The Integrator

Page 1



Technology’s Impact As we enter into a new decade, technology will continue to accelerate. I always enjoy reflecting on the past year and also looking ahead to what the next year has in store. In 2019, many technological innovations have emerged that have had a leading role in society affecting other areas such as labor, cultural, commercial and even political. Cybercrime has become one of the biggest threats to everyday life, not just to individuals but to industries all over the world. It’s now as complex and unpredictable as ever. To cope with the ongoing threat, organizations are moving away from simply building high walls to focused investment on forward planning, intelligence, real-time detection and response, all of which can be costly, time consuming and overwhelming. The wheels of 2020’s biggest cybersecurity threats have already been set motion. Mobile, the Cloud and Artificial Intelligence, are trends that will continue to be exploited by criminals. Couple that with the rapid growth of software development and a cybersecurity skills shortage that should be enough to keep security pros on their toes. It is time for Intersec 2020 where business, technology and innovations come together. The world’s leading security, safety, and fire protection trade show, will open doors in January 19-21 with a long list of dedicated features set to complement a packed exhibition floor featuring more than 1,100 exhibitors from 50 countries including two-thirds of the world’s top 50 security manufacturers. We are witness to the latest in technology and innovative solutions that will likely disrupt the digital world forever. The edition would not be complete without information about new product launches, announcements and various initiatives that have kept the market buzz. Promising to keep you updated on the latest and introduce business opportunities to all our readers. Till then take good care and happy selling!

Vivek Sharma Managing Editor

Managing Editor: Vivek Sharma Commercial Director: Mallika Rego Content Lead, Print & Online: Deepti Israni Art Director: Faiz Ahmed

ontents

Dear Readers

Evolution Of Cybersecurity – P-8

Increased computer power, artificial intelligence, and tools on the Dark Web are equipping cyber attackers with the resources to launch more sophisticated and destructive attacks.

At Lenovo, we are committed to bringing the latest innovations to Middle East – P-6 Cloud data services in 2020 – P-7

Nutanix and International Systems Engineering sign MOU in Saudi Arabia – P-13 Schneider Electric Appoints Pankaj Sharma Executive Vice President of Secure Power Division – P-16

Emerson Named ‘Industrial IoT Company of the Year’ for Third Year in a Row – P-18 ThreatQuotient Named Industry’s Top Threat Intelligence Platform By Frost & Sullivan – P-19 20 Tips for 2020: Mistakes to Avoid – P-20

Vectra Integrates AI-driven network threat detection and response with Amazon Web Services VPC Ingress Routing – P-22

Published by: JNS Media International MFZE

P.O Box 121075, Dubai UAE, Tel: +971-4-3705022 Fax: +971-4-3706639, website: www.VARonline.com Sales Inquiries: sales@var-mea.com All other Inquiries: info@var-mea.com | Editorial: editor@var-mea.com Disclaimer: While the publishers have made every attempt possible to get accurate information on published content in this handbook they cannot be held liable for any errors herein.


News Bytes

Aruba to Simplify Branch Deployments with Amazon Web Services Aruba, a Hewlett Packard Enterprise company, announced the integration of the Aruba SD-WAN solution with the new AWS Transit Gateway Network Manager from Amazon Web Services (AWS), to greatly simplify the deployment and management of networks connecting remote branch locations to Amazon Virtual Private Clouds (Amazon VPCs). With this integration, customers deploying the Aruba SD-WAN solution alongside AWS will have the ability to monitor and manage connectivity between AWS resources and their on-premises locations using either Aruba Central or AWS Transit Gateway Network Manager in a simple and intuitive manner. Aruba Central completely automates the process of setting up and managing these networks using Application Programming Interfaces (APIs) to interact with AWS Transit Gateway Network Manager. “We are pleased to be working with Aruba to integrate the Aruba SD-Branch solution with AWS Transit Gateway Network Manager as a simplified branch networking solution that delivers enterprise-grade performance at scale,” said David Brown, vice president of Amazon EC2 at Amazon Web Services, Inc. “This new capability helps to simplify and streamline network management for customers, so they can focus on driving their businesses forward.” Designed to help customers modernize branch networks to

meet the evolving needs of cloud, mobile and Internet of Things (IoT) environments, Aruba’s SD-Branch solution brings together cloud-managed SD-WAN, wired and wireless networking and proven security, all intelligently managed from a single point of control, Aruba Central. This purpose-built, unified solution improves pure-play SD-WAN offerings by enabling a reduced device footprint, streamlined deployment of large-scale distributed installations and lower WAN connectivity costs for branch customers. With Aruba’s SD-Branch solution, IT organizations can easily deploy and manage more branch locations while consistently enforcing security and compliance policies across all locations. “With branch locations scaling up to the hundreds – if not thousands – of sites, the need for flexibility and simplified management powered by the cloud is critical,” said Kishore Seshadri, vice president and general manager of SD-WAN Solutions at Aruba, a Hewlett Packard Enterprise company. “The integration between Aruba’s SD-WAN solution and AWS Transit Gateway Network Manager uses the power of the cloud to seamlessly connect branches to workloads in any region by connecting to the closest AWS Transit Gateway, accelerate VPN connectivity for any branch bypassing the public Internet, and deliver branch-to-branch connectivity in different AWS Regions.”

QNAP Integrates Wasabi Cloud Object Storage for High Cost Efficiency and Exceptional Performance

Q

NAP Systems, Inc., a leading computing, networking and storage solution innovator, today announced its collaboration with Wasabi Technologies, Inc. a US-based cloud object storage company, for the integration of Wasabi Hot Cloud Storage into several QNAP solutions, including HybridMount, VJBOD Cloud, and Hybrid Backup Sync 3 (HBS 3). QNAP NAS users can now enjoy a cloud object storage service that offers simple pricing, great cost efficiency and uncompromising high performance. "By supporting the popular Wasabi Hot Cloud Storage service, we're giving QNAP NAS users more choices to freely build a hybrid cloud solution that is fast in response, high in cost efficiency, and flexible in expansion,"

4  |  January 2020

said Josh Chen, product manager of QNAP. HybridMount is QNAP's file-based cloud storage gateway solution for accelerating access to major cloud storage services, such as Wasabi. The VJBOD Cloud block-based cloud storage gateway allows QNAP NAS users to accelerate cloud object storage access with additional local data store, further enhancing availability and reliability. HBS 3 is the latest version of QNAP's data backup/restore/synchronization solution to assist users with disaster recovery plans. HBS 3 can back up and synchronize data to supported cloud storage services. For these solutions, users can now select Wasabi as their cloud storage and enjoy versatile benefits including low cost and high performance.

Wasabi Hot Cloud Storage is an enterprise class, tier-free, instantly available cloud storage solution that allows storing infinite amounts of data affordably. Wasabi provides an S3-compliant interface to use with storage applications, gateways, and other platforms. Wasabi brings all cloud storage services under one tier to reduce complexity and increase cost predictability for companies and enterprises. "The integration of QNAP's backup and cloud storage gateway software with Wasabi Hot Cloud Storage creates an affordable pathway for businesses to create a highly efficient hybrid cloud solution with easy and affordable pricing," said David Friend, co-founder and CEO of Wasabi.


TechKnow | Western Digital As data explosions generated from various connectivity devices, how are WD products evolving to meet the new challenges and demands? As the data universe continues to expand, big data and the cloud have completely changed how we use data and opened new possibilities for insight and always-on accessibility while 5G and edge computing are bringing the next layer of fast data to devices at the edge. Organizations are focused on how to get more value out of the vast amount of data that’s collected 24/7, with artificial intelligence and machine learning driving new possibilities through analytics. These new workloads have demands that are very different from traditional applications. Western Digital is addressing the everchanging market needs by providing a full portfolio of compelling, high-quality storage solutions with customer-focused innovation, high efficiency, flexibility and speed. Share more about your embedded and removable flash storage solutions design for connected home, automotive, IoT and surveillance? Our embedded iNAND e.MMC flash drives are optimized for the connected home and deliver smart, high-endurance storage designed for write and read intensive applications found in a wide range of home entertainment and security applications. We are also addressing the automotive industry's increasing need for storage by equipping vehicle manufacturers and system solution providers with the technology and capacity to support both current and future applications including e-cockpits, Artificial Intelligence (AI) databases, ADAS, advanced infotainment systems, and autonomous computers. In the realm of Smart Video, Artificial Intelligence-enabled video cameras and higher 4K and beyond video resolutions are driving the increased need for oncamera storage in smart city settings. Our WD Purple series is designed specifically to meet the demands of 24/7 Smart Video and features Western Digital’s exclusive AllFrame™ technology. What are the best practices for building data strategies? To manage the mountains of data

Khwaja Saifuddin Senior Sales Director, ME Western Digital Corporation

5G & Edge Computing Bringing The Next Layer Of Fast Data businesses gather you need a plan to share this information rather than create islands of applications to solve immediate or shortterms problems. Otherwise you are creating greater long-term complexity by producing more and more varied data sets. Data should be seen as an enterprise asset. By aligning a company’s data strategy with their business strategy, benefits are bound to follow. This approach will allow companies to gain maximum value from data. How are WD products and solutions addressing the BFSI market needs? Our high-performance storage and integrated data protection help to accelerate transactions and trading, while flash storage platforms integrate speed, computing, big data management, business intelligence, and agility across the entire trading value chain. We provide the infrastructure that allows enhanced insurance services to deliver holistic customer insights and enhance client reach through unified data, applications, analytics, and human expertise, while simplifying operations and safeguarding privacy and security.

Our range of efficient and flexible storage solutions area enabling disruptive technologies such as AI and predictive analytics, allowing financial services organizations to gain insights from vast amounts of data. Please tell us about your offerings at your stand this year at Intersec? Western Digital will showcase how it is pushing the boundaries of Smart Video technology through the concept of ‘No Blind Spots’. This includes a broad range of storage solutions that enable smart video. We will have our WD Purple Series on show with both the MicroSD and WD Purple Surveillance HDD. These devices provide internal and external storage options that are high performance and reliable. Ultrastar HC 530, WD Gold HDD and Ultrastar Data 60/102 are our premier Cloud solutions and will be demonstrated at the exhibition. These storage options can be tailored to meet the needs of customers and offer enterprise class performance. In addition, Western Digital will also have a wide range of HDDs and SSDs that offer secure storage solutions that are suitable for business and consumer requirements. January 2020  |  5


TechKnow | Lenovo

At Lenovo, we are committed to bringing the latest innovations to Middle East Dr. Christopher Cooper DCG Director Lenovo MEA

Middle East – a region which is quick to embrace new technologies and adopt the latest trends. We anticipate the ThinkPad X1 Fold to launch locally towards mid-2020 and look forward to seeing how it will revolutionize the PC experience for local users. We will be sure to update you as we move closer to the official launch date.

Lenovo offers a complete product and service portfolio from connectivity devices to data center solutions and everything in between. Has this provided Lenovo a competitive edge? Our industry-leading portfolio of hardware, software and services are all created with exactly that in mind - to give our partners and clients an edge in their respective sectors. We tailor our solutions to work seamlessly and in tandem with emerging technologies such as Artificial Intelligence, Big Data & Analytics, Cloud, Internet of Things and many more to provide engineered, tested, and certified solutions to accelerate our clients’ and partners’ business growth. Furthermore, our solution services, implementation services, Truscale Infrastructure and support services has made Lenovo the industry leader in server support.

How ThinkPad X1 Fold will give an edge over competition to Lenovo? We are extremely proud to be introducing a revolutionary formfactor to the market, in the shape of the world’s first foldable PC. The ThinkPad X1 Fold is constructed of lightweight alloys and carbon fiber, covered in a leather folio cover. Beyond its classic style, it also offers the durability consumers have come to expect of the ThinkPad brand. Our research has shown that users who frequently shift from smartphone to tablet and laptop are often seeking a solution which can be molded to suit a range of environments. With the ThinkPad X1 Fold, as the needs of the user change, the PC morphs seamlessly with them.

In terms of data center solutions and software defined infrastructure and enterprise application. How is Lenovo driving its channel strategy? Lenovo Data Center completely embraces our Channel. What differentiates Lenovo when it comes to working closely with channels and vendors is our commitment to creating opportunities for our partners to succeed through the Lenovo Partner Engage Program. This is the foundation of our joint success and a powerful force to help our customers exceed their business goals. For instance, last year we announced ‘Velocity’, a project to simplify the way Lenovo does business with partners. Such projects are geared towards providing more consistency and predictability in partners’ engagements with Lenovo. By reducing friction for partners in their day-to-day relationships with Lenovo, ‘Velocity’ has successfully made us faster and more responsive with all our channel partners.

What are some of the innovative products on demo at Intersec 2020? In line with Lenovo’s strategy to empower and facilitate ‘Intelligent Transformation’, our participation at Intersec follows the company’s recent announcement of entering a strategic partnership with Pivot3, a leading provider of intelligent infrastructure solutions, to develop, market and sell a new set of converged computing and storage solutions optimized for mission-critical smart city security applications. The integrated appliances feature Lenovo DCG’s ultra-reliable ThinkSystem servers and are powered by Pivot3 HCI software. As cities around the world compete for the title of the smartest and safest city, much of the market growth is being driven by mission-critical security initiatives that rely on information collated from an array of city sensors and databases combined with video data and analytics, including facial recognition, behavioural analysis, license plate recognition and many others. Effectively collecting, analysing, storing and acting on all this information in real-time is dependent on the capabilities of the latest advances in reliable, efficient and always-available computing and storage solutions.

With the launch of Lenovo ThinkPad X1 Fold at CES 2020 when can we anticipate this product in the region? At Lenovo, we are committed to bringing the latest innovations to

6  |  January 2020


TechKnow | NetApp

Cloud data services in 2020 As answered by Maya Zakhour, MEA Partners and Pathways Lead at NetApp How do you see the regional growth for cloud data services in 2020 and forward? The arrival of hyperscalers like AWS, Microsoft, and Google is proof that businesses in the region are ready for the cloud, and that demand for public cloud services is on the rise. With the widespread adoption of hybrid multicloud as the de facto architecture for enterprise customers, organizations everywhere are under tremendous pressure to modernize their infrastructure and to deliver tangible business value around data-intensive applications and workloads. As a result, organizations are shifting from on-premises environments to using public cloud services, building private clouds, and moving from disk to flash in data centers—sometimes concurrently. These transformations open the door to enormous potential, but they also introduce the unintended consequence of increased IT complexity. We predict that a demand for simplicity and customizability will be the number one factor that drives IT purchasing decisions in 2020. As the customer needs are moving more towards hybrid multi cloud environment, how NetApp product and solutions are geared up to meet such demands? NetApp is enabling companies to have their data and applications in the right place at the right time with the right characteristics to accelerate innovation and find new insights. We do this by helping build their data fabrics. We start by developing the best, most advanced and cloud integrated physical platforms to cover more traditional workloads that companies want to keep on premises. The industry leading All Flash FAS platform, FlexPod Converged Infrastructure solution and advanced extreme performance technologies such

as our MAX Data are recommended to build this foundation. How is NetApp developing its channel in support to manage data in hybrid multi cloud environment? NetApp is focused on making it simple for partners to do business. Our award-winning Unified Partner Program makes it easy for NetApp partners to offer customers a seamless data management experience across private, public and hybrid cloud environments. Our “Cloud First Partners” have access to vital business development resources to help them grow business. Please share the progress of NetApp in its vision to support every cloud everywhere? Four years ago, when we announced the Data Fabric vision, it was a simple concept in the era of early cloud adoption. Cloud was an exciting opportunity for businesses but a major challenge for IT professionals—a fear more than an opportunity that most CIOs associated with “shadow IT.” With the Data Fabric, NetApp introduced the idea of sharing data across multiple datacenters and clouds. It gave customers the choice to use whatever hardware, software, or public cloud they want in a single, integrated ecosystem. Today, 70% of companies have a cloud strategy, whether it’s public, private, or hybrid cloud. NetApp has transformed from “just” a storage hardware company into a cloud data services and software vendor, able to respond flexibly to the needs of customers in this new cloud world. Data Fabric is no longer a vision—it’s a reality. With a cloud model built on the Data Fabric, customers can do some pretty incredible things. Data Fabric continues to grow and evolve, giving customers a best-of-breed storage experience for their data in the cloud.

What are some of the innovative products on demo at Intersec 2020 We will showcase our E-Series Video Surveillance Storage Solution designed to access and retrieve content in a heartbeat – whether for 200 or 200,000 cameras. Intelligent video is expanding the use of video surveillance imagery for new use cases in operational efficiency, marketing, demographic analysis, and true business intelligence. With the rapid growth of video surveillance data, organizations need reliable, affordable storage solutions that can scale quickly without complex management overhead. Complexities inherent in scale-out file system architectures can cause performance and management bottlenecks and introduce security vulnerabilities. The NetApp E-Series offers advantages in video surveillance environments, including modular scalability, lower risk, always-on access to data, and simplified management. January 2020  |  7


Cover Feature | Cybersecurity

EVOLUTION OF CYBERSECURITY Increased computer power, artificial intelligence, and tools on the Dark Web are equipping cyber attackers with the resources to launch more sophisticated and destructive attacks.

M

any people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the seventies, before most people even had a computer. We have covered hacking incidents that took place before computers, but for the purposes of this article, our timeline starts in 1971, with an experiment.

attack in history. Surprisingly, Morris did not write the worm to cause damage. In contrast, Morris created it to highlight security flaws such as Unix sendmail and weak passwords. However, the code made the worm replicate excessively, causing damages estimated around $100,000 to $10,000,000. It also resulted in a partition of the internet lasting for several days.

The First Computer Worm

Security Goes Mainstream

In 1971, Bob Thomas made history by creating a program that is widely accepted as the first ever computer worm. The worm bounced between computers, which was groundbreaking at the time. The worm was not at all malicious. However, it would display a message on any infecting screen stating, “I’m the creeper: catch me if you can.”

In 1999, Microsoft Windows 98 came out and ushered in a whole new level of accessibility for the layman. Windows released many patches and commercial products. Additionally, many security vendors released anti-hacking software for home computer usage.

The First Denial-of-Service (DoS) Attack

The wheels of 2020’s biggest cybersecurity threats have already been set motion. Mobile, the Cloud and Artificial Intelligence, are trends that will continue to be exploited by criminals. Couple

In 1989, Robert Morris created a computer worm, which slowed the early internet down significantly. Thus, we have the first DoS

8  |  January 2020

Cybersecurity is still the issue on every business leaders mind


be a repeat of the Mirai Botnet in 2020? Indeed, the next generation of AI-powered attacks will be crafty enough to emulate the behaviors of specific users to fool even skilled security personnel. Environmental dynamics are changing and disrupting resiliency with the rapid adoption of cloud infrastructure and the proliferation of IoT devices. The concept of a perimeter as we have known it is disappearing, and the battle against cybercrime has moved inside the network. With this shift, organizations need to rethink their security strategies as well as the tools they have traditionally come to rely on.

The threat landscape shift over the last 20 years Attacks are getting both more and less sophisticated. More sophisticated in the targeted phishing email attacks and less in the “spray and pray” attacks that bombard similar companies with similar forms of attacks. With these, instead of being strategic, they are being opportunistic and preying on the mistakes and simple misconfigurations that lead way to an easy attack. Earlier forms of attacks focused on credit card and PHI theft, these remain active but are also now accompanied by ransomware and crypto-mining attacks in an effort for simpler and more instant gratification.

Changes to the threat landscape are changing the strategic considerations of boards and business leaders

that with the rapid growth of software development and a cybersecurity skills shortage that should be enough to keep security pros on their toes.

Here is what experts say the year ahead in cybersecurity has in store:This year, the need for organizations to keep GDPR in mind has remained prominent. The stakes for protecting your organization from cyber threats have never been higher.

Cybersecurity and Internet of Things (IoT) ‘Secure by design’ will garner much copy, but probably will not deliver until 2020 or beyond. We’ll have to wait and see with this, as connected devices are increasing in circulation by the day, and perhaps it is only a matter of time before the security vulnerabilities are exposed — could there

With the increased risks of a cyber-attack, cybersecurity needs to be on the mind of both boards and business leaders. This is not only to prevent disruption of service and loss of revenue, but also to maintain a competitive advantage. Business must constantly innovate in the services they offer and how they are delivered. Falling behind will be at the expense of customer loyalty and sales. Plus, with the change in generational interests, not appealing to the millennial need for open and on demand access could also result in company obsolescence. The role Cybersecurity companies have to play in guiding organizations through this ever-changing, always evolving, threatscape Cybersecurity companies must adapt their approaches to security and solutions to align with the new perimeter-less network. This will drive a shift in thinking and product design to address security in multi-cloud, IoT, and other inter-connected environments. Today, with the sharp increase in use of digital technologies in the workplace, driven by the need for businesses to become more agile and adaptable, there has been a surge in the number of endpoints and potential ways for cybercriminals to gain access to enterprise networks. As a result, the entire cyber battlefield has evolved and become far more complex. In the past, the battle against cyber criminals was regarded as a concern for the

"We’ll have to wait and see with this, as connected devices are increasing in circulation by the day, and perhaps it is only a matter of time before the security vulnerabilities are exposed"

January 2020  |  9


Cover Feature | Cybersecurity IT department, but the widely documented breach at Sony in 2014 put cybercrime at the top of the business agenda. Organizations realized that a breach, compromise or attack could have a major impact on business performance, brand perception and – most importantly – the financial bottom line. Security became an enterprisewide issue that needed addressing, and managing risk, a business priority. More recent attacks such as the crippling WannaCry and more recent NotPetya ransomware outbreaks have highlighted that an attack doesn’t need to be against a specific organization to create chaos and cost millions. In WannaCry’s case, this attack affected huge organizations, such as the NHS, Telefonica and other large multinational enterprises, to devastating effect. If board members weren’t paying enough attention to the need for better cyber security defenses before, they certainly are now.

With this in mind, there have been three key shifts have taken place in the wake of recent large scale cyberattacks:Security has moved beyond IT No longer just the concern of the IT geek in the backroom, security now impacts everyone and has an expansive view. Its horizon is absolutely linked to business operations – whether local, regional or even global – and every department it touches. It has the power to break down the silos that enterprises often operate within; increasing interaction across departments, so that assets that need protecting are identified, reducing the impact of a future attack. However, its reach stretches beyond the confines of the core of the business, out to the edge where data is in transit and potentially a moving cyber target.

Security is at the heart of innovation IT security is no longer a barrier to change, hindering the adoption of new processes and the adoption of innovative technologies. In fact, security is front and center in the new digital world. It is

10  |  January 2020

accelerating ‘speed of service’; embedded in software-defined networks (SDN); enabling wider, seamless and secure access to data in the Internet of Things (IoT) and much more. Security is now a pre-requisite, built into new technologies and devices from the outset.

Security is becoming smarter, better, faster stronger Speed and agility are not the only assets IT security needs to harness. It also needs to act smarter and be more effective, often in the face of reduced budgets. Managing security in the digital world involves the gathering, synthesis and analysis of security data as standard. It’s no longer just about the data, but what the data can tell us. Those providers that can leverage insight, intelligence services within a global network view will be at the forefront of the next generation of security services, improving cyber threat visibility and mitigating risk. This will separate the security intelligence provider market into those who just collect data, and those with the foresight and expertise to deliver intelligent insights.

Where do businesses go from here? It’s impossible to predict exactly where the industry will turn next, but we do know that innovation and digitization will not stop anytime soon. They will continue to grow at an exponential pace, and remain crucial for business success. With this in mind, businesses must embrace new technologies, define strategies that deliver on customer experience, and take a proactive security approach to ensure all these elements can take place securely. Verizon’s 2017 Data Breach Investigations Report showed that the same threat tactics are still effective in infiltrating data, because many organizations are missing a core foundation of security tools and processes. Given the threat from cybercrime is increasing; businesses can’t afford to be reactive anymore. To succeed in security, they must look towards improving their cyber security systems, as there is too much at stake – no one wants to become a victim of the next WannaCry or NotPetya.

CyberSecurity Statistics  From 2017 to 2022, Sectors that are predicted to experience the fastest growth in security spending include state/local government (11.9%), telecommunications (11.8%), resource industries (11.3%), banking (10.4%), federal/central government (9.9%), and other industries (8.3%). (IDC)  Global spending on security applications is predicted to increase from $103.1 billion in 2019 to $133.8 billion by 2022. (IDC)  Energy companies invest below 0.2% of their revenue in cybersecurity as a rising number of hacker groups target the sector. (Bloomberg)  Cybercrime will incur up to $1.745 trillion in Asia-Pacific. (Microsoft and Frost&Sullivan)  Worldwide spending on cybersecurity is forecasted to reach $133.7 billion in 2022. (Gartner)  68% of business leaders feel their cybersecurity risks are increasing. (Accenture)  Only 5% of companies’ folders are properly protected, on average. (Varonis)  71% of breaches were financially motivated. (Verizon)  52% of breaches featured hacking, 28% involved malware and 32–33% included phishing or social engineering, respectively. (Verizon)  The top malicious email attachment types are .doc and .dot which make up 37%, the next highest is .exe at 19.5%. (Symantec)


News In Detail

ServiceNow Research Shows That Despite Increase in Cybersecurity Spending, Breaches Increased in 2019 According to respondents, 60% of breaches in 2019 involved vulnerabilities where available patches were not applied ServiceNow, the leading digital workflow company making work, work better for people, has released its second sponsored study on cybersecurity vulnerability and patch management, conducted with the Ponemon Institute. The study, “Costs and Consequences of Gaps in Vulnerability Response”, found that despite a 24% average increase in annual spending on prevention, detection and remediation in 2019 compared with 2018, patching is delayed an average of 12 days due to data silos and poor organizational coordination. Looking specifically at the most critical vulnerabilities, the average timeline to patch is 16 days. At the same time, the risk is increasing. According to the findings, there was a 17% increase in cyberattacks over the past year, and 60% of breaches were linked to a vulnerability where a patch was available, but not applied. The study surveyed almost 3,000 security professionals to understand how organizations are responding to vulnerabilities. In this report, ServiceNow presents the consolidated findings and comparisons to its 2018 study, Today’s State of Vulnerability Response: Patch Work Requires Attention.

to vulnerabilities. Four in five (80%) of respondents who employ automation techniques say they respond to vulnerabilities in a shorter timeframe through automation. “This study shows the vulnerability gap that has been a growing pain point for CIOs and CISOs,” said Sean Convery, general manager, ServiceNow Security and Risk. “Companies saw a 30% increase in downtime due to patching of vulnerabilities, which hurts customers, employees and brands. Many organizations have the motivation to address this challenge but struggle to effectively leverage their resources for more impactful vulnerability management. Teams that invest in automation and maturing their IT and security team interactions will strengthen the security posture across their organizations.”

The survey results reinforce a need for organizations to prioritize more effective and efficient security vulnerability management: • 34% increase in weekly costs spent on patching compared to 2018. • 30% more downtime vs. 2018, due to delays in patching vulnerabilities. • 69% of respondents plan to hire an average of five staff members dedicated to patching in the next year, at an average cost of $650,000 annually for each organization. • 88% of respondents said they must engage with other departments across their organizations, which results in coordination issues that delay patching by an average of 12 days. The report points to other factors beyond staffing that contribute to delays in vulnerability patching: • 76% of respondents noted the lack of a common view of applications and assets across security and IT teams. • 74% of respondents said they cannot take critical applications and systems offline to patch them quickly. • 72% of respondents said it is difficult to prioritize what needs to be patched. According to the findings, automation delivers a significant payoff in terms of being able to respond quickly and effectively

January 2020  |  11


News Bytes

Tenable Appoints Marty Edwards as Vice President of Operational Technology Security

Mindware Unveils Expansion Plans for New Cloud Marketplace

T

M

enable, Inc., the Cyber Exposure Company, announced the appointment of Marty Edwards, a globally recognized expert in cybersecurity for industrial control systems and operational technology, as VP of OT Security. “OT is part of the modern attack surface and CISOs are being tasked with securing OT systems alongside traditional IT,” said Renaud Deraison, co-founder and Chief Technology Officer, Tenable. “Together with Indegy, we’re going to deliver the industry’s first unified, risk-based view of IT and OT security. Adding Marty Edwards, one of the foremost and most sought-after industrial cybersecurity experts, to our OT bench is another testament to our growing expertise in this space and to our commitment to pioneering new solutions for the next wave of IT/OT convergence.” At Tenable, Edwards will serve as an evangelist for the company’s OT security vision, with a particular focus on furthering government and industry initiatives to improve critical infrastructure security. Edwards and his team will help ensure organizations address OT security as part of their risk conversations. He will report to the office of the Chief Technology Officer.

12  |  January 2020

indware, one of the leading Value Added Distributors (VAD’s) in the Middle East and Africa, has announced regional expansion plans for the company’s new Cloud Marketplace. The company has had a great deal of success on-boarding current channel partners and actively recruiting new partners to the platform. It is also adding a number of new products on the marketplace, giving partners an opportunity to co-sell these solutions with the existing Microsoft products, thereby enhancing their revenues. Mindware is currently seeing a lot of interest from the channel community in countries like UAE, Saudi Arabia, Kuwait and the Northern Gulf. It will also be launching the Marketplace in LEVANT where the company believes there is high potential with the growing interest in cloud services in these regions. Mr. Vijayan K. Raman, Managing Director, ICT & Cloud Solutions at EMTECH said, “We are excited about the launch of the Mindware Cloud Marketplace and the various co-sell motions the company has put into place. Over the past couple of years, digital transformation has become a big priority for regional enterprises. A lot of our customers rely on our expertise as consultants to help them transition to the cloud which they see as a big enabler of their digital transformation. The Marketplace is a great platform for us to leverage and the various built-in features enable us to be more productive and profitable as we help customers on their cloud journey.” Currently the product catalogue available on the Marketplace is heavily skewed in favour of Microsoft cloud related products and services. Realizing the need to diversify this portfolio in order to give partners the opportunity for increased revenue, Mindware is in the process of adding several new products on the platform that can be bundled with the existing Microsoft solutions. These new ‘co-sell’ products are in the areas of virtualization, backup and disaster recovery, security and performance management. In the background, Mindware is working closely with various vendors to get these ‘Cloud Solutions’ certified for interoperability. Vijay Kumar, CTO and cloud Director at Mindware said, “A lot of products that we intend to bring onto the cloud platform have already been available on-prem as a bundle with Microsoft solutions. Partners using our cloud platform will find tremendous value in co-sell products since they will be able to offer an end-to-end solution to their customers, rather than a stand-alone product. This in turn optimizes the revenue and profitability opportunities for partners. We also offer partners the option of using Mindware’s professional services in case they don’t have their own capabilities. This is a big value add for those partners that are just beginning their cloud journey.”


Nutanix and International Systems Engineering Sign MoU in Saudi Arabia N

utanix, Inc. a leader in enterprise cloud computing, announced that it has signed a Memorandum of Understanding (MoU) with International Systems Engineering (ISE), a leading systems integrator based in Saudi Arabia. The two companies plan to work together to help accelerate the realization of the goals set by Saudi Vision 2030’s National Transformation Program, by removing the constraints of traditional approaches to IT whilst ensuring integrity of information. The MOU aims to leverage the strengths of Nutanix’s market leading multi-cloud infrastructure solutions and ISE’s strong capabilities in technology implementation and operations. As part of the agreement, ISE will grant Nutanix preferred technology vendor status and will primarily position Nutanix solutions for its proposed and existing external and internal opportunities wherever appropriate. Nutanix will assist ISE in developing and certifying its staff skills to provide design, configuration and support capabilities to its customers for Nutanix solutions. Mohammad Abulhouf, country manager - Saudi and Bahrain at Nutanix said, “In Saudi Vision 2030, the government of Saudi Arabia has outlined its intent on developing the digital economy in the Kingdom, as it rightly believes that a sophisticated digital infrastructure is integral to today’s advanced industrial activities. Developing a digital economy means that both, public as well as private enterprises, need to embark on digital transformation initiatives and in this scenario, having a well defined cloud

computing strategy is an imperative.” “As a leader in hyperconverged infrastructure, Nutanix is the operating system for the cloud. Our solutions help organizations free themselves from the complexity and cost of legacy IT, and embrace the power of cloud. We believe that with a strong partner like ISE, having a high level of technical expertise and extensive knowledge of the local market, Nutanix will be able to help enterprises in Saudi embark on their hybrid cloud journey and thus contribute to the government’s overall vision of developing the Kingdom’s digital competence.”

The Security Implications of an Apparent Memory Leak in the Microsoft Access Database

I

n January 2019, Mimecast Research Labs discovered and disclosed CVE2019-0560, a Microsoft Office product vulnerability. Recently the lab discovered and disclosed a startingly similar new vulnerability called MDB Leaker that required a patch in Microsoft’s Access database application. If this vulnerability is left unpatched, it could leave 85,000 companies – nearly 60% of which are in the U.S. – exposed to a leak of sensitive data. How are these two vulnerabilities similar? Because of how a common coding mistake - in this case the improper management of system memory by an application - can lead to the unintended disclosure of sensitive or private information. False Positives Can be Good While false negatives such as missing malicious files or emails should always be minimized, counterintuitively, not

code fragments in what should clearly be a data-only file type, a Microsoft Access MDB file. The team suspected improperly-managed system memory in the Microsoft Access application, and they were able to reverse-engineer Microsoft Access and quickly reproduce the problem and track it back through multiple older versions of Microsoft Access.

all false positives are inherently bad. For instance, with MDB Leaker, as with the January 2019 Microsoft Office vulnerability, the report of a potential false positive proved to be critical to this discovery. Here’s how. After receiving a false positive report for a particular Microsoft Access file flagged through static file analysis, Mimecast researchers swung into action and determined that there were

What is the Security Vulnerability? MDB Leaker is nearly identical to the broader Office memory leak discovered early in 2019, which causes the content of uninitiated memory elements to be saved into every file - at least since Access 2002 - that is saved with an unpatched version of Access. While in many cases, due to the randomness of memory content at play here, the data unintentionally saved into the file will often be valueless content fragments. January 2020  |  13


News Bytes

Sophos Launches Managed Threat Response Service S

ophos, a global leader in network and endpoint security, announced the availability of Sophos Managed Threat Response (MTR), fully managed threat hunting, detection and response service. The re-sellable service provides organizations with a dedicated 24/7 security team to neutralize the most sophisticated and complex threats. These types of threats include active attackers leveraging fileless attacks and administrator tools such as PowerShell to escalate privileges, exfiltrate data and spread laterally, as explained in the SophosLabs Uncut article on Lemon_Duck PowerShell malware. Attacks like these are difficult to detect since they involve an active adversary using legitimate tools for nefarious purposes, and Sophos MTR helps eliminate this threat. “Cybercriminals are adapting their methods and increasingly launching hybrid attacks that combine automation with interactive human ingenuity to more effectively evade detection. Once they gain a foothold, they’ll employ ‘living off the land’ techniques and other deceptive methods requiring human interaction to discover and disrupt their attacks,” said Joe Levy, chief technology officer at Sophos. “For the most part, other MDR services simply notify customers of potential

threats and then leave it up to them to manage things from there. Sophos MTR not only augments internal teams with additional threat intelligence, unparalleled product expertise, and around-theclock coverage, but also gives customers the option of having a highly trained team of response experts take targeted actions on their behalf to neutralize even the most sophisticated threats.” Built on Intercept X Advanced with endpoint detection and response (EDR), Sophos MTR fuses machine learning with expert analysis for improved threat hunting and detection, deeper investigation of alerts, and targeted actions to eliminate threats.

CaaB: Single-Click App Feature Accelerates Customers’ Cloud Migration

C

aaB, a leading provider of a customizable, white-labeled global cloud infrastructure to help Managed Services Providers (MSPs) instantly expand their business opportunities and bottom line, recently announced its unique single-click feature that enables users to quickly, seamlessly, and efficiently migrate to cloud. Businesses who sign up for services with “The Big 3” cloud providers often find they are vendor locked and can only use the cloud vendor’s versions of solutions -- firewall, database server, communication system, etc. – taking away customers’ freedom of choice. Moreover, these providers often offer multiple options, overwhelming the customers, causing delay, and requiring additional expense and training.

14  |  January 2020

CaaB avoids all these complexities, enabling customers to bring in their existing, familiar solutions onto the new cloud infrastructure. Customers who move to the cloud can still use the programs and apps they’re comfortable using - all with a single click. “Migrating to the cloud is stressful enough, so our solution minimizes costs, worries, and prerequisites,” said Mor Mordchaev, Global Partners Director of CaaB. “Now, you don’t have to change systems or software, you take them all with you to the cloud. Cloud migration is now even more simple, seamless, efficient, and convenient - the way it should be.” As a partner-focused infrastructure (IaaS) provider, CaaB supports 6,000+ businesses by delivering flexible,

scalable cloud infrastructure services that MSPs can custom-tailor to each client’s needs. The service increases the ability of solely cloud-focused businesses to fulfill client demands quickly and efficiently. CaaB’s solutions deliver unlimited cloud bandwidth, traffic and IOPS; customizable backend for business management; simple user interface and customizable packages; reliability, scalability, and easy implementation; disaster recovery planning capabilities and other advanced technical features. Its 13 data centers across North America, Asia, Europe, and Africa/Middle East provide local sites that allow each MSP to offer country-specific solutions when it comes to data privacy, retention, and back-up regulations.


Register Online Today!

19 – 21 January, 2020 Dubai, UAE www.IntersecExpo.com

The world’s leading trade fair for Security, Safety & Fire Protection 34,800 Visitors 1,100+ Exhibitors 12 Country Pavilions 4 Conferences & Forums NEW Intersec Arena - Tech Centre for Excellence www.IntersecExpo.com/Arena Register online and skip the queue. www.IntersecExpo.com


News In Detail

Schneider Electric Appoints Pankaj Sharma Executive Vice President of Secure Power Division

years, living in various parts of the world,” said Philippe Delorme, Executive Vice President, Energy Management, Schneider Electric. “I congratulate him, and I thank Dave Johnson for his outstanding legacy. For 27 years, Dave has been dedicated to the success of APC initially then Schneider Electric in the Secure Power space. A pillar in our company, Dave has pushed a customer-first approach and a dare-to-disrupt attitude to keep reinventing a business that has gone through many transformations.” With his extensive expertise, Johnson will support the Secure Power leadership team transition in 2020, continuing Pankaj Sharma Senior Vice President, Home & Business Networks Schneider Electric

as an employee of Schneider Electric, then as an independent consultant. “Resilient systems in the cloud and at the edge are a key enabler of the all digital, all electric world. It’s an honor to take over the helm for the Secure Power Division during this critical

Pankaj Sharma has worked successfully in the Secure Power business for the last 19 years in commercial, strategy, marketing, M&A, and line of business leadership roles around the world.

time,” Sharma said. “In my new role, I will continue to advance our mission to ensure life is on in the digital world and that we are helping to build a sustainable future for our planet.” Under Johnson’s leadership, Secure Power has been a highperforming and industry-leading division, providing complete physical infrastructure solutions for data centers, distributed IT

chneider Electric, the leader of digital transformation in energy

S

environments, and industrial applications. Johnson has led global

management and automation, has promoted Pankaj Sharma

functions including strategy, commercial operations, marketing,

to succeed Dave Johnson as Executive Vice President of its Secure

R&D, supply chain, finance, and human resources. He managed

Power Division effective Jan. 1, 2020. Sharma, who is currently

teams across Asia, Europe, the Middle East, Africa, and the

Senior Vice President, Home & Business Networks, Schneider

Americas, driving overall growth and profitability.

Electric, has held leadership roles in the company including

“I want to thank Dave for his dedication to Schneider Electric

commercial, strategy, marketing, mergers and acquisitions, and

and I know it is because of his leadership that Schneider Electric

line of business. In his current role, he’s led Schneider Electric’s

is well positioned to lead the industry with disruptive innovation,”

strategy to help customers and partners address the disruptive

Sharma said. “My goal is to keep raising the bar in the Secure

trend of edge computing.

Power space by operating with the highest energy efficiency

“Pankaj is well prepared to take this challenge as he has been working successfully in the Secure Power business for the last 19

16  |  January 2020

possible, nurturing a growth mindset, and continuing to embrace a global and diverse team approach.”


A10 Networks Announces Dhrupad Trivedi as New CEO Founder Lee Chen Will Assist in Smooth Transition of Leadership Strategy Committee of the Board of Directors Continues to Review Strategic Alternatives Directed at Maximizing Shareholder Value

A10 Networks, a leading provider of intelligent and automated cybersecurity solutions, announced that Dhrupad Trivedi has agreed to join the company as its new President and Chief Executive Officer. Lee Chen, who founded A10 Networks in 2004 and has served as CEO since inception, will continue to be actively involved with the company to ensure a smooth leadership transition, and will continue as chairman of the A10 Networks Board of Directors. Dr. Trivedi joins A10 Networks from Belden, where he most recently was Executive Vice President running Tripwire, a cybersecurity software business and CTO of Belden. Prior to this, he held other executive roles at Belden, including President of Belden’s Network Solutions Division; Vice President of Corporate Strategy and Development, leading the company’s M&A activities; and starting in Belden as President of Trapeze Networks. Prior to joining Belden, Trivedi held executive roles at JDS Uniphase Corporation from 1998 through 2010. “I am honored and excited to join A10 Networks as CEO to help the company

pursue its mission of organic growth by delivering leading technology for our customers in terms of reliability, security and availability. I also look forward to partnering with the Strategy Committee of the Board of Directors to maximize shareholder value,” said Trivedi. “Lee and the A10 team have established a strong reputation as the high-performance leader in multiple growing markets, which will provide strong secular tailwinds for many years to come. I am excited to join the company at a pivotal time and lead it through this key inflection point to the next phase of growth. I look forward to working with our customers, employees, partners and investors.” “I am privileged to serve marquee customers across the globe in a wide variety of industries and tremendously proud of the innovative solutions we offer. I am honored to have worked with our outstanding team at A10. I especially appreciate their commitment to customer success first and foremost in everything they do,” said Chen. “I am also deeply confident that under Dhrupad’s leadership

the A10 Networks team will continue to help our customers prosper.” The company has committed to appoint Trivedi to its board of directors within 30 days of his joining the Company. The company’s letter agreement with VIEX Capital Advisors and its affiliates, in which the company had agreed to fix the size of the Board at six, has been amended to permit increasing the board to seven members until the company’s 2020 annual meeting of shareholders. Pursuant to the amended agreement, the company has also agreed to re-nominate directors Eric Singer and Tor R. Braham for election at the 2020 annual meeting, and VIEX Capital Advisors’ right to identify, and A10 Networks agreement to appoint within 15 days thereafter, an additional director to the Board, with Phillip J. Salsbury agreeing to resign from the Board in such event, has been extended for an additional year. The Company further announced that the Strategy Committee of the Board of Directors continues to evaluate steps to maximize shareholder value. January 2020  |  17


News In Detail

Emerson Named ‘Industrial IoT Company of the Year’ for Third Year in a Row Global technology and engineering leader recognized by IoT Breakthrough for digital transformation strategies

Stuart Harris Group President Emerson

E

merson a global automation technology and engineering company, has been named the “Industrial IoT Company of the Year” by IoT Breakthrough for an unprecedented third consecutive year. The honor recognizes Emerson’s commitment to helping customers in industries such as chemical, life sciences, power, and oil and gas define and execute a practical and successful path to digital transformation. Emerson recently introduced a new, dedicated digital transformation business that combines Emerson’s leading sensing technology, operational analytics and broad services capabilities to deliver targeted digital solutions to customer challenges. IoT Breakthrough, which received more than 3,700 nominations for the 2020 competition, recognizes companies, technologies and products worldwide that set themselves apart in IoT categories ranging from industrial and enterprise, to consumer and connected home. Winners are selected by a panel of senior-level professionals experienced in the IoT space, including journalists, analysts and technology executives. Industrial Internet of Things (IIoT) capabilities can enable a

18  |  January 2020

step change in performance, but many companies lack a clear path to get there. A recent survey by Emerson showed more than 70% of companies do not have a vision for data analytics with a clearly defined roadmap to success. Emerson’s new digital transformation business brings together critical resources, along with its existing expertise in consulting, project execution, smart sensor technologies, data management and analytics, to help manufacturers develop and implement pragmatic digital transformation strategies. “The IIoT space is crowded and can be confusing, so the goal of this organization is to help customers achieve measurable business improvement through a focused strategy and relevant technologies,” said Stuart Harris, group president for Emerson’s digital transformation business. “This award reinforces our leadership with capabilities that are proven to deliver measurable results.” To help customers realize the promise of digital transformation, Emerson’s Plantweb digital ecosystem is highly scalabe, enabling companies to focus on priority areas with a practical roadmap tailored to their business needs and readiness. This is critical because, according to the same Emerson survey, only 26% of respondents are scaling digital transformation pilots, hindering the potential of new technologies to enable widescale improvement. Emerson continues expanding its Plantweb capabilities through strategic partnerships, investments and innovation, building the industry’s most comprehensive operational analytics portfolio. Together, these dedicated resources are helping guide customers to the right digital transformation strategy and programs that accelerate Top Quartile performance. “The industrial IoT market is inundated with confusing promises and complex issues as organizations look to embrace innovation and new technology while leveraging their existing investments,“ said James Johnson, managing director at IoT Breakthrough. “Emerson is ‘breaking through’ the crowded market as a true industrial automation leader by focusing on partnering with their customers from start to finish, helping them define and execute a practical and successful path to digital transformation. Emerson’s most recent developments open up the promise of IIoT to businesses that may otherwise not be able to navigate the digital transformation process, and we are proud to name Emerson our 2020 Industrial IoT Company of the Year.”


ThreatQuotient Named Industry’s Top Threat Intelligence Platform by Frost & Sullivan Research report honors ThreatQ with 2019 Technology Innovation Award for delivering a streamlined, efficient platform

T

hreatQuotient, a leading security operations platform innovator, today announced that Frost & Sullivan has named

ThreatQuotient the 2019 Technology Innovation Leader in the threat intelligence platform industry. Frost & Sullivan’s best practices research report, available now, revealed that ThreatQ is the only solution in the threat intelligence space that enables siloed security teams to work collaboratively and manage threats effectively. After extensive evaluation, Frost & Sullivan’s global team of analysts and consultants recognized ThreatQuotient for consistently pursuing and investing in new technologies, which enables the company to serve customers more effectively and grow at a rate above the industry average. “ThreatQuotient is proud to be recognized by Frost & Sullivan as the industry’s best threat intelligence platform. Our solution, which empowers teams to identify and anticipate threats, enables organizations to reduce risk now and in the future,” said John Czupak, President and CEO, ThreatQuotient. “Our mission is to continually innovate to help security operations teams to become more efficient and effective, especially with the dynamic threat landscape and rapidly changing business requirements.” Frost & Sullivan believes finding new ways to motivate the market and maintaining a long-term commitment to innovation are key to successful growth in any organization, and that

John Czupak President & CEO ThreatQuotient

technology innovation can only be sustained by understanding demand, nurturing the brand, and differentiating from the competition. To develop their report on technology innovation for threat intelligence platforms, Frost & Sullivan analysts

teams to understand and quickly act upon the highest priority

independently evaluated solutions on two key factors: Technology

threats they face. ThreatQuotient offers exactly this solution,”

Attributes, such as industry impact, scalability, application

said Mohammed Riyaz Ahmed, Frost & Sullivan Industry Analyst.

diversity, etc.; and Future Business Value, such as financial

“Achieving excellence in technology innovation is never an

performance, customer acquisition, human capital, etc. According

easy task, and it is made even more difficult considering

to Frost & Sullivan’s best practices report, ThreatQuotient rated

today’s competitive intensity, customer volatility, and economic

higher in both factors than each of the other participants that

uncertainty. Frost & Sullivan recognizes that ThreatQuotient’s

were reviewed.

accomplishments are the result of many employees, customers,

“Today’s enterprises require a streamlined, efficient threat intelligence platform that will enable their threat operations

and investors making daily choices to support their organization and contribute in a meaningful way to its future.” January 2020  |  19


News In Detail

20 tips for 2020:

Mistakes to avoid In the first instalment of this two-article series we will be looking at cybersecurity habits to avoid when using your computing devices Let’s have a look at some cybersecurity mistakes you should avoid for a more secure 2020. Denying you are a target

Recycling your passwords

You’ve probably already brushed off this possibility with contempt, thinking the chances are slim to none. To quote Dwight from The Office, “False”. When it comes to the internet, you cannot anticipate if a breach will directly affect you. New malware may appear or a service that you use may get hacked and your password can be leaked. All of these are probabilities that you should be aware of, and prevention can go a long way in securing your connected presence.

To simplify the arduous task of memorizing scores of passwords, some people resort to recycling. This means that they reuse the same password or passphrase, perhaps varying a character or two or by adding upon it. This practice should be avoided. If the bad actors figure out one of your passwords, password reuse allows them to guess the rest of your passwords.

Clicking on suspicious links Receiving spam has become a part of everyday life. Sometimes it’s just a harmless ad, but every now and then it can be something more sinister. You might get an email coaxing you to click on a suspicious link to claim a prize you’ve won. Or an offer that sounds too good to pass up might appear in an ad. Whatever the case, if you have even a shred of doubt about it: avoid clicking on it at all costs. The link just may contain malware that may wreak all kinds of havoc on your computer.

Two-factor authentication (2FA), also known as multifactor authentication (MFA), is a simple way to add an extra layer of security to your accounts. The most common 2FA method used by popular online services is a text message with an authentication code sent to your phone. It is one of the most basic methods but use at least this one if you have no other option. If bad actors are missing one piece of the puzzle, they cannot get in until they overcome that hurdle, which might make them look for an easier challenge elsewhere.

Failing to patch

Ignoring your router setup

Is your computer nagging you for the umpteenth time to install that pesky update? Perhaps the latest patch for your smartphone’s OS has been released. You’ve probably hit the postpone button more times than you’ve snoozed your alarm. We can’t speak to your sleeping habits, but you should always keep your devices updated to the latest version of software available. It will probably save you from a headache in the long run. The infamous WannaCryptor malware spread due to devices not being patched.

When it comes to home interconnectivity, the router is the heart of your home. All your devices with an internet connection are linked to it, be it your smart TV, smartphone, personal computer or laptop. For convenience’s sake, a lot of people just go through the bare necessities when installing it or keep the default settings pre-configured by your ISP. You should always take steps to secure your router, so you can browse the internet safely.

20  |  January 2020

Not using 2FA


Using unsecured public Wi-Fi Most places like cafes, restaurants, and even shops offer complimentary Wi-Fi connections, which is a welcome alternative to using up your precious data plan. As convenient as such free connections might be, you should be careful what you connect to. An unsecured public Wi-Fi can lead to your private data being stolen or your device being hacked.

Disregarding VPN Besides using a Virtual Private Network (VPN) to connect to your work’s servers, there are other security reasons to use one in private. You can use VPNs to access your home network remotely or to limit your ISP from seeing what you are doing, or to browse safely on public Wi-Fi. Depending on what you want to do, there are various types of VPNs you can choose from to protect your communication.

Skimping on security software The internet is a useful tool, no doubt, but to paraphrase G.R.R. Martin, it can be dark and full of terrors. Granted, this leans towards hyperbole, but you should always use reputable security software to protect your data. Clicking on the wrong link might lead to malicious code making its way to your computer. Security software provides multiple layers that can stop these threats in their tracks. Prevention is the mother of security; athletes in contact sports use mouthguards as a preventive measure because fixing their teeth is more expensive than protecting them. The same goes for your data.

Underestimating backup and encryption If, due to some unforeseen circumstances, your computer kicks the can, having a backup comes in handy. Always back up your sensitive data and things you have been working on recently;

Amer Owaida Security Writer ESET

thus, if something does happen, you can continue unhindered by the unfortunate loss of your device. The same goes for encryption. Never underestimate the value of having your data encrypted: if you get hacked, the bad actor will have a tough time getting to your data; if your device gets stolen, you have an extra layer of security in place before you remotely wipe it. If you just counted ten tips and not twenty, you would be right. So stay tuned, as tomorrow we’ll continue with tips that will be geared towards smartphones. January 2020  |  21


News In Detail

Vectra integrates AI-driven network threat detection and response with Amazon Web Services VPC Ingress Routing Vectra protects cloud deployments in AWS and is now available in the AWS Marketplace

Gokul Rajagopalan Director of product Management Vectra

Vectra, the leader in network detection and response (NDR), announced that its award-winning cybersecurity platform integrates AI-driven attacker detections, threat hunting and incident investigations with Amazon Virtual Private Cloud (VPC) Ingress Routing. The Vectra platform is now available in the AWS Marketplace. “As enterprises move their high-value data and services to the cloud, it’s imperative to reduce cyber-risks that can take down businesses,” said Gokul Rajagopalan, director of product management at Vectra. “Our continued strength and leadership in AI-driven cybersecurity – coupled with our availability in AWS Marketplace – validate Vectra as a premier provider of network threat detection and response for the cloud.”

22  |  January 2020

The Vectra platform uses Amazon VPC Traffic Mirroring to monitor connections in AWS deployments to detect hidden threats without using agents. It is rapidly and efficiently deployed using AWS CloudFormation and Vectra insights are published as findings in AWS Security Hub. The performance and health of the deployment can be fully monitored through Amazon CloudWatch. When enterprises scale the size and number of their VPC instances, increased visibility becomes a requirement that is complex to support. Amazon VPC Ingress Routing is a service that helps customers simplify the integration of network and security appliances within their network topology. With Amazon VPC Ingress Routing, customers can define routing rules at the Internet Gateway (IGW) and Virtual Private Gateway (VGW) to redirect ingress traffic to third-party appliances, before it reaches the final destination. This makes it easier for customers to deploy production-grade applications with the networking and security services they require within their Amazon VPC. The Vectra platform works natively in this architecture to detect hidden threats. The Vectra Stream Connector, which delivers security-enriched network metadata to SIEMs and data lakes for threat hunting and attack investigations, is available via a valid AWS Marketplace login. Vectra sensors, which passively monitor network traffic and extract critical metadata for analysis and threat detection, are also available via a valid AWS Marketplace login. This builds on the momentum from earlier this year when Vectra announced that its AI platform features Amazon VPC Traffic Mirroring, enabling enterprises to natively run Vectra in AWS environments, as well as the achievement of AWS Advanced Technology Partner accreditation. A worldwide community of security teams now actively use Vectra to secure their cloud and hybrid environments with integrations through AWS CloudFormation, AWS Security Hub, and Amazon CloudWatch. Vectra provides innovative AI-powered cybersecurity solutions to organizations around the world. The Vectra platform applies AI to detect, respond, hunt and investigate hidden cyberthreats that evade traditional security controls and spread inside cloud, data center and enterprise infrastructures.




Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.