Category Archives: Industry News

More and More Workloads Are Moving to the Cloud From Now to 2018

hybrid cloudMost companies hesitate to transfer their workloads between services and information in the cloud, so far although there have been many doubts about privacy and security.

According to the latest 451 Research report, based on interviews with over 1,200 IT professionals in different parts of the world, the level of enterprise workloads is in fact set to rise from 41% today to 60% in mid-2018.

The report also highlighted that 38% of the companies involved have a policy of type cloud-first; this means that the priorities of where to place all of their assets are just the cloud. Among other, acquisitions, mergers, updates, divestitures, new hardware and software are pushing more and more companies towards cloud adoption.

The cloud is suitable for any workload in all situations. Naturally, it facilitates and improves things. And if it is true that there is an inevitable transaction to be made in the transition from traditional infrastructure to a cloud, it is also true that more often than not it is a traumatic transaction. That’s why more and more companies will perform this migration to the cloud, whether on-premise, managed by a service provider or in a data center.

Part of the reason behind this growth of cloud adoption is that executives are going beyond the initial concerns about security and privacy. With more and more experience gained in this field, even the doubters against the cloud are overcoming initial fears and gaining more and more confidence in the cloud.

If it is quite simple to move the new cloud services, applications, and data, transfer existing services and information is another matter. The report noted that it takes time to change the way you do things, abandon a practice that already exists, and arrive at a new working structure. Also because, when things work, there is little incentive to change, even with the promise of a secure improvement after this change.

Finally, according to 451 Research, the strongest growth of the cloud will occur especially in critical enterprise categories, such as data analytics, and business applications.

MadeIT hybrid and private cloud is built in a way that meets your company’s specific needs and is comprised of security, bandwidth, storage, and power. We engineer all of these together into a custom solution that fits your exact requirements.

MadeIT cloud architecture helps the client build a solid, redundant and robust solution by either using the client’s suggested engineering or by working together with the team to develop a customized solution to suit their needs.

MadeIT public cloud offers the benefit of operating in a virtual environment with limitless scalability. If your server outgrows its capabilities, the team can add memory, processing power, and storage almost instantly. MadeIT cloud is fast, accessible, and reliable. We provide 24/7 support using live chat, telephone, and ticketing systems.

The Switch to the Hybrid Cloud is Progressing Globally

hybrid cloudAccording to a study by Cicero Group and Veritas Technologies, the private cloud, and public cloud alliance continues to grow in business.

Three-quarters of companies worldwide continue their adoption of hybrid cloud, by definition involving the private cloud and public cloud. This is the salient point of a recent study sponsored by Cicero Group Technologies and Veritas.

The results show the importance of a sophisticated corporate strategy for information management and security. For the study, Veritas and Cicero Group interviewed more than 1,800 worldwide IT executives with more than 500 employees and managed by at least 75 terabytes of data.

This study was especially noted the pace of switches to different kinds of cloud and motivations. This flip-flop now applies to all types of data, including critical data, which implies to adopt a real strategy and real security.

Nearly 38% of the volume of data is currently housed in a private cloud (+7% in one year) against 28% in a public cloud (+ 18%). In Japan and Brazil, it is 50% of the volume that is currently in the public cloud. 74% of companies use multiple cloud providers, and 23% use at least four suppliers. It increases the pressure on IT departments to secure the data on all of these environments.

In the breakdown by sectors, the manufacturing industry is in the first place. The manufacturing industry takes 30 percent of their workloads in the public cloud. Second place goes to telecommunications companies with 24 percent, followed by health care and finance, each with 23 percent. The public sector constitutes 16 percent cloud adoption.

More than a third of respondents cite cost as the main argument for the public cloud use. However, security remains the main obstacle. Half of respondents named security and backup architectures as the main reason to avoid the public cloud. Nearly 41 percent expect an improvement by introducing a hybrid cloud – which is internationally the highest percentage.

Security is also the most important factor for the satisfaction of enterprises with public cloud offerings. Providers of public cloud solutions should communicate their benefits in terms of safety.

A significant number of respondents indicated that they would always run certain workloads within the enterprise and do not move to the cloud. 28 percent cited in this context named backup and recovery, 27 percent disaster recovery and 26 percent archiving or data warehousing.

About 81 percent of companies not using cloud in the implementation and ongoing support to the services of service providers. The heterogeneous and complex composition of cloud solutions is therefore likely to remain a challenge for IT departments.

Companies are increasingly using heterogeneous solutions. From the perspective of information management, this can increase the complexity. Organizations must be more vigilant than ever to see blind spots of IT and potential safety issues. Only way they can avoid unplanned downtime or even an information crisis.

The study recommends several steps – the organizations should help to remain agile to minimize the risks inherent in the implementation of hybrid cloud environments. IT professionals should focus more on information management rather than on infrastructure.

Cisco Cybersecurity Report- The Present and the Future of Security

midyear-security-report-2016-486x274The recent study Cisco 2016 Midyear Cybersecurity Report indicates that organizations are not prepared for the arrival of more sophisticated ransomware strains. Weak infrastructure, inadequate care of the network and slow detection times are giving cyber criminals plenty of time and plenty of room to operate.

According to the results of the report the fight to limit the working area of hackers is the biggest challenge for companies, as well as a threat to digital transformation. The study results also point out that opponents are directing their attention towards server-side attacks, continuing to evolve methods of attack and increasing the use of encryption to mask their activities.

In the first half of 2016, ransomware has become the most lucrative malware ever. According to Cisco, this trend will continue with the arrival of even more destructive strains that can spread on their own and to hold entire networks and companies hostage.

New strains modular ransomware will be able to change their diffusion tactics quickly to maximize efficiency. For example, future attacks and ransomware will evade detection, managing to limit the CPU utilization and to refrain from command and control actions.

Visibility across networks and endpoints remains a primary challenge. On average, organizations employing up to 200 days to identify new threats. The average time to Cisco for detection (TTD: time to detection) exceeds the industry standard, with a new minimum of time about 13 hours to detect previously unknown impairments relatively to the six months ended in April 2016. This result lowers the average level recorded in the period ending in October 2015 amounted to 17.5 hours.

Although organizations in critical areas such as health have marked a small improvement concerning attacks in recent months, the results of the report indicate that all vertical sectors and all regions of the world can be targeted. In the first half of 2016, it was recorded an increase in direct attacks on society, companies, non-profit organizations, non-governmental organizations (NGOs) and businesses operating in the field of electronics.

In the face of sophisticated attacks, aging infrastructure and limited resources, security managers are struggling to keep up with their opponents. The data suggest that security managers have trouble taking proper care of the network, starting from patch application to the most critical technologies for the business.

Cisco has found that much of the infrastructure under consideration is not supported or work with known vulnerabilities. Specifically, the researchers looked at 103,121 Cisco Internet-connected devices and found that on average on each device are running 28 known vulnerabilities, and known vulnerabilities were present on average for about 5 years, including more than 9% of vulnerabilities are known for over a decade.

Browser updates are the least heavy for endpoints, while enterprise applications and server infrastructures are more difficult to upgrade because they can cause business continuity problems. In essence, most application is critical to your business and less likely to be updated, creating gaps and opportunities to be attacked.

In the end, Cisco report suggests some simple steps to protect corporate environments.

  • Improve the cleanliness of the network by distributing timely patches and updates and implementing perimeter defenses, including solutions for the protection of email and web security, firewall, and next-generation IPS.
  • Measure the detection time, get a time threat detection as fast as possible and immediately take countermeasures to limit the damage. Establish security policies that also include metrics at the time of detection and threat mitigation.
  • Protect users wherever they are and wherever they are working, not to restrict the protection to systems and devices used when you are connected to the corporate network.
  • Back up your critical data and systematically test their effectiveness also making sure that the back-ups are not at risk of being compromised.

Gartner: 5 Keys Areas of Security Problem in 2016

gartnerThe IT security professionals should better address the known risks, monitor the value of computer IT devices in the shade and solve the inherent weaknesses introduced by the Internet of things, according to Gartner.

The consulting firm has reviewed the five key areas of security problem facing businesses this year, and issues forecasts and recommendations on how to protect networks and data threats that are likely to arise for each.

The areas are threats and vulnerability management, data security and applications, mobile security and network identity and access management, and security of the Internet of Things (IoT). Gartner’s findings were announced at its recent Summit Security and Risk Management by analyst Earl Perkins.

A key recommendation is that companies should be aware that the delay of the security measures to avoid business interruption, can be a bad measure. Gartner recommends that security professionals should make decisions on the protection of networks and based on the series of risks posed known deficiencies of the company and its objectives resources. Instead of thinking about its purely protective role, they should see it as a facilitator of the favorable results of the company.

Here are the predictions and recommendations:

The management of threats and vulnerabilities

Prediction: By 2020, 99% of exploited vulnerabilities continue to be known by security professionals and IT for at least one year.

With attackers in search of vulnerabilities in applications and exploitable configurations, it is important that companies prevent vulnerabilities in a timely fashion. If they do not, they may lose money through damage to systems and data theft.

Prediction: In 2020, one-third of attacks experienced by companies will be successful in their IT resources in the shade.

One area of growing concern is the introduction of new technologies by business units, without control by the security team. The fact that avoid the review, and that many of these technologies are new and still contain vulnerabilities, making them susceptible to attacks.

Data security and applications

Prediction: In 2018, the need to prevent data breaches from public clouds will boost 20% of organizations to develop government data security programs.

The government data security will be promoted by insurance companies that will set the cybernetic premiums based on whether companies have these programs in place.

Prediction: In 2020, 40% of companies dedicated to DevOps ensure applications developed by adopting self-diagnostic application security and self-protection technologies.

The mature technology called self-protection application at runtime would be a solution as a way of avoiding vulnerabilities in applications that might result from problems overlooked because of the rapid pace of DevOps teamwork. Self-protection application does its job quickly and accurately in order to provide protection against vulnerabilities that could be exploited.

Mobile and network security

Prediction: In 2020, 80% of the new jobs for security officers access to the cloud (CASB) will be packaged with secure web gateway link (SWG), network firewall, and web application firewall platform (WAF).

Traditional providers network security products such as firewalls, SWGs and WAFs want to be in the protection of SaaS applications, which is carried out efficiently through CASBs. Companies should assess whether the CASB services are guaranteed by their plans for the deployment of applications, and should consider offers from their current providers of these traditional technologies.

Identity and access management

Prediction: In 2019, 40% of identity as service implementations will replace implementations of AMI in facilities.

This increase in the use of IDaaS be derived in part because of the difficulty and cost of operation of the IAM infrastructure facilities, and the increasing use of other offers of something-as-service will make the decision more comfortable. The continued introduction of more and more mobile Web applications will create a natural opportunity to transition from IAM in the premises of the company IDaaS.

Prediction: In 2019, the use of passwords and sample use cases medium risk will be reduced by 55% due to the introduction of recognition technologies.

With the cost and accuracy of biometric data, they will become a good option for authentication continuously. In combination with the analysis of use and behavior of the entity, this technology can make a difference when cases requiring an average level of confidence applies.

Security for the Internet of Things (IoT)

Prediction: By 2018, more than 50% of manufacturers of IoT devices will not be able to cope with the threats of methods of weak authentication.

The IoT devices are still being manufactured without taking much consideration of security; however, some are on networks so that, if exploited, could expose them to a data damage in case of default. Companies need a framework to determine the risks posed by each type of IoT devices and adequate controls to deal with them.

Prediction: In 2020, more than 25% of the identified business attacks involve the IoT, although, in reality, it is liable for 10% of the budgets of IT security.

As security professionals will not be able to determine the importance of IoT devices for the organization, the business unit that uses them must decide what risk they represent. Security professionals must reserve 5% and 10% of security spending for surveillance and protection of these devices.

Go Back