The 10 Most Trusted Companies in Enterprise Security 2019 November2019

Page 1

+ Seok-woo Lee Founder & CEO Future-Bots Catching-up With The Robotics For Better Future Data Center Security: Controlling Possible Threats Digital Revolution Volume 11 | Issue 07 | 2019 Ready to Open a New Era of Total Connected Car Security Solutions with AUTOCRYPT Penta Security Systems 10 The Most Trusted Companies in Enterprise Security, 2019

Editor’s Desk

ChangingAspects ofSecurity

Sprivacyandpersonalbelongingsfromanunknown threat.Itisallweknowingeneralsensebutwhya companyneedssecurityandwhatsecurityconcernsithas? Thesedays,fromanenterprise’sperspective,securityisa broadandverychallengingissue.Whether,itisphysical securityoradatasecurity,breachinanyoftwocanleada companyintovulnerability.

ecurityiswhatweneedtoprotectourselves,our

Sohowtheenterprisesecurityservicesarehelping organizationswithsecuritybreachandwhyitisnecessary toconsultwiththem?Todayalltheorganizationsaredriven byinformation,anddatabecomesthemostimportantasset. Mostofthecompaniesaretransformingtheirbusinesses intoe-businesswhereitiscrucialtopreserveintegrity, availabilityandconfidentialityofinformationdueto sensitivityandvalueofbusinessdata.Theamountofdata organizationshavetodayishugeandtheyfindthemselves overwhelmedinthefaceofunauthorizedaccessas networksareopenedwhenconnectedtotheinternet.The datacontainsconsumers’informationaswellas organization’scriticalinformationsuchasoperation records,financialaspects,cash-flowinformation,health careandadministration.

Thisdataandinformationislifebloodofanorganization andanydamagetoitcanbefataltotheircontinuedviability asalivingentity.Insuchsituationsenterprisesecurity servicesplaycrucialpartandensurethattheoriginalityand accuracyoftheinformationispreserved,anditshallnever beexposedtounauthorizedapproach.

Individualsororganizationsleveragetechnologytouseto meetorcompletedesiredgoalsanditisdifficulttoforesee allthreatsandvulnerabilitiesthatsurfaceintheprocess.In otherwords,theenterprisesecurityisreactivewhereno

Enterprisesecurityisnot anymorearequirement itsaNecessity.

technologyorsecuritysystemcanfullyassure protectionfromthreat.Butthereareseveralsecurity serviceprovidersarewhocanguideandprovidetheir deepinsightsinsecuritysolutionsandhelptoavoid anymajordatabreach.

Inthisissueof“The10MostTrustedCompaniesin EnterpriseSecurity”InsightsSuccesshasshortlisted thoseeecurityproviderswhichareprovidingnterprises solutionsthataresystematicallyprofileand contextualizesecuritythreatswithalevelofdetailand granularitythathasneverbeenachievedbefore.

ThecoverisfeaturingPentaSecuritySystems,a leadingproviderofwebanddatasecurityproducts, solutions,andservices.PentaSecurity’swebsecurity productrespondsfasttoproxydeployment,inline topology,cloud,andotherweb-relatedenvironment changes.Thecompany’sdataencryptionproductalso respondsfasttoDBMS,filesystems,cloud,andother datamanagement-relatedenvironmentchanges includinglogandimages,theunstructureddata.Ithas beenexpandingitsofferingsinordertomeetthe demandsofencryptionindifferentareas,withitsdata encryptionproducts.

Also,makessuretoscrollthroughthearticleswritten byourin-houseeditorialteamandCXOstandpointsof someoftheleadingindustryexpertstohaveabrief knowledgeofthesector.

HappyReading!

Rohit Chaturvedi
COVER STORY Ready to Open a New Era of Total Connected Car Security Solutions with AUTOCRYPT Penta Security08
CONTENTS ARTICLES 16 AI: From Artificial to Authentic Maestros Insights 34 Challenges in Cloud Computing Leadership Viewpoint 22 28 Helping Businesses to Improve Customer Engagement Callsign Protecting Critical IT Infrastructure Cimcor Catching-up With The Robotics For Better Future Future-Bots18 32Data Center Security: Controlling Possible Threats Digital Revolution 24 Tech Evolution How VideoAmp Evolved the Company Culture and Process to Increasethe Number of Engineers Employed
sales@insightssuccess.com November, 2019 Editor-in-Chief Senior Sales Manager Business Development Manager Marketing Manager Technical Head Technical Specialist Digital Marketing Manager Research Analyst Database Management Technology Consultant Pooja M. Bansal Managing Editor Anish Miller Executive Editor Kaustav Roy Assistant Editors Jenny Fernandes Hitesh Dhamani Visualizer David King Art & Design Director Amol Kamble Associate Designer Iresh Mathapati Kshitij S Peter Collins John Matthew Sales Executives David, Kevin, Mark, Jobin Business Development Executives Steve, Joe, Alan, ManishJacob Smile Aditya Marry D’Souza SME-SMO Executive Prashant Chevale Calvin Jones Circulation Manager Robert Brown Stella Andrew David Stokes Mayur Koli Co-designer Copyright © 2019 Insights Success, All rights reserved. The content and images used in this magazine should not be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission from Insights Success. Reprint rights remain solely with Insights Success. Follow us on : www.facebook.com/insightssuccess/ www.twitter.com/insightssuccess We are also available on : Email: info@insightssuccess.com For Subscription: www.insightssuccess.com
ReadytoOpenaNewEraofTotalConnectedCar SecuritySolutionswithAUTOCRYPT Penta Security Systems The10TRUSTED Enterprise 2019Security Most Companies In
SeokwooLee Founder&CEO

oday,businessesandtheinternetareunited,as

Tbusinessesarerunontheinternet.Themarket demandsapplicationsofbothsafeandstable foundationoftechnologyaswellasapplicationsoffastand newtechnologies.Nonetheless,applicationsofenterprise securitymustneverbecompromisedregardlessofthe circumstantialchangesandbytakingthisintoconsideration, PentaSecuritySystems,aleadingproviderofwebanddata securityproducts,solutions,andservices,wasincepted.

Belowarehighlightsoftheinterviewconductedbetween Penta Security and Insights Success:

WhatledtotheinceptionofPentaSecurity?

WhenIwaseagertopursuemyentrepreneurshipdesiresback in1997,theinternetstartedtogainpopularity.Inthisstage wherethingswererapidlychangingandmostcertainlyinthe connectivitysector,itmademerealizethateveryonewill soonerorlaterbeplacedinasituationwhereconnectivity securityisinevitableintheirlives.

Afterthefoundation,thecompanyfocusedonutilizingthe meritsofthiscounty,SouthKorea.Itwasnoteasyto establishPentaSecurityasanOSoranetworkingtechnology providerassomeofthefirmsintheUSwerealreadytaking theleadintheworld.ThisisthereasonwhyIhavedecided tofocusondevelopingsecurityforthedevelopers.InSouth Korea,thereisarelativelyhighnumberofapplication developers,thereforewethoughtwecouldlistentotheir demands,reflectthemonourproducts,andeventuallycreate somethingthatisdeveloper-centric.Asexpected,‘Web applicationsecurity’hasbecomeinevitableforthebusinesses becausetheirmostimportantassets,thedata,wentonthe applications.Asaresult,comparedtotheexistingsystemand networksecurity,‘datasecurity’becamethemostimportant partofmaintainingthebusinessesnowadays.

From‘things’to‘vehicles’andnow‘blockchain’that’s enormouslyandinnovativelyimpactingourdecision-making processes,wearecopingwithbigandimportantchangesas anITsecurityfirm.Westronglybelievethatsecuritymust keepupwithrapidtechnologicalchangesandbytakingthe lead,PentaSecurityhasbeenexpandingitssecurityofferings fromIoTtoallsortsofmobilityenvironments.

Howdoyoudiversifytheorganization’sofferingsinweb anddatasecuritytoappealtothetargetaudience?

Today,businessesandtheinternetareunited.Businessesare runontheinternet,whichnowaretheapplications.The marketdemandsapplicationsofbothsafeandstable

Cover Story

foundationoftechnologyaswellasapplicationsoffastand newtechnologies.

Intermsofapplyingsecuritytotherapidlychanging environment,PentaSecurityisconfidenttostressthat developingthemethodologiesinordertokeepupwiththe changesisoneofthebiggestandimportantgoalsofthe company.

PentaSecurity’swebsecurityproductrespondsfasttoproxy deployment,inlinetopology,cloud,andotherweb-related environmentchanges.Dataencryptionproductalsoresponds fasttoDBMS,filesystems,cloud,andotherdata management-relatedenvironmentchangesincludinglogand images,theunstructureddata.Wehavebeenexpandingour offeringsinordertomeetthedemandsofencryptionin differentareas,withourdataencryptionproducts.

Fromthenon,wefocusedonprovidingdifferentsolutionsto differentaudiences.Tobeginwith,wemanagedtoprovide ‘detection’solutiontocompensatethesecurityfeaturesthe developersmighthavemissed,then‘encryption’solutionto protectcriticaldataassets,andfinally,‘authentication’ solutiontoallowuserstoidentifythemselvesinthe interconnectingnetwork.Ourofferingshavemanagedto expandanddiversifyinIoT,automobiles,trains,andshipsas well,viaassociatingthesemainsecurityfeatures.

Inresult,PentaSecurityhasregistered95internationaland domesticpatentsandgained58internationalanddomestic certifications.Moreover,won37productawardsincluding thelatest‘CybersecurityExcellenceAwards’,‘GoldWinner ofDatabaseSecurity2018’,andTU-Automotive’s‘2019 BestAutoCybersecurityProduct/Service’withour authentication,detection,andencryptionsolutions.

Giveadetaileddescriptionofthefeaturedperson’s influenceoverthecompanyandtheindustry.

SecuritymustbeattheheadofITanditstransformationin ordertoletthetechnologiesdevelopeachandeverypartof thebusiness.Therefore,astheCEOandFounderofanIT securitycompany,Ibelieveit’smostimportanttoprovidea clearvisionandroleofsecuritytotheemployees.Lettingthe professionalsdotheirjobs,whilsttheentrepreneurleadsthe directioniswhatIbelievemanagingandrunningasuccessful companyreallymeans.

Securityisnotonlydeeplyengagedwithintheindustry,but alsowithnationalpolicies.Evenwiththeslightestmisleading regulations,theresultandtheimpactcanbebeyondour control.Therefore,westronglybelievethatITsecurityfirms musttakepartintheprocessofpolicymaking.Inorderto

achievethis,wehavebeenactivelyparticipatingin developingnationalindustriesbyweighinginour opinions.We’realsoengagedwithtechnologyinstitutes aswebelieveeducatingthenextgeneration’s professionalsisoneofourimportantmissionsasthe leaderintheindustry.

Asperyouropinion,whatarethewebanddata securityroadblocksorchallengesorganizations facingtoday?Andwhatisyouradvicetoovercome them?

Thebiggestobstructionistheexistingcustomthatonly focusesonfindingthevulnerabilitiesandinturn, patchingthemtemporarily,assumingthattheinitial issueshadbeenresolved.Idefinitelyagreewiththeeffort atleast,however,lookingaheadtobuildinganimmune ITsystemfromthestartiswhatactuallymattersthe most.

Wemustletsecuritybecomeanimportantpartof buildingtheITsystem-especiallywhenweliveinsuch ahyperconnectedsociety.Thewholeconceptwell explainsPentaSecurity’sphilosophyandvision,whichis ‘SecureFirst,ThenConnect’.

Secure First, Then Connect “ “

Itisalsoverycommontofacesituationswherepolicymakerswithbiginfluencethatlackagood understandingofnewtechnologiesendupdevelopingwrongfulITpolicies.Therearetimeswhen industryrevitalizationagendasproduceactualregulationsandresultsthatstandintheway.Inorder topreventsocialresourcesfromstandinginthewayofdevelopments,PentaSecurityisputtinga lotofresourcestoeducate,inspire,andpromotebase-level,easilyunderstandableITsecurityto non-professionalsoutthere.

HowdoesPentaSecuritycopewiththevolatiletechnologicaltrendstoboostitsgrowth?

Whentryingtorespondquicklytothechanges,thereisalwaysamixofoldandnewways.Thisis notjustabouttheconflictoftheoldandnew,butit'saboutefficiency.PentaSecurityputsitsbest effortinsolvingthedeclineofefficiencyinstructuralandproceduralways.Ifwefeeltheneedto focusondevelopingandapplyingnew,innovative,anddisruptivetechnologies,weformanew teamoradepartmentaswellasnewlabsforin-depthdevelopmentsinordertomeettheneedsof newbusinessopportunities.Wealternativelyseparatethecompanythroughspin-offsifnecessary, aswetrulybelievethatrespondingfasttothechangesiswhatmakesus‘PentaSecurity’asa whole.

Couldyouthrowsomelightonyourmissionandvisionstatement?

Theconceptofrealizingan‘OpenSociety’,whichIdeliberatedwhenstartingthecompany,have becomethecompany’svision.Asmentioned,tryingtofixtheproblemonlyafteranincident occurs,istheworstwayofrealizingsecurityaswecanimagine.Modernizationisallabout communicating,interchanging,andsharing.Wecannotgrowanddevelopwithouttheseinanopen society.Ifwewanttofeelsecuredevenwithourdoorswideopen,wemustgivetrustandtrust otherswhoenteroursafetyzones.PentaSecurityisthecompanythatcanprovidethattrustandwe stronglybelievethisiswhat‘TrustforanOpenSociety’reallymeanstous.WithPentaSecurity’s securitysolutions,businessescantrustandfreelymanagebusinessesintheirowndisruptiveways.

Whatareyourcompany’sfutureaspirations?Whatstrategiesareyouundertakingto achievethosegoals?

WhatITsecuritymeanttootherindustriesbackinthedaysweren’tmuchatall-infact,itwasjust seenasacomponentpartthatsupportstheentireITsystem.WewantedtobuildanITsecurity companythatresolvesanyissuesrelatedtoITsecurityfromthefirststep,andthatstartswhen buildingtheinitialITsysteminabusiness.Wethrivetobuildasafeplatformandaninfrastructure basedontheconceptof‘SecuritybyDesign’.Asarecentexample,thereisautomotivesecurity. Inadditiontoautomobiles,weareplanningonexpandingourdesirestotrainsandships,by providingsecuritytoallsortsofmobilityenvironments.

TheestablishedITwasallaboutconnectinguserstothecentralsystem.Howevernow,different devicesareconnectedtoeachotherand‘connectedcar’isatypicalexample.Withourwholesystemapproachtosecurity,webelieveitenablesaneraofhyperwebintegrationandconnectivity. Therefore,weaimtodrivesafertransportthroughoureffortsinsmartmobility,provideautomotive securityforconnectedandelectricvehicles,automotiveblockchaintechnology,andamobilitydata intelligenceplatform.

We’regoingthroughabigchangewherethemethodofconnectivityhasbecomecompletely differentcomparedtothepast.This,itisnotanoverstatementtosaythatblockchain,anew computingsystemthatdrivesinnovativechangesindecision-makings,isleadingthischange. Thischangenotonlyimpactsotherindustriesbutmostly,impactsthesecurityindustryandof course,PentaSecurityaswell.Runningdifferenttechnologicallabs,subsidiaries,andteamsin eachsecuritysectorinordertoputourselvesoutofthecomfortzone,iswhatweconstantlyaimto achieve,withourbesteffort.

In the

era,

is What Ultimately Completes

Hyperconnected
Security
Connectivity “ “

SUBSCRIBE

Address : Country :City : State : Zip : Date :Name : Telephone : Email : Cheshould be drawn in favor of:que INSIGHTS SUCCESS MEDIA TECH LLC Global Subscription 1 Year.......... $250.00(12 Issues) .... 6 Months ..... (06 Issues) ..... $130.00 3 Months ... (03 Issues) .... $70.00 1 Month ...... (01 Issue) ..... $25.00
TODAY

WithsomuchattentionfocusedonArtificial Intelligence(AI),it’sworthrememberingthat onesizedoesnotfitall.Therearespecific business-relatedpainpointsinmindwhenacompany decidestodeployAItechnology,somakingtheright choicescanbeatrickytask.

Forexample,severalmonthsago,anAIrelated breakthroughwasannounced–arobotlearnedand demonstratedtheabilitytoperformaperfectbackflip. Whileitiswellacknowledgedthattheinvestedresearch anddevelopmentforthismissionwashugeandthe commercialpotentialforsomeapplicationsisenormous,it issomewhatunclearhowthisspecificinnovationorthe coremodelsandalgorithmsofit,canserveotherindustries andverticals.Hereinliestheproblem.

About the Author

Mr. Jay Klein drives Voyager Lab’s technology strategy and core intellectual property. He brings more than 25 years of experience in data analytics, networking and telecommunications to the Company. Before joining Voyager Labs, he served as CTO at Allot Communications where he steered Allot’s data inspection and analytics core technology offerings, and as VP Strategic Business Development at DSPG, where he was responsible for strategic technology acquisitions. He also co-founded and held the CTO position at Ensemble Communications while founding and creating WiMAX and IEEE 802.16. He also served as the CTO and VP of R&D at CTP Systems, acquired first by DSP Communications and later by Intel. Jay Klein holds a BSc in Electronics & Electrical Engineering from Tel Aviv University as well as numerous patents in various technology fields.

AI: From Artificial to Authentic

GaugingAIsuccessinonefieldinmanycasescanbe meaninglessforanother.Tomakethingsworse,evenwhen tryingtogodeeperintothetechnologyandattemptingto evaluate,forexample,whichMachineLearningalgorithms areutilizedbytheproduct,orwhatarethenumberof layersintheDeepNeuralNetworkmodelsmentionedby specificvendors,intheenditwillbepossiblypointlessas itdoesnotdirectlyreflectthesolutiondeployment ‘success’implications.

Nevertheless,itseemsthatthemarketignoresthisreality andcontinuestoevaluateAI-basedproductsbybuzzword checklistsusingfamiliarandrelatedAIterminology(e.g.,

Maestros Insights www.insightssuccess.com16 2019|November

Supervised,Unsupervised,DeepLearningetc.).While checklistsareaneffectivetoolforcomparativeanalysisit stillrequiresthe‘right’itemstobeincluded.

Unfortunately,whattypicallyisabsentaretheitemswhich areimportanttothecustomer,fromaproblem-solution perspective.

IntroducingAuthenticAI

Givenallofthis,thereisaneedtochangethenarrative aroundAItechnologyandsolutionstosomething meaningfulandauthenticthatreflectsthereal-life challengesandopportunitiesthatbusinessesarefacing. ThisisthetimetointroduceAuthenticAI.

TheMerriam-Websterdictionarydefines‘Authentic’as both ‘worthy of acceptance or belief as conforming to or based on fact’and ‘conforming to an original so as to reproduce essential features’.Thisisnotabout‘Fake’tobe contrastedwith‘Real’.It’sabouttheessentialfeaturesof AIwhichneedtobeacknowledged,andhence,redefine the‘checklist’.Often,theseessential‘authentic’features arehiddenandonlysurfacewhenaCIO/CDOisfaced withanewproblemtobesolved.Thisisseenespecially whentheAIaspectsofaproposedproductorsolutionare fullyexploredbyaskingquestionssuchas:

- IstheAItechnologyutilizedbytheproductaimed specificallyformyproblem,optimally(e.g., performance,cost,etc.)?

- Isitcapableofaddressingthecompleteproblemor onlyapartofit?

- Canitbeassimilatedintotheexistingecosystem withoutimposingnewdemands?

- Canitaddressthecompellingenvironmental conditionsoftheproblemspace?

Theseissuescanbegroupedintothreedifferent‘classes’‘Original’,‘Holistic’and‘Pragmatic’:

Original–Howinnovativeisthesolution?Thiscanbe quantifiedbyassessingthefollowing:

- theinventionofnewalgorithmsorevennewmodels and - theuseofcomplexorchestrationtechniquesor - throughthecapabilitytohandlecomplexdataformats andstructures.

Whilethereisnoneedtore-inventthewheelrepetitively foranyproblem,therearedistinctivecharacteristicswhich requireoptimizing.

Holistic–HowcompleteistheproposedAItechnology?It takesintoaccountthecapabilityofhandlingtheend-to-end aspectsofthesolution,thecompetenceofharmonizingthe operationofthevariousAIcomponentsofthesolutionand theabilitytoadapttoeverchangingconditionsoftheAI application.

Pragmatic–Canthetechnologysolverealworld problemsintheiractualandnaturalspaceina commerciallyviableway?Thismeansthatforexamplethe datasourcescanbeprocessedintheirmostnativeformat (bothunstructuredorstructured)aswellasprovide insightsorresultsmatchingthepragmaticneedsofthe specificmarketexpectations.Inaddition,theabilitytobe quicklydeployedandrapidtoactareassessed.

Alloftheseelementsshouldbeusedtosystematically assessandevaluateAI-basedproductsandsolutionsto assesstheirauthenticityandthereforeeffectivenessin specificusecases.

Forexample,manyhome-loanmortgageevaluationand recommendationsystemsutilizeasomewhatisolated machinelearningbasedapplicantclassificationmethod, oneofmanyotherprocessesincludedwithinthesolution. TheAIinthissolutioncannotbeconsideredAuthenticAI toahighdegreeasit‘scores’lowonthe‘Original’and ‘Holistic’classesasitisn’tinnovative‘enough’(froman AIsense).Inaddition,theAIcomponentitselfdoesnot coveronitsowntheend-to-endaspectsofthesolution (henceaffectingtheoverallperformanceandprecision).It couldbeconsideredtobe‘Pragmatic’tosomelevelifit canhandletherequireddatasourcesoffinancial institutionsorthecustomerapplicationsnatively,andifthe solution‘output’aretheexplicitresultsrequiredasa specificrecommendation(e.g.,loanconditions).However, thedeploymenttimeline(time-to-market)andcommercial aspectsneedtobeevaluatedaswell.Thisisjustone exampleofmanyothers,coveringallkindsofvariations.

Perfectbackflipsmaygrantyouagoldmedalifyouarea gymnastbutifyouareamasterchessplayerdon’texpecta winningmove.

www.insightssuccess.com17 2019|November

Catching-up with the ROBOTICS

Better FUTURE for

obotshavealwaysbeen

Rpicturedasaman-made advancedtechnological creativity,whichdoandwillfavorthe humanspeciesforfuture.Asrobotics isvibrantlyglobalized,soonitwillbe mainstreamedinvariousfieldsand sectors.Currently,therearenumerous enterprisesworldwidewhichare implementingroboticsintoindustrial, healthcareandcommercialuse. Whereas,roboticshaveexperienceda lotofup’sanddown’sduringthis tenure,butwiththetime,ithelda strongholdinthedigitalworld.

Wheneverthediscussionarisesabout theapplicationsofrobotics,the industrialsectorhasbespoken benefits’.Robotshavebecomemore affordable,smartandproductiveover theyears.Thesectorslikeagriculture, construction,warehousingand logistics,andcustomerservices.By investingmoreinrobots,anenterprise

www.insightssuccess.com18 2019|November

willbesolvingcertainproblemsmore accuratelyandefficiently.Meanwhile, utilizingrobotswillhelpenterprisesto pushtheirlimitsinordertofillupthe productivityvoids.

Witheachslippageoftime,the technologyisupgradingsodoesthe robotics.Theadvancementsinrobotics fieldwillbeaboontotheenterprisesin ordertoincreasegrowthand productivityrate.Therearecertain parametersthatshouldbeconsidered whileimplementingroboticsinthe enterprise,suchas

FollowingupParametersbefore ReachingtheDepthofRobotics Modifying; as per the user’s need Generally,robotsusedtorequire advancedtraininginordertooperate comfortably.It’snotanissueforthe bigenterprisesastheyacquirethe skilledpeopletodealwith,wherethe smallenterprisesarenotsogiftedwith

loadsofassetsinitially.But,withthe newadvancesinroboticstechnologies, ithasbecomeeasierforsmallventures toinvestinrobotsforincreasingthe productivitygeneratingmorerevenue. Justbygivingwirelesscommands fromanIOT,demonstratingtasksto therobotsgetseasier.Nowadays,there arenumerousvarietiesofrobotsto carryoutmultitasks,thusasperthe user’sneed,onecaninvestinrobots fortheindustrialpurpose.

Easily Compatible

Unlikethebigmanufacturingrobotsin hugeindustries,therearevarious collaborativerobotswhichare speciallydesignedtoworkalongside andtoassisthumanworkersina varietyoftasks.Earlieritwassortof stressfulforanenterprisetoallot specificman-powerforcertaintask, butbyimplementingco-botssuch issuesareresolved.Asthesizeand shapeofco-botsaregettingmore

compact,itmaybenefittheenterprises invariousterms.

Easy to Develop

Earlierrobotswerenotabletoprogram easilyduetotheincompatibility betweentheuserinterfaceand hardware.But,nowRoboticOperating System(ROS)isdominatingthe industrybyprovidingsolutionsfor variedrobotsinordertoperformthe taskwithoutlagging.It’sanopensourceframeworkwhichhelps developerstoredirecttheprogramming indifferentways.Thisopen-source frameworkisdominatingthegrowth towardstheconstructivedirection.

AmplifyingtheRangeofApplied Robotics

st

The21 century—istheeraof implementingnewideologyand technologiesinvarioussectors.While technologicaldisruptionhas collectivelyaffectedeverypossible

Future-Bots www.insightssuccess.com19 2019|November

sector,roboticsisstillunaffected.Frompastfewyears,the technology,aswellasitsimplementation,hasincreased substantially.Havealookonsuchfewareasforpossible applications.

Obliging Enterprises through Robotics

Cobot’s: Assisting Humans

Unlikebigmanufacturingrobots,collaborativerobotsare designedtoworkwithemployeesinenterprisesand corporates.Thedesignissmartenoughtoassisthumans andalso,compactenoughtohandle.Generally,thesmall andmedium-sizedenterprises(SMEs)areslightlyboonby implementingco-botsindaytodaylife,astheyareeasily adaptable,easytoprocessandmostimportantlyit’s affordable.Accordingtosomeexperts,there’sapossibility ofenormousgrowthinthebusiness,ifCo-botsare implementedwidely.Themainmotiveofindustrialrobots istotheprioritizedsafetyofemployeesandworkers,yet thechancesofaccidentsarealwaysathighrisk.Whereas, co-botsworksasaservicerobot;theycomeinvarious shapeandsizeseasingtheworkabilityandreducingthe liabilityofemployees.Inordertogetsanctionedasservice robots,anyco-bothastopasscertaintestingparametersby robotmanufacturingcompanies,factorssuchaseasily compatiblewithotherdevicesandprograms,safein use,easytocommand,andprocessingatafaster rate.Currently,co-botsareusedforprocesses likemachinetending,packaging,andmaterial handling.Inspiteofindustries,co-botsare usedinvarioussectorssuchasinfarming, hospitals,healthcareandfacilities,and labs.Itdoescomeunderrobot-as-aserviceformat.

Cloud Robotics

Imagineanenterprisewith robotsthataretotallyindependent totheusercommands,inother words,noexternalprogramming mayrequireinordertoprocessrobots forthevarioustasks.Inaccordanceto that,aUserInterfacetobeexactmightnot beneededinthefuture,asmachinelearningis alreadyonitsvergetogetexplored.Currently,in ordertocarryoutcertaintasksrobotsarebeentoldto whattodousingtheinterfacewhereas,cloudrobotics directlytwitchcompatiblecodefromthecloudswhich arerequiredforthetasks.Toworkalongsidewith humans,robotsmustbedeeplearningthesubjects simultaneouslyabletopointoutproblemsandprovide solutionsrightaway.Meanwhile,itwillbeaboonforthe enterprisesiftheemployeeswillgettointeractwithrobots asapersonifiedobjectratherthanamachine.Soon,there

withpersonalroboticscloudwhichwillhelprobotstotake andgiveinformationdirectly.Dependingontherobot,it canprocessvariousfunctionssuchaslifting,leveraging, handlevision,objectrecognitionandother,thuscertain robotsacquiresuchskillsandwillprovideinformationto thecloud.Then,thisinformationhelpsotherrobotstoget enlightened.Insimplewordstosay,robotswillteachother robotsforthebettergoodoftheenterprises.Ontheother hand,asrobotsaregettingmoreandmoreevolved,filtering ofessentialinformationfromrestwillgetmucheasier.This willcomfortbothbigandsmallenterprisestomanagebig datamoreprecisely.

Withtheemergenceofadvancementinrobotics,theyareon thevergetotouchskiesalready.Ifconsideringtheabove possiblefactors,thisevergreeneraofroboticsislesslikely togetsaturatedduetotechnologicaldisruption.Asthe technologiesaregrowingfaster,theenterprisesmustto catch-upwiththemaccordingly.It’shightimetoimplement newtechnologiesespeciallyoftheroboticsasitsutilization isnotonlysubjectedtowarehousesbutalso,towardstheinhouseenterprisework.Hopefully,there’sapossibilityof robot-orientedindustriesinthefuture.

www.insightssuccess.com20 2019|November

Helping Businesses to Improve User Engagement

Whetherit’stheiremployees orcustomers,organizations oftenstruggletofindthe rightbalancebetweensecurityanduser experience.Callsign,aComputer& NetworkSecuritycompanyprovides user-friendlyidentificationand authenticationsolutions,thathelp businessesbalancethetwo,whilstalso reducingcosts.

Belowarethehighlightsofthe interview:

GiveabriefoverviewofCallsign,its uniqueness,anditsvision.

Thedigitalworldisbasedonasimple premise–trust.Whenwe’re interactingwithapersonorentity–whetherit’sabusinessorsomeother transactionalinterface–weneedto knowwithnouncertaintytheyarewho theysaytheyare,doingwhattheysay theyare,wheretheysaytheyare.This isexactlywhereCallsignhelps.

Weareanidentityfraud,authorization &authenticationcompany,solvingthe challengesthatorganizationsfacein gettingtheirusersonto&interacting withtheirdigitalplatforms.

WedothisusingrealtimeAIdriven identityandauthenticationsolutions, thatconfirmtheuserreallyiswhothey saytheyare,nomatterwhattheir location.

DescribeCallsign’scuttingedge securitysolutionswhichaddressall theneedsofyourcustomers?

Asorganizationsstrivetosecuretheir systems,theaimistodosoinaway thatdoesn’thinderemployee productivity.Ideally,usingpoliciesthat allowforatailored,contextual approachtoworkforceidentification. What’smore,today’semployeesare increasinglyprioritisingprivacyover convenience,sothat’sgottobe factoredin,too.

OurIntelligenceDrivenAuthentication Platformconsistsofthreemodules–Intelligence,Policy&Authentication. Ourintelligenceengineusesmultiple datapointstocreateaconfidence score,tellingushowlikelyitisthat someoneiswhotheysaytheyare.If theconfidencescoreishigh,wecan safelyreducefrictionandifit’snot, authenticationisdynamicallyadjusted.

Thisorchestrationisachievedusing thePolicyManager.Organizationscan builddynamic,naturallanguage policiesandjourneysthatadapt,inreal time,tocontextualintelligence.Asa result,Callsign’sPolicyEnginecan dynamicallyadjusttothetypeof hardware,connectivityandeven preferencesofindividualusers(for exampleiffacialrecognitionisnot enabled).Becausethepoliciesarefully transparentandwritteninnatural language,leadersinrisk,compliance, userexperiencecanunderstandthem

aswellastechnicalpeersinITand fraudmakingthesolutionmucheasier tomanageandutilizeacross businesses.

Inall,theentireprocessisdesignedto determinewhatkindofauthentication journeysarebestusedinwhich circumstances,basedonwhatactionis beingperformed,bywho,where,and how.Meaningorganizationsaren’t isolatingswathesofuser’swith either/orchoicesofbiometrics,or additionalpasswordchecksandcan adheretoprivacyrequirementssuchas GDPRandCCPA.

Whattechnologiesareyou leveragingtomakeyoursolutions resourceful?

Collectingthousandsofdatapoints acrossdevice,locationandbehavior, weusestatisticalmodelingand advancedmachine&deeplearning techniques,tocreateauniqueidentity profileofthatusersothatthepolicy enginecandelivertheappropriate authenticationjourney.

Thislevelofintelligenceenablesusto deliverpassiveauthenticationasmuch aspossible–andonlycallingfor activeauthenticationwhenappropriate orrequired.Thismeanswecandeliver improvedlevelsofsecurityfor organizationswhilstimprovingthe userexperience,withonaverageover 80%ofauthenticationstepsremoved.

www.insightssuccess.com22 2019|November

Whatarethechallengesfacedwhileprovidingsecurity solutionsandhowisCallsignservingtotacklethem?

Identityisthegatewaytoallthingsdigital,yetthemost commonauthenticatorintheworldwasinventedinthe 1960's–thepassword.This,andeveryotherauthentication/ authorizationsolutionsincethenrepresentsidentityproxies, notidentity.Manysolutionsweredesignedtoidentify fraud,notproveidentity.Callsignisthefirstsolutionthat buildsuniqueindividualdigitalprofiles,collecting thousandsofdatapoints,andverifyingandlearningwith eachinteraction.

PrivacyisalsoanessentialpartoftheCallsignplatform. Today,it’simportantthatusersaregiventherightchoice, control&consentaroundtheuseoftheirdata.With Callsign’sIntelligenceDrivenAuthentication(IDA),clients canallowtheiruserstodeterminejustwhichdatapointscan becollected,empoweringuserstoactivelyparticipatein securingtheirdigitalidentities.

Additionally,CallsignIDAservesalluserswhospana broadrangeofsocio-economicandgeographic backgrounds,aswellascapabilitiessuchasusersoptingout ofbiometricauthentication,oreventhosewithoutasmart phone.

Whataccordingtoyoucouldbethepotentialfutureof theenterprisesecurityindustryandhowdoesCallsign envisionsustainingitscompetency?

Assecurityingeneralevolvesasacorebusinessfunction, leadersneedtobalanceriskanduserexperiencetoagree theappropriatebusinessrisktolerance.

Manycurrentmethodsfocusonazero-trustapproachthat reliesonuser’sregularlyauthenticating,oftenwithfairly rigidmethods.Byusingthousandsofdatapointsinreal timetodetermineidentity,Callsignsafelyremoves authenticationfrictionforemployees–ensuringsolution adoptionandboostingproductivity.

Italsoremovesthecostsincurredbytokensthatarelostor needreplacing.Plusreducesrelianceonpasswords,and thereforethecostofsupportcallswhenthey’reforgotten.

AbouttheLeader

ZiaHayatistheCEOandCo-founderofCallsign.Zia hasaPhDinInformationSystemsSecurityfromthe UniversityofSouthamptonandhasworkedincybersecurity forbothBAEsystemsandLloydsBankingGroup.

Alongsideoverseeingthecompanystrategyandinputting intotheresearchandtechnologyroadmap,heworkswith executivelevelsoforganizationstoexaminehowdigital identitycanbemademoresecure,simplertouseandmost critically,maintainingtheprivacyofindividuals.

Collaboratingwithindustryandacademiaheishelping driveawarenessandinnovationtoanticipatethechallenges oftomorrow.Thiscouldbedrivenbyusers'desiretohave choiceandcontrolovertheirdigitalidentities,and/orthe badactorsincreasinglygarneringgreaterlevelsof sophisticationaroundattacks.

A scalable “banking grade” user friendly, identity fraud, authentication & authorization platform.
The10TRUSTED Enterprise 2019Security Most Companies In www.insightssuccess.com23 2019|November
www.insightssuccess.com24 2019|November

VideoAmpturns4yearsoldthismonth.Somany memories,andsomuchgrowth.Let’sreflecton someoftheworstdecisionsandassociated learningsthathavebeenfundamentaltoourgrowth.Why theworstyousay?Becausewhenyouaccelerateyour learningrateinafail-fastenvironment,itthenallowsyouto makefastdecisionsvs.theanalysisparalysispredicament.

Reflection

Oneofmyfavoritewildcardinterviewquestionsfor managersis:“Describethefailureyou’remostproudof.” Thissometimescatchespeopleoffguard,soI’llsharemine firsttogettheconversationgoing.Inevitablyitcomesdown tochoosingbecausetherearesomany.

Youcan’ttalkaboutgrowthandsuccesswithouttalking aboutthesefailures.Unlessyou’resomekindofhybrid AI-robot-space-alienwho’sabsolutelyperfect,there’sgoing tobemistakes.What’simportantisthatasaleaderyouown yourmistakesandbetransparentaboutthem.

Hiring

Findingtherightpeopleisthesinglemostimportantaspect ofgrowingastartup.Thebiggestmistakesinhiringhave been:

Ÿ “Hiringoutofhand”,orshortcuttingthenormal processesbecausethecandidateiswellknownbyother engineersinthegroup.

Ÿ “Promotingoutofhand”isanothervariationofthis whereyoudon’tputsomeonethroughthenormaldue diligencebecausetheyalreadypresent.Inourcase, individualcontributor(IC)engineersdon’tgothrough therigorousreferencechecksthatnewmanagersdo.

Ÿ “Hiringunderduress”,orloweringyourbarsimplyto meetheadcountgoals.Istronglyadvisetohirefewer “full-fullstack”seniorengineersvs.abunchofjunioror mid-levelcareerdeveloperswhorequiremoretime, nurturingandpreciousattentionunitsfromyoursenior staff.

Process

Thisisamovingtarget,andonewhichhasdefinitelybeen anongoingseriesofblogs.Intheearlystage,we“over prescribedscrum.”Somethingthataveryearlystage companycando,alongwithtoomuchagileprocessestoo soon.

Forexample,prototypesandproofofconceptsshouldnot havearigorousdefinitionofdone,withendlessunit, functional,andend-to-endtestsbecausetheproduct’s requirementswillprobablyzig-zagwildly.

Conversely,havingtoolittleprocesswhenyouare supportingenterprisecustomerscanalsobeaproblem.I spentmypriordaysasanICand

Tech Evolution www.insightssuccess.com25 2019|November

contractorretrofittingandscalingCI/CDpipelinesand trainingengineershowtowritebettertests.

Thechallengeisright-sizingthisallalongtheway,andthe triggerpointsonwhentochangemaynotbeobvious.Isay thisbecausewegrewheadcountby22engineersfromOct 2017toFeb2018,andintheprocesswedidnotmodifyour simplifiedKanbanapproachtoaprescribedScrumprocess quicklyenough.Growingpainsemerged,tosaytheleast. Nowwe’reinaspotwherewecanwithstandamagnitude scaleofgrowthwithroughlythesamesquadandtribe-level process.

Management

RiffingoffrapidgrowthofBrainsinengineering,wedidn’t scalemanagementfastenough.Almostallstartup engineeringorgsstartveryflat,withallICsandno management.Youhave“techleads”whomaysplittheir timedoinglightmanagerialfunctions,buttheyallwrite codeanddiveintotheoperations.

ThebiggestfailhereinscalingtheICswasnotscalingthe organdmanagementstructuretofollow.At~44engineers anddatascientists,wehaveadutytodeliveronourmission toprovideanenvironmentwheretheyhavetheopportunity todothebestworkoftheirlivesandbeworthmoreinthe marketplace.

Withoutthisvitalmanagementstructure,thereisavacuum. Donotboltthisonlater,builditasyougo.Wetook inspirationfromSpotify’smodelofengineering organizationalscaling.

Growth&CareerPathing

We’vetalkedaboutallofthesefails,howaboutsomething thathasworkedwellforus?

Whendoinginitialcontactwithacandidate,Ioftenask “whyareyouinmarket?”Ihaveseencountlessfolkswho arelookingbecausetheircurrentmanagementdoesnot havetheirgrowthandcareerpathinginmind.Inextreme cases,theycandoaday’sworkinfourhours,feellikethey areunder-challenged,andhavenotlearnedanythingin years.TheyworkinanenvironmentlikethemovieOffice Space.

Takinganoppositeapproachistoengageinthegrowthand pathingofeveryindividual.Wedothisby:

Ÿ aligningthegrowthoftheindividualwiththe company’sgrowth.

Ÿ havingmanagementcheckinfrequentlyonthesuccess ofthis,and

Ÿ settingupformalquarterlycheck-insonmeasuring thesegoals.GoogleadoptedthisearlyonfromJohn DoerrintheformofOKRs,andtherearegreat platformsouttherewhichcanformallymeasureand tracktheseobjectives.

Careerpathingisalonger-termconcern.Iaskcandidates fromthestart“sowhat’sthenextjobafterVideoAmp?” Thisoftencatchesthemoffguard,thenaftercarefulthought mostreplywitharole1-2levelsbeyondwherethey’reat now.It’sourgoaltohelpsteertheminwhateverpaththey currentlysee.

Manyearlier-careerengineersthinkmanagementistheir ultimatepath,butIhavefoundthatmanywillstayona tractofengineeringexcellence.Whetherit’saPrincipal EngineeroraVPofEngineering,thegoalistoorientthe newchallengesinamannerwhichgrowstheminthat direction,evenifwecan’tfullyrealizetheirultimate pathinggoalwhileatthecompany.

Bypayingcarefulattentiontothesedetails,wehavefound ourannualretentionrateinthehigh90%.

www.insightssuccess.com26 2019|November

Foundedin1997,Cimcor Inc.isanindustryleaderin developinginnovative security,integrityandcompliance softwaresolutions.Thefirmison thefrontlinesofglobalcorporate, governmentandmilitaryinitiatives toprotectcriticalITinfrastructure andhasconsistentlybroughtIT integrityinnovationstomarket.

WhenCimcorwasstarted,ithada focusonprocessautomationand control.Thecompanywas responsibleforcreatingand implementingmission-critical applicationsinboththe manufacturingsectorandutilities. Itidentifiedtheneedfor corporationstoensurethatcritical systemscontinuetooperate appropriately,despitecyberthreats orevenhumanerror.The CimTrak Integrityproductlinewascreated inresponsetothisidentifiedneed. Overtheyears,Cimcorhas expandedthescopeofitsproduct linebeyondmanufacturing& utilitiestomeettheneedsofthe broaderenterpriseandrapidly growingcloudinfrastructures.Its visionisstraightforward;todetect changethroughouttheenterprise. However,theimplementationof thisvisionisquitecomplicated.Its dedicatedteamofengineershas

Protecting Critical IT Infrastructure

createdthemostadvancedintegrity monitoringsystemintheworld.Its next-generationfile/system integritymonitoringproductthat goesfarbeyondthestandard detectionofothertoolsinits marketplacefocusesnotonlyon changedetectionbutalsoon maintainingsystemuptime. Powerfulfeaturessuchasselfhealing/remediationcapabilities, reinforcethecompany’s commitmenttonotonlyproviding informationaboutchangestoyour ITinfrastructurebuthelpingyou manageitproactively.

AnIntegratedSolution

Asacomprehensivesecurity, integrityandcompliancesolution, CimTrakiseasytodeployand scalestomeettheneedsofthe largestofglobalnetworks.Withan automateddetectionprocess, flexibleresponseoptions,and auditingcapabilities,CimTrakisa powerfulcompliance,information assurance,andsecuritytool. CimTrakprovidestotalsystem deviceandintegritymonitoring. OrganizationsusetheCimTrak IntegritySuitetomonitortheir servers,workstations,network devices,activedirectory/directory services,databases,POSsystems,

Docker/ContainerSecurity,and cloudsecurity,forunexpected change.

AnInventor

AneliteteamofCimcorisledby itsPresidentandCEO,RobertE. Johnson.Robertisaninventorand hasledthedevelopmentofseveral patentedandpatent-pending technologies.Asaresultofhis passionfortechnology,hehas authorednumerousarticles, contributedtobooksabout technology,anddevelopedseveral commercialsoftwarepackages.He hasappearedonCNN,World BusinessReview,andInside IndianaBusinessaswellas BloombergRadio.

Activelyinvolvedinthe community,hehasservedon numerousboardsincludingthe PurdueTechnologyCenterof NorthwestIndiana,theMethodist HospitalFoundation,Boardof AdvisorsforPurdueUniversity NorthwestComputerInformation Technologydepartment,the advisoryboardoftheDepartment ofComputerInformationSystems forIndianaUniversityNorthwest, andBoardofAdvisorsfor WestwoodCollege.

www.insightssuccess.com28 2019|November

The CimTrak Integrity Suite monitors and protects a wide range of physical, network, cloud and virtual IT assets in real-time while providing detailed forensic information about infrastructure changes.

“ The10TRUSTED Enterprise 2019Security Most Companies In www.insightssuccess.com29 2019|November

Mr.Johnson’scontributionstosecurityandinnovation havebeencommendedandwrittenintothe CongressionalRecordofthe112thCongress.Underhis leadership,Cimcorhasbeenfelicitatedbyvarious recognitionsandawards.In2015,Cimcor,Inc.was selectedbytheIndianaNW-ISBDCasExporterofthe YearinTechnology.Inthatsameyear,Cimcor,Inc.was selectedbyCyberSecurityVenturesas#82intheglobal compilationofthetop500informationsecurity companiestowatch. In2017,Cimcormovedupto#75 intheglobalCyberSecurityVenturesTop500 compilationandMr.Johnsonwasinductedintothe NWITimesBusiness&IndustryHallofFame,an accomplishmentthathasbeendocumentedinthe CongressionalRecordofthe118thCongress.In2019, CimcorwasnamedtotheHOT150Companiesto Watchin2020byCybercrimeMagazineandnamedin theTop25CybersecurityCompaniesof2019.

ConstantlyInnovating

AccordingtoCimcor,thechallengewithinthis particularindustryistherapidpaceatwhichtechnology andmalwareevolve.In2018,therewere1.2million newvariantsofmalwarecreatedeverysingleday. Helpingorganizationscopewithzero-dayexploitsand malwaretrendsrequiresCimcortoinnovateconstantly. Succeedinginsuchafluidandever-changingthreat landscaperequiresthecompanytofosteracultureof continuouslearningandserialinnovation.This corporateculturehasenabledCimcortocontinuously improveitssecurityandcompliancesoftware, providinguserswithchangedetectioninreal-time, coupledwithremediationensuringanorganization’s systemisinasecurestate.

Real-timeIntegrityMonitoring

Cimcor,Inc.hasapatentonreal-timeintegrity monitoringwithremediationcapabilities.CimTrakhas beendevelopedbyitstalentedengineers.Itstechstack

iscenteredaroundC/C++,Angular,andGo.Allofits communicationsanddataatrestisencryptedand compressed.ThecompanyusesFIPS140-2certified cryptographicmethods.Inaddition,allcommunication isencryptedviaTLS1.2.Whencommunicatingwith externaldevices,Cimcorusesavarietyofsecure protocolsincludingSSHV2.Thismulti-protocol supportallowsthecompanytoconnectandmonitora rangeofservers,networkdevices.Itsfocuson applicationportabilityhasenabledCimcortotightly monitorWindows,Linux,Solaris,AIX,MacOS,and HP-UX.Therearefacilitiestomonitordatabases, ActiveDirectory,LDAP,andavarietyofnetwork devicessuchasCISCO,Juniper,PaloAlto,Checkpoint, andmore.Itevensupportsthemonitoringofcloud servicessuchasAmazonAWS,GoogleGCP,Microsoft Azure,DockerandKubernetes.

TwoMajorShiftsareyettoCome

CimcorenvisionstwomajorshiftsintheenterpriseIT space.ItexpectsacontinuedshiftofITinfrastructures intothecloudandanincreaseinhybridcloud/brickand-mortarinfrastructures.Theothershiftisthe dramaticincreaseinIOTandIndustrialInternetof Things(IIOT)devices.CimTrakisuniquelypositioned tohelpprotectassetsbothwithintheenterpriseandin thecloud.

Testimonials

“CimTrakworksgreat.Itiseasytouseandthe supportteamisfantastic.”

Mike, Direct Mail Processors.

“WhatIlikeaboutCimTrakisthatitissoeasyto setup.Withinahalf-hour,wewereupandrunning, withTripwire®,whichI’veworkedwithinpast organizations,itwasprettyintensetosetup.We lookedatafewothers.Manydidn’tofferthesame benefits.TheyarenothinglikeCimTrak.”

www.insightssuccess.com30 2019|November

Data Center Security:

Controlling Possible Threats

Theriseincyber-crimesisoneofthemaincausesof Datacenteroutages.Aspertherecentsurvey conductedbyindustryinsiders,cyber-crimecaused 22percentdatacenteroutagesin2015opposedto2percent outagesin2010.Addingtoallthese,nowmostofthedata centersarere-evaluatingtheirsecuritypoliciesafterthe recentWannaCryransomwareattack.

Datacenteroutagescausecompaniestolossrevenuein manyways.However,thecostliestlossisservice interruptionandlossofITproductivity.So,the organizationsarenowrealizingthattraditionalsecurityis nolongersecureenoughtosecureanydatacenter.Arecent studyhasfoundthat83percentoftraffictravelseast/west withinthedatacenter,whichstaysundetectedbythe perimetersecurity.Inthisenvironment,whenanattacker infiltratestheperimeterfirewall,thencanjumpacrossthe systemwithease,extractinformationandcompromise valuabledata.Additionally,datacenterscanfaildueto trespassersoraterroristattackorbynaturalcalamities.

So,howcanonesecureadatacenterinthebestway possiblefromanykindofcyberthreat?Don’tworrywe’ve gotyoucovered,withthepointsbelow.

Asthefirststep,oneshouldMaptheDataCenterandflag thehackerswithinthevirtualandphysicalinfrastructure. TheCSOsandCIOswithasystemmapoftheirsystems canreacttoanysuspiciousactivityandtakestepstostop databreaches.Beingabletovisualizedifferenttraffic patternswithinanetworkhelpstounderstandthreats,that eventuallyelevatesthelevelofsecurity.

Understandingandmeasurementoftrafficflowwithin thedatacenterboundaryareveryimportant.Inthecaseof

anyinterruptionintrafficacrosseast/westvsnorth/south, protectedvsunprotectedonecangettoknowaboutathreat. Additionally,vulnerablezonesandunprotectedtrafficneed tobemonitoredforabetterresult.

Firewallrulesneedtobedefinedandimplementedasper requirements.Additionally,oneshouldallowtrafficonly afterthoroughverificationandselectivelyallow communicationtoensuremaximumprotection.Thekeyis toidentify,what;slegalandsecuredandwhatcanbe blockedtoenhancesecurity.

OneneedstoBuildaTeamwithexecutiveswho understandhowtrafficflowswithinthepremisesandcan access&secureinformation,takenecessarymeasuresto secureimportantassetsalongwiththeimplementationof roadblocksfortheattackers.

Securitymustmoveasfastasadatacenter’stechnology adoptionandintegration.SecurityStrategyShould ChangeAlongsidetheTechnologyanditshouldnotbe treatedasanadd-onoption.Additionally,businessesalso shouldensurethattheirvirusprotection,signaturesother protectionfeaturesareuptodateforbetterprotection.

BusinessesshouldIdentifyandPlaceControlsoverhighvalueassets,whichwillhelptoreducerisk.However,older securitysolutionsarecompletelyblindtonewthreats,new securitycompanieshaveproducedlatestsolutionsthat protectdatainthevirtualworld.

AccessRestrictionalsoneedstobeimposed.Every businessshouldthoroughlycheckaperson’sbackground beforegivingtheaccesstoaprizedpossession.Accessto themainsiteandtheloadingbaymustbelimited,

Digital Revolution www.insightssuccess.com32 2019|November

additionally,two-factorauthenticationsandfortifiedinteriorswithsecurityguardsandrovingpatrolswouldhelpto safeguardtheemployeesandthedatacenter.

InstallingSurveillanceCamerasaroundthedatacenter,alongsideremovingsignswhichmayprovidecluestoitsfunction helpstolocateanintruder.Abufferzonebetweenthedatacenterandalltheentrypointswilllimitunlawfultrespassingtoa greatextent.Additionally,thedatacenterneedstobefarawayfromthemainroadanditshouldnothaveanywindowsother thanadministrativepurposesforbettersecurity.

AdatacentershouldCheckTestBack-UpSystemsregularlyasprescribedbythemanufacturer.Itshouldalsoensureto makealistandofDo’sandDon’tsintheeventofanattack.Recoveryplansandsecurityplansalsoneedtobechecked thoroughly.

DatacentersarealwaysaSoftTargetforTheTerrorists,asanattackonthemcandisruptanddamagemajorbusinessand communicationinfrastructure.So,securityneedstobetakenseriouslyandtodothatproactivestepsshouldbetakentolimit theimpactofaterroristattack.

TrainedSecurityGuardsneedstobepostedinsideadatacenterandtheyshouldbewelltrained.Securityofficersmust undergostrictsite-specifictrainingtomonitorsurveillancefootage.Dependingonthesizeofdatacenterandthenumberof securitycamerasmultiplesecurityofficersmayberequiredonduty.Securityofficersdedicatedtoinspectingsurveillance footagehelpswhenitcomestosecuringadatacenter.

DisasterRecoveryisverymuchimportant,thatmustbeinplace.Ifthedatacenterstopsfunctioningafteranattackor naturalcalamity,itmusthaveawaytorestoreoperationsassoonaspossible.Tobereadyforadisasterandtoevaluatethe disasterrecoveryplan,it’snecessarytotrainstaffswellandexperiencesimulateddisasters.

Toavoidtheseobstacles,oneneedsafairbitofknowledgeofnewsecuritysystems,solidplans,andcomprehensive visibility.Themoreworkadatacentercandoupfrontintheabove-mentionedareasthebetterthechancesofsuccesswith lesseroutages.

www.insightssuccess.com33 2019|November

Challenges in Cloud Computing

Challenges in Cloud Computing

TheCloudskeeprollinginforenterprises.Inthe 2018StateoftheCloudSurveyperformedby RightScale,theyfoundthat96%ofrespondents nowusethepublic,private,hybrid,oramixofcloud computingmodels.Toaddsomeadditionalcomplexityto themix,fromthesamesurvey,organizationsarealready runningapplicationsin3.1cloudsandexperimentingwith 1.7moreforatotalof4.8clouds.

Businessesreportthekeyadvantagesofmovingworkloads totheCloudareflexibility,agility,easyaccessto information,andcostsavings.Allofthesegreatadvantages thoughcomewithaprice.Justlikeanymigrationproject, therearealotofmovingpiecesandalotofplacesa companycanrunintoissues.

Therearereallythreesilosofchallengesthatbothcloud migrationsandoperatingintheCloudfallinto.

– Planning–Withoutawellthoughtoutplan,your migrationisdestinedtohavearockyroadtooperational readiness.

– RiskMitigation–Itiskeytounderstandalltherisks, technologyandbusiness,thatmovingandoperatingin theCloudcreates.Addingriskmitigationtoyourinitial planwillhelpeasethetransitionandmakeasurprise freeenvironmentwhenservicesgointoproductionin theCloud.

Governance(CostandSecurity)–Theeaseofuse, agility,andelasticityoftheCloudaregreatbenefits, but,theycanalsoleadtorunawaycostsandalackof adherencetosecuritybestpractices.

AtCCSIwebreakthemigrationandoperationintheCloud into5keyareas.

– Discovery

Itisacriticalstartwithafullunderstandingofwhat existsintheenvironmenttoday.Allapplications, services,andsupportinginfrastructureshouldbe inventoriedanddocumented.Thiswillensurenothing getsleftbehindandthatthereisaclearunderstanding ofthecurrentsteadystateinfrastructure.

– Assessment

Onceacompleteinventoryiscreated,eachapplication andservicecanbeevaluatedtodetermineifitshouldbe movedtotheCloud.Ifitistomove,isitbestsuitedfor public,private,orhybriddeploymentorwoulditbe bettertomovetoaSaaS(SoftwareasaService) solution.Perhapsitcanbedecommissionedbecause thereareduplicateservices,oritisnotbeingused anymore.Itmayalsobedeterminedthattheapplication orserviceisnotagoodtargettomove.Perhapsitisa legacyapplicationthatcan’tsupportmoremodern infrastructures.

ThisisalsoagoodtimetostartreviewingCloudservice providersthatmayfittherequirementsofyour applications,yourinfrastructure,andyourbudget.

– MigrationPlanning

Nowthatweknowwhatwearemovingandwhereitis moving,wecanstarttoputtogetheraplan.Duringthe migrationplanningphaseworkloadsareprioritizedfor theordertheyaregoingtobemoved,abudgetisput together,abusinesscaseismadeforeachworkloadthat istobemoved,andpilotmigrationsareperformed wherefurtherdesign,performance,orreliabilitytesting isneeded.Oncethisstageiscomplete,afullmigration roadmapalongwithbuyinfromalltheinterested partieswithintheorganizationshouldbesecured.

– MigrationandTesting

Onceaworkloadismigrated,fulltestingshouldtake place.Testingforperformance,load,security,resiliency andreliabilityshouldbeperformed.Thisisoneofthe mostcriticalsteps.Itismucheasiertomitigateissues BEFOREgoingintoproduction.

GoLive

Thisisprobablytheshortestbutscariestpartofthe process.Afterallthehardwork,theplugispulledon theoriginalsystemandthenewsystemintheCloud goeslive.Allsupportprocessesshouldbetransitioned tosupportthenewcloudinfrastructureandall documentationshouldbeupdated.Afteranyissuesare

Leadership Viewpoint www.insightssuccess.com34 2019|November

ironedout,apostmigrationreviewis alwaysvaluabletoseeifthereareanywaysto improvethemigrationprocessforthenextworkload.

Nowthatyourorganizationisofficially“intheCloud”,the challengeofgovernancebegins.Foreffectivecostcontrol incloudcomputingservices,itisimportanttounderstand thedifferentfactorsthatimpactanorganization’scost. Cloudcostmanagementtoolsshouldbeusedtohelp discoverthesourceoftheseinefficiencies.Unplannedcosts areoftenduetoalackofvisibilityofcurrentconsumption andpasttrends.Whenorganizationsusedonpremise infrastructure,theyfinanceditwithfixedupfrontCAPEX investments.CloudconsumptionisanOPEXsubscription modelbasedonutilization.Ashiftintheapproachto operationalmanagementisnowneeded.Optimizingfor costisasimportantasoptimizingforperformance.

Cloud-basedgovernancetoolscantrackusageandcosts thenalertadministratorswhencostsaregreaterthan budgeted.Thesesametoolscanbeusedtoensurecorporate securitypoliciesarebeingappliedtoallworkloadsandthat bestpracticesecurityframeworkslikeCenterforInternet Security(CIS)arebeingapplied.

Ascloudservicesmovedeeperintotheorganization,it’sas importantaseverthattechnologyleadersmakeinformed decisionsaboutwhichproducts,services,andpayment

modelsdeliverthe bestresultsandhave adequateplanningin place-butit’snoteasy.

AboutCCSI

Formorethan40years,ContemporaryComputer ServicesInc.(CCSI)missionhasbeentohelpsolve modernbusinesschallengeswithtechnologysolutionsthat optimizecost,reducerisk,simplifyoperations,andincrease performance.CCSIprovidesthehighestqualityofservice intheindustryforthefullspectrumoftechnologies–from containerstoPCs,networkinfrastructures,managed services,IPtelephony,cybersecurity,cloudservices,SDWAN,tostoragesolutions.AtCCSI,webelievethat technologyexiststomakeourlives-andourbusinessessimpler,moreproductive,secure,andultimatelymore profitable.Let’sGrowTogether.Learnmoreat www.ccsinet.com.

Joe Goldberg Cloud Program Manager CCSI
Joe Goldberg is the Senior Cloud Program Manager at CCSI. Over the past 15+ years, Joe has helped companies to design, build out, and optimize their network and data center infrastructure. Joe is also ITIL certified. Joe can be contacted via Twitter handle
@DevOps_Dad or by email jgoldberg@ccsinet.com.
About the Author
www.insightssuccess.com35 2019|November

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.