94% of Security Teams Start Threat Investigations with DNS but Under Use the Investment through the Hunt Cycle

203 senior security and risk professionals reveal a missed opportunity to leverage DNS throughout the threat analysis and response cycle

As cyberattacks escalate, Infoblox Inc., the leader in Secure Cloud-Managed Network Services, and Forrester Consulting investigated how security and risk (S&R) teams are using their DNS investments. The 203 respondents to the Accelerate Threat Resolution with DNS study reveal they most often use DNS to detect and block threats early in the kill chain, identify compromised devices, and investigate and respond to malware.

The top findings, as detailed in this infographic, underscore DNS is an effective but under-utilized tool for threat hunting and resolution even as alert fatigue challenges security teams to scale:

  • 94% of S&R leaders either use or consider DNS as a starting point for threat investigations but only 43% of security and risk leaders rely on DNS as a data source to complete their investigations.
  • 66% of respondents use DNS to catch threats — from DNS tunneling/data exfiltration, domain generation algorithms (DGAs), and lookalike domain attacks — that other security tools miss but only 34% anticipate using internal DNS to stop malicious attacks at scale.
  • 52% of leaders cite alert fatigue among teams and 51% report challenges dealing with threat triage; but only 58% of teams incorporate some automated processes for incident response.

“It’s good to see the vast majority of security and risk teams recognize DNS as a powerful threat hunting tool,” said Anthony James, Vice President of Product Marketing at Infoblox. “At the same time, most companies are leaving money on the table by under-using their DNS investments. With 56% of leaders looking to improve security ROI, DNS can help save the day by providing a single pane of visibility into threats across the network and the edges.”

“DNS can also help automate some of the more repetitive tasks in threat hunting, freeing up security teams who spend an average of 4 hours per incident investigation to address more complex problems,” continued James. “DNS is one of the most cost-effective ways that companies can fortify their security and risk frameworks and maximize their existing security investments.”

Register for the EMEA webinar taking place August 19 to hear Anthony James from Infoblox and guest speaker David Holmes, Senior Analyst from Forrester, discuss the study’s findings.

Forrester surveyed 203 security and risk leaders from companies that earned more than $1 billion in annual revenue in the financial services, health care, education, retail, and government sectors for this report. Respondents include all levels of decision-making, including C-level (48%), VP (11%), Director (34%), and Manager (7%) roles across companies.

Fortinet Unveils Cloud-to-Cloud SD-WAN Solution to Simplify and Enhance Multi-Cloud Applications

News Summary

Fortinet® (NASDAQ: FTNT), a global leader in broad, integrated and automated cybersecurity solutions, today announced Fortinet Secure SD-WAN for Multi-Cloud, a networking and security solution that solves common application performance, visibility, cost, and control challenges associated with multi-cloud deployments by enabling SD-WAN across multiple clouds and regions.

Most enterprises today – 93% by recent estimates – have a multi-cloud strategy in place and work with multiple cloud providers to meet a number of business needs, including disaster recovery, data backup, application resiliency, and global coverage. However, managing and securing an assortment of different private and public cloud workloads and environments remains a challenge, with many organizations choosing to connect their clouds via their on-premises data center WAN edge. The use of this type of traditional WAN infrastructure approach, though secure, inhibits multi-cloud capabilities and results in deployment complexity, inconsistent network performance, and expensive connectivity.

John Maddison, EVP of products and CMO at Fortinet

“For enterprises deploying applications and workloads across multiple clouds, the need to seamlessly manage connectivity and maintain security across the diverse infrastructure is higher than ever. Fortinet Secure SD-WAN solutions provide connectivity and security across diverse cloud infrastructures while optimizing application user experience. Fortinet enables enterprises to realize the true potential of SD-WAN by enabling it to be implemented anywhere. From home, campus to cloud, data center to cloud, and now cloud to cloud, Fortinet delivers the industry’s most scalable, cost effective and secure SD-WAN solution on the market.”

Fortinet Secure SD-WAN for Multi-Cloud is a new approach to establishing secure and high-performance connectivity between public cloud workloads running on multiple clouds without increasing cost and complexity. Available in all major cloud providers, Fortinet Secure SD-WAN for Multi-cloud enables a consistent network architecture leveraging SD-WAN capabilities between clouds and empowers application developers and enterprise IT to build a high speed and seamless cloud-to-cloud network and security architecture. Fortinet Secure SD-WAN for Multi-Cloud uniquely offers a secure and effective infrastructure for maximizing the benefits of enterprise multi-cloud deployments by:

  • Automating the deployment of a consistent overlay network across different cloud networks, reducing complexity and increasing agility to save teams time and resources.
  • Offers end-to-end visibility, control, and centralized management that unifies functionality across multiple cloud environments through cloud native integrations.
  • Securely transports application traffic between clouds without needing to backhaul through the data center, enabling better scaling of deployments and reducing latency.
  • Intelligently selects connections based on application characteristics employing dynamic path selection, improving performance and optimizing cost by selecting the best internet or leased line link.
  • Provides an application developer-friendly API to enable programmers the ability to consistently represent their network and security requirements.

Fortinet Performance Advantage On-Premises and in the Cloud

Fortinet delivers Secure SD-WAN as an integrated feature of its industry-leading FortiGate Next-generation Firewall, powered by the industry’s first SD-WAN ASIC to enable better application experience, higher performance, and better cost efficiency – with Security Compute Ratings up to 17 times better than competitor solutions. Fortinet Secure SD-WAN for Multi-Cloud, delivered via FortiGate-VM, a virtual appliance, is powered by Fortinet’s patented vSPU technology and maintains a performance advantage in the cloud, including over 20Gbps of IPsec performance – 10 times the industry average – for fast encrypted connections over internet and leased line links to reduce operational costs. By leveraging the broad FortiGate-VM footprint across all major cloud platforms, as well as market leading FortiGate appliances on-premises, enterprise organizations can benefit from cloud-agnostic consistent multi-cloud networks without compromising on security and performance.

Fortinet Secure SD-WAN for Multi-Cloud, which securely connects applications and workloads across multiple clouds, complements Fortinet’s existing Secure SD-WAN Cloud On-Ramp capabilities to securely connect users and offices to applications and cloud workloads. 

SD-WAN for the Entire End-to-End Enterprise

Fortinet delivers a Secure SD-WAN product portfolio designed for the entire end-to-end enterprise with physical appliances for large data centers, branch offices, remote sites, and home offices, as well as virtual appliances for multi-cloud deployments. Fortinet Secure SD-WAN’s ability to scale from home office to branch to cloud all tied to a single operating system via the Fortinet Security Fabric ensures networking and security policies seamlessly work across multiple environments and cloud platforms, enabled by the latest threat intelligence from FortiGuard Labs.

 

Successful Tech Strategies for Tackling Evolving Guest Expectations in the Hospitality Industry

Elaine Shuck

By: Elaine Shuck, Solutions Marketing Manager, Global Hospitality Team, Aruba, a Hewlett Packard Enterprise company

Connectivity expectations in the hospitality industry have accelerated from simply providing mobile connectivity to leveraging wireless and wired network capabilities to make experiences increasingly home-like, while simultaneously improving operations and profitability.

With a range of innovations to select from, we foresee that the following three technology trends will headline your IT to-do lists — regardless of your brand’s size or type.

Trend #1: Know Your Guests Better Than Ever Before

Delivering home-like experiences starts with knowing even more about your guests than before. This requires gathering and leveraging a range of data and analytics for both individuals and in the aggregate. To do so, hospitality providers are focusing on the following:

  • Enable frictionless Wi-Fi access and enhance data collection. The first step to knowing your guests is ensuring they are on your network. By using a technology called Passpoint, your existing loyalty guests can transition automatically from their provider’s cellular network to your wireless network. Guests will enjoy the ease of connectivity and you’ll gain capabilities for immediately providing personalized offers. With data gathered at the point of entry, rather than after a guest initiates a connection, you gain new insights on traffic patterns, enabling you to position digital or other signage, offer related items or discounts, and tweak infrastructure as needed to deliver the best connectivity experience.
  • Get personal by adopting a proven technology ecosystem. Truly personalizing guest experiences requires making sense of collected data quickly and responding accordingly. That’s why simply deploying a specific Wi-Fi solution is no longer enough. You need to also evaluate Wi-Fi solutions for offering proven technology ecosystem partnerships that help you turn your networking infrastructure into a powerful personalization platform.

For example, an ecosystem partner can automatically gather data from multiple sources, such as access points, people counters and POS systems, turn it into insights about how people behave, and enable you to engage with guests based on their preferences or the profile you’ve established.

Or, perhaps you’re a cruise line – where terrestrial backhauls are absent when your ships are at sea – and want to utilize location technology to offer guests app-based wayfinding or give your staff the ability to track equipment and luggage in real time. In this case, you need an ecosystem partner that tightly integrates location data from your Wi-Fi gear with a vessel’s on-premise positioning and proximity marketing platform rather than the typical cloud-based service.

Trend #2: Morph Your Wi-Fi Infrastructure into a Robust IoT Platform

Advanced Wi-Fi 6 solutions pack so much intelligence into each access point that industry leaders are now approaching their wireless infrastructure as an IoT platform, capable of enhancing guest experiences and operational efficiencies.

  • Deploy one platform that speaks many languages. Investing in an innovative Wi-Fi 6 solution that supports several protocols, such as Bluetooth and Zigbee as well as Wi-Fi, eliminates the need to deploy a separate overlay network. The most comprehensive solutions offers access points with a USB port, allowing you to plug in a dongle if another protocol is needed. Multi-protocol capabilities can enable better integration with app-enabled services, like automatic door locks and environmental controls. As a result, guests experience a seamless journey that begins with selecting their desired room and personalizing their environment prior to arrival and then walking directly into a personalized space, just like at home.

Go greener with energy saving features. Another hallmark of a robust IoT platform is energy efficiency. Such solutions supply the capability for automatic power reduction, where access points put themselves to “sleep” when utilization subsides and “wake” when demand returns. This offers significant savings to anyone with large conference areas, dining rooms or any high-density location where traffic varies over time.

Boost staff safety and operational effectiveness. Improved operational effectiveness, including a staff that feels safer, also contributes to a home-like experience. That’s why hospitality IT departments are adopting location-enabled tools, such as panic buttons for hotel staff that can trigger a trace and report on an individual, even when he or she is on the move. For day-to-day effectiveness, these same solutions can also support trackers to help staff keep tabs on inventory, such as those often-elusive luggage carts, or even monitor a vendor’s staff members who are scattered throughout your property.

Significantly improve everyone’s physical security. In the wake of high-profile adverse events, your guests expect more advanced physical security systems. Established partnerships with leading IoT providers help ensure joint solutions are fully tested and interoperable, improving guest and associate safety from guest rooms to back-of-office. For instance, emergency response solutions can leverage your wireless IoT platform, giving first responders and security staff split-second situational awareness into an entire property. This includes locating and monitoring affected areas, viewing threat entry and exit points, time-stamping incident progress and conducting real-time communication between staff, responders, on-site contractors and guests.

Trend #3: Manage Infrastructure at Far-Flung Locations Centrally and Securely

At remote locations, where on-site IT staff is limited, it’s important for corporate IT departments to feel confident with network and application performance at such facilities, as poor guest experiences can damage loyalty and the brand. The maturing of software-defined branch networking gives you the option to centralize worldwide infrastructure deployments to enable secure, simplified branch connectivity at scale. New innovations include capabilities that support a Zero Trust security model at remote locations throughout your footprint and SD-WAN orchestration features that deliver unified SD-Branch management and secure connectivity for cloud workloads. Also, for those using a leading cloud platform provider, adopting an SD-Branch solution that offers proven cloud platform integration capabilities can maximize benefits.

Regardless of how you begin addressing the trends and strategies we’ve discussed, it’s critical for you to advance your experiences to match evolving guest expectations. Doing so also improves employee satisfaction and retention, making innovation a win-win for your bottom line.

 

Key Business IT Priorities Needed to Embrace Opportunities at the Edge

By: Morten Illum, VP EMEA, HPE Aruba

Organisations across every industry sector are currently experiencing change on an unprecedented scale as they look to digitally transform operations, through the implementation of digital devices, smart technologies, and an ever-expanding network, in the search for a competitive advantage. However, in order to leverage and evolve how we use data collected though digital transformation, it’s increasingly clear every business should be looking to the edge of their network. Where data and processing power were once concentrated in the back-office, now they live at the Edge, near the people who are using it – as both employees and customers.

A book, ‘Opportunity at the Edge’ from Fast Future, in collaboration with Aruba, demonstrates that Edge technologies have the potential to overhaul business models, transform user experiences, and even create entirely new industries.

Edge computing is defined as products that facilitate data processing at or near the source of data generation, delivers far speedier results than traditional architectures. At the Edge, enterprises can deploy technology, from the mobiles that customers use to connect to service, to the sensors that can track activity, and the Artificial Intelligence (AI) that can analyse the data collected in real time, to create user experiences that are faster, more dynamic and personalised to individual needs. Edge computing technologies –– This makes it possible for every organisation to provide a radically improved level of service.

According to Gartner, edge computing will be a necessary requirement for all digital businesses by 2022. But with business and technical hurdles to overcome, how can CIOs manage the business strategy of implementing their network at the edge? With potentially trillions of dollars being invested in the hope of generating huge economic returns, the argument for paying attention to the Edge opportunity is clear and the window for learning and action is narrowing.

Leadership

In order to truly embrace the Edge, you have to start at the top. Senior-level management must develop a deep understanding of the shifts taking place in the marketplace, and the opportunities and challenges posed by adopting the edge as a cornerstone of business strategy. What’s more, leaders need to understand how the technologies will enable their business to create these new opportunities and recognising that it transcends the realm of IT, opening up new avenues of business. For instance, in the hospitality sector, Edge solutions can help create more personalised experiences for guests. Interaction between the guest’s intelligent assistant and the hotel can ensure that the mini-bar is stocked only with what is in their approved diet, and digital restaurant menus can automatically update using the same information, such as removing any high sugar content dishes. But with change comes challenge – the c-suite needs to have a full understanding of the challenges when making the transition and learn from other companies who have embarked on both successful and failed digital transformation efforts.

In order to succeed, managers need to prioritise objectives, ensuring that both IT and wider business resources are not spread too thinly across multiple projects. Senior leadership’s key role will be to provide the resources and direction to ensure projects stay focused on their goals and can deliver meaningful results. Stakeholder engagement is critical here – the scale of the opportunity, the size of the transformation, and the commercial risks of inaction need to be communicated clearly to critical stakeholders from employees and managers to shareholders and the board.

Develop and Evolve the Business Case

From the outset, it is important to understand that the business case for deploying edge technologies is likely to evolve over time. While assumptions will need to be made at the start of the process, in order to give the project direction, this will likely change and evolve once businesses gain more practical experience implementing edge-based solutions and are in a better place to understand the true benefits for customers and the organisation.

The key factor in evolving business cases will be responding to feedback from the end user or employees. While enterprises may have to adjust the solution as they hit technological barriers or come up against an unwillingness to invest from senior stakeholders, the biggest success factor in delivering on the business case will be understanding and responding to any adverse consumer and employee reactions over how these technologies might be used and how they might impact personal privacy. Trust and transparency are going to be key to implementation.

Security and Risk Management

As with any large-scale transformation, adopting edge-based strategies has inherent security challenges and risks, and many have raised concerns about the potential invasion of privacy and misuse of customer data. Operationally, the critical risk here is not investing enough in mind-set change, digital literacy across the business, and the capability of IT to lead and deliver edge strategies.

According to Fast Future’s book, the most voted for security fear is that Edge solutions could potentially create thousands of points of risk exposure across the network for hackers to take advantage of (82%). Every enterprise that moves towards the Edge must act to pre-empt the security threats inherent to a network newly flooded with connected devices. Fundamental to these opportunities is the need for robust, centrally-managed network infrastructure – one that provides visibility and control in an increasingly complex, and potentially vulnerable, enterprise environment. Enterprises must also work on the basis of an open technology ecosystem that leaves them with the room to adapt and evolve over time, as priorities change. Businesses will have to show stakeholders that the benefits of edge technologies far outweigh any privacy fears, and that any data captured will only be used to evolve and improve their experiences.

It’s clear that, if implemented correctly, Edge is going to be key to evolving businesses and getting a digital advantage over competitors. fast becoming the single most important trend for enterprises in the coming years, which will be able to contend with the quickly evolving expectations of consumers for more seamless, customised and on-demand services. But in order to implement these solutions effectively, enterprises must take heed of both the benefits and challenges such an extensive implementation may cause and pre-empt them ahead of time. Companies need to focus not just on installing technology, but upgrading the institutional mindset towards a more experimental approach, and improving digital literacy across the board

Those that lay the foundation now from a technical and structural standpoint, will be best placed to take advantage of the Edge potential.

Dimension Data Unifies Middle East Operations to Drive ‘Client-First’ Regional Strategy

Mohammed Hejazi has been appointed to lead Dimension Data’s operations in the Middle East as company consolidates Saudi and UAE entities

Dimension Data today announced the restructuring of its operations in the Middle East with the aim of elevating its customer-centric market approach through streamlined decision making, enhanced organisational synergy, and a unified go-to-market strategy. In line with this undertaking, Mohammed Hejazi, who has served in regional sales and leadership positions at the company for nearly a decade, has been appointed to lead the newly consolidated Middle East entity.

Outlining his objectives as the Managing Director for Dimension Data Middle East, Hejazi said, “Saudi Arabia, the UAE and other countries in the Middle East have clearly demonstrated their desire to be global technology pioneers. By merging our team, we are bringing together the expertly qualified technical, sales and support resources that have been driving innovation for some of the region’s largest and most prestigious public and private sector organisations.”

“We have reorganised ourselves with growth and the market needs in mind. This move transforms Dimension Data into a truly client led company that will continue to spearhead the digital transformation of the Middle East through collaborative, co-creation with our customers,” he added.

The company’s strategy in the region will now strongly pivot around five go-to-market areas to deliver intelligent technology and services that are aligned to our clients’ journeys, including Intelligent Infrastructure, Intelligent Workplace, Intelligent Customer Experience, Intelligent Business Applications, and Intelligent Security.

Hejazi reassured customers that Dimension Data will continue to deliver services seamlessly and efficiently through the integration process. “Recent months have highlighted that now more than ever, digital technologies are critical to unlocking business potential. As the market evolves at breakneck pace, we were committed to working together with our clients to enabled them to remain industry vanguards and power their digital futures by using game-changing technologies,” he said.

 

Automation that Matters and Eliminates Errors

Hesham

By: Hesham Elsherif, Principal System Engineer at A10

Operators consider network complexity to be the greatest threat for the next three years, according to a research survey by 451 Research. At 61 percent of respondents, this ranks higher than competition from cloud providers or concerns about the pressure on service margins and lower operating costs.

Greatest Threat for the Next Three Years

  • Network complexity 61%
  • Competition from cloud service providers 49%
  • Inability to adopt agile service delivery models 35%
  • Regulatory constraints on spectrum 29%
  • Inability to lower operating expenses 25%
  • Increased pressure on service margins 25%

This concern was echoed by analyst, Patrick Donegan of HardenStance, from an interview with an A10 customer who pointed to complex and unwieldy manual operations as the primary security challenge for operators scaling out their networks with more 5G devices and elements. For example, “fat finger” errors by operations personnel can cause configuration issues and potential disruption when new devices are brought online. Manual application for security patches is also prone to error or inconsistent updating, leaving network devices vulnerable. With a variety of individuals implementing different configurations at different times along with the growing number of devices, it becomes difficult to compare configurations and patch updates to see if the correct one is in place. The automation of simple tasks and discrete but complex processes are the first steps to better consistency. Automation, even in small steps, can provide big rewards to operators in reducing costs and enabling faster, more secure rollouts of 5G use cases such as fixed wireless access (FWA).

Operators are caught between needing to automate and reduce costs while still managing older, multi-generational and hybrid technologies of 3G, 4G, 5G and fixed broadband. The automation of deployment, configuration, update and upgrade processes can substantially ease the pain of this transition and support operator goals of lower cost, stronger security and better customer experience.

Service providers operating both mobile and fixed networks, such as the one interviewed in the HardenStance brief, are focused on FWA with 5G to improve the volume and quality of their video services, to further enable the convergence of the mobile and fixed infrastructure and to reduce costs. This operator wants to provide consistent services for fixed broadband users, even when connecting via 5G FWA, and to extend broadband coverage to underserved areas such as rural populations.

Globally, the FWA market is surging worldwide with over 100 million households now using fixed wireless access. Overall, the mobile industry sees fixed wireless access with 5G and 4G as providing a cost-efficient way to connect underserved populations. Broadband deployment has been particularly slow in developing and underdeveloped countries where as many as 1 billion families are estimated to be without any fixed broadband access at all. The operators’ opportunity for fixed wireless access services (both 4G and 5G) is huge. 5G for fixed wireless access provides up to 100x more capacity than 4G and eliminates the need to deploy costly fixed wireline or fibre infrastructure, which requires digging trenches, laying cable and securing the right of way.

At A10 Networks we believe a comprehensive set of API scripts that allow operators to automate multiple tasks and simplify complex processes and meet network transition business goals. A10 approach is we only require no more than a handful of API calls to execute many changes, which may require a thousand API calls from other vendors. This greatly simplifies the management of ever-expanding network nodes. Furthermore, clustering functions and licensing options allow for the flexibility to increase capacity across different nodes, regardless of location and without service interruption in just 20 minutes.

The automation of seemingly simple tasks and processes and elastic scalability help optimise investment per site and enable operators to more easily build out mobile edge computing and to converge mobile and fixed technologies while ensuring a uniform subscriber experience.

NetApp Closes Acquisition of Spot

anthony-lyeSpot by NetApp establishes leadership in application-driven infrastructure

NetApp (NASDAQ: NTAP), the leader in cloud data services, today announced that it has completed its acquisition of Spot, a leader in compute management and cost optimization in the public clouds.

Spot by NetApp® delivers application-driven infrastructures (ADIs), cloud infrastructures that use analytics and machine learning to continuously adapt to the needs of applications, to help drive cloud resource optimization in real time, for both compute and storage. ADIs automatically deliver the availability, performance, and capacity that applications need at the lowest cost, accelerating the deployment and innovation of applications. ADIs help application teams shorten development lifecycles and run more applications in their choice of cloud. Customers can save up to 90% of their compute and storage infrastructure expenses, which typically make up 70% of total cloud spending, while maintaining SLAs and SLOs.

“Together, we are extending NetApp’s vision for helping customers unlock the best of cloud,” said Anthony Lye, senior vice president and general manager of NetApp’s Public Cloud Services business unit. “With Spot by NetApp, we will enable customers to get more out of their cloud investment to gain competitive advantage and accelerate their business success.”

“Cloud infrastructure gives application developers the ability to develop and deploy applications faster by providing resources almost instantly at any time,” said Amiram Shachar, CEO and cofounder of Spot. “We are excited to join NetApp in pursuit of the shared vision to help application owners embrace and take advantage of the full power of the cloud.”

Spot by NetApp offers a portfolio of compute and storage services that monitor and analyze the needs of applications and automatically optimize cloud resources to meet those needs. Customers will be able to:

  • Make reliable and greater use of cloud excess compute capacity (aka spot instances) and save up to 90% of compute and storage costs, which typically make up 70% of cloud spend.
  • Use compression, dedup and tiering technology to provide dramatic costs saving, up to 60% less than standard cloud storage
  • Provide full value out of customers’ cloud reserved capacity
  • Integrated, actionable approach to managing cloud spend
  • Continuously monitor, analyze and predict applications’ resource needs.
  • Proactively optimize cloud infrastructure to meet business and application demands.
  • Automatically scale and adapt to deliver optimized capacity and performance.

86% Percent of Public Sector Decision Makers Believe their Organisations’ Productivity Depends on Network and Application Performance

Riverbed® today launched its expanded ‘Rethink Possible: Visibility and Network Performance – The Pillars of Business Success’ Study, focused on the public sector. The study revealed that 89% of IT decision makers (ITDMs) and 82% of business decision makers (BDMs) in the public sector believe productivity is reliant on effective network and application performance. In addition, three-quarters of those surveyed (72% ITDMs and 79% BDMs) agreed that visibility into IT performance is the key to driving business innovation and staff retention.

These and other findings in the study highlight the necessity for public sector organisations to have effective IT infrastructure in order to be successfully productive, innovative and drive their growth. These are key considerations given the critical challenges public sector organisations are facing to maintain infrastructure, policing, health, and political balance in today’s environment.

Poor visibility and outdated systems proving to be a hindrance

Decision makers within the public sector recognise that improved visibility into network and application performance will have a direct, positive impact on their organisations’ development. In fact, over three-quarters of ITDMs (77%) think that having more visibility into their organisation’s systems will help to mitigate risk and ensure productivity. Both of which are essential factors in improving efficiency, driving employee engagement, and developing projects within public sector organisations. However, a clear conflict exists in the public sector between the visibility experienced by the IT teams and business decision makers. More than half of ITDMs (54%) state that they do not have enough visibility into the performance of their networks, applications, or infrastructure, compared to 76% of BDMs who believe IT has a comprehensive overview of applications. This disconnect may be why 75% of public sector leaders surveyed felt frustrated by their current network performance (74% of BDMs and 76% of ITDMs). Ensuring ITDMs and BDMs see eye-to-eye is paramount to helping them recognise the need for new technology that will improve visibility and performance, overcoming this frustration.

Productivity and organisational growth need the right IT infrastructure

As the recent global pandemic has shown, the public sector needs technology that evolves with the increasing demands placed on national services. In fact, over 90% of IT decision makers in the public sector believe future success hinges on their organisations’ ability to innovate and break boundaries. It is therefore encouraging to see that over 85% of both ITDMs (89%) and BDMs (86%) in the public sector believe there should be more investment in technology solutions that enhance overall IT visibility. With more than three quarters (78%) of public sector leaders agreeing that investment in next-generation technology is vital, organisations need to act quickly or they risk not only diminishing productivity levels from employees but also failing to keep up with customer needs and expectations.

Commenting on the research findings, Mena Migally, Senior Director, MENA at Riverbed, said: “Strong IT infrastructure is essential for any business but in the public sector – where ineffective systems cause major disruptions for national government departments, non-departmental public bodies such as the NHS, and service delivery – it is crucial. Especially during these unprecedented times, it is really positive to see that both IT and business decision makers in the public sector recognise the need to invest in the right technology to optimise their IT infrastructure – for both employees in the office and those working remotely – and successfully achieve business growth, now and in the future.

Migally, continued, “At Riverbed, we want to encourage public sector leaders to work together in order to identify and overcome the IT challenges they may be facing, from the lack of visibility, to poor network performance and inefficiencies due to outdated infrastructure. We fundamentally believe that in finding a solution to these problems, ITDMs and BDMs can unlock the capability to evolve their business, drive innovation, boost productivity and ultimately, achieve success in the public sector.”

Rethink Possible: Evolving the Digital Experience

Over 80% of all public sector leaders (87% of ITDMs and 81% of BDMs) agree that organisations must rethink what is possible to gain true success in today’s fast-moving world. Technology has to be the enabler in the process. Riverbed’s portfolio of next-generation solutions is giving customers in the public sector across the globe the visibility, acceleration, optimisation and connectivity that maximizes performance and visibility for networks and applications.

To find out more, download the full ‘Rethink Possible: Visibility and Network Performance – The Pillars of Business Success’ report by visiting here, and join in the conversation here.

By: Claude Schuck, Regional Manager, Middle East at Veeam

Over the last few months, we’ve seen many organizations in Saudi Arabia have arranged for employees to work from home. Living in the golden age of Digital Transformation means that we are connected at all times. Consequently, the workplace today has evolved significantly to allow individuals to communicate seamlessly and connect from anywhere through mobile devices, digital tools, cloud services and many more. But what does this mean for organizations and the protection of its data?

With many employees working from home, businesses can expect a huge spike of personal file storing coming in from external sources. This is the perfect opportunity for malicious malware to make their way into servers, potentially corrupting a network of data.

Here are some of the necessary steps businesses should be taking to protect their data and IT architecture:

3 layers in the circle of defense

Businesses need to be aware of how they manage data between cloud and consider tools that will give them an advantage. Today, businesses are continuously backing up and replicating applications and we can only expect this to increase over the next few years as others learn the significance of data that are easily recoverable.

They need to understand the different roles that are needed for consideration when optimizing their systems for backup and replication. This can be easily summed up into the 3 layers of defense in data protection.

  • Perimeter: Firstly, businesses must consider the situation at hand – in this instance, it is remote working or working from home. Protection must be made available for employees to be able to access the cloud and in turn, ensure that these data can be backed up.
  • Mid: Next, businesses need to note that with an increase in the number of people working from home, measures must be put in place so that the systems are still able to run smoothly and efficiently. To counter this, it is highly recommended that servers be optimized for different groups of networks to tap into.
  • Base: It goes without saying that having more people accessing the servers from an external network will also result in an increase in the number of personal files coming in. Businesses need to ensure that they are able to mitigate any malware that might make its way through.

 Data backup and protection

There are many unforeseen circumstances that businesses need to prepare for. Therefore, it is important for them be highly adaptable. Having data that is easily accessible is part of the solution to be ready for remote working. Over the next few years, businesses can expect to see an increase in the number of tools that can allow them to continuously back up their data and perform recovery in a matter of minutes. With these tools, they will be insured with more than just backed up data – they will also have access to insights that will allow them to make informed decisions in their digital transformation journey.

Apart from that, it is also important for businesses to protect their data – as seen with the recent increase of data breach. Cloud Data Management is expected to see an increase in mobility and portability over the next few years. With added security measures, businesses will have access to data easily outside of their workplace with a peace of mind.

Prevention of cyberattacks

One of the essential steps businesses need to take is to minimize administrative access to platforms and servers and increasing rules of operation. Not everyone needs to be able to access all the systems in place.

It is also vital for organizations to educate their employees – often, ransomware finds its way through a system because of an individual’s mistake. It is important for businesses to remind employees on best practices, especially in times when telecommuting is an option for everyone. They need to understand that being connected to a network outside of the company’s system exposes the servers to potential malware.

To sum it all up, businesses in Saudi need to always prepare ahead for any disruption that might have an impact in the way they work. Especially in an era where remote working is a step forward, organizations need to ensure that their systems are ready and fully protected so that their employees can remain efficient and productive.

 

TLS/ SSL Decryption – One of the Main Pillars of Zero Trust Model

Adil Baghir Photo

By: Adil Baghir, Technology Consultant Lead, Middle East & Africa at A10 Networks

In a world where everything and everyone is connected to the internet, in one way or another, it’s hard to imagine a network that is truly secure. Data, large amounts of it, are at the centre of it all. With industries from healthcare to the education sector to the government using the internet to provide easy access to data, it is no wonder that cybersecurity teams are always working around the clock to try and come up with better ways of defending these networks and the data they store.

Insider Threats – Need for Security to Evolve from “Castle and Moat” Approach

Modern cyberattacks are not limited to just network intrusion from the outside. Internal threat actors can often be found at the centre of sophisticated attacks.

Initially, we had the concept of zones, perimeters and network segments – placing all the protected assets “inside” the secured network perimeter. However, attackers are always evolving the methods they use; always on the lookout for weak points in your network defences; and coming up with newer ways of infiltrating the perimeter. Keeping up with them is a challenging and ongoing struggle. We also need to realize that the “castle and moat” approach to our network defences was mostly effective against threats that resided outside the network. But what about the threats on the inside? What about modern attacks that work on multiple levels to try to bring your networks down? How do we protect our networks from people who have legitimate access to all its resources? How do we battle the ever-growing and ever-evolving modern cyberattacks? Add to these questions, regulations like GDPR, and the rising fines, and you will see that having your networks attacked and data breached is one of the worst things that can happen to your company. With these issues as the backdrop, we are forced to re-assess and re-think the way we defend our networks, users and data.

Zero Trust Model – a Modern Cybersecurity Approach

Zero Trust attempts to fix the problems, and patch the holes, in our cybersecurity strategies. At the core of it, the Zero Trust model is based on the principal of “trust nobody.” The Zero Trust model dictates that no one in your network should be trusted completely, that access should be restricted as much as possible, and that trust should be seen as yet another vulnerability that can put your network at risk.

Some of the precepts of the Zero Trust model are:

  • Networks need to be redesigned in a way that east-west traffic and access can be restricted.
  • Incident detection and response should be facilitated and improved using comprehensive analytics and automation solutions, as well as centralized management and visibility into the network, data, workloads, users and devices used.
  • Access should be restricted as much as possible, limiting excessive privileges for all users.
  • In multi-vendor networks, all solutions should integrate and work together seamlessly, enabling compliance and unified security. The solutions should also be easy to use so that additional complexity can be removed.

Danger of Security Blind Spots

In recent times, we have witnessed a phenomenal rise in the use of encryption across the internet. Google reports that over 90 percent of the traffic passing through its services is encrypted. The same is true for all the other vendors. This rise has been driven by many factors, including privacy concerns.

However, with encryption comes the creation of a “blind spot” in our network defences as most of the security devices we use are not designed to decrypt and inspect traffic. The Zero Trust model is not immune to this problem as visibility is considered as one of the key elements to its successful implementation. Without complete encrypted traffic visibility, the model will fail, introducing vulnerabilities that can be exploited by both insiders and hackers.

TLS/SSL Decryption – One of the Main Pillars of Zero Trust

A centralized and dedicated decryption solution must be placed at the centre of the Zero Trust model and should be included as one of the essential components your security strategy.

Many security vendors will make claims of the ability to decrypt their own traffic, working independently of a centralized decryption solution. However, this “distributed decryption” approach can introduce problems of its own, including inferior performance and network bottlenecks, and fixing these would require costly upgrades. In a multi-vendor, multidevice security infrastructure, the distributed decryption also forces you to deploy your private keys in multiple locations, creating an unnecessarily large threat surface in your network, which could be subject to exploitation.

Key features of a good TLS/ SSL Decryption Solution

It is important that a dedicated, centralized decryption solution provides full visibility to the enterprise security infrastructure for TLS/SSL traffic. Not only that, but the solution also needs to provide a multi-layered security approach, which then makes it the perfect candidate to be deployed at the centre of a Zero Trust network.

Below are some of the features to look out for when looking to implement a TLS/ SSL Decryption Solution:

  • Full Traffic Visibility – It needs to enable the entire security infrastructure to inspect all traffic in clear-text, at fast speeds, ensuring that no encrypted attacks or data breaches can slip through
  • Ease of Integration – It should be vendor agnostic and easily integrate with security devices already deployed within the network. This drives down additional costs and upgrades.
  • Multi-Layered Security Services – These are additional security services, including URL filtering, application visibility and control, threat intelligence and threat investigation, that help strengthen the security efficacy of the entire enterprise network
  • User Access Control – The product should be able to enforce authentication and authorization policies to restrict unneeded access, log access information and provide the ability to apply different security policies based on user and group IDs.
  • Micro Segmentation – It should facilitate micro-segmentation through its ability to provide granular traffic control, user and group ID-based traffic control, and support for multi-tenancy
  • Securing Cloud Access – SaaS security is an important feature which can be provided by enforcing tenant access control and visibility into user activities.

In conclusion, without a centralized and dedicated TLS/SSL decryption solution, the Zero Trust model is unable to do what it was designed to do – protect our networks, users and data from threats residing inside and outside the network.