Network Identity in a Cloud-native World

By: PG Menon, Director of Marketing at Infoblox

Cloud-native technologies transform businesses at a global scale

Companies like Amazon and Netflix leveraged cloud technologies to go from being mail order companies to some of the world’s largest consumer on-demand businesses. Cloud-native technologies empowered them to make this transition by providing increased agility and productivity, improved scalability and reliability, and lower costs.

In a borderless enterprise identity is the new perimeter

DNS, DHCP and IP address management collectively automates network connectivity and provides visibility into network connected devices. They enable a foundational layer of visibility and security for your network. Network identity has long been used as a means for authentication and authorization because it ensures you are who you say you are, and, only allows you to do what you are permitted to do no matter where you are located and or your access method.

Identity now includes human users, devices and applications

In transitioning to cloud, the different types of cloud-native applications developed and deployed by organizations such as microservices, web applications or bots are inherently different than human identities and require additional oversight. For example, in operation, Kubernetes requires access to registries on the internet to download various containerized micro-services. There may be hundreds or even thousands of identities accessing resources across an enterprise network on a regular basis, each with its own unique set of circumstances.

Volume and variety of corporate identities are plaguing enterprise IT

Per IDC, it is not uncommon for applications to use their own LDAP directories. Managing those directories and controlling risk is a problem. Enterprise IT simply doesn’t have the level of visibility required to truly understand which identities are performing what actions on their critical resources across multiple and vastly different cloud operating models. Moreover, the identity teams don’t have the time or expertise to keep up with the proliferation of privileges, roles, resources and services across multiple cloud platforms.

ML and AI has transformed identity management

Identity lies in the core of security. Traditional identity mechanisms don’t apply to modern and often hybrid workloads. Runtime authorization decisions are now made within, applications. One integrated platform instead of several discrete Identity and Access Management solutions consumed in a SaaS-delivered manner is the answer. In addition, an ML/AI-driven approach that automates the identity management processes can improve operational efficiencies. AI and ML technologies continuously monitor access relationships and patterns for every cloud resource and aligns with zero trust network access (ZTNA) model for the enterprise.

The City of Music: Nashville

By Shereen Shabnam

The first thing I fell in love with in Nashville, the music city was Nashville’s premier hotel, the Gaylord Opryland Resort & convention center and the beautiful guitar exhibits. I went there to attend an IT conference with Epicor and expected a simple resort but the ambience, excitement and energy of the place made me feel I could live there for years and not get bored.

The beautiful gardens beneath climate-controlled signature glass atriums, the meandering Cumberland River plus an extraordinary selection of dining, shopping and recreation options made me feel like this was more of a getaway and I thoroughly enjoyed the atmosphere in between the conference.

I walked through various indoor gardens, cascading waterfalls and took a boat ride in the indoor river and still had time for the spa and fitness center. Most times, the lush greenery reminding me of my own country Fiji Islands and made me feel right at home.

Inspired by elements of music everywhere in the resort, I set out to see more of what the rest of Nashvile had to offer. Music is in the DNA of people from Nashville and the award-winning Station Inn is considered to be one of Nashville’s premier venues for bluegrass music. Notable artists have performed at this venue, which is perfect for concerts and jam sessions by up-and-coming artists.  

Then there is the Tennessee State Museum that tells the story of the state’s rich history over three floors of the building. Creative visitors will love the Frist Center that hosts Visual Arts displays by local, state and regional artists along with national and international exhibitions.

Music lovers will find the ‘Two Old Hippies’ a haven as a retail store offering a large selection of guitars, music, clothing and other novelty merchandise. The shop has a stage with an organ, several guitars and a drum set as well as lighting and a mixing board in a deco where walls are full of music artefacts and memorabilia.

Alternatively, head to Curb Records, an independent music label founded by Mike Curb. The label’s top recordings include hits by legendary artists. A philanthropist, Curb has been instrumental in restoring historic buildings, including Columbia’s Historic Quonset Hut, a recording studio originally established by Owen Bradley, and the Johnny Cash Museum.

Then there is the music Row, home to several businesses and attractions related to the city’s musical heritage. Considered the heart of Nashville’s entertainment industry, the area has the historic RCA Studio B, Columbia’s Historic Quonset Hut, Owen Bradley Park and numerous shops and restaurants. “Musica,” a large bronze statue designed by Alan LeQuire, is the centerpiece of the Music Row Roundabout.

It is all about Music in Nashville. The Musicians Hall of Fame at Historic Nashville Auditorium honors the artists and session musicians who have accompanied legendary performers in a broad range of musical genres, including country, rock, jazz and soul.

I naturally stopped at the Marathon Motors Factory in the heart of downtown Nashville. This area has an array of music recording studios, numerous shops, studios etc. If you like walking, head to ‘The Gulch’, a historic walkable neighborhood with hip restaurants, eclectic boutiques and vibrant nightlife venues.

In Nashville’s Centennial Park, the Parthenon stands as an exact replica of the Parthenon in Athens, Greece. You can see the 42-foot gilded sculpture of Athena, and temporary shows and exhibitions.

There is so much to se and do in Nashville but Music is really what makes this city stand apart. I enjoyed Nashville and look forward to going back again.

#GlobalTrendMonitor #Nashville #Travel #destination #holiday #lifestyle #magazineUAE #magazine #mediaUAE #UAEbusiness #myDubai 

Paxful Launches Paxful Pay, E-Commerce Solution To Strengthen Cryptocurrency Adoption

Peer-to-peer fintech partnering with global businesses to offer bitcoin as payment option

Paxful, the leading global peer-to-peer fintech, today announced Paxful Pay, an e-commerce solution that allows businesses worldwide to receive bitcoin. The service is available today and allows customers to pay with almost 400 payment methods – exchanging into bitcoin that is sent to the merchant’s digital wallet. Businesses can register now to add Paxful Pay as a purchase option to their online checkout process.

Through Paxful Pay, businesses have the ability to manage their earnings and convert bitcoin into their local currency on the Paxful Marketplace using almost 400 payment methods. Merchants will also have control over the configuration of the solution on their Paxful Merchant Dashboard and can track every transaction. The company expects to expand to other digital currencies and also plans to introduce automatic conversion into stablecoins such as Tether (USDT). Further down the line, Paxful Pay will allow merchants to automatically convert bitcoin into their local currency within their bank account.

Consumers can expect the typical e-commerce flow — but will now have the option of selecting Paxful Pay as a payment method. This will prompt users to create a new profile or login as an existing Paxful user. Users can then use almost 400 payment methods to complete their purchase. With their Paxful login, users can also take advantage of Paxful’s other products such as Paxful Marketplace and Paxful Wallet.

Ray Youssef, CEO and co-founder of Paxful, said: “In many regions across the globe, we see people use bitcoin as a financial tool for purchasing goods and services. Bitcoin has several different use cases that we’ve only begun to leverage and e-commerce is a great example. At Paxful, it’s imperative that we give users and businesses around the world the opportunity to take advantage of the power of bitcoin to gain financial freedom.”

Artur Schaback, COO and co-founder of Paxful, said: “We’re thrilled to bring Paxful Pay to our global community. There is a clear need to offer local options for bitcoin and this product is a culmination of our efforts to deliver on that demand. By offering users the ability to complete purchases using almost 400 payment methods, they will now have an even stronger financial solution at their fingertips. We cannot wait to expand this offering to encompass as many merchants as possible.”

Currently, Paxful has over a hundred merchants on Paxful Pay. As the company ramps up the service, it expects to onboard a select number of new merchants in the coming weeks. From there, Paxful Pay will expand more generally.

Founded in 2015 and completely bootstrapped since then, Paxful is headquartered in New York with offices in Estonia, the Philippines and Russia. The team has doubled in size over the last 12 months, growing to over 400 people.

THE COLORFUL SUMMER WE HAVE ALL BEEN WAITING FOR!

Breitling’s latest seasonal creation for women is a fresh reincarnation of a classic. What started as a 1950s divers’ watch has evolved into a fashionable timepiece for women ready to jump into summer! 

The Superocean Heritage ’57 Pastel Paradise Capsule Collection is all about color, proportion, and of course substance. Its 38-mm stainless-steel case features a rotating bezel and bold indices. It’s the very essence of summer style. 

“This modern-retro tribute to the original SuperOcean is an exciting addition to the Breitling family of ladies’ watches. Of course it’ll look great at work, but its fun-in-the-sun vibe might make you want to spend a weekend at the beach,” says Breitling CEO Georges Kern, noting how the highly-coveted original was a nod to the rising popularity of seaside leisure in the 1950s and 1960s. That laid-back vibe is reflected in the sunny dials of today’s Pastel Paradise – enjoying the moment with your hair blowing in the breeze.  

The palette for this seasonal women’s Capsule Collection is summer white, aquamarine, mint green, and iced latte – all with tone-on-tone dials, bezels, and straps. But the real show-stopper is the rainbow tangerine version. With hour markers and hands coated in Super-LumiNova®, it sings in hues of yellow, green, blue, indigo, violet, red, and orange. If you want a custom color combination, you’ll love the quick-exchange system for swapping out the luxe Saffiano calfskin leather straps, which also come in lemon and raspberry sorbet. 

At the heart of each watch beats the COSC-certified Breitling Caliber 10 with a power reserve of about 42 hours. And even if these timepieces seem too elegant for exploring a coral reef, it’s good to know that they’re water resistant up to 100 meters. 

One look at this collection and you might be thinking: “It’s always summer somewhere.” But even the best summers have to end sometime. The Superocean Heritage ’57 Pastel Paradise Capsule Collection will be produced for a limited time during this summer season only. Just something to keep in mind whether you prefer sunrise yoga on the beach or socializing over sundowners.

GET DREST

The colorful Superocean Heritage ’57 Pastel Paradise Capsule Collection is also a perfect fit for a mood board challenge with Breitling’s partner DREST, the world’s first interactive luxury fashion mobile game. This highly immersive game puts players in the role of fashion stylists choosing clothing and accessories from over 200 leading global fashion brands. 

The third Breitling–DREST mood board challenge goes live on Monday, June 28, 2021, 
at 1:00 p.m. GMT, and will run for three days (72 hours). Join the challenge here.  

As with all the other fashion items featured in DREST, there is the option for users to seamlessly shop the Breitling pieces they have played and competed with in the game – creating a fun and interactive modern-day shopping experience.

SonicWall Triples Threat Performance, Dramatically Improves TCO with Trio of New Enterprise Firewalls

SonicWall today announced three new high-performance firewall models for enterprises and large organizations — NSa 4700, NSa 6700 and NSsp 13700 — designed to accelerate network throughput, stop advanced cyberattacks like ransomware, and securely connect millions of users. Featuring some of the highest port densities in their class, the new appliances help enterprises keep pace with the speeds of their growing networks — all while drastically reducing total cost of ownership (TCO).

“The growing volume of ransomware attacks has enterprises and government agencies moving quickly to evaluate their mitigation capabilities and strengthen their security postures,” said SonicWall President and CEO Bill Conner. “The recent string of highly publicized cyberattacks has catapulted security to the top of the priority list. We’re there to help by delivering multiple options to cost-effectively protect even the largest environments. With higher port densities and more capacity, the new offerings dramatically disrupt the traditional cost structure as organizations need fewer appliances to secure the same environment.”

New NSa Firewalls Disrupt Cost Expectations by Tripling Throughput, Expanding Port Densities

The new SonicWall NSa 4700 and NSa 6700 next-generation firewalls deliver 18 and 36 Gbps of firewall throughput — three times the previous comparable SonicWall appliances. Both also support critical TLS 1.3 encryption standards.

The NSa models boast some of the highest port densities in their class; the NSa 6700 even offers both 40G and 25G connectivity, delivering multi-gigabit threat protection for large environments. These higher port densities, coupled with hardware redundancy and high availability, allow distributed enterprises to purchase fewer appliances while supporting more secure connections as their networks grow.

The NSa 4700 and NSa 6700 provide up to 115,000 and 153,000 connections, respectively, per second. They also support up to 2 million or 6 million concurrent DPI connections, and up to 4,000 or 6,000 site-to-site VPN tunnels.


High-Performance NSsp 13700 Firewalls Designed To Protect The Fastest, Most Complex Environments
The new SonicWall NSsp 13700 is an advanced next-generation firewall for high-speed threat protection designed for enterprise-class networks and MSSPs that supports millions of encrypted connections.

The NSsp 13700 next-generation firewall delivers elite speeds for threat prevention throughput (45.5 Gbps), IPS (48 Gbps) and IPsec (29 Gbps), and include scalable hardware architecture with high port density. Like SonicWall’s other new offerings, the NSsp 13700 supports the latest TLS 1.3 encryption standard.

New Capture Labs Portal Delivers Research Tools, Centralized Repository
Information-sharing and collaboration is a critical component of an organization’s defensive posture. SonicWall is consolidating access to threat research and security news through the Capture Labs Portal, a free and centralized repository of research tools available to the public where visitors can track malicious actors and remain up to date with latest zero-day vulnerabilities.

To help expedite remediation, the Capture Labs Portal offers a single repository to look up threat signature, CVE details, IP reputation, and URL reputation, making it effortless to do your threat research from a single interface. SonicWall PSIRT advisories and Capture Labs threat researcher blogs with news regarding the latest vulnerabilities can be easily and quickly found      out to take actions in response to emerging threats, attack vectors or vulnerabilities.

Simplify Secure SD-WAN Deployment, Management with New Orchestration and Monitoring Capabilities
Enterprises, service providers, government agencies and MSSPs can efficiently manage large-scale deployments with SonicWall’s cloud-native Network Security Manager (NSM), which delivers a single, easy-to-use cloud interface for streamlined management, analytics and reporting.

With NSM 2.3, network infrastructure teams can quickly troubleshoot and resolve issues as they monitor secure SD-WAN landscapes in real time. Administrators can monitor the health and performance of complete SD-WAN environments to ensure consistent configurations and drive optimal application performance.

SD-WAN environments are now easily organized using SonicWall’s new and intuitive self-guided workflow as well as the use of Templates that allow the provisioning of thousands of remote firewalls efficiently.

Enterprises also can leverage the NSM wizard-based setup process to ensure proper configuration for site-to-site VPN connectivity, and use the monitoring tools to track the connections and ensure optimum performance.

Optimize Productivity with Enhanced Network Visibility, Monitoring and Reporting
Managing employees’ internet utilization and behavior can be a substantial challenge for organizations. SonicWall has enhanced network visibility and reporting capabilities across security devices, users, VPN connections and more.

SonicWall Analytics 3.1 delivers Productivity Reports to provide insights into employees’ internet utilization and behavior. Generated snapshots and drill-down reports can classify users’ web activities into productivity groups such as productive, unproductive, acceptable, unacceptable or custom-defined groups.

Drill-down capabilities enable analysts to easily and quickly pivot and investigate data points of interest at the user level, and establish evidence-backed, policy-controlled measures for risky users and applications as they unfold in the discovery process.

New VPN Reports allow organizations to summarize what company resources are being accessed inside VPN tunnels, how much bandwidth they are consuming and by whom. Network admins can leverage this information for monitoring business-critical applications, controlling or shaping traffic, and planning for capacity growth.

Zero-Trust Security Offering Expanded to Include More Granular Control

SonicWall also introduced Device Posture Check with SonicWall Cloud Edge Secure Access 1.1, and the addition of new Network Traffic Control that enforces access control to the resources based on user groups, IP addresses, ports and network protocols.

Louis Moinet makes unique timepiece dedicated to UAE space mission

Hope Probe Tourbillon is a new one-of-a-kind creation dedicated to the extraordinary UAE space mission. Based on a technology exclusive to Louis Moinet, this satellite tourbillon timepiece contains an authentic meteorite fragment from the Moon and genuine Martian meteorite dust.

“The UAE mission, dubbed the Hope probe, entered Mars’ orbit following a journey of more than 300 million miles offering an unprecedented  and unique instrumental synergy, by exploring Mars’ different atmospheric layers, revealing new and global perspective of its atmospheric behavior and connections,” said Jean-Marie Schaller, CEO and Creative Director of Les Ateliers Louis Moinet. “The UAE and the world rejoiced with pride and this unique timepiece is our way to honor the Mars mission – a remarkable feat of human ingenuity utilizing science and technology,” he added

The satellite tourbillon beautifully depicts on a blue dial, the map of the Northern hemisphere constellations and is crafted using a special miniature painting with mother-of-pearl technique. The green tourbillon carriage, measuring an exceptional 13.59 mm in diameter, is balanced by means of a Mars planet rotating around it and encrusted with genuine Mars meteorite dust.  A hand-painted depiction of the Hope Probe appears on the black aventurine front plate, inlaid with a genuine lunar meteorite fragment – as too is the black rear plate featuring a hand-painted UAE astronaut. 


The UAE’s Hope Probe is the first Arab space mission. Known as Al-Amal in Arabic, it will orbit the red planet for at least one Martian year (687 days). It is the first probe to provide a complete picture of the Martian atmosphere while evaluating its seasonal and daily changes. The Hope Probe is an important gift dedicated to the people of the UAE on the 50th anniversary of the nation and a source of inspiration for Arab youth. 

Jean-Marie Schaller created Les Ateliers Louis Moinet in St-Blaise (NE) in 2004. The fully independent firm was established to honor the memory of Louis Moinet (1768-1853): master watchmaker, inventor of the chronograph in 1816 (certified by Guinness World Records), and pioneer in the use of very high frequencies (216,000 vibrations per hour). Louis Moinet was a watchmaker, scholar, painter, sculptor, and teacher at the School of Fine Arts – as well as the author of the Traite d’Horlogerie, a watchmaking treatise published in 1848 that remained a definitive work of reference for a century.

Today, Ateliers Louis Moinet is perpetuating this legacy. The firm’s mechanical timepieces are produced as one-of-a-kind models or limited editions only and comprise two categories: “Cosmic Art” and “Mechanical Wonders”. Louis Moinet creations often make use of unusual and rare components, such as extraterrestrial meteorites or prehistorical materials. 

Summer Travel Beauty Must Haves from Himalaya

 It’s finally time for a much deserved vacation! 

Yes, nothing gets better than knowing that we can finally step out and explore new places. But in all the excitement, don’t forget certain essentials that will need your attention on travel. Your regular skin care routine may take a back seat but there are surely basic steps that are easy to follow and will help your skin look fresh and glowing throughout your trip. So don’t forget to pack the below travel beauty must haves from Himalaya to flaunt that instagram worthy complexion. 

Himalaya Neem Face Wash –  The Himalaya Purifying Neem Face Wash cleanses your skin by removing excess oil and impurities without over drying it. Cleanse your face at least twice a day to ensure your skin is free from all dust and grime.

Himalaya Aloe Vera Face and Body Gel –  Travel, especially by air, can drain the skin of its glow making it dull and dehydrated. Himalaya Aloe Face and Body Gel will ensure your skin is adequately moisturised throughout your journey.

Himalaya Sheet Mask – Your skin will require some extra pepping to keep it rejuvenated, after all the sudden change in lifestyle and routine does take a toll on the skin. The Himalaya Facial Sheet Masks, available in 4 variants, will instantly revive your skin giving it a natural glow. 

Himalaya Strawberry Shine Lip Balm – Dry and chapped lips are probably the biggest deal breaker and that is what travelling leaves you with. So, ensure you carry Himalaya’s Strawberry Shine Lip Balm that will keep your lips soft and moisturized giving it a glossy shine at all times. 

Himalaya Facial Wipes – While on the move, it may not always be possible to wash your face therefore  Himalaya Facial wipes handy. It will keep your skin clean, refreshed and relaxed at all times. 

Shop Himalaya’s travel beauty must haves from your nearest supermarket or online on www.himalayawellness.ae

Security Is Key for the Success of 5G

By-Ronen Shpire, Director CSP Solutions Marketing at Fortinet

5G has been a particularly hot topic lately, sparking significant debates and being considered as polarizing to some extent. However, countries all over the world are rolling out their 5G networks, considering this evolution in mobile connectivity as a strong game-changer for end users, the mobility ecosystem, and many industries.  

Two Takeaways that Make 5G Unique 

5G differs from 4G and previous mobile generations in two significant and interdependent aspects. 

First, 5G breaks away from the gradual evolution from one mobile generation to the other by redefining its technology foundations, to support and drive the ongoing digital transformation businesses, consumers, and even whole societies are undertaking. It means that most of the legacy nature of the mobile network, such as the use of specific protocols and interfaces, is replaced by common IT protocols, APIs, and cloud technologies. 

Second, 5G brings customized mobile connectivity and added value services both for industrial organizations and mobile network operators (MNOs). Thanks to 5G capabilities, such as increased bandwidth and low latency, organizations can develop new products, services, and most importantly, best practices, such as significant safety and efficiency in production floors, greater automation in industry 4.0, better proactive maintenance and so much more. This wasn’t possible in the days of wired networks or Wi-Fi networks.

When it comes to MNOs, 5G represents a significant growth opportunity. Traditionally, their revenues were heavily dependent on SIM/package sales, as a basic service for a mobile provider. With the 5G capabilities and ecosystem, MNOs can now better address the business segment and deliver added-value services beyond cellular connectivity to their customers, creating new revenue streams and improving margins.   

5G Impacts on Cybersecurity 

5G “uniqueness” in the mobile generation evolution has had major impacts on many areas, including cybersecurity. With the use of common IT protocols and interfaces in the infrastructure, such as HTTP and API calls, combined with its open and distributed nature, as well as the expanded attack surface, 5G is an attractive target for hackers.

The 5G technology impact on security is multi-faceted. While the use of cloud technologies and architectures throughout the 5G infrastructure (RAN, core, and edge) enables enhanced agility, scalability, efficiency, and customization, securing that environment is also a key element to consider. Security must be integrated into the virtual infrastructure as well as the orchestration layer and embedded into the end-to-end network to ensure both security and business continuity.

Hyperscalability, ultra-low latency, support for machine communications, predictability, agility, and high precision are some of the capabilities that will drive 5G adoption and use cases in vertical industries and for consumers. It is mandatory that the cybersecurity approach and solutions will support, and not hinder, these capabilities. 

Security visibility, automation, threat intelligence, and control are critical to protect the 5G infrastructure and the 5G-enabled use case ecosystem (OT/IIoT/IoT devices, 5G public and private networks, MEC and public cloud environments, applications and APIs).

Cybersecurity: A 5G Enabler for Widespread Adoption 

5G is the most natively secured mobile generation. But the security foundations laid out in the 5G standards can only be a starting point for a security blueprint that secures end-to-end 5G-enabled innovation and use cases. 

In 2020, Fortinet conducted a survey around security in enabling 5G adoption in business verticals, and the results are very clear:

Almost 90% of respondents stated that the MNO’s security capabilities are either critical or very important for success in vertical industry use cases. More than 80% consider native 5G security features as important, but only a baseline for the security needed to serve the 5G market. 

Another interesting data point arising from the survey is that 54% of respondents believe operators should offer a shared responsibility model. However, nearly all those who support this approach believe that a shared responsibility model should be offered as an option alongside the alternative of comprehensive, full-stack, end-to-end security. True to the traditional telco business model, fully 86% of respondents believe operators should offer full-stack security.

In previous mobile generations, security was all about protecting the network itself, creating a walled-garden environment for the core of the network by securing all external exposure points, such as the internet/PDN, roaming, RAN to core access, external partners, etc. This is also valid to 5G, with the appropriate integration and compatibility to 5G technologies and architectures. But the unique nature of 5G and its role and criticality in the business segment means that security’s role is changing and expanding, and should encompass the following main roles: 

  • Protect the 5G mobile infrastructure from attacks to ensure service continuity and availability. This is similar to the traditional security role in previous mobile generations.
  • Protect the larger 5G ecosystem required to deliver 5G-enabled use cases for enterprise verticals to meet security and regulatory requirements. 
  • Enable monetization via a wide range of 5G security services to organizations through managed security services as part of service/use case offerings. 

The Success of 5G

The benefits of 5G far outweigh its potential risks—but only when security is an integrated part of the process and solution. Although 5G has some built-in security, organizations will still need to integrate a larger cybersecurity strategy to confidently move to 5G applications. They need a solution that will provide comprehensive protection at 5G speeds without compromising end-to-end visibility, automation, and enforcement throughout the ecosystem’s attack surface. And to do that most efficiently and securely, the solution must also be part of a coherent, integrated, and self-healing security platform. This will enable organizations all over the world to confidently distribute 5G services from the core of their network out to its furthest reaches, while allowing them to continue developing and deploying critical digital innovation.