Archives

Cyber Security

Unforgettable Speakers – Add the Partner Exchange Keynote Series to Your Agenda Today!

We’re excited to announce the following NEW Business Growth Keynote series at Partner Exchange @ VMworld 2017 US on Sunday, August 27. But first, take a moment to check out this video.

1:30 - 2:30 PM –- Cloud Computing [PAR4418KU]
Featuring Special Guest Speaker:Bernard Golden- a long-time tech innovator and visionary. Wired.com named him one of the ten most influential people in cloud computing, and his blog has been listed in over a dozen &#rsquo;best of&#rdquo; lists. He is the author/co-author of five books, including Amazon Web Services for Dummies, the best selling cloud computing book ever.

2:45 - 3:45 PM — Embracing Digital Transformation [PAR4417KU]
Featuring Special Guest Speaker:Greg Verdino- a highly regarded authority on the digital future who helps leaders build thriving 21st century organizations. He is known for his uncanny ability to forecast trends, spot the difference between fads and the future, and apply his understanding of the rapidly changing global landscape to solve pressing client challenges.

4:00 - 5:00 PM — The Future of Cyber Security [PAR4419KU]
Featuring Special Guest Speaker:Keren Elazari- an internationally recognized researcher, author and speaker on all matters cyber security and hacker culture. Since 2000, Keren has worked with leading security firms, public organizations, Big 4 and Fortune 500 companies.

The post Unforgettable Speakers - Add the Partner Exchange Keynote Series to Your Agenda Today! appeared first on Partner News.

Read more..

Transforming Security: There’s Never Been a Better Time

As the digital economy continues to evolve, IT teams are scrambling to keep up with the changing requirements. From the demand for speed and accuracy to the need for agility and performance, it can be difficult to juggle it all and still maintain robust security.

Some of the top challenges IT is facing as the data center landscape evolves include:

  • The changing nature of applications, infrastructure, and security attacks. Application infrastructure is no longer confined to on-premises data centers but is now highly dynamic, and spread out between public and private multi-cloud environments. That makes security more complex, especially as threats become more sophisticated.
  • Increasingly strict requirements for regulatory compliance. From industry-specific requirements like PCI, FISMA, ECPA, and HIPAA, to differences in regulations from the cloud to on-premises, it&#rsquo;s not easy to get or stay in compliance.
  • The high cost of security breaches. Organisations of all sizes remain vulnerable to persistent, sophisticated threats—and the price of breaches just keeps rising. The annual cost of global cyber espionage is estimated to be around $500 billion.*

To protect applications, data, and users, organisations need to totally transform the way they view and enforce security. Download the new eBook: Transforming Security in the Mobile Cloud Era.

A three-part approach to better security

A security solution that&#rsquo;s built to tackle both current and future challenges can give you the ability to support your business and gain a competitive edge. VMware provides a ubiquitous software layer across application infrastructure and endpoints that is independent of the underlying physical infrastructure or location. This approach can help you:

  • Secure application infrastructure
  • Secure identity and endpoints
  • Streamline compliance

VMware solutions make it possible for your IT team to leverage the power of the cloud, and focus on innovation and strategic initiatives—instead of spending all your time trying to prevent costly attacks or compliance errors.

With more time and improved visibility, you can keep your organisation more secure, and help it succeed in the digital economy.

Learn more about how to achieve better security by downloading the eBook: Transforming Security in the Mobile Cloud Era.

Discover further:

  • Visit our website for more information about transforming security
  • Learn how you can build a secure application infrastructure with Hands-On Labs

You may also like our other blog articles:

  • Why a Modern Data Center is Essential for the Digital Economy
  • Empower the Digital Workspace
  • Network Virtualization For Dummies

*Source: Cost of Data Center Outages, Ponemon Institute, January 2016

Read more..

Mitigating WannaCry with VMware NSX

The ongoing WannaCry ransomware attack targeting the Microsoft Windows operating system has infected hundreds of thousands of computers across the world - an attack on an unprecedented scale.

Ángel Villar Garea, a systems engineer at VMware discusses and demonstrates how VMware NSX can help protect infrastructures against WannaCry and similar attacks.

Want to learn more about how VMware NSX can defend against the latest cyber security threats? Click here to download your free copy of &#rsquo;Network Virtualization for Dummies&#rdquo;.

 

Read more..

Raus aus der Rolle des Opfers! Die eigene Sicherheit gestalten, aber wie?

Beitrag von Thomas Wirtz, Pre-sales Director Germany

Nahezu tagtäglich erreichen uns Nachrichten über Cyber Attacken auf Unternehmen, Behörden oder Social Media Profile bekannter Personen und mobile Geräte. Alles, das in irgendeiner Weise mit dem Internet verbunden ist, ist heutzutage ein potentielles Ziel für einen Hackerangriff. Und so stellen wir uns indirekt darauf ein, das nächste mögliche Opfer zu sein. Diese allgemeine und besorgniserregende Stimmung spiegelt sich auch in Unternehmen wieder: Rund 60% der CIOs sehen den Kampf gegen Cyber-Kriminalität bereits als verloren an. So das erschreckende Ergebnis einer Studie von Vanson Bourne in Zusammenarbeit mit Bromium.

Man ist sich dieser Gefahr bewusst, trifft meist auch zahlreiche Vorsichtsmaßnahmen und dennoch würde es keinen überraschen, das Ziel von Cyberkriminalität zu werden. Das Sinnbild von Unternehmern, die eine notdürftige Schutzmauer aufbauen und jederzeit mit einem niederschlagenden Angriff rechnen, ist leider viel zu aktuell! Ich bin der Meinung: Schluss damit und Zeit den Spieß umzudrehen! Zeit, den Hackern nicht nur einen Schritt voraus zu sein, sondern unangreifbar zu werden. Doch welche Maßnahmen müssen dafür ergriffen werden? Das verrate ich Ihnen:

IT-Security on top

Mit der fortschreitenden Digitalisierung sammeln Unternehmen viele sensible Daten. Daten, die nicht nur große Möglichkeiten bringen, sondern auch Gefahren anlocken. Es sollte daher Top-Priorität eines jeden Unternehmens sein, diese Daten zu schützen, denn es ist nicht nur ihre wichtigste Ressource, sondern auch ihr meist gefährdetes Gut. Und so sollte Cyber Security keine alleinige Sorge und Aufgabe der IT-Abteilung sein, sondern vielmehr bei den CEO&#rsquo;s ganz oben auf der Agenda stehen! Mit dieser Einsicht ist der erste von weiteren wichtigen Schritten für die Sicherheit Ihres Unternehmens bereits getan.

Budget festlegen: Was ist Ihnen die Sicherheit Ihrer Unternehmensdaten wert?

Die Erkenntnis, dass nicht nur die IT-Abteilung der Hauptverantwortliche der IT-Security ist, bringt auch eine weitere Einsicht mit sich: IT-Security ist kein Part des IT-Budgets, sondern zählt zum Transformations- & Innovationsbudget, welches wiederum auf der Agenda des Managements steht. Das bedeutet ganz einfach eins: IT-Sicherheitsmaßnahmen müssen nicht (!) ausschließlich aus dem IT-Budget bezahlt werden, sondern erfahren Unterstützung aus anderen Budget-Töpfen.

Cyber Security für Ihren Wettbewerbsvorteil nutzen

Eine sichere IT-Infrastruktur schützt nicht nur die sensiblen Informationen eines Unternehmens, vielmehr ist sie ein Aushängeschild. Unternehmen, die bereits ein Hackerangriff erfahren haben, hatten folglich mit schweren Einnahmebußen zu kämpfen. Eine vorhandene Sicherheitsinfrastruktur ist daher auch die beste Grundlage für eine gute Unternehmensposition, steigert so Ihren Wettbewerbsvorteil und kurbelt das Unternehmenswachstum an.

Neue Wege einschlagen

Zahlen zeigen, dass die Skepsis gegenüber Cloud-Lösungen nach wie vor immens hoch ist. Zu Unrecht: Denn Daten, die in der eigenen IT-Infrastruktur gespeichert sind, hindern ein Unternehmen nicht nur im flexiblen und agilen Handeln, sondern sind zudem auch wesentlich gefährdeter. Das glauben Sie nicht? Anbieter von Cloud Lösungen haben nicht nur von vornherein erkannt, dass Security DAS Aushängeschild ihres Angebotes ist, sondern haben zudem die besten Security Manager im Team – einen besseren und sicheren Ort für Ihre Daten gibt es wohl kaum.

Ich bin mir sicher, dass es auch Ihr Ziel ist, das Unternehmenswachstum voranzutreiben. Eine vorhandene IT-Security hängt ungefragt mit diesem Wachstum zusammen. Anstatt weiterhin auf der Zielscheibe von Hackern zu sein und nach und nach aufkommende Sicherheitslücken zu stopfen, sollten Sie Maßnahmen ergreifen, die die Cyber Security in den Mittelpunkt Ihrer Unternehmensstrategie setzt. Denn eins ist sicher: Die fortschreitende Digitalisierung von Unternehmen setzt eine bombensichere Sicherheitsinfrastruktur voraus!

Mehr zum Thema IT-Security gibt es auch regelmäßig auf meinem Twitter Kanal. Folgen Sie mir und auch unserem VMware DACH Kanal.

Read more..

Is it time for a new approach to security? 5 things to come in 2017 that says the answer is yes

The third and final installment in our 2017 Predictions blog series continues to tackle the cybersecurity issues facing the modern enterprise. As businesses accelerate along their digital transformation journey, new approaches to cybersecurity will become essential. Tom Corn, Senior VP of Security Products at VMware, outlines five key predictions for 2017 that will change the way enterprises look at and implement cybersecurity in the coming year.

More so than ever before, security is top of mind for organizations. In 2016 we witnessed multiple large-scale cyberattacks across industries, to the point that it seemed like rarely a day went by when the news wasn&#rsquo;t plastered with revelations of a massive data breach or some other online threat. As data center infrastructure increasingly moves to the cloud, new approaches to security are needed.

Let&#rsquo;s take a step back to reflect on where we&#rsquo;ve been – and where we&#rsquo;re going – in terms of security.

Below I&#rsquo;ve outlined five things we should expect to see this year:

1. Application is king

Security teams have traditionally concerned themselves with protecting data center infrastructure, and they&#rsquo;ve worked most closely with infrastructure teams to deploy, align, and manage security controls. That approach needs to change in the hybrid cloud era. Ultimately, the applications and data are what we are trying to protect. In 2017, we expect the application will become the new unit of focus for security teams, who will align themselves more closely with application teams to deploy their controls. Containers and DevOps will further fuel this model.

These new approaches to application development will result in application teams being more declarative of the components that make up their applications, which will aid security teams in aligning their controls around applications and data. We&#rsquo;ve already begun to see evidence of this trend with the growing popularity of network micro-segmentation, a process by which a critical application or compliance scope is compartmentalized in a segment and endpoint and network controls are aligned to that boundary. We predict that adoption of this and other application-centric security ideas will only accelerate in the coming year.

2. Using the cloud to secure, versus securing the cloud

To date, the security discussion around the cloud – both public and private – has centered around how to secure it. And while concerns and challenges remain, in 2017 we believe security teams will increasingly look to the cloud to capitalize on security approaches that have not been possible in the world of traditional data centers. As part of that movement, we will see a growing number of technologies and techniques to leverage the cloud to secure applications and data – including controls and policies that follow the workload, the use of dynamics to limit persistence, automation of security incident response, micro-segmentation, greater visibility and control, and so on. As the cloud shifts away from its &#rsquo;just trust us&#rdquo; roots toward more customer visibility, more inter-customer isolation and 3rd party attestation (less faith based trust), the cloud will become more secure and digestible for broader ranges of applications and services.

3. Simplicity and automation become the new dimension of innovation in security

Security has become astronomically complex, and the limiting factor for most security organizations is the lack of qualified human capital available to run it. Both the scarcity of talent and the difficulty of funding additional headcount (which is often even more challenging than funding capital expenditures) have hampered organizations&#rsquo; ability to adopt powerful new security technologies. We see a tipping point ahead. The talent shortage will drive a new wave of security technologies designed to both simplify and automate the process of securing critical infrastructure and applications, both on-premises and in the cloud. Already there are a host of companies working toward automating incident response. The desperate need to stay ahead of an ever-worsening threat landscape will continue to spur innovation in other areas along this same dimension – including threat detection and predictive analytics – where elbow-grease alone can no longer do the job.

4. More sophisticated attacks from less sophisticated attackers

Just as defending data is becoming an increasingly complex job, so too are the attacks themselves. Increasingly sophisticated attack techniques deployed by nation-states and organized crime require very specialized skill sets. But the trend towards automation we mentioned earlier is a double-edged sword. The weaponization of cyberspace has driven a wave of new, more automated tools for creating and managing sophisticated attacks. Prominent examples of these kinds of attack / malware tools including Zeus (for building Trojans) and BlackPoS (which was used to attack point-of-sale terminals in several prominent retail breaches). The rise of this kind of advanced yet easy-to-use malware means we will begin to see significant attacks from a much broader range of attackers. We already see an expansion of the advanced attacker population and motivation to include things like political activism/dissent. The trends we mentioned earlier will certainly help mitigate these new threats in the long run, but things will get worse before they get better.

5. Mobile security and identity controls collide

So far, mobile security and identity and access management (IAM) have largely remained two separate markets – but we see them on a collision course. Mobile devices are already a critical component of the knowledge worker&#rsquo;s toolkit. They are being used as communication devices, data storehouses and application portals, and increasingly they are being used as a credential and authentication mechanism. As a result of this move to mobile, identity is rapidly moving to a risk-based behavioral model, where the IAM solution factors in the risk of the endpoint device, the criticality of the application and data being accessed and the level of confidence that the user really is who they say they are. The motivation for “risk-based” controls has been that authentication and isolation have not been enough to support trustworthy identity. Evidence of behavioral consistency helps address the risk that authenticated, isolated and trusted services have been taken over by exploiting imperfections in their implementation or infrastructure. We&#rsquo;ve already begun to see some unified security solutions that blend these two components, and we expect this trend to accelerate in the coming year.

Missed our other predictions for 2017? Discover the changes our experts anticipate for hyperconverged infrastructure and cloud-native applications next year – and don&#rsquo;t forget to follow @VMware_UK to stay up to date with the latest news, announcements and industry insights.

Read more..

2016: Year In Review

2016 has been a busy and exciting year for us, with lots going on. We&#rsquo;ve gathered together some of our highlights – take a look and let us know your best bits of the year.

Bridging the #SecurityDisconnect

We carried out a research piece to explore the disconnect between IT decision makers and the wider business community. As part of this, we held a live CrowdChat, bringing together top influencers and VMware experts to discuss hot topics surrounding this issue. Take a look at our Storify post to read through the highlights. For more on how you can rethink your cyber security disconnect, why not also check out our Top 10 Takeaways report.

Supporting our partner community

In early 2016, we crowned ON2IT as our NSX partner of the year in EMEA as part of our Partner Innovation Awards programme. We&#rsquo;ve also been talking to our partner community throughout the year to learn more about the challenges facing them and their customers – see the blog series here.

Be_Tomorrow at VMworld 2016

From Pat&#rsquo;s big announcements - Cross-Cloud Architecture, Cloud Foundation and VMware Cloud on Amazon Web Services - to a deep dive into how VMware is helping deliver mobility and digital transformation, you can catch up on all the VMworld action on our blog.

Cross-cloud campaign kick-off

We recently announced the results from our latest cross-cloud research, which explores the decentralisation of IT. Take a look at the infographic we&#rsquo;ve developed which covers highlights from the research, looking at the extent to which IT has opened up across businesses, as well as the impact this is having on innovation.

Robot Wars returned to our screens

This year, VMware sponsored robot #Storm2 made an exciting come back for a brand new BBC series. Over on the blog, we explored the innovative approach to the robot&#rsquo;s build – including a greater focus on drivability and weaponry.

Make sure you are following @VMwareUK over on Twitter, and keep an eye on our blog for all the news and announcements in 2017!

Read more..


Fatal error: Allowed memory size of 67108864 bytes exhausted (tried to allocate 1161775 bytes) in /home/content/36/8658336/html/goquecom/wp-content/themes/WPGoqueV52/library/sidebars.php on line 119