Nutanix Launches Kubernetes Platform-as-a-Service for the Multicloud Era

Karbon Platform Services Provides Managed Offering to Accelerate Container-Based Application Delivery and Operations on Any Cloud

Nutanix (NASDAQ: NTNX), a leader in enterprise cloud computing, today announced Karbon Platform Services, a Kubernetes-based multicloud Platform-as-a-Service (PaaS) with automated system-managed security, to accelerate the development and deployment of microservices-based apps across any cloud. This offering provides software developers with a turnkey managed services experience, on-premises, in the public cloud, and at the edge, to build and run cloud native applications while enabling them to decouple applications from the underlying infrastructure. It also provides IT operations teams with a simplified and consistent application lifecycle management and security framework. This announcement marks a significant milestone for Nutanix as it looks to expand offerings aimed at accelerating enterprises’ cloud native journeys.

Enterprises, with their sights set on realizing the benefits of digital initiatives, often struggle to unleash the full potential of their software developers and the agile DevOps processes by which they need to operate. Kubernetes, along with its ecosystem of cloud native technologies, continues to rapidly evolve, making it increasingly difficult to implement without extensive technical resources. Furthermore, organizations need to be able to leverage both on-premises and public cloud-based Kubernetes deployments without compromising their ability to manage data, applications, and IT resources simply and effectively.

“IT resources are the engines that power digital enterprises. But as a company scales, adopts hybrid cloud, and manages an increasing number of applications, supporting engineering needs can be challenging for IT,” said Rajiv Mirani, CTO at Nutanix. “With Karbon Platform Services, we aim to simplify application development and orchestration while streamlining the relationship between IT and development teams to support our customers’ DevOps strategies.”

This new cloud native PaaS will help software engineers to streamline application development and orchestration without needing to manage the underlying infrastructure. Karbon Platform Services builds on the core Kubernetes lifecycle management capabilities initially introduced with Karbon as an integrated component of the Nutanix HCI software. This new offering brings automated, system-managed security and multi-tenancy​ to run a wide range of microservices-based applications across multiple cloud infrastructures.

“We were looking for a single PaaS platform that could host our Reflex and Vision Insights on both the edge and in our private cloud, to take advantage of both a distributed architecture as well as support software development and machine training on the public cloud,” said Damien Pasquinelli, CTO at Hardis Group. “Karbon Platform Services delivers the richness of services we need in a PaaS solution, along with the simplicity and ease of management Nutanix is known for — across clouds. Implementing Karbon Platform Services has allowed our Vision Insights development and DevOps teams to go from zero to prototype in less than a quarter of the time it previously took. This software running on Karbon Platform Services is already in production for customers like Schneider Electric, a leading global specialist in energy management and automation.”

Key benefits of Karbon Platform Services include:

  • Rich Managed Services: This PaaS offering enables rapid development and deployment of applications ranging from simple stateful containerized applications to complex web-scale applications by leveraging simple, open abstraction of rich services. Specifically, Karbon Platform Services include:​ managed Kubernetes (K8s-aaS), Containers-as-a-Service (CaaS), serverless Functions, AI, message bus, ingress, service mesh, observability, and security services.
  • SaaS-based Multicloud Operations: Ops teams benefit from simplified operations and uniform application, data, and security lifecycle management, regardless of the underlying cloud, at scale leveraging the SaaS-based infrastructure lifecycle manager. Developers benefit from the rich platform services to write applications once and deploy in the cloud through the SaaS-based application lifecycle manager.
  • Extensible Hybrid PaaS: Karbon Platform Services provides cross-cloud data mobility and hybrid application management through transparent, WAN-optimized data pipelines and extensible data interfaces. This feature gives enterprises the flexibility to bring their own services and leverage the broader Kubernetes ecosystem.
  • Enhanced Security Posture: With Karbon Platform Services, IT operations teams can leverage a consistent security and API model with unified observability for data and applications across cloud. It provides automated, system-managed security with built-in multi-tenancy and role-based access control (RBAC) for the rich services.

Nutanix Karbon Platform Services is now available to customers. For more information, visit here.

In addition to Karbon Platform Services, Nutanix today also announced Calm as a Service [LINK TO BLOG], a hosted version of its application management and orchestration solution to support DevOps teams, which is under development.  

Outside the Four Walls of the Data Centre

By: Michael Cade, Senior Global Technologist, Veeam

Almost three-quarters of professionals across the Middle East and North Africa (MENA) region prefer jobs that allow them to work remotely, according to a new survey by job site Bayt.com. The impact of the pandemic is likely to see this trend continue as 90% of respondents said they expect that remote work will increase over the next decade. Now that organizations and employees have seen some of the benefits of remote working, many companies are likely to build more flexible and agile working arrangements into their long-term strategies. For IT departments, the impact of this is huge.

The digital fortress

Formerly, a company’s IT infrastructure was contained within its own four walls. Employees used hardware such as PCs, printers, and phones which remained securely in the office, while software programs and data were stored in on-premises data centres. IT had full control over the performance, maintenance and security of the organisation’s technology stack. Early remote working initiatives were tightly controlled with users connecting to Virtual Private Networks (VPN) so that the only thing that left the data centre was the employee and the limited hardware. Over the VPN, the IT department could maintain visibility of security protocols and maintain administrators’ rights to ensure employees were not installing unapproved, potentially high-risk software.

Along came the cloud, which allowed organisations to scale-up their data storage capacity as well as their ability to back up files to remote locations. However, with the cloud came greater agility and choice for employees. Shadow IT, the phenomenon of employees using applications of their own choosing to store and access company data outside the data centre’s four walls – on personal devices and online accounts – became a challenge to IT departments. Fast-forward to 2020, when at some stages a large number of enterprises in the Middle East have been working remotely, and the four walls of the data centre have fallen as far as many businesses are concerned. Some organisations found themselves supporting remote workers for the first time – many with employees who would not be working from company-issued laptops and smartphones. While figures vary across EMEA, an IBM survey of 2,000 new remote workers in the US found that over half (53%) of were using personal laptops.

From a cybersecurity perspective, this is a critical risk. Previously, the data centre was analogous to a fortress. Everything that went in or out was strictly monitored and the threat from external sources was low. This is why one of the most well-known forms of cyber-attack is a Trojan virus – one that tricks the victim into thinking they are receiving or opening a legitimate file, document, link, effectively inviting in the attacker. Now, not only have the gates of the digital fortress been flung wide open, the people who used to be inside are now distributed. And, every single one represents a possible entry point for a malicious threat. The attack vector hasn’t just increased, it’s exploded.

Increased threat vector

More than half of newly-remote employees were not given new security policies and 45% said they have not received training of how to work from home in a secure manner, according to the study mentioned previously, IT departments often have little to zero visibility of whether or not employees are connecting to the VPN, particularly when employees are using personal devices. Furthermore, personal devices aren’t just being used outside the data centre’s four walls, but in family home environments and shared households. Not only do IT teams have far less control over the apps, websites, content they’re employees are engaging with, there is no guarantee they are the only person using that device. While the organisation might not have visibility of data now being stored and used outside the four walls, it is still ultimately responsible for it.

According to the Veeam 2020 Data Protection Trends Report, the No. 1 challenge that will impact Middle East and African organizations within the next 12 months is cyber threats (31%). Over half (51%) have a “protection gap” between how frequently data is backed-up versus how much data they can afford to lose after an outage.  Given the vastly increased threat vector and risk to data systems in light of the remote working trend, organisations must ensure they have a robust Cloud Data Management strategy in place to ensure data is backed up, protected and recoverable across all devices and applications. Employee best practices and training are vital to this – helping IT teams ensure that users are connected via the VPN and storing company data in secure cloud environments rather than personal accounts or their own desktops. The Veeam report goes on to show that on average, 19% of Middle East and African organizations’ data is not backed up. If data cannot be backed up, it is not protected, and in the event of unplanned downtime or a cyber breach that data will be unrecoverable. Moreover, organisations are adopting Software as a Service (SaaS) solutions in their droves. For example, Microsoft Teams grew from 32 million users to 72 million between March 2019 and April 2020. For businesses using SaaS solutions such as Microsoft Teams and Microsoft Office 365, backups of data need to be conducted on a continuous basis – either on premises or in cloud object storage. This will protect the business against a single point of failure that is outside their control.

As a combination of working from home and from offices becomes increasingly commonplace – even for organisations who previously had little to no track record of supporting remote working – the cyber-attack vector will remain high. It is therefore critical that businesses have a clear strategy for managing data across their cloud and data provisioning. This includes ensuring data is backed up at all times, recoverable in the event of a disaster, outage or cyber-attack, and as protected from external malicious threats as possible.

The Myriad selects Alcatel-Lucent Enterprise for state-of-the-art student accommodation projects in Dubai and Muscat

Alcatel-Lucent Enterprise, a leading provider of communications, networking and cloud solutions tailored to customers’ industries, today announced that The Myriad, a dedicated student housing property developer and operator, has selected ALE to provide converged wired-wireless LAN infrastructure for their modern living communities built for a primarily student population in Dubai and Muscat.

The Myriad Dubai, a wholly owned subsidiary of Strategic Housing Group, is a fully integrated, urban-styled student living community located in the heart of Dubai International Academic City, where over 26,000 students study at 30 universities. Comprising seven blocks with a capacity of 2250 residents, the project is spread over 68,000 square meters and located within walking distance of most universities in Dubai Academic City.

The Myriad Muscat offers accommodations exclusively for young women in the Sultanate of Oman. With a capacity of 2700 residents, the project is spread over 100,000 square meters and located near universities in Al Seeb, Muscat.

The Myriad embodies a world-class student lifestyle and offers a fresh living experience based on in-depth research and analysis of today’s local and global students’ expectations. With students spending more time on the internet for research, homework, assignment submissions, social media, video streaming and gaming, it was important for The Myriad to provide advanced and fast connectivity. Investing in advanced technology to elevate service levels also helps The Myriad stand out in the student housing space.

Haseeb Malik, General Manager – Technologies, Strategic Housing Group

“At The Myriad, we recognize the importance of embracing new technologies to remain competitive. It was crucial to have a solid network foundation and ubiquitous Wi-Fi to offer the very best for our young residents. In addition to their proven technologies that met our needs, we appreciated ALE’s level of engagement throughout all phases of the project, working as a true partner,” explains Haseeb Malik, General Manager – Technologies, Strategic Housing Group.

The Myriad Dubai and The Myriad Muscat deployed a cloud-based converged wired-wireless LAN solution from Alcatel-Lucent Enterprise, each comprised of over 70 LAN switches and 1900 wireless access points. In addition, The Myriad Dubai also implemented an ALE Unified Communications solution.

“We aligned with The Myriad’s expectations and provided a simplified, efficient and secure communications and network infrastructure intended to enhance the experience for students and young professionals. The company can also build on the highly scalable infrastructure to meet future needs,” said Rui Silva, Distribution Manager, Alcatel-Lucent Enterprise.

ALE has provided The Myriad properties with solutions that are designed to meet the residents’ connectivity expectations at an affordable cost. The switches deployed at both locations, Alcatel-Lucent OmniSwitch® 6900 Stackable LAN Switches at the core and OmniSwitch 6560 Stackable LAN Switches at the edge, are top-of-the-line, secure and provide easy management. The Alcatel-Lucent OmniVista® 2500 Network Management System provides IT admins with cohesive management and network-wide visibility as well as a full set of tools for converged campus networks. The converged solution is completed with Alcatel-Lucent OmniAccess® Stellar AP1201, AP1201H and AP1251 WLAN Access Points, Alcatel-Lucent OmniPCX® Enterprise Communication Server, and Alcatel-Lucent 8008 Deskphones Cloud Edition SIP.

Post implementation, the unified network offers reliable and secure access whenever and wherever needed, in student rooms or on the move with smart devices. Unique IoT containment technology allows secure, automatic connection of authorized devices, users and applications. The controller-less Wi-Fi architecture enables better performance, high availability and scalability across The Myriad’s premises, while reducing complexity and lowering the total cost of ownership (TCO). In addition, the in-room access points provide four ethernet ports that reduce the amount of cabling required.

To further boost its connectivity and communications strategy, The Myriad has plans to deploy Alcatel-Lucent Rainbow™, the company’s UCaaS platform, in the near future. The cloud-based Rainbow solution will allow The Myriad to integrate real-time communications into its existing business applications and provide residents with a single platform for unified communications and collaboration.

Network ‘As A Service’ Adoption to Grow by 38% in the Next One to Two Years in UAE

In response to the pandemic, IT leaders in EMEA are now investing more in cloud-based and AI-powered networking technologies as business recovery plans take shape, according to research from  Aruba, a Hewlett Packard Enterprise company.

The findings in a new global report ‘ Preparing for the post-pandemic workplace’ suggested that IT leaders are responding to the challenges associated with enabling a highly distributed workforce and the emergence of the hybrid workplace – with people needing to move seamlessly between working on campus, at home and on the road – and as such are looking to evolve their network infrastructure and shift away from CapEx investments towards solutions consumed ‘as a service’.

The average proportion of IT services consumed via subscription in the UAE will accelerate by 49% in the next two years, from 39% of the total today to 58% in 2022, and the share of organizations that consume a majority (over 50%) of their IT solutions ‘as a service’ will increase by approximately 56% in that time.

“The emergence of the hybrid workplace is pushing IT leaders to deliver a delicate balance between flexibility, security and affordability at the edge,” said Jacob Chacko, Regional Business Head – Middle East, Saudi & South Africa (MESA) at HPE Aruba. “The workplace as we knew it has significantly changed and to support new norms such as social distancing and contactless experiences, office locations need to have the right technology in place to offer enterprise-level connectivity, security and support. All this must be done in an increasingly challenging financial environment which is spurring the trend for IT decision-makers to opt for the reduced risk and cost advantages offered by a subscription model.”

The report, which surveyed 2400 ITDMs in over 20 countries including the UAE and eight key industries, looked at how they have responded to IT and business demands in the wake of COVID-19, what investment decisions are being made as a result, and the consumption models now being considered. A number of key findings stood out:

IMPACT OF COVID-19 HAS SIGNIFICANT IMPLICATIONS

ITDMs report that the impact of COVID-19 has been significant both on their employees and short-term network investments:

  • In the UAE, 25% describing the impact on their employees as ‘significant’ (widespread furlough or layoffs), while 43% considered it ‘moderate’ (temporary reductions in some functions), and 23% ‘low’ (very few jobs impacted).
  • In EMEA, Russia (27%), UAE (25%), Sweden and France (both 24%) ranked highest in terms of ‘significant’ impact with Spain (13%) and The Netherlands (15%) significantly lower.
  • 86% of organizations in the UAE said that investments in networking projects had been postponed or delayed since the onset of COVID-19, and 31% indicated that projects had been cancelled altogether.
  • Project cancellations were highest in Sweden (59%) and lowest in Italy (11%), project showing there are also significant disparities between countries within the same region, while 37% of ITDMs in education and 35% in hotels and hospitality globally said they have had to cancel network investments.

A POSITIVE OUTLOOK: INVESTING FOR EMERGING NEEDS

By contrast, future plans are aggressive, with the vast majority of ITDMs planning to maintain or increase their networking investments in light of COVID-19, as they work to support the new needs of employees and customers.

  • 38% of ITDM’s globally plan to increase their investment in cloud-based networking, with 45% maintaining the same level and 15% scaling back. The APAC region was the global leader with 45% stating increased investment in cloud-based networking compared to 32% in EMEA, and 38% in UAE and rising to 59% among ITDMs in India. With cloud solutions allowing for remote network management at large scale, these capabilities are particularly enticing for IT teams when being on-premises is not possible or challenging.
  • ITDMs are also seeking improved tools for network monitoring and insight, with 34% globally planning to increase their investment in analytics and assurance, 48% indicating that they will maintain their level of investment and 15% reducing it. This allows IT organizations to troubleshoot and fine-tune the network more efficiently, as demands on it are augmented by a distributed workforce. 
  • There is also an emphasis on innovative technologies that simplify the lives of IT teams by automating repetitive tasks. We found 35% of ITDMs globally are planning to increase their investment in AI-based networking technologies, with the APAC region leading the charge at 44% and EMEA and the Americas both on 30%.

ADOPTION OF NEW CONSUMPTION MODELS IS ACCELERATING

As ITDMs shape their investment plans, they are looking at alternative modes of consumption to achieve the best balance of value and flexibility.

  • 62% in UAE say they will explore new subscription models for hardware and/or software, 58% managed services for turnkey hardware/software and 41% financial leasing – all as a result of the impact of COVID-19. This reflects the increased need for more financially flexible models in a challenging environment.
  • Networking subscription models are more popular in APAC (61%) than in the Americas (52%) or EMEA (50%), and at a country level the highest demands are in Turkey (73%), India (70%) and China (65%).
  • The global industries most likely to be considering the subscription model are hotels/hospitality (66%), IT, technology, and telecom (58%) and education (57%). The impact of COVID-19 on IT behavior has made the desire for flexibility and predictability in spending, while reducing risk from initial capital costs, greater than before.
  • In stark contrast, just 8% globally plan to continue with only CapEx investments, though the proportion is higher in the Netherlands (20%), US (17%), Spain (16%) and France (15%). Across industries, 15% in retail, distribution and transport will continue to focus solely on CapEx investments, versus just 5% in education and IT, tech, and telecoms, and 2% in hotels and hospitality.

“Customers and employee needs have changed so comprehensively in recent months, it’s no surprise to see IT leaders seeking more flexible solutions,” says Chacko. “The need for agility and flexibility in network management is greater than ever and it is now mission critical to ensure that businesses reduce complexity in the network to ensure the secure and seamless experience that users demand.”

“The pandemic has caused many organisations to rethink their IT infrastructure investment to build business models that are agile, adaptable and fit for purpose. While there may have been an initial negative impact on ongoing projects, it is encouraging to see that there are firm medium term plans in place to invest in advancing network technologies enabled by more flexible models of consumption that limit up-front capital demands,” he said.

SASE is All About Delivering Security Everywhere

By John Maddison, EVP of Products and CMO at Fortinet.

Secure Access Service Edge (SASE) is an emerging enterprise strategy that incorporates multiple solutions to enable secure remote access to on-premises, cloud-based, and online resources. Unfortunately, there has been a lot of hype that has left some organizations wondering what exactly SASE is. Understanding the basic concepts and components of SASE is important, as the benefits can be significant for many organizations. Fortunately, getting to the bottom of this is easy, as many of the fundamentals of SASE – such as bringing networking and security together– are trends that customers have been gravitating to for years. However, it is still critical to properly define SASE up front in order to avoid adding complexity or worse, missing the true value of SASE at all.

Security Everywhere

Today’s organizations require immediate, uninterrupted access to the network and cloud-based resources and data, including business-critical applications, no matter where their users are located. The reality is that consumption patterns are changing due to the implementation of 5G, cloud migrations, sustained work from home, and similar outcomes from digital innovation efforts. This has transformed the traditional network to a network of many edges.

At the same time, these dynamically changing network configurations, and the rapid expansion of the attack surface, means that many traditional security solutions no longer provide the level of protection and access control that organizations and users require. In this environment, security has to be delivered anywhere from any place, at any time, and for any device – the WAN Edge, Cloud Edge, DC Edge, Core Network Edge, Branch Edge, and Mobile Remote Worker Edge. This requires the convergence of traditional and cloud-based security, as well as deep integration between security and fundamental networking elements.

Accurately Defining SASE

SASE is designed to help organizations secure these new distributed networks. However, as with any emerging technology category, there is still some uncertainty about what precisely a SASE solution means—and what technologies are included. In addition, vendors are attempting to redefine this market in ways that best reflect their current offerings – which means that some elements are being overemphasized and others, often essential elements get overlooked. Unfortunately, some market definitions of SASE already include important omissions that are leaving some organizations confused about how to best select, implement, and manage the right sort of solution for their unique environments.

Not Just Cloud

SASE is generally classified as a cloud-delivered service, providing secure access to cloud-based resources, secure communications between remote users, and always-on security for devices off-premises. However, there are situations where organizations may require a combination of physical and cloud-based solutions for SASE to work effectively. This may include supporting a physical SD-WAN solution in place that already contains a full stack of security, or the desire to provide protection at the edge when processing confidential or sensitive information rather than shuttling it out to the cloud for inspection.

By combining physical and cloud-based elements, the role of SASE can also be easily extended deep into the network, rather than simply handing off security to an entirely different system at the edge. This ensures that a secure SASE connection is seamlessly integrated with critical solutions that also rely on hardware, such as network segmentation and compliance requirements that a strictly cloud-based security approach can’t address, to provide end-to-end protection.

Secure LAN and WAN

Some SASE definitions also omit things like Secure LAN and Secure WLAN that are essential considerations for many organizations. Including these sorts of technologies in a SASE solution helps ensure that security is applied consistently across an entire security architecture, rather than deploying separate security components for their SASE deployment – which could create gaps in security policy enforcement and limit visibility. 

Flexible Consumption

But regardless of which tools are used or where they are deployed, there is a central issue that needs to be remembered. Every SASE solution must not only meet the access needs of today, but also have the capability to quickly adapt to rapidly evolving network changes and business requirements as they occur. This explains a key criteria for SASE, which is flexible consumption models that give organizations choices depending on their unique use-cases in order to achieve the true vision of SASE.

Essential Security Elements Defined

Any true SASE solution must include a core set of essential security elements. To realize the full potential of a SASE deployment, organizations must understand and implement these security components across the WAN-edge, LAN-edge, and Cloud-edge. 

  • A fully functional, SD-WAN solution. SASE starts with an SD-WAN solution that includes such things as dynamic path selection, self-healing WAN capabilities, and consistent application and user experience for business applications. 
  • • An NGFW (physical) or FWaaS (cloud-based) firewall. SASE also needs to include a full stack of security that spans both physical and cloud-based scenarios. For example, remote workers require a combination of cloud-based security for accessing resources located online, and physical security and internal segmentation to prevent network users from accessing restricted corporate network resources. However, physical hardware and cloud-native security need to deliver the same high performance at scale, enabling maximum flexibility and security.   
  • Zero-trust Network Access. It is primarily used to identify users and devices and authenticate them to applications. Because ZTNA is more of a strategy than a product, it includes several technologies working together, starting with multi-factor authentication (MFA) to identify all users. On the physical side, ZTNA should include secure network access control (NAC), access policy enforcement, and integration with dynamic network segmentation to limit access to networked resources. And on the cloud side, ZTNA needs to support things like microsegmentation with traffic inspection for secure East-West communications between users, and always-on security for devices both on and off-network. 
  • A Secure Web Gateway. It is used to protect users and devices from online security threats by enforcing internet security and compliance policies and filtering out malicious internet traffic. It can also enforce acceptable use policies for web access, ensure compliance with regulations, and prevent data leakage. 
  • A CASB. A cloud-based service enables organizations to take control of their SaaS applications, including securing application access and eliminating Shadow IT challenges. This needs to be combined with on-premises DLP to ensure comprehensive data loss prevention.

SASE – The Convergence of Networking and Security

At a high level, implementing SASE really comes down to enabling secure connectivity and access to critical resources from anywhere on any edge. Unfortunately, very few vendors can provide this because their portfolios are full of disparate, acquired products, or they simply don’t have enough breadth to provide all of the security elements that a robust SASE solution requires. And even when they do, their solutions simply do not interoperate well enough to be effective.

This is a problem, because for SASE to work well, all of its components need to interoperate as a single integrated system – connectivity, networking, and security elements alike. Which means every component needs to be designed to interoperate as part of an integrated strategy bound together by a single, centralized management and orchestration solution. They also need to seamlessly integrate with the larger corporate security framework, as well as dynamically adapt as networking environments evolve. If not, it’s not a true SASE solution.

The recent market momentum around SASE is exciting because it underscores the need for a Security-Driven Networking approach. In the era of cloud connectivity and digital innovation, networking and security must converge. There’s no going back to outmoded and siloed architectures. 

Intelligent Protection Against DNS DDoS Attacks is Critical Part of Cybersecurity Architecture

By: Ashraf Sheet, Regional Director, Middle East & Africa at Infoblox

In 2020 DDoS attacks continue to increase both in volume and in frequency. Nexusguard Research[1] just reported a 542% increase in DDoS attacks in the first quarter of 2020 when compared with the last quarter of 2019. The NexusGuard research team also detected unusual traffic patterns from ISPs which included traffic generated from infected devices.

In rare harmony, Kaspersky also reported that DDoS attacks have doubled in the first quarter of 202 when compared to the last quarter of 2019[2]. Kaspersky also found that DDoS cyberattacks are increasing in duration – the average attack duration increased by 24% in the first quarter of 2020 compared with the same quarter one year ago.

DNS and DDoS attack vectors have emerged as one of the critical weapons of choice to support fraud, extortion, and malicious attack. Threat actors may be politically motivated, part of organized crime, or even nation-state cyberwarfare operatives. 

The COVID-19 pandemic was the genesis of this new opportunity as the disease continues to impact businesses and economies worldwide. The net result is that 2020 has become the year of the teleworker. The use of online services from home and other remote locations became more critical than ever. Students are online. Employees are serving customers online. Many of us are working from home and highly dependent on internet connectivity. The mix of devices we use often includes our laptops and mobile devices. Threat actors have moved with lightspeed to leverage this opportunity. 

But just when you thought it could not get worse, it does. DDoS for hire (otherwise known as “booter” services) allows threat actors to access thousands of pre-configured servers that can be used to launch DDoS assaults against any organization. Booters are web-based services that provide criminal DDoS services for hire. These tools are often referred to in polite conversation as IP stressors, which are legitimately used to test your networks and servers for resiliency. Certainly, stress testing your own network is normal. But deploying such technology to create a DDoS attack against external parties is illegal and malicious criminal activity. The great majority of these servers are hijacked, and malicious activity is usually completely unknown to their owners.

As you would expect, booters are sold on the dark web using untraceable currencies such as Bitcoin. An informal survey showed that you could “purchase” the use of a compromised server for between $10 to $150 or more. You get the passwords and access to the server. Some criminal enterprises sell access to the use of booters “as a service” and vary pricing by the number of attacks you wish to launch, the duration of the attacks, and even price out the addition of customer support! 

As quickly as law enforcement agencies can find them and shut them down, new ones still seem to spring up. The number of these servers for sale at times looks quite large, with many tens of thousands of hijacked servers accessible at meagre cost for a motivated attacker.

The DDoS attacks launched by these threat actor booter sites take us back to basics. As always, the mix of readily usable attack techniques includes DNS amplification and DNS reflection. They may be used alone and in combination. An amplification attack is a technique used by threat actors where a small query can trigger a massive response. In this scenario, threat actors flood the server with short requests that require long responses, allowing a small compute resource to overload the targeted DNS server. The DNS server is so busy attempting to respond to all these malicious requests that it doesn’t have time to respond to legitimate ones, and network activity grinds to a halt.

The reflection attack vector sends queries that appear to come from the target of the attack. The huge volume of responses, which are amplified, are then sent to the target effectively overwhelming the target. In this scenario, the attacker sends a query to a recursive name server with a spoofed source IP address. Instead of the real IP address, the threat actor places the target (victim) IP address as the source IP address. The recursive name server retrieves the answer to the query from the authoritative name server and sends it to the target.

A sophisticated threat actor can combine the two techniques by spoofing the targets’ IP address and sending a carefully crafted query that will result in a large payload. This double punch can be an overwhelming DNS DDoS attack scenario. This allows the threat actor to attack two different targets at the same time easily. 

Comprehensive and intelligent protection against DNS DDoS attacks should be an essential part of your cybersecurity architecture.


[1] https://www.businesswire.com/news/home/20200630005295/en/DDoS-Attacks-Increase-542-Quarter-over-Quarter-Pandemic-Nexusguard/

[2] https://securityintelligence.com/articles/avoid-ddos-attacks/

Cyber-attacks are the New Norm and Ransomware is on the Rise

By: Ehab Halablab, Regional Sales Director – Middle East at A10 Networks

Last year ransomware made a comeback, as worldwide mobile operators made aggressive strides in the transformation to 5G, and GDPR achieved its first full year of implementation. The industry saw some of the largest fines ever given for massive data breaches experienced by enterprises. As the spike in demand for ransomware-as-a-service tools in underground forums, coupled with the anonymity offered by the dark web, the surge in these types of cyberthreats should not be a surprise.

This year ransomware will continue to garner more international attention as a host of the not new, like the continued rash of DDoS attacks on government entities and cloud and gaming services, to the new and emerging.

Growth of ransomware

One reason for ransomware attacks gaining widespread popularity is because they now can be launched even against smaller players. Even a small amount of data can be used to hold an entire organisation, city or even country for ransom. The trend of attacks levied against global cities and governments will only continue to grow.

Below I can share three new strains of ransomware types introduced:

Modular or multi-levelled/layered ransomware and malware attacks will become the norm as this evasion technique becomes more prevalent. Modular attacks use multiple trojans and viruses to start the attack before the actual malware or ransomware is eventually downloaded and launched. 70 percent of all malware attacks will use encryption to evade security measures (encrypted malware attacks)

It is no surprise that cyber security skills gap will keep on widening. As a result, security teams will struggle with creating fool-proof policies and leveraging the full potential of their security investments.

Slow Adoption of new Encryption Standards

Although TLS 1.3 was ratified by the Internet Engineering Taskforce in August of 2018, we won’t see widespread or mainstream adoption: less than 10 percent of websites worldwide will start using TLS 1.3. TLS 1.2 will remain relevant, and therefore will remain the leading TLS version in use globally since it has not been compromised yet, it supports PFS, and the industry is generally slow when it comes to adopting new standards. Conversely, Elliptical-curve cryptology (ECC) ciphers will see more than 80 percent adoption as older ciphers, such as RSA ciphers, are disappearing.

Decryption: It’s not a Choice Any Longer

TLS decryption will become mainstream as more attacks leverage encryption for infection and data breaches. Since decryption remains a compute-intensive process, firewall performance degradation will remain higher than 50 percent and most enterprises will continue to overpay for SSL decryption due to lack of skills within the security teams. To mitigate firewall performance challenges and lack of skilled staff, enterprises will have to adopt dedicated decryption solutions as a more efficient option as next-generation firewalls (NGFWs) continue to polish their on-board decryption capabilities.

Cyber-attacks are now the new norm. Each year brings new threats, data breaches and operational challenges, ensuing that businesses, governments and consumers must always be on its toes. With the transformation to 5G mobile networks and the dramatic rise in IoT, by both consumers and businesses, the potential for massive and widespread cyber threats expands exponentially. Let’s hope that organizations, as well as security vendors, focus on better understanding the security needs of the industry, and invest in solutions and policies that would give them a better chance at defending against the ever-evolving cyber threat landscape.

Kodak Alaris Announces Global Alliance with RPA Software Leader UiPath

Vanilda Grando, Director Global Sales Development, Alaris division of Kodak Alaris

Kodak Alaris has announced a global alliance with UiPath, one of the world’s leading Robotic Process Automation (RPA) software companies. The collaboration will enable both companies’ channel partners and customers to leverage Kodak Alaris’ award-winning information capture solutions and UiPath software to accelerate digital transformation by automating and streamlining business processes. The companies also introduced their integration via the Alaris Capture Pro to UiPath Orchestrator Connector, which provides a seamless connection between fully indexed, high quality images from Kodak scanners and UiPath bots.

RPA is the key to working smarter and for many organizations – in particular, those most reliant on paper-based processes – has the potential to be truly transformative when used to modernize information and data capture. The alliance between UiPath and Kodak Alaris will generate new business opportunities for system integrators and software vendors, helping them expand RPA projects and deliver intelligent scanning and information capture solutions to customers in sectors including Government, Financial Services, Logistic and Healthcare.

RPA starts with usable data, which in turn starts with high quality images. Perfect Page Technology from Kodak Alaris optimizes the image quality of every page for more accurate information extraction and up to 20% better[1] OCR read rates, while Capture Pro Software quickly converts batches of paper into high-quality images — the foundation for accurate, streamlined data and decision-making.

“We are delighted to announce this global alliance with UiPath, whose software is among the leading tools for building RPA robots,” said Vanilda Grando, Director Global Sales Development, Alaris division of Kodak Alaris. “Intelligent information capture combined with RPA is especially powerful for finance, IT and IT services, operations and information governance. The combination of Kodak Alaris scanners, software and services, with UiPath’s RPA platform will enable partners to take their customers’ information capture to the next level, making total automation and paper-free processes a business reality.”

The UiPath RPA platform automates sequences of repeatable processes, minimizes disruption, uncovers efficiencies and provides insights, making the path to digital transformation fast and cost-effective. Once information is captured via the scanner, software robots complete repetitive, rules-based tasks such as moving files and folders, extracting structured data from documents and executing processes with it.

“Our two technologies complement one another,” said George Roth, Senior Manager, Technology Alliances at UiPath. “It’s not about taking people out of the loop, it’s about being able to reallocate them and bring them back in if needed. For example, you could set a threshold for OCR read rates at 90%. If the RPA solution doesn’t meet the 90% threshold, the bot will send it to a human for review. So, there’s an opportunity to really make a good human-in-the-loop partnership.”

On July 29th, Kodak Alaris-hosted a virtual event where keynote speaker Jim Walker from UiPath and Joe Yankle from Kodak Alaris shared tips for helping organizations automate business processes, connect their digital workforces and drive better business outcomes. By using technologies like artificial intelligence to automatically recognize documents or redact sensitive data, organizations are freeing up staff for higher-value tasks. Click here to watch the webcast on demand.

For a brief video about Kodak Alaris and UiPath, please click here: Partnering for a Digitized Automated Future:  UiPath & Kodak Alaris


[1] Based on third-party testing performed by BLI and commissioned by Kodak Alaris.  Test was designed by Kodak Alaris with all devices tested in similar operational conditions and where tested with similar operational methods.

New Sennheiser MKE 200 Microphone Enables Middle East Creators to Enhance Audio Capture on Cameras and Mobile Devices

Audio specialist Sennheiser today extended its portfolio of market leading audio-for-video microphones with the launch of its new MKE 200 in the Middle East. The mini-microphone is designed for easy on-camera use with DSLRs and mirrorless cameras as well as mobile devices, where it ensures clean and crisp audio and gives a professional touch to video clips.

“With the MKE 200, we are offering creators the first step to upgrading their sound,” said Tobias von Allwörden, Head of Portfolio Management – Audio for Video at Sennheiser. “Improved audio significantly increases the overall quality of your content. The MKE 200 makes this possible with its unique design which minimizes handling and wind noise. Simply attach it to the shoe mount, select the appropriate cable for your device and you’re good to go!”

Directional, clean audio

The MKE 200 features a directional design which captures the sound of your subject while rejecting unwanted background noise. To minimize any handling noise, the microphone is fitted with a clever internal shock-mount which acoustically decouples the capsule from the housing. To protect from wind noise, Sennheiser engineers designed the MKE 200 with an integrated layer of protective mesh inside the housing. This protection is further enhanced by using the included furry windshield when filming outdoors.

A compact companion

The MKE 200 features a compact, sleek design with a stylish finish thanks to a fully integrated shock-mount and built-in windscreen. Battery-free operation and a lightweight design allow for optimal gimbal performance.

The MKE 200 comes complete with a furry windshield, two locking connection cables for DSLRs or mirrorless cameras (3.5 mm TRS cable) and mobile devices (3.5 mm TRRS cable) plus a draw-string pouch for storage.

The MKE 200 is available in the Middle East as of September 1 and retails at USD 100.00 List Price, excluding local taxes and duties.

Aruba ESP Unifies IoT, IT, and OT Networks to Dynamically Adapt to Changing Environments and User Requirements

First Fully Programmable Platform to Unify IT, IoT and OT Networks with Zero Trust Security and AIOps Enables Organizations to Automate and Optimize Safety, Security, Reliability and Productivity

Aruba, a Hewlett Packard Enterprise company (NYSE: HPE), today announced significant enhancements to Aruba ESP (Edge Services Platform) that unifies IoT, IT, and Operational Technology (OT) networks to enable customers to quickly adapt to changing environments and user requirements. Aruba ESP is the first fully programmable platform to generate contextual information – about identity, location, security posture, and applications in use – to power efficient decision making and AIOps. Built to integrate with devices and applications from Aruba’s technology partners, customers can now become hyper-aware of their operating environment so they can quickly adapt to evolving business, visitor, and employee demands.

Today, “connected facilities” only provide device connectivity for subsets of control services, whereas hyper-aware facilities can leverage Aruba ESP-generated contextual data to dynamically adapt a facility to its occupants and operating environment. Unifying these IoT, IT, and OT networks under the Aruba ESP platform, and capturing rich context, enables hyper-aware facilities that are safer, more adaptive, and enhance productivity. That represents a quantum leap forward over what can be achieved by basic connectivity and machine learning-based monitoring.

These enhancements to the Aruba ESP cloud-native, AI-powered platform are integral to sensing, analyzing, and reacting to device data and contextual information. Aruba access points and switches now serve as multi-protocol IoT/OT platforms that interface with Aruba’s expanded technology partner ecosystem. Virtually every subsystem spanning machine inputs and outputs (I/O) on a manufacturing floor through multimedia devices in the CEO suite can be accommodated – from social distance monitors to gunshot detectors, rotating equipment monitors to guest wayfinding – with solutions tailored for education, enterprise, healthcare, hospitality, industrial, manufacturing, retail, transportation, and government applications.

Use cases with Aruba ESP-based hyper-awareness include smart buildings, industrial/manufacturing facilities and the broader Intelligent Edge:

Hyper-aware Smart Buildings for Enterprises, Education, Healthcare, Hospitality, Retail, and Government

  • Building Control and Digital Twin enablement – Using native AI capabilities to create real-time simulation models that change and learn in lock-step with the building, Aruba and technology partners like Microsoft with its Microsoft Azure IoT platform can create digital twins or software models to identify sub-optimized processes, recommend operational enhancements, and monitor the trajectory of energy usage needed for proactive interventions.
  • Context-aware, Real-time Integrated Emergency Response and Notification – During an incident, building occupants need real-time safety information pushed to their mobile devices and first responders need to continuously communicate with those in possible danger. Aruba ESP, with integrated solutions from technology partners like Critical Arc and Patrocinium, can actively communicate with tenants, visitors, and staff, and use unique 4D graphics for first responders to quickly see where people are situated within buildings.
  • Seamless Extension of the 5G Footprint with Wi-Fi – Aruba ESP allows mobile operators to extend their 5G footprint into the building and seamlessly power Wi-Fi calling while delivering gigabit-class guaranteed performance using Aruba Air Slice technology. This provides a seamless user experience and non-stop connectivity without the need for costly and complex distributed antenna systems.

For more context on these use cases, read the Designing hyper-aware smart buildings whitepaper.

Hyper-Aware Industrial Facilities

  • Migrating from Break/Fix to Proactive Maintenance – Proactively addressing maintenance issues minimizes downtime, and maximizes the utilization and performance of assets, reducing maintenance costs by up to 40%. Through deep integration with technology partner devices like ABB’s Ability Smart Sensor, Aruba ESP enables machinery sensors to monitor equipment like motor drives, valves, and pumps for abnormal behavior, to identify points of failure before they happen, improving productivity, reliability, and efficiency.          
  • Reducing Mean Time to Repair with Location Services – Navigating large industrial sites can be challenging, resulting in inefficiencies and safety issues. Native innovations from Aruba Meridian and Aruba ESP provides site occupants with turn-by-turn navigation to their destination without human assistance.    
  • Monitoring Personnel and Asset Safety – For environments with potentially explosive conditions, location-based safety systems are often mandated to safeguard employees and visitors. Aruba ESP, together with technology partner Mobilaris, can deliver real-time 3D situational awareness by tracking the location of people and assets, and can integrate with automated ventilation, geofencing, and vehicular navigation systems.                                

For more context on these use cases, read the Designing hyper-aware industrial facilities whitepaper.

To enable the automation needed to deliver these use cases at scale, Aruba AIOps uses AI and big data to continuously optimize, detect, isolate, and remediate network issues that impact reliability. As sources of IoT, IT, and OT data expand, it becomes increasingly difficult to isolate the source of problems or optimize the infrastructure. Aruba’s Cloud AI already combines telemetry data from over 65,000 customers and one million network devices, supplemented with 18 years of domain expertise to inform supervised learning. Aruba ESP produces AI-powered insights with greater than 95% accuracy to automatically improve communications and visibility across and among IoT, IT, and OT networks. Embedded within Aruba ESP’s unified infrastructure and zero trust security framework allows Aruba AIOps to transcend basic connectivity and simplistic machine learning-based monitoring. Aruba AIOps is a game changer for improved uptime and shortened repair times.

In addition to Unified Infrastructure and AIOps, ESP generates contextual data that make networks situationally aware for enterprise security. The Zero Trust Security framework ensures no user or IoT device is granted entry or ongoing access unless trustworthy. This framework uses AI and exchanges security and policy with more than 130 security technology vendors to obtain a deep understanding of each device and its role, allowing hyper-aware facilities to fold security activities into situational awareness.

“Machines, applications, and interfaces are typically tailored to each IoT, IT and OT vertical application, driving complexity in network management,” said Will Townsend, Senior Analyst, Moor Insights & Strategy. “I have analyzed Aruba ESP and believe its architectural platform based on a unified infrastructure, zero-trust security, and AIOps has the potential to reduce complexity and accelerate smart facility and hyper-awareness use cases both on-prem and in the cloud.”  

Additional information on Aruba’s technology partners can be found at https://www.arubanetworks.com/partners/programs/.