Actifio Strengthens Its Data-as-a-Service Vision with App-Centric Approach in the Multi-Cloud and DevOps Era
Actifio’s 2018 customer and partner conference was named “Data-Driven.” The name will remain for our 2019 conference (Boston in June) because we know that every enterprise in or moving to multi-cloud strategies starts with data challenges. How to manage it. How to migrate it. How to move it among cloud providers. How to accelerate analytics and assure protection. We have seen it in every customer engagement. Attendees at the conference confirmed it. Effective data management strategies are essential to extracting data value, and Actifio has become a vital component of that strategy for many major enterprises.
Maximize Performance and Scalability, Eliminate Downtime and Data Loss
Modern Network Video Recorders (NVRs) are based on Direct Attached Storage (DAS) technology, and were designed to mimic obsolete analog VCRs and DVRs. But most IT organizations have evolved to virtualized servers and shared storage infrastructure (SAN), and stopped using DAS decades ago due to its highly inefficient operation and critical susceptibility to downtime and data loss. Many security implementations, however, have continued to rely on aging and inadequate DAS architecture for increasingly sophisticated video surveillance systems. Pivot3 Hyperconverged Infrastructure (HCI) brings the best of both worlds, merging the resiliency and efficiency of SAN with the simplicity of DAS, and optimizing performance for challenging workloads like video surveillance.
As IT and operational technology networks converge, organizations are exposing their traditionally isolated OT networks to new cyber-risks. Cybercriminals have already begun designing new malware threats, like CrashOverride/Industroyer, Triton and VPNFilter, to target vulnerable OT systems. While some of these new attacks target SCADA (supervisory control and data acquisition) and ICS (industrial control system) systems, most are focused on highly vulnerable industrial IoT devices.
Traditionally, OT engineers attached devices to monitor and control the OT infrastructure through a serial connection, which made them less available to traditional hackers. Today, as OT managers add serial-to-Ethernet converters to these devices, they are becoming prime targets. Part of the reason is that many of these devices are highly vulnerable to attack. For example, many run aging operating systems, such as Windows XP, that are highly susceptible to exploitation. In addition, most OT networks simply haven’t deployed the sorts of security technologies commonly in place in IT networks. As a result, targeting IIoT devices has certain advantages for some cybercriminals.
Location analytics solutions have been around for a while. But despite the valuable data they can provide, they are still primarily perceived as a tool for big box retail environments, such as malls, grocery stores, and department stores. In such environments, location analytics are commonly used to track consumers while they shop to help retailers do things like identify natural customer movement patterns, address congestion, identify places within a shopping environment that are less frequently visited, or place specific merchandise in high traffic areas.
But the reality is that any number of verticals can realize benefits from leveraging the sort of information that a presence analytics solution provides. Knowing where people are, where they’ve been, and how they’re moving around a location can be of key importance to a wide variety of vertical markets, including hospitality industries, transportation hubs, public venues, theme parks, and even large healthcare facilities. In fact, any business that needs to manage large numbers of people or evaluate the effectiveness of the placement of resources or services can benefit from location-based analytics.
Financial, Healthcare, Government, and Retail IT Professionals Review Fortinet’s Enterprise Firewall Solution
Recognition in the Magic Quadrant for Enterprise Network Firewalls
Each year, Gartner evaluates the enterprise firewall market based on the capabilities and features of the solutions being offered throughout the cybersecurity space. The Gartner Magic Quadrant for Enterprise Network Firewalls examines today’s solution providers based on completeness of vision and how effectively they are able to execute this vision. According to the report, “products in this market must be able to support single-enterprise firewall deployments and large and/or complex deployments. These include traditional “big firewall” data center placements, branch offices, multitiered demilitarized zones (DMZs), and, increasingly, virtual versions for the data center and various cloud environments.” Learn more about Fortinet’s Enterprise Firewall and the company’s position as a Leader in the Gartner Magic Quadrant.
Cinema might be over a century old. But it’s showing no sign of slowing down. Even a quick glance through its history tells its own filmic story of technology’s progress through the decades. From humble, silent monochrome beginnings, through to the lush, colourful expanse of CinemaScope, 3D and today’s jaw-dropping digital effects, film has both pushed and chronicled the latest in technology for audiences worldwide.
The silver screen’s sparkle is showing no sign of dimming just yet, and it’s technology that pushes the multi-billion dollar film industry to the next generation of movie-goers. So, how is film doing this, and what can audiences look forward to?
Today, Microsoft Azure announced a brand new storage tier, Ultra SSD, which delivers extreme performance for critical applications such as SAP HANA, MS-SQL, and other databases. Some salient features are:
As the value of cryptocurrency continues to rise, a new form of malware has grown in popularity: crypto-malware. Though “crypto” may seem like a buzzword that’s popping up everywhere, it is very real when it comes to cyber threats. Crypto-malware is one of the latest malware threats, and it’s particularly insidious because it only requires CPU cycles to do its best work. It is classified as a “silent threat” – the longer it remains undetected, the better it is for the criminal. It’s a threat that is not likely to go away any time soon. Indeed, in a survey of 235 security professionals that Lastline conducted at Black Hat 2018, 56% think that cryptomining will still be the number one threat vector in 2019.
Over the last year, the IT Central Station team reached out to LogRhythm customers with one goal: to find out what made them choose LogRhythm as their SIEM solution.
As we looked into this customer feedback, we discovered that many LogRhythm users provided reviews that highlighted four particular benefits (among others) that made the LogRhythm NextGen SIEM Platform a strong contender in the SIEM market. In this post, we will highlight these features in more detail through the lens of unbiased reviews from LogRhythm customers.