically adept adversaries will always find new ways to circumvent security safeguards. That's why many businesses (59%) are purchasing cybersecurity insurance to help mitigate the financial impact of cybercrimes when they do occur.
- Government Surveillance Impacting Buying Decisions: Purchases in certain countries are either under review (34%) or happening less frequently (22%) as a result of hearing about reports that the government is conducting surveillance on hardware, software and/or services from certain countries.
To explore the survey findings by industry and region, visit: www.pwc.com/gsiss.
The Global State of Information Security® Survey 2016 is a worldwide study by PwC, CIO and CSO. It was conducted online from May 7, 2015, to June 12, 2015. Readers of CIO and CSO and clients of PwC from around the globe were invited via email to take the survey. The results discussed in this report are based on the responses of more than 10,000 executives including CEOs, CFOs, CISOs, CIOs, CSOs, vice presidents, and directors of IT and information security from more than 127 countries. Thirty-seven percent (37%) of respondents were from North America, 30% from Europe, 16% from Asia Pacific, 14% from South America, and 3% from the Middle East and Africa. The margin of error is less than 1%.
CIO is the content and community resource for information technology executives and leaders thriving and prospering in this fast-paced era of IT transformation in the enterprise. The award-winning CIO portfolio—CIO.com, CIO magazine (launched in 1987), CIO executive programs, CIO strategic marketing services, CIO Forum on LinkedIn, CIO Executive Council and CIO primary research—provides business technology leaders with analysis and insight on information technology trends and a keen understanding of IT’s role in achieving business goals. Additionally, CIO provides opportunities for IT solution providers to reach this executive IT audience. CIO is published by IDG Enterprise, a subsidiary of International Data Group (IDG), the world’s leading media, events, and research company. Company information is available at http://www.idgenterprise.com/.
CSO is the content and community resource for security decision-makers leading “business risk management” efforts within their organization. For more than a decade, CSO’s award-winning web site (CSOonline.com), executive conferences, strategic marketing services and research have equipped security decision-makers to mitigate both IT and corporate/physical risk for their organizations and provided opportunities for security vendors looking to reach this audience. To assist CSOs in educating their organizations’ employees on corporate and personal security practices, CSO also produces the quarterly newsletter Security Smart. CSO is published by IDG Enterprise, a subsidiary of International Data Group (IDG), the world’s leading media, events and research company. Company information is available at www.idgenterprise.com.
At PwC, our purpose is to build trust in society and solve important problems. We’re a network of firms in 157 countries with more than 208,000 people who are committed to delivering quality in assurance, advisory and tax services. Find out more and tell us what matters to you by visiting us at www.pwc.com.
PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see www.pwc.com/structure for further details.
©2015 PwC. All rights reserved
Many BCM practitioners talk about BCM standards, but few walk the walk. I write this blog as this subject continues to boggle my mind in today’s risk-filled environment.
I recently presented to two groups: one at a major conference in Orlando and the second at a leading continuity group in Nebraska. We spoke to a total of about 140 practitioners regarding standards and compliance. The attendees were all from mid-level to very large companies – some regulated, some not. Experience levels ran from beginner to advanced.
The first question I asked both groups was: How many of you have adopted a standard to drive your enterprise BCM program?
Want to guess what percentage had adopted a standard? 1%? 25%? 50%? Less than 10% of the 140 had adopted a standard—a dreadfully low number.
New PwC global defense map illustrates priorities and postures
National defense organisations are facing complex and dynamic security challenges, ranging from a myriad of modern terrorist threats to tough spending cuts.
PwC’s global defense experts have assessed the impact of these challenges on 60 countries worldwide - including the top 50 defense-spending nations – and mapped the results.
The security challenges confronting national defense organisations are both complex and dynamic. Countries now face a range of threats that vary greatly in both scope and scale. Long-standing threats from neighbouring nations, such as the enduring tensions on the Korean peninsula and Indian subcontinent, are the types of traditional challenges that most national defense organisations have been organised to confront.
But, says Tom Modly, PwC’s Global Defense Network Leader:
“Major terrorist attacks such as those of September 11, 2001 and, more recent attacks on schoolchildren in Kenya and French satirical writers in Paris, typify the emergent challenges of ‘asymmetrical adversaries’. These groups possess destructive capabilities that are more difficult to detect and defeat through conventional means – and thinking.”
The other challenge highlighted by the PwC report - Global Defense Perspectives: Mapping prioritisation and posture in a challenging world – is the downward pressure on defense spending. Faced with growing government costs, sluggish economic growth and weariness after a decade of operations in Afghanistan and Iraq, defense budgets for many NATO allies and partners have dropped substantially in recent years.
Many of these countries continue to struggle to modernise outdated systems and maintain readiness as the security environment facing ministries is both uncertain and increasingly complex.
PwC’s approach for developing these global defense perspectives looks at recent defense spending trends and the major investment, institutional, structural and strategic priorities and challenges impacting these nations.
Using the insights and unique perspective of PwC’s Global Government Defense Network, we have measured and plotted these 60 nations against two dimensions: how they prioritise defense spending, and how they position or ‘posture’ themselves in the global security environment.
Global Power Projectors: The US and Russia. These two nations alone spend greater than 3% of their GDP on defense and are very engaged in security efforts around the world. They seek to use their military capabilities and security posture to influence global security issues. Their defense organisations are very large and mature. Although not necessarily nimble, they are capable of deploying forces, managing large complex procurements, and, at least in the case of the US, conducting large scale operations around the world.
Constrained Force Projectors: Australia, China, France, and the UK. These four nations spend between 1.5% and 3% of their GDP on defense and are very engaged in security efforts around the world. These nations are among the world’s largest defense-spending nations, who prioritise high-end defense capabilities and have militaries that can deploy or exert their influence in most regions of the world. They can selectively deploy forces to key regions around the world, manufacture and integrate complex weapons systems - but, with the exception of China, are also aggressively looking for ways to reduce costs and increase efficiencies in these times of significant fiscal constraints.
Coalition Partners: Canada, Germany, Italy, the Netherlands, Spain, and Sweden. These six nations spend less than 1.5% of their GDP on defense, but they are very engaged in security efforts around the world. Despite modest budgets, they readily contribute to UN peacekeeping and multilateral coalition operations around the world. Except for Sweden, these nations are all NATO allies who have a strong track record of operating together. They deploy forces regularly, but have struggled in recent years to maintain readiness as defense budgets have shrunk.
Robust Self-Defenders: Angola, Algeria, Bahrain, Colombia, Iraq, Israel, Kuwait, Morocco, Oman, Pakistan, Saudi Arabia, Singapore, Syria, Ukraine, and the United Arab Emirates (UAE). These 15 nations spend more than 3% of their GDP on defense, but are more focused on security efforts in their immediate geographic region. Because of internal or immediate regional threats, they have developed military capabilities centred on directly and aggressively countering those challenges. They generally do not get involved in UN or multilateral coalition operations except when addressing nearby security concerns.
Threat-Focused Self-Defenders: Chile, Croatia, Egypt, Estonia, Greece, India, Iran, Malaysia, Portugal, Poland, Qatar, South Korea, Taiwan, Thailand, Turkey, and Vietnam. These sixteen nations spend between 1.5% and 3% of their GDP on defense and are more focused on security efforts in their immediate geographic area. Many of these nations participate in UN peacekeeping or multilateral coalition operations to help build relationships with allies and partners, but the focus of their spending is on countering a specific threat emanating from a single nation.
Territorial Security Seekers: Argentina, Austria, Belgium, Brazil, Denmark, Finland, Indonesia, Japan, Latvia, Lithuania, Mexico, New Zealand, Norway, the Philippines, South Africa, Switzerland, and Venezuela. These 17 nations spend less than 1.5% of their GDP on defense and are more focused on security efforts in their immediate geographic area. These nations spend modestly on defense, but many contribute to UN peacekeeping operations or multilateral coalition operations in some fashion.
PwC analysts conclude there are a number of lessons to be learned when looking at the Defense Map:
- Expect movement: There is a tremendous amount of growth in the lower half of the Map where 31 nations have seen significant recent growth that is expected to continue in the next five years.
- Global players under severe pressure: The preponderance of nations that have a globally-oriented security posture are also under significant budgetary pressure as evidenced by the fact that spending in 10 of the 12 nations in the top half of the Map has declined or remained flat in the past five years.
- Cost-cutting dominates strategy: Institutional reform efforts focused on cost-cutting are a major emphasis for most of the nations that have a globally-oriented security posture. Global Power Projectors (such as the United States), Constrained Force Projectors (like the UK), and Coalition Partners (such as Canada) are all undertaking initiatives to increase efficiencies and reduce overhead or personnel expenses.
- A focus on institutional and national capacity: Furthermore, institutional reform efforts focused on capacity building are a priority principally in those nations in the lower half of the Map. Robust Self-Defenders (such as the UAE), Threat-Focused Self-Defenders (like India), and Territorial Self-Defenders (such as Japan) are less focused on efficiencies than on building the institutional capabilities of their respective ministries of defense.
- Collaboration in Procurement: Cooperative efforts are particularly prevalent among the nations that had lower levels of defense prioritisation. Cooperative procurement efforts, for example, are much more prevalent among the Coalition Partners and the Territorial Self-Defenders than with the Robust Self-Defenders.
- Asymmetric threats and cyber ‘insecurity’ gains prominence: Regardless of where a nation currently resides on the Map, vulnerabilities to asymmetric threats such as terrorism and cyber crime/attack are driving investment in new, non-traditional defensive and offensive capabilities. Such investment has profound implications for the nature of the future forces with respect to recruiting, training, career development and retention.
Concludes PwC’s Tom Modly:
“The depth and breadth of these current security challenges leave defense leaders with some tough choices. What institutional reform initiatives are needed to posture their ministries for the future? What procurement priorities are needed for the coming years? How do they build the necessary organisational agility in order to address a wider range of threats such as strategic nuclear, conventional, terror, and cyber? And how should they cooperate with allies and partners around the world?”
- The nations that the PwC report and mapping focuses on are: Americas: Argentina, Brazil, Canada, Colombia, Chile, Mexico, US, Venezuela. Europe: Austria, Belgium, Croatia, Denmark, Estonia, Finland, France, Germany, Greece, Italy, Latvia, Lithuania, the Netherlands, Norway, Poland, Portugal, Russia, Spain, Sweden, Switzerland, Turkey, Ukraine, UK. Middle East and Africa: Algeria, Angola, Bahrain, Egypt, Iran, Iraq, Israel, Kuwait, Morocco, Oman, Qatar, Saudi Arabia, South Africa, Syria, United Arab Emirates. Asia Pacific: Australia, China, India, Indonesia, Japan, Malaysia, New Zealand, Pakistan, Philippines, Singapore, South Korea, Taiwan, Thailand, Vietnam.
In addition, due to their regional and global significance, other countries have been selected, including: Ukraine, Baltic States, Bahrain, Philippines, Qatar and Vietnam.
- Methodology: PwC developed a template to analyse specific national defense characteristics. This template had two principal sections that focused on: Recent, current, and anticipated defense spending trends; and the major investment, institutional, structural and strategic priorities and challenges impacting these nations. We used the insights of PwC's Global Government Defense Network as well as publicly available resources to populate the templates and develop insights on the progress made by these defense organisations in adapting to their respective challenges. Using this information, we then measured these nations against two metrics: 1) Prioritisation - how they prioritise defense spending, and 2) Posture - how they posture themselves in the global security environment.
- The full report, Global Defense Perspectives: Mapping prioritisation and posture in a challenging world, can be downloaded from here.
- At PwC, our purpose is to build trust in society and solve important problems. We’re a network of firms in 157 countries with more than 208,000 people who are committed to delivering quality in assurance, advisory and tax services. Find out more and tell us what matters to you by visiting us at www.pwc.com.
PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see www.pwc.com/structure for further details.
©2015 PwC. All rights reserved
Two earthquakes within a few days may seem like a lot for one region of a country to withstand, but in the case of the insurance and reinsurance industry early indications suggest the impact of the Japan quakes will be manageable.
A magnitude 6.5 earthquake struck the Kumamoto prefecture of Japan last Thursday. Just 28 hours later a magnitude 7.3 quake struck the region. So far, Japanese officials have confirmed 46 fatalities and more than 1,000 people injured.
Reports appear to show significant property damage in the region, but it’s too soon to know what insured losses will be.
Backup is broken. Anyone who has had to work with enterprise backup knows this to be the case. Gartner, in fact, published a report six years ago titled, “Best Practices for Addressing the Broken State of Backup.” One would think that, given how awful the state of backup was in 2010, the situation would have improved by now. But, unfortunately, the broken state of backup is actually getting worse, not better.
For example, a global survey of CIOs and IT pros in 2015 showed that, on average, an organization experienced 15 unplanned downtime events that year. This compares to the average of 13 reported in 2014. In addition, unplanned mission-critical application downtime length grew 36 percent from 1.4 hours to 1.9 hours year over year, and non-mission-critical application downtime length grew 45 percent from 4 hours to 5.8 hours. These outages cost the average organization $16 million a year, up 60 percent over 2014.
The central problem is that backup cannot provide what organizations really need: availability. After all, when a mission-critical application is down or the file server has crashed beyond repair, it’s cold comfort to have a backup of the data somewhere across town on a tape in an underground vault. The enterprise is undergoing a digital transformation in which executives, employees, customers and partners expect to have 24/7/365 access to data.
The Internet of Things (IoT) promises to cause disruption in almost every industry. Companies need to examine how they can take advantage of connected products and services and plan for the significantly increased data workloads that will likely come with the deployment of sensor-enabled products. However, an expected surge in product innovation also means that companies should carefully consider how they will deal with the potential rise of new, more agile competitors whose business models will be based primarily on IoT products and services. Here are some points about the IoT I’ve been discussing with colleagues that organizations may want to consider.
Company's Dynamic Deception Platform ups the Anti for Attackers Looking to Breach OpenStack Networks
FREMONT, Calif. – Attivo Networks®, the award-winning leader in deception for cyber security threat detection, today announced that its deception platform architecture now integrates with OpenStack, providing organizations with efficient and effective detection of inside-the-network threats for virtualized software defined data centers (SDDC). Building upon its current Dynamic Deception Platform, Attivo now offers support for OpenStack environments in addition to its current support for VMware EXSi, Amazon Web Services, SCADA, and user networks.
Tweet This: @AttivoNetworks ups the ante for attackers looking to #breach @OpenStack networks
Data center virtualization has achieved large-scale deployment based on its inherent cost and performance benefits; however with a SDDC there also comes a challenge of decreased visibility, which raises the risk of a network intrusion. With the explosion of server-server or what is also referred to as east-west traffic, traditional IDS/IPS and sandboxing solutions become unsuitable given their cost and the large amounts of resources and personnel required to manage and deploy these devices. A new, scalable approach is needed for increased network visibility and the ability to promptly and reliably detect the growing number of complex and malicious attacks targeted at the high value information stored within a data center.
The highly scalable Attivo Deception Platform is designed for friction-less deployment and efficient inside-the-data center threat detection for environments of large server workloads and widespread adoption of virtual machines (VMs) that are typically seen in data center and cloud networks. Using dynamic deception based on highly efficient luring techniques, Attivo does not rely on the compute and log intensive processes of monitoring traffic for known signatures or attack patterns. Instead, deception and decoys are used to lure in and deceive an attacker into revealing themself. These deception techniques are a highly effective approach for promptly detecting zero day, stolen credential, insider, and ransomware attacks. Once the attacker is engaged with the BOTsink® engagement server, the attack and its lateral movement can be studied, alerts raised, and forensics provided for prompt incident response. Integrations with firewall, NAC, SIEM and other security solutions are also available to automate the process and improve the time to remediation.
With the majority of a company's data passing through their data center it is critical to have clear visibility into threats that are inside the network. The Attivo solution integrated with the OpenStack Platform will support deployment of engagement VMs in production subnets.
Attivo is also working with Criterion Networks and its Criterion SDCloud Platform to implement security groups and quarantine infected VM's in Criterion SDDC solution architecture, which will contain an attacker from moving to other VMs to maintain persistence.
"With large scale SDDC comes challenges in security both in terms of visibility and detection of attackers," said Srinivas Vegesna, CEO, Criterion Networks. "The integration between Criterion Networks' quarantine solution with Attivo Networks provides organizations real-time detection of threats and the ability to promptly quarantine infected VMs. This is critical to protect against cyber threats, which can rapidly spread within a data center environment. This integrated solution will also be available on Criterion SDCloud platform so that our customers can see the solution in action instantly."
"Cloud and software defined data centers are growing at unprecedented rates and there is an unquestionable need for visibility into and the protection of these environments," said Tushar Kothari, CEO of Attivo Networks. "Attivo provides an inside the network breach detection solution that is massively scalable, complementary and seamless to integrate with OpenStack installations. The combination creates a powerful defense against attacks."
"By 2019, OpenStack enterprise deployments will grow tenfold, up from just hundreds of production deployments, due to increased maturity and growing ecosystem support," notes Gartner analyst Matthew Cheung in his February 5, 2016 report, "Competitive Landscape: OpenStack Distributions and Support Service Market."
Attivo Networks is also a member of the OpenStack Foundation and will be participating at the OpenStack Summit in Austin, TX on April 25-29, 2016. Attivo will be speaking on April 28th at 11:50 AM and will be providing an overview on deception benefits based on customer use cases.
Criterion Networks: www.criterionnetworks.com
Attivo Networks: www.attivonetworks.com
About Attivo Networks
Attivo Networks® is the leader in dynamic deception technology, which in real-time detects intrusions inside user networks, data centers, cloud, and SCADA environments before the data is breached. Leveraging high-interaction deception techniques, the Attivo BOTsink® Solution lures BOTs and APTs to reveal themselves, without generating false positives. Designed for efficiency, there are no dependencies on signatures, database look up or heavy computation to detect and defend against cyber threats. Attivo solutions capture full forensics and provide the threat intelligence to shut down current and protect against future attacks. www.attivonetworks.com
OpenStack is a cloud operating system that controls large pools of compute, storage, and networking resources throughout a datacenter, all managed through a dashboard that gives administrators control while empowering their users to provision resources through a web interface. The OpenStack Mission is to produce the ubiquitous Open Source Cloud Computing platform that will meet the needs of public and private clouds regardless of size, by being simple to implement and massively scalable. OpenStack is open source, openly designed, openly developed by an open community.
Netskope Achieves Agility, Availability, and Performance Across Its Network With Infoblox DDI
SANTA CLARA, Calif. – Infoblox Inc. (NYSE: BLOX), the network control company, today announced that Netskope has deployed Infoblox solutions to achieve its mission of delivering secure cloud-based services to its customers. Through an integrated DNS, DHCP, and IP address management (DDI) solution utilizing Infoblox Grid™ technology, Netskope has the scalability and control to ensure always-on, automated network functionality with minimal operational support. Infoblox provides an essential component for Netskope's popular service where its customers' end users, on average, access over 750 applications and cannot afford disruptions to their business processes.
Netskope is a leader in enabling organizations to safely employ cloud-based applications while protecting sensitive data, which is crucial in a world where almost 50 percent of data lives in cloud applications outside the reach of traditional network security. Netskope delivers a cloud-based service that enables IT organizations to manage usage of sanctioned and unsanctioned cloud applications, protect sensitive data, and ensure compliance in real time on any device, including native applications and mobile devices, on-premises or remote.
As with other cloud service providers, Netskope's ongoing business challenges include providing an optimal customer experience. This not only includes overcoming concerns about operational efficiency and risk management, but also providing a high degree of visibility into network operations that take place outside the corporate firewall. Delivering on these lofty expectations required Netskope to find a centralized solution for managing core network services, including configuration changes and updates, as well as providing a high degree of redundancy throughout the network.
To meet these goals of agility, availability, and performance, Netskope integrated the patented Infoblox Grid technology into its network infrastructure. The Infoblox solution enables Netskope to link distributed appliances throughout the network using a central database to ensure consistent information availability, as well as to provide a centralized view of network data for simplified monitoring and reporting.
"Because we provide services to businesses of all sizes, flexibility in our network is of utmost importance," says Abhay Kulkarni, vice president of engineering and operations at Netskope. "Infoblox gives us the flexibility to maximize our resources and the tools to see exactly what is happening across our network at any moment. In turn, that allows us to focus on the customers and give them granular control of their applications and data -- all with a fraction of the operational headcount required by other enterprises with similar network scale. In fact, with the automation Infoblox provides, our two-person operations team can launch new services and spin up new machines, while monitoring workloads and adding capacity, without the need for manual intervention."
The Infoblox solution has improved productivity for Netskope's distributed network by monitoring conditions before additional resources are necessary, adding capacity automatically to support new product launches, and reducing the manpower needed for daily operations. It also redistributes traffic in the event of a data center outage, preventing service interruptions. Its visibility functions deliver crucial insight into subnets to allow scaling for enterprise clients, and Anycast support increases performance by routing users to the nearest data center.
"For companies providing software as a service, their network is their livelihood," said Ashish Gupta, chief marketing officer at Infoblox. "Our goal is to give businesses like Netskope deep visibility into current network conditions and the agility to fulfill moment-to-moment needs without compromising availability or performance. As in the case of Netskope, this provides an important competitive advantage in today's 24/7 marketplace."
Read this case study and more at https://www.infoblox.com/resources/case-studies.
Infoblox (NYSE: BLOX) delivers critical network services that protect Domain Name System (DNS) infrastructure, automate cloud deployments, and increase the reliability of enterprise and service provider networks around the world. As the industry leader in DNS, DHCP, and IP address management, the category known as DDI, Infoblox (www.infoblox.com) reduces the risk and complexity of networking.
SUREedge® Now Supports DR of Containers Across All Popular Platforms
SANTA CLARA, CA--(Marketwired - April 20, 2016) - Sureline Systems, a leader in cloud migration, datacenter consolidation and Disaster Recovery solutions, is pleased to announce the addition of support of containers to its flagship SUREedge product line. Containers running on all popular platforms are supported along with physical servers and virtual machines so that the entire infrastructure can be migrated in case of a disaster. Additionally, Containers along with data volumes can also be migrated and restored in Google Container Engine managed by Kubernetes.
Containers are becoming an integral part of a new generation of software solutions, and can now be protected in the same way as existing applications, using SUREedge. "With many applications being a mix of containers and traditional virtual machines or physical servers running parts of the complete application, it is important to have a single solution that works with the entire application and ensures it is protected at a remote site or in a Cloud and can be up and running quickly in case of a disaster," said Kuldeep Nagarkar, VP of Engineering at Sureline Systems.
"Sureline Systems is taking a lead in cloud migration aligning product capabilities with business requirements around performance and security when migrating to the cloud," according to a 451 report by Agatha Poon.
SUREdge supports all of the standard Linux environments where containers are developed and deployed, including Docker containers 1.10.2 running on Ubuntu 12.04, Ubuntu 14.04, CentOS 7 and RHEL 7.
About Sureline Systems:
Sureline Systems, is headquartered in Santa Clara, CA, with offices in Japan, India and Dubai. Sureline's award winning SUREedge® is a proven enterprise-class software platform for Cloud Migration, Cloud Disaster Recovery, Datacenter Consolidation and Application Mobility.
Sureline Systems has announced partnerships with Google Cloud Platform (GCP), Century Link Cloud, Nutanix, Tintri and several large Channel Partners. SUREedge reduces risk through secure data transmission, efficient data movement, and reliable movement of the entire application including containers, and its data. It is easy to deploy and manage through a single UI, with automated discovery, no agents to install, and is completely non-disruptive. SUREedge is source and destination agnostic working from any physical server, any hypervisor, any cloud, and any storage including hyperconverged to any other environment. Customers worldwide trust SUREedge® to meet their application mobility, disaster recovery, business continuity and application mobility objectives. For further information, please visit the Sureline website at www.surelinesystems.com.
Red Herring Top 100; Red Herring Global 100, CIO Review Top 100 Twitter: @SurelineSystems