Archive for the ‘Enterprise IT’ Category

How Singapore IT practitioners perceive mobility risks

Thursday, March 1st, 2012

Singapore was one of 12 countries surveyed in a new “Global Study on Mobility Risks” conducted by Ponemon Institute. Out of the overall 4,640 IT and IT security practitioners surveyed, 259 respondents were from Singapore.

Perception of mobile phone use as a threat and presence of security controls to mitigate the risks.

Perception of mobile phone use as a threat and presence of security controls to mitigate the risks.

The study was sponsored by content security provider Websense Inc, and is designed to help IT security professionals plan for an increasingly mobile workforce.

“We asked thousands of IT security professionals and found mobile devices were overwhelmingly important to business objectives,” said Dr Larry Ponemon, chairman and founder of the Ponemon Institute.Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies.

In Singapore, 45 percent of respondents say that their organizations experienced a data breach due to insecure mobile devices, and 22 percent are unsure.

“However, mobile devices put organizations at risk — risks that they do not have the necessary security controls and enforceable policies to address. It’s also clear that employees are deliberately disabling security controls, which is a serious concern,” Dr Ponemon addedThis is slightly less than the overall proportion of 51 percent for all 12 countries.

Fifty-five percent say that their employees circumvent or disengage security features such as passwords and key locks – versus the overall 59 percent.

Below is the Executive Summary for the survey of IT & IT Security Practitioners in Singapore, which was extracted from the “Global Study on Mobility Risks”.

(more…)

BYOD causing security breaches

Thursday, March 1st, 2012

51 percent of organizations lose data through mobile devices, while 59 percent of employees dodge security controls, according to a new  “Global Study on Mobility Risks” unveiled at the RSA Conference in San Francisco, USA.

The “Global Study on Mobility Risks” by Ponemon Institute.

The “Global Study on Mobility Risks” by Ponemon Institute.

Mobile devices help business, but security is needed to prevent costly data loss.

Corporate mobile devices and the bring-your-own-device (BYOD) phenomenon are rapidly circumventing enterprise security and policies. This survey defines mobile devices as laptops, USB drives, smartphones, and tablets.

“IT has spent years working on desktop security and trying to prevent data loss over web and email channels—but mobile devices are radically changing the game,” said Tom Clare, senior director of Product Marketing Management.Seventy-seven percent of more than 4,600 respondents in 12 countries (Australia, Brazil, Canada, France, Germany, Hong Kong, India, Italy, Mexico, Singapore, United Kingdom, and the United States) surveyed agree that the use of mobile devices in the workplace is important to achieving business objectives.

But 76 percent also believe that these devices put their organizations at risk—and only 39 percent have the necessary security controls to address the risk.

The study was conducted by the Ponemon Institute and sponsored by content security provider Websense Inc, and is designed to help IT security professionals plan for an increasingly mobile workforce.

“Tablets and iOS devices are replacing corporate laptops as employees bring-their-own-devices to work and access corporate information. These devices open the door to unprecedented loss of sensitive data. IT needs to be concerned about the data that mobile devices access and not the device itself,” Clare added.The research shows that organizations often don’t know how and what data is leaving their networks through non-secure mobile devices.

Traditional static security solutions such as antivirus (AV), firewalls, and passwords are not effective at stopping advanced malware and data theft threats from malicious or negligent insiders.

To safely permit corporate use of mobile devices, Websense has released its new Websense TRITON Mobile Security solution.

Sixty-five percent of respondents are most concerned with employees taking photos or videos in the workplace—probably due to fears about the theft or exposure of confidential information.

Other unacceptable uses include downloading and using internet apps (44 percent) and using personal email accounts (43 percent).

CA Technologies Cross-Enterprise Application Performance Management

Saturday, February 25th, 2012

The new release of the CA Cross-Enterprise Application Performance Management (CA CE APM) promises business service innovation across the hybrid data center and the cloud.

CA Cross-Enterprise Application Performance Management (CA CE APM)

CA Cross-Enterprise Application Performance Management (CA CE APM)

CA Technologies today announced a new release of its CA CE APM which extends mainframe monitoring capabilities and provides richer information about the health and performance of key IT services.

“Our clients are focusing on how IT can be more strategic to the business by providing decision makers and IT staff with timely information about IT services, and how their predictability and availability impacts business outcomes,” said Dayton Semerjian, general manager, Mainframe, CA Technologies.CA CE APM monitors and collects information on the mainframe and integrates with CA APM to provide 24×7 monitoring of business transactions in a single pane of glass across mainframe, distributed and the cloud.

This  offers a business-level view of service performance that can be displayed on their mobile devices, via CA Executive Insight for Service Assurance, when executives need it

The enhanced capabilities provide deeper insight into customer-facing business transactions across increasingly complex IT environments, modernizing mainframe administration by simplifying and enhancing cross-platform management to help incorporate the mainframe into an organization’s broader enterprise IT strategy.

“This new release of CA CE APM offers IT staff more real-time visibility into the customer experience to help them optimize customer-facing applications and services, no matter where they reside,” Semerjian added.Advancing Service Assurance Across Mainframe, Distributed, Virtual and Cloud

With the rise of virtualisation and cloud computing and the complex mix of mainframe and distributed platforms in the evolving data center, IT staff needs to perform real-time “application triage” to quickly diagnose and fix problems that can impact the customer experience.

By providing a 360˚ view of all customer transactions, organisations can better understand the health, availability and business impact of critical business services to prioritize problem resolution and help assure that service performance meets SLAs.

To provide this level of visibility, new capabilities in CA CE APM and its integration with CA APM include:

  • Over 90 metrics for DB2 for z/OS, end-to-end IMS for z/OS and the mainframe network to provide richer data faster, and with less work, so IT organizations can more quickly resolve problems with mainframe-based business transactions.
  • Information about network traffic across mainframe and distributed platforms that helps pinpoint problems affecting the performance or availability of an application or service.
  • A virtual infrastructure view so staff can more easily diagnose problems in the virtual environment and resolve them faster.
  • Information on how well SaaS vendor-delivered applications are performing for end-users
  • Expanded information used to monitor cloud services efficiently.

Tata Communications wires up F1

Friday, February 24th, 2012

Singapore-headquartered Tata Communications is now designated a “Technology Supplier of Formula 1”, with category exclusive designations as “Official Connectivity Provider of Formula 1” and “Official Web Hosting and Content Delivery Network of Formula1.com”.

Vinod Kumar, MD and CEO of Tata Communications and Bernie Ecclestone, CEO of Formula One group announced the multi-year technology service and marketing agreement at a London press conference today. Photo from Tata.

Vinod Kumar, MD and CEO of Tata Communications and Bernie Ecclestone, CEO of Formula One group announced the multi-year technology service and marketing agreement at a London press conference today. Photo from Tata.

Tata Communications will deliver connectivity to all 20 Formula 1 race locations over its global network, the largest in the world.

“Formula 1 requires fast and secure connectivity, because even a split second of downtime can have huge repercussions for its business, brand and reputation,” says Vinod Kumar, Managing Director and CEO of Tata Communications.It will also provide hosting and content delivery services to Formula1.com, which is accessed by tens of millions of fans around the globe.

Formula One group businesses and race locations will now be connected to the Tata Global Network (TGN), supported by secure MPLS connectivity.

Formula One Management’s IT infrastructure and Formula1.com will be colocated and hosted in Tata Communications’ data centres.

Tata Communications’ capabilities in video and content delivery networks (CDN) will enable uninterrupted, high-quality connectivity to the multi-media portal on Formula1.com.

“Connectivity and content delivery are critical issues for Formula 1 and working with the best in the business is a priority for us,” says Bernie Ecclestone, CEO of Formula One group.The (TGN) has Trans-Atlantic and Trans-Pacific data transfer capacity of one terabit per second.

This capacity will ensure Tata Communications to fully support Formula1.com during race weekends, when the site gets on average four million unique visits per weekend, peaking at seven million over some events.

Tata Communications’ infrastructure will enable the sport’s official website to instantly scale up to cope with these significant and sometimes unpredictable traffic spikes.

Tata Communications is now the Official Connectivity Provider for Formula 1.Tata Communications will also provide Formula1.com with a new Managed Security Suite and will apply an additional layer of managed security monitoring to ensure an increased level of protection to Formula One Management’s IT infrastructure.

Looking ahead, Tata Communications and Formula One Management will also work in close collaboration on research and development around connectivity and the latest video technologies.

Twitter reaches 500 million users

Thursday, February 23rd, 2012

Twitter now has more than 500 million users, according to twopcharts.com, although only 100 million are active accounts.

Websense illustrates “some of the not-so-high Twitter highlights of the last 5 years”.

Websense illustrates “some of the not-so-high Twitter highlights of the last 5 years”.

Started in 2006, Twitter had hit 300 million users back in May 2011.

Commenting on the situation, Mr. Carl Leonard, Senior Manager, Websense Security Labs said: “… what’s in a number? Twitter is free to use, easier to abuse and is constantly targeted by malware authors and spammers. It’s nothing new; not all Twitter users are who they claim to be. Let’s see this more than just a numbers game and focus on keeping users safe in real-time so they are not just another statistic.”Twitter estimated that only ten percent of its active users have sent more than 100 tweets, while only 20 percent of users have sent more than ten tweets.

Facebook hit 500 million ACTIVE users back in July last year.

Launched in 2004, Facebook now has more than 845 million monthly active users, according to its statistics.

The number of DAILY active Facebook users is roughly half that number, at 483 million.

The popularity of Twitter has made it a fertile hunting ground for abuse by spammers and bot networks.

Kelihos spam engine lives on

Wednesday, February 22nd, 2012

The Websense Security Labs Spam Trap system has detected a variant of Kelihos that is apparently still active.

Google Maps showing geographically how widespread the Kelihos command and control and peers infrastructure is, and therefore how well protected the botnet is.

Google Maps showing geographically how widespread the Kelihos command and control and peers infrastructure is, and therefore how well protected the botnet is.

“Kelihos is yet another example of how botnets shut down and reappear. Malware authors have a motive to get them up and running again. Websense Labs detected this new variant of Kelihos as we are constantly monitoring web and email exploits. More importantly, we are able to join the dots between these different attack vectors and protect against cybercriminals achieving their ultimate goal – stealing data,” said Carl Leonard, Senior Security Research Manager (EMEA), Websense Security Labs.Over the last half a year, the spam engine Kelihos has attracted the attention of many people, including security company researchers and analysts.

Microsoft had partnered with Kyrus Tech Inc. and Kaspersky Lab to take down the Kelihos botnet in September 2011.

However, Microsoft has recently confirmed, on its official blog, a new generation of Kelihos variants derived from the original Kelihos botnet.

Websense Security Labs has written up a detailed account of their investigations into this resilient nuisance.

SolarWinds launches SeUM to Monitor Web Transactions

Thursday, February 16th, 2012

SolarWinds launches the industry’s­ first affordably-priced SaaS (Software as-a Service)-like product to monitor web transactions from cloud-based locations.

SeUM web console has wizards to guide the creation of Amazon EC2 Cloud Player instances.

SeUM web console has wizards to guide the creation of Amazon EC2 Cloud Player instances.

SolarWinds Synthetic End User Monitor (SeUM) v.1.5 works to streamline the process of monitoring websites and web based applications from the cloud, offering users the ability to monitor their web based services from various geographical locations around the globe.

Leveraging the cloud allows users to inexpensively monitor performance and availability from locations beyond their data center, central office, or remote office locations to where their mobile work force, home offices, or customers are located.

SeUM allows system administrators and application support staff to monitor response time proactively for multi-step web transactions.

The latest version of SeUM introduces the Cloud Player Portal that allows users to deploy transaction players easily to Amazon EC2.

New Features in v. 1.5

  • Cloud Player Portal: Easily deploys transaction players to Amazon EC2 to enable web transaction monitoring from cloud-based locations and does not require users to pay subscription fees.
  • Multi-Tenant UI: Monitors website and web application performance for large deployments or in MSP environments.
  • Rich Content Recording and Playback: Record and playback dynamic web pages to include support for Flash and Silverlight; also validates the existence or absence of text and other website content.
  • Firewall-Friendly Communication: Transaction players make their monitoring data available for polling from the SeUM server, eliminating any need to open in-bound Firewall connections.

(more…)

CA Technologies earns Overall Positive Vendor Rating from Gartner

Tuesday, February 14th, 2012

CA Technologies has also earned a “positive” rating in the following categories: Identity and Access Management; Service Management; Portfolio Management; and Service Assurance; and Capacity Management.

For the Mainframe Modernization category, it earned a “strong positive.”

Gartner rates CA Technologies with an overall Positive rating in the latest Vendor Rating report.

Gartner rates CA Technologies with an overall Positive rating in the latest Vendor Rating report.

According to Gartner, a positive rating means that “potential customers should consider this provider a viable choice for strategic or tactical investments, while planning for known limitations.”

“With a deep commitment to focusing on high-growth markets in areas such as automation, cloud computing security and software as a service (SaaS), we believe CA Technologies has laid out a strong roadmap for the future,” said Peter Griffiths, executive vice president, Enterprise Solutions Technology Group, CA Technologies.A “Strong Positive” is the highest possible rating given.

The Mainframe Modernization category includes new products geared to simplify mainframe management, such as CA Mainframe Chorus and CA Mainframe Software Manager.

Gartner is a leading provider of research and analysis on the global information technology industry.

Its Vendor Ratings assess all the different aspects of a technology provider, such as its strategy, organization, products, technology, marketing, financials and support.

These ratings are periodically revised to reflect changes in assessment when a significant internal or external event directly affects the provider.

Here is the Vendor Rating report.

Akamai acquires Blaze

Friday, February 10th, 2012

Akamai has acquired Blaze Software Inc, a provider of frontend optimization (FEO) technology. This will complement Akamai’s site acceleration solutions with technology designed to optimize the speed at which a web page is rendered, regardless of end user device.

Akamai announced today that it has acquired Blaze.

Akamai announced today that it has acquired Blaze.

The synergy derived from the combining Blaze’s FEO and Akamai’s site acceleration solutions will improve the performance of customers’ web sites and applications

“We believe Blaze has developed a powerful solution for frontend optimization, and that its cloud-based services approach is synergistic with Akamai’s offerings,” said Rick McConnell, executive vice president of Products and Development, Akamai.Akamai is also in the process of acquiring Cotendo – a company that offers an integrated suite of Web and mobile acceleration services – in an effort to help accelerate its pace of innovation in cloud and mobile optimisation.

With the rapid adoption of rich Internet applications and the increase in mobile browsing, new performance bottlenecks are emerging.

Websites are becoming richer and more complex, with more compute requirements built into a single page, impacting performance in the browser or client device.

As a result, content providers are faced with a growing set of challenges in maintaining a high-performing site and assuring a superior end-user experience.

“Our technology is aimed at reducing the number of requests required to load a page, reducing the size of each request, and improving the browser rendering experience for our customers,” said Michael Weider, CEO of Blaze.Blaze provides technology designed to automatically optimize the code on a web page during the delivery process to ensure faster transmission of content and a faster rendering of the page, regardless of whether it is served to a PC, tablet or smartphone.

As a cloud-based service that requires no software or code changes by the customer, Blaze’s offering is designed to work with any web site.

Akamai plans to integrate the technology into its global cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere.

Dell delivers new data solutions

Friday, February 10th, 2012

Dell improves Fluid Data architecture for more flexibility in meeting the changing demands of organisations, and for increased automation for management of primary, backup and archive data.

Dell has a range of data solutions for SMBs and large enterprises.

Dell has a range of data solutions for SMBs and large enterprises.

Enhancements include new storage backup, application and networking solutions to help SMBs and large enterprises.

“With Dell‟s new primary, archive and backup storage solutions, the Dell Fluid Data architecture delivers the storage intelligence customers need to deal with a sea of constant IT change without driving up costs, wasting time or continually replacing infrastructure.”Dell’s Fluid Data architecture is designed to enable customers to manage more information more effectively.

Specifically, the enhancements include the following:

  • Dell‟s first deduplication backup appliance that integrates intellectual property from the Ocarina acquisition
  • a major software release for Compellent storage arrays
  • a new storage optimization solution for Microsoft SharePoint
  • broader support for Dell Force10, PowerConnect and Brocade storage networking solutions

The solutions are listed below:

  • New Dell DR4000 Storage Platform with Deduplication and Compression
  • New Dell Compellent Storage Center 6.0
  • Dell Compellent VMware vSphere Storage APIs for Array Integration
  • Dell Compellent Storage Replication Adapter (SRA) for Site Recovery Manager 5
  • Dell Compellent vSphere 5 Client Plug-In and Enterprise Manager-vSphere 5 Integration
  • Expanded Support for Dell Force10, Dell PowerConnect and Brocade Storage Networking Solutions

DellAvailability

Currently available:

  • The Brocade 6510 and Brocade DCX 8510 data center switches will be available in January.
  • The Dell Force10 S4810 10Gb Ethernet switch and the deep-buffer S60 1Gb/10Gb Ethernet switches for EqualLogic are currently available.
  • The Dell PowerConnect 8024 10Gb switches and M8024-k Blade IO modules are currently available.

First quarter 2012:

  • The Dell DR4000 disk-based backup appliance with deduplication will be available in Q1.
  • The Compellent Storage Center 6.0 software will be available in Q1.

Detailed descriptions of the solutions can be found in the press release below.

(more…)