Monthly Archives: april 2015

Cisco, Elastica Forge Reseller Partnership

29 april 2015
By

A new partnership gives Cisco’s customers and partners channel access to a cloud access security broker (CASB) offering from Elastica.

Elastica, a cloud access security provider, and Cisco signed a reseller agreement that adds Elastica’s cloud app security solution to Cisco’s threat-centric security portfolio. The deal bolsters Cisco’s security offering with a cloud access security broker (CASB) portfolio that addresses security and compliance risks associated with cloud application and services adoption.

While Cisco gains access to cloud security technology that complements and enhances its existing security offerings, the partnership gives Elastica, an emerging company in the CASB space, greater customer reach. The agreement includes Elastica’s complete product portfolio, including the CloudSOC platform, security apps (Audit, Detect, Protect and Investigate), and Securlet family of stand-alone APIs targeting specific software-as-a-service (SaaS) apps, including Google Drive, Box, Dropbox and Office 365.

“Enterprises are adopting more and more cloud apps, and knowingly or unknowingly there has been a big blind spot in terms of visibility and control in what’s happening in those cloud apps,” said Eric Andrews, vice president of marketing at Elastica. “The company is focused on providing that visibility and control of all activity in the cloud. It’s particularly important now that the adoption of cloud has picked up.”

The Elastica offering is all about understanding what an enterprise’s users are doing in those apps by providing increased visibility and control to understand how the data is being shared, what’s getting shared outside the company, who is using which apps, and whether there are any security concerns or threats to the data stored in the apps, explained Andrews.

Elastica’s Security Apps deployed on the CloudSOC platform deliver a complete range of cloud application security—including shadow IT risk monitoring and control; visibility and control for network and Web security; real-time detection of intrusions and threats; protection against intrusions and

Bron: Linux and Unix Nieuws Lees het complete artikel hier: http://www.channelinsider.com/security/cisco-elastica-forge-reseller-partnership.html/

Welcome, stranger: Inside Microsoft’s command line shell

27 april 2015
By

PowerShell is everywhere, it seems. Not just in Windows Server, SharePoint, SQL Server, Exchange, Lync and Azure cloud, but it’s in third-party software, too. Take VMWare PowerCLI – that’s an extension of PowerShell.

With many in the Windows world chewing on this fat PowerShell server software sandwich it’s easy to take Microsoft’s command-line shell for granted.

But it wasn’t until Exchange 2007 that anyone building or administering the platform needed to start using PowerShell. This was Microsoft’s first really big push towards the shell and it met a lot of resistance – mainly from those used to being able to use the GUI for almost any task.

It wasn’t like the GUI had been established for terribly long, either. Before PCs had Graphical User Interfaces (GUIs) and mice, the Microsoft Disk Operating System (MS-DOS) prompt was the starting point of doing anything on that beige-boat anchor.

Back in 1981, Microsoft bought 86-DOS for the measly sum of $75,000 (roughly $193,000 by today’s standards) and stuck the “MS” badge on it. 86-DOS was a port of another command line operating system known as CP/M – and that was somewhat influenced by the TOPS-10 operating system which has a history way beyond what we can cover in this article.

After making many licensing deals and publishing under a myriad of different names, MS-DOS became the de facto operating system for the 8086 Intel architecture. For many, this is how the humble PC was introduced into the home for the first time.

Other nostalgia aside (such as spending hours mucking about with CONFIG.SYS and AUTOEXEC.BAT to get the most memory available at start-up), the MS-DOS command line wasn’t particularly intuitive. Starting with a simple prompt and a flashing underscore, your only option was to work out what you needed to type in to make use

Bron: The Register Lees het complete artikel hier: http://go.theregister.com/i/cfa/http://www.theregister.co.uk/2015/04/27/from_ms_dos_to_powershell/

Why Taking the Right Security Measures Matters

23 april 2015
By

The latest Dell Security Annual Threat Report makes for disturbing reading because not only are the number of vulnerabilities and instances of malware on the rise, but also that malware is starting to be delivered via encrypted connections that IT security defenses can’t pick up on. Most of the attacks rely on the same basic set of exploit kits, but the targets are changing. “Everyone knows the threats are real and the consequences are dire, so we can no longer blame lack of awareness for the attacks that succeed,” said Patrick Sweeney, executive director, Dell Security. “Hacks and attacks continue to occur, not because companies aren’t taking security measures, but because they aren’t taking the right ones.” The report confirms that digital hackers have identified point-of-sale (POS) and other types of systems as targets worth compromising. For solution providers across the channel, this means that the scope of the IT services they need to provide is expanding at a time when hackers are becoming more sophisticated in how they deliver malware payloads. That may not be what solution providers want to hear, but as the saying goes, to be forewarned is to be forearmed.

Bron: Linux and Unix Nieuws Lees het complete artikel hier: http://www.channelinsider.com/security/slideshows/why-taking-the-right-security-measures-matters.html/

How MSPs Can Help Medical Firms Protect Their Data

17 april 2015
By

Physician, encrypt thyself. Guest author Doug Truitt, Kalleo Technologies CEO, offers his take on how MSPs can safeguard medical firms from costly data breaches.

By Doug Truitt

As the health care industry becomes increasingly technologically grounded, the oath taken by medical professionals to “do no harm” should extend to protecting patients’ personal data.

For doctors’ offices, pharmacies and other medical facilities, taking precautions to safeguard the sensitive information under their care is not just ethically sound in that it spares patients from harmful breaches in privacy, but also financially prudent as Health Insurance Portability and Accountability Act (HIPAA) violations and fines can severely impact the health of a business.

They say in the medical industry that an ounce of prevention is worth a pound of cure; in this case, one government fine from a HIPAA violation can easily cost in the mid-five figures, which can be about 1,000 times the expense of the monthly fee for an encryption service. And that’s not yet addressing what is actually most deadly to a medical business: loss of reputation.

For hardworking doctors with enough on their mind, investing in low-cost data security coverage can prevent being blindsided by a breach. Unfortunately, a basic barrier keeping many medical businesses from properly securing data is that they simply don’t know where to begin or how to implement the protections they need (and ought to schedule a check up with an HIPAA-focused managed service provider.)

In our day and age, with information carried on portable devices, it’s too easy to lose data. A doctor may think nothing of taking a laptop containing work that includes confidential patient information home for the weekend. But when that laptop is lost—whether stolen or simply misplaced—these medical practitioners need technology solutions that quickly resuscitate their prospects of avoiding embarrassing and costly calls to government agencies

Bron: Linux and Unix Nieuws Lees het complete artikel hier: http://www.channelinsider.com/security/how-msps-can-help-medical-firms-protect-their-data.html/

RSA Shows Partners the Security Ropes

14 april 2015
By

With the annual RSA security conference set to kick off next week, much of the attention in the channel community naturally turns to security. With demand for IT security expertise at an all-time high, more organizations than ever are looking for external services to help secure their IT environments.

The challenge is that creating a managed security service practice to serve that demand is no simple undertaking. Not only does it require a lot of technical expertise, IT professionals with IT security skills are in short supply.

To help its channel partners make the transition to becoming a managed security services provider (MSSP), RSA has launched a RSA SecurWorld Delivery Services Program. Via this program, RSA channel partners are exposed to a series of advanced technical training sessions, various security delivery methodologies and mentoring engagements with RSA. Once complete, they are deemed an RSA Certified Delivery Services Partner in a particular solution.

The first solution that RSA is providing channel partners access to under this program is RSA Identity Management and Governance. This is emerging as one of the hotter categories in security because IT organizations are trying to secure content while also coming into compliance with a whole range of regulatory requirements, said William Taylor, vice president of worldwide channels and alliances at RSA.

In general, Taylor said the RSA SecurWorld Delivery Services Program is an exercise in sales enablement for the channel. By working hand-in-glove with channel partners to get them started, instead of simply handing out leads, RSA is committed to teaching channel partners how to hunt on their own, Taylor said. Then, they can determine to what degree they want to develop their own security and compliance expertise versus reselling services provided by RSA.

Providing IT security services is clearly not a business for the faint of heart. A

Bron: Linux and Unix Nieuws Lees het complete artikel hier: http://www.channelinsider.com/blogs/security/rsa-shows-partners-the-security-ropes.html/

Why IT Channel Firms Need to Bolster Their Security Offerings

9 april 2015
By

If channel companies want to tap growth opportunities in security services, they will need to make changes, which may include retraining staff, revamping their sales structure, becoming more proactive and becoming experts on all facets of a security technology they are addressing, according to a new study from CompTIA. Sixty-three percent of the nearly 300 U.S.-based IT channel companies surveyed expect their revenue from security services to grow over the next 12 months. However, some IT channel companies will need to up their game in security, according to the study. There is strong potential for channel companies to expand into areas such as compliance management, risk management, cloud security, identity and access management, mobile security, and security information and event management, which “could all easily become components in a new security baseline,” said Seth Robinson, senior director, technology analysis, CompTIA. This is in addition to foundational security offerings such as network security, business continuity, email security and data protection, which many of them already offer. Here’s why IT channel firms should re-evaluate their portfolios.

Bron: Linux and Unix Nieuws Lees het complete artikel hier: http://www.channelinsider.com/security/slideshows/why-it-channel-firms-need-to-bolster-their-security-offerings.html/

Maakt zich op voor de wereldtop

7 april 2015
By

Maakt zich op voor de wereldtop

Unit4 maakt zich op om wereldwijd uit te groeien tot een topspeler op de erp-markt. De leverancier van software voor enterprise resource planning (erp) richt zich daarbij met name op het middensegment. Met de in 2014 aan boord gestapte kapitaalkrachtige eigenaar, investeerder Advent, en nieuw buitenlands management krijgt de internationale strategie, die sinds eind jaren ’90 is ingezet, een extra impuls. Niet slecht voor een bedrijf uit Sliedrecht dat in 1980 met lokaal oliegeld is opgericht.


Voor Unit4 wordt de kiem eind jaren zeventig gelegd bij de toenmalige hardwaredienstverlener MAI. Het Amerikaanse bedrijf levert geïntegreerde systemen aan het midden- en kleinbedrijf (mkb) in het minicomputertijdperk. MAI verkoopt Basis/Four-computers, waarop programma’s geschreven in Business Basic draaien. In die tijd besluit het bedrijf, dat met softwarehuizen samenwerkt, ook eigen softwareproducten te gaan ontwikkelen. Het plan behelst het leveren van een complete ‘small business’ computer inclusief administratieve software, waarmee bedrijven hun financiën, voorraad, verkoop en administratie konden ondersteunen.

Dit concept is in de Verenigde Staten redelijk succesvol en dat wil MAI uitrollen naar andere landen. ‘Wat de Amerikanen even waren vergeten, was dat men in Europa niet overal Engels spreekt, dus de software, handleidingen en verkooptrainingen moesten worden vertaald. Dat vonden ze in Amerika maar lastig, en van een concept als btw hadden ze helaas ook nooit gehoord. Dus die software, zo bleek na het installeren, werkte niet’, vertelt mede-oprichter en oud-topman Chris Ouwinga (inmiddels voorzitter van de toezichthoudende raad van Unit4).

Het lokale Nederlandse management van MAI besluit vervolgens dit Amerikaanse pakket niet aan te passen, maar een nieuw Nederlands softwarepakket te bouwen met dezelfde functies. Ouwinga, die na een elektrotechnische opleiding bij het bedrijf aan de hardwarekant is binnengekomen, vindt dat een interessante ontwikkeling en stapt over

Bron: Computable Lees het complete artikel hier: http://www.computable.nl/artikel/magazine/5245287/5215853/pareltjes-unit4.html

More Firms Meeting PCI DSS, but Only Temporarily

6 april 2015
By

Organizations may not exactly be in love with the Payment Card Industry Data Security Standard (PCI DSS), but they are increasingly complying with it with help from solution providers across the channel. The 2015 PCI Compliance Report from Verizon finds that although more companies than ever are attaining PCI DSS compliance, few of them can maintain it since the overall IT environment remains fairly dynamic. “Compliance at a point in time isn’t sufficient to protect valuable data and their reputations; organizations must make being proficient at maintaining security controls in a dynamic environment a strategic imperative,” the reports explained. “Being able to say that you were compliant three months ago will be of little solace when dealing with the aftermath of a breach.” Most of the data being stolen is accessed with credentials that have either been stolen or are easily cracked. Also, much of the stolen data is unencrypted, showing that companies still have work to do to move toward compliance.

Bron: Linux and Unix Nieuws Lees het complete artikel hier: http://www.channelinsider.com/security/slideshows/more-firms-meeting-pci-dss-but-only-temporarily.html/

Amazon is de koning van cloud computing

3 april 2015
By

03-04-2015 10:26
| Door
Henri Koppen
| Lees meer artikelen over: IT-auditing,
Datawarehouse,
DNS,
Laptops,
Office,
Encryptie,
VPN,
Linux,
E-mailmanagement,
Apps,
Tablets
| Er zijn 3 reacties op dit artikel
| Dit artikel heeft nog geen cijfer (te weinig beoordelingen)
| Permalink

Henri Koppen

Cloud Computing Consultant

Expert van Computable voor de topics: Cloud Computing en BPM

Meer

Amazon is absoluut de leider als het gaat om cloud computing. Het is een oncomfortabele waarheid die veel weerstand oproept. Tijd om eens een beschrijving te geven van al het moois dat Amazon te bieden heeft. Lees mee en oordeel zelf.


Op het gebied van generieke cloud computing, ofwel het aanbieden van rekenkracht en data opslag heb je in de feite de ‘grote 3’. Dit zijn Amazon Webservices, Google Compute Engine en Microsoft Azure. Google is minder generiek omdat het vooral krachtig is op het gebied van Linux en Microsoft uiteraard op het gebied van Microsoft en daarmee heeft Amazon al een streepje voor. Microsoft heeft echter een zeer krachtige office suite en Google is daarin de enige concurrent met Google Apps for Work. Niettemin is Amazon ook daar een zeer geduchte concurrent aan het worden.

Delen van bestanden en samenwerken kan nu al met Workdocs dit kan vergeleken worden met een business variant van Microsoft Onedrive en Google Drive. Amazon is begonnen met Workmail. Dit product mag nog niet in de schaduw staan van Outlook en Gmail, maar als je Amazon kent zal dit enorm snel veranderen, dat hebben ze al heel vaak laten zien.

Bron: Computable Lees het complete artikel hier: http://www.computable.nl/artikel/opinie/cloud_computing/5248274/2333364/amazon-is-de-koning-van-cloud-computing.html

Nutanix looking for a way to burst VMware’s bubble

2 april 2015
By

Comment Rumours are circulating about a hypervisor built by Nutanix, and Nutanix open-sourcing its software; two intriguing moves. Why would Nutanix make these moves as VMware ratchets up its attack on hyper-converged vendors with EVO:RAIL?

Start-up Nutanix is a hyper-converged infrastructure appliance (HCIA) supplier, widely-regarded as the leading such company in terms of units shipped.

It started out in 2011 as a combined hardware-software shipper, using commodity hardware powered by VMware’s ESXi hypervisor and providing a virtual SAN from its SOCS (Scale-Out Converged Storage) software.

SOCS is a virtualised controller that implements a clustered file system. The storage underneath is a combination of SSDs (Intel) and SATA disk drives. Nodes are linked across 10 GbitE cables for cluster traffic. SOCS became NDFS (Nutanix Distributed File System) and Nutanix says its appliance provides a Virtual Computing Platform.

Competitor and fellow HCIA shipper SimpliVity took a similar route, but uses ASIC hardware and firmware to accelerate its performance. Latecomers such as Maxta provide a SW-only HCIA offering, with channel partners building complete HCIAs from hardware meeting required standards for performance and capacity.

Nutanix SW capabilities

The NDFS software has developed and now supports both Microsoft Hyper-V (in 2013) and Red Hat KVM (in 2012) hypervisors. It does not support Docker containers. Its storage capabilities have grown and a brief list shows it having:

  • Cluster RAID
  • HOTcache tiering to put high-priority data in flash and ordinary data on disk
  • Medusa distributed metadata
  • Curator data distribution services
  • Snapshots
  • Thin-provisioning
  • In-line or post-process compression
  • Replication for disaster recovery
  • Prism user interface
  • Real-time inline deduplication
  • Post-process deduplication using MapReduce
  • Synchronous mirroring
  • Cloud Connect data protection using an Amazon cloud target

Bron: The Register Lees het complete artikel hier: http://go.theregister.com/i/cfa/http://www.theregister.co.uk/2015/04/02/nutanix_looking_for_vmware_bubble/