Cloud Visibility Is a Top Priority That Companies Can’t Quite Achieve

SDNCentr | March 26, 2019

Cloud Visibility Is a Top Priority That Companies Can’t Quite Achieve
As more enterprises move their workloads to the cloud, gaining visibility into both application and data traffic is becoming a top priority, but enterprises can’t meet this priority. This is according to new research from Ixia, a monitoring company under Keysight Business, and Dimensional Research, which found that eight out of 10 companies increased their cloud workloads in 2018, but only 20 percent of respondents felt their company was able to “accurately” monitor these environments. Of this perplexing paradox, Scott Register, VP of product management for cloud and security at Ixia, said “We live in a world where cloud is the new normal, but we’re still learning what the new normal means when it comes to visibility, security monitoring, and application performance monitoring.” Dimensional Research conducted a survey, sponsored by Ixia, of 338 IT professionals from organizations ranging in both size and industry. Forty-one percent of those surveyed were from large organizations, 45 percent from mid-size companies, and 14 percent from small companies.

Spotlight

When it comes to the number of data breaches and how much they cost, the trend is only going one way in 2015: and that’s up. We can be pretty certain that 2014 was a record year for high-profile breaches and that 2015 will beat it, especially with the EU General Data Regulation on the horizon. Download this whitepaper for preparation on what lies ahead in data breaches.

Related News

DATA SECURITY

Owl Cyber Defense improves advanced network security capabilities with Trident Assured Collaboration Systems Acquisition

prnewswire | January 05, 2021

Owl Cyber Defense Solutions, LLC ("Owl"), a worldwide market pioneer in online protection arrangements and administrations for safeguarding network limits and empowering secure information sharing across areas, reported today the obtaining of the Trident Assured Collaboration Systems ("ACS") product offering. ACS has the solitary U.S. government-affirmed Voice over IP ("VoIP") and Video Teleconference ("VTC") Cross Domain Solution ("CDS") just as the business' most exceptional Full Motion Video ("FMV") sifting ability – usefulness basic to CDS activities in a time of robots and cameras. The obtaining gives Owl a more extensive scope of guaranteed network border guard arrangements than any rival on the lookout. Owl, upheld by private speculation firm DC Capital Partners, has been a main supplier of CDS to the U.S. Branch of Defense ("DoD") and Intelligence Community for over 20 years. Owl is likewise the worldwide pioneer in network safety assurance for basic framework, offering the solitary U.S. government tried and certify CDS accessible for organization inside and outside the U.S to both government and business customers. Owl's Cross Domain Solutions offer the most elevated level of organization edge security, far surpassing the capacities of firewalls and other ordinary organization protections. Owl's items are the decision for ensuring the country's most delicate organizations and frameworks against assault. Ongoing episodes have exhibited the failure of inheritance firewalls to forestall cyberattacks against basic business and working frameworks and cloud-based applications. The blend of Owl and ACS's innovation offers a full continuum of CDS items that give equipment upheld space partition and layers of information separating confirmation instead of a solitary organization line checkpoint with insignificant substance sifting. Arrangements like firewalls that worked 25 years back as an organization insurance approach are not, at this point compelling against country state quality assaults. As country state assaults increment, the methodologies utilized by state entertainers start to saturate the criminal side of cyberattacks. Powerful network safety presently requires a coordinated, multi-layered framework with information diode equipment parts in gatekeepers which perform escalated information assessment and confirmation. The up and coming age of insurance, coming out now and based on a mix of Owl and ACS innovation, installs CDS usefulness in incredibly low-inactivity, unmodifiable equipment. Thomas J. Campbell, Chairman of Owl and Founder and Managing Partner of DC Capital, said, "This is another step in executing our strategic vision. The acquisition of ACS not only places Owl ahead of other Cross Domain Solution providers, but it also plays a pivotal role in our larger strategy to offer true cybersecurity protection. The future requires solutions that are cost effective and easy to implement, use, and maintain." "The explosion of the Internet of Things ("IoT") demands cyber-secure devices, from those that control our critical infrastructure, to our homes and cars," said Campbell. "The technology Owl pioneered 20 years ago is now available in form factors small enough to be embedded inside devices. Owl has always been an early mover, the first to develop hardware-enforced network protection and now the first to offer a hardware-enforced CDS that can be embedded." "Owl has been rapidly moving towards this number one position for the last couple of years," commented Robert Stalick, President and CEO of Owl. "With the addition of ACS, the last piece has fallen into place. Owl is now the clear leader in accredited Cross Domain Solution offerings, with the widest range of capabilities and products – solving problems from tactical to enterprise in data, voice, and video; for government, critical infrastructure and commercial enterprises." Jerry B. Chernock, Partner at DC Capital, added, "Clearly we need to address the deficiency of firewalls. There is a motivation behind why our customers demand Cross Domain Solutions and not exclusively on firewalls. Late assaults, including a security break at an unmistakable U.S. based network protection firm and a few U.S. Government organizations, have accentuated the requirement for knowledge, military, basic framework and corporate customers to rapidly develop how they secure their organizations." "The sophistication of these technologies cannot be overstated," said Ken Walker, Chief Technology Officer at Owl. "The U.S. Government continues to set the standards for the most rigorous operational requirements and testing regimes globally, setting expectations that very few companies can meet. Owl is one of a handful of elite companies that satisfies the government-established 'Raise the Bar' requirements." About Owl Cyber Defense Solutions Owl has been serving the cybersecurity needs of the U.S. government since inception – providing hardware-enforced cybersecurity controls, industry leading expertise in operating system hardening, extensive device and network-based assessment services and thought-leadership in filtering/data processing disciplines. Owl Cross Domain Solutions are operating broadly in missions across both the DoD and the U.S. intelligence agencies. Globally Owl is the leader in perimeter protection for nuclear power plants, oil and gas operations, renewables and power generation and transmission, with aggressive growth occurring in the data center and cloud provider sectors. Owl continues to innovate and is bringing to market the world's first embeddable cybersecurity to serve the Internet of Things ("IoT").

Read More

DATA SECURITY

Radiflow's New Version of CIARA - OT Risk Platform Transforms Industrial Cybersecurity

Radiflow | May 31, 2021

Radiflow has received extensive industry appreciation for its one-of-a-kind, fully IEC62443-compliant Cyber Industrial Automated Risk Analysis Platform (CIARA), enabling CISOs to optimize their cybersecurity expenditure non-intrusively simulating breach attempts in industrial automation networks and prioritizing the most effective mitigation measures. In accordance with Radiflow's ongoing mission of "Taking the guesswork out of OT cybersecurity," the latest edition of CIARA allows users to further customize their cybersecurity optimization with additional operational and budgetary criteria. Ilan Barda, CEO of Radiflow, announced the new features: "CIARA was warmly received in the market as the first-of-its-kind OT BAS solution (breach attack simulation). Since its release, we have seen an increase in demand for risk prioritization in the dynamic OT/ICS threat landscape. Our new edition responds to the critical need for data-driven decision-making. We are delighted to assist CISOs in developing the best budget-driven mitigation strategy." Users of the updated version of CIARA can now: Customize their OT-security optimization: Users can now choose from a wide range of factors to find a balance between security, compliance, and budget. CIARA prioritizes security requirements for mitigation measures (SRs) that match the chosen criterion to maximize their cybersecurity ROI. Among the current optimization criteria are: • Zone impact: What is the financial impact of a disruption in that zone? • Which zone has the lowest tolerated risk (as specified by the user)? • Which zones have the highest disparity between real security measures and those prescribed by the IEC62443 standard? New supply chain threats are included in attack simulations: Supply chain attacks, such as the SolarWinds breach, take advantage of vendor networks' vulnerabilities. In addition to the fundamental requirement control groups in IEC62443, CIARA users can now add a security control group for Supply Chain attacks (NIST 800-161) to CIARA's breach simulations, including such attack strategies prioritize the effectiveness of relevant mitigation measures. Budget and Plan : CIARA's new OT security project planner generates a complete quarterly mitigation plan based on the user's optimization preferences, balancing the estimated cost of mitigation controls against the quarterly budget constraints. About Radiflow These new features enhance Radiflow's objective to eliminate the guesswork from OT security. Radiflow is committed to assisting CISOs in prioritizing their activities by providing industrial threat detection and risk management solutions.

Read More

DATA SECURITY

NETSCOUT Omnis Cyber Intelligence Integrates with AWS Security Hub

NETSCOUT | November 11, 2021

NETSCOUT SYSTEMS, INC. a leading provider of cybersecurity, service assurance, and business analytics solutions, today announced that Amazon Web Services, Inc. (AWS) customers will now have added visibility and security when migrating workloads to AWS using NETSCOUT's Omnis® Cyber Intelligence (OCI) integration with AWS Security Hub. NETSCOUT OCI is the industry's fastest and most scalable network security software solution, built on the foundation of the industry's most prominent network monitoring and packet recording and analysis technology. It uniquely detects and investigates suspicious activities in real-time and retrospectively, identifies threats early in the attack life cycle to prevent infections from spreading, stops future attacks, and identifies compromised assets. As a cloud security posture management service, AWS Security Hub performs automated, continuous security best practice checks against AWS resources, aggregates alerts, and enables automated remediation. The integration between NETSCOUT OCI and AWS Security Hub enhances the corporate security posture by extending the breadth and depth of cyberthreat visibility and intelligence. The integration is seamless since NETSCOUT OCI automatically formats violations in the Amazon Security Findings Format (ASFF) with built-in intelligence to suppress duplicate alerts and group them as needed. NETSCOUT OCI, through its integration with AWS Security Hub, helps detect, investigate, and respond to potentially malicious activity exposing risks that exist in hybrid cloud interdependencies. "As organizations migrate workloads to the cloud, their infrastructure becomes increasingly complex, making end-through-end visibility a necessity to uncover increased attack surfaces and combat threat exposure,As an AWS Validated Technology and Public Sector Partner with Network and Migration competencies, we've been in lock-step development with AWS. We're excited that customers can realize the benefits of NETSCOUT OCI, which is now fully integrated onto AWS Security Hub." Russ Currie, vice president, enterprise strategy, NETSCOUT About NETSCOUT NETSCOUT SYSTEMS, INC. helps assure digital business services against security, availability, and performance disruptions. Our market and technology leadership stems from combining our patented smart data technology with smart analytics. We provide real-time, pervasive visibility and insights customers need to accelerate and secure their digital transformation. Omnis Cyber Intelligence delivers the fastest and most scalable network security solution available on the market. NETSCOUT nGenius service assurance solutions provide real-time, contextual analysis of service, network, and application performance. And Arbor® Smart DDoS Protection by NETSCOUT products help protect against attacks that threaten availability and advanced threats that infiltrate networks to steal critical business assets. To learn more about improving service, network, and application performance in physical or virtual data centers or in the cloud, and how NETSCOUT's security and performance solutions can help you move forward with confidence.

Read More

Spotlight

When it comes to the number of data breaches and how much they cost, the trend is only going one way in 2015: and that’s up. We can be pretty certain that 2014 was a record year for high-profile breaches and that 2015 will beat it, especially with the EU General Data Regulation on the horizon. Download this whitepaper for preparation on what lies ahead in data breaches.