Category Archives: Security

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs

Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for years to follow.

The role of Chief Marketing Officer (CMO) has evolved significantly in the past several years. Previously, the job was predominantly about establishing an identity — advertising, brand management and thinking creatively — but today it’s a lot more complex. CMOs are now charged with a variety of responsibilities that span technology, analytics and growth strategy, and because they’re often held accountable for contribution to company revenue, today’s CMOs are also responsible for optimizing operational processes and demonstrating measurable impact.

My personal roles in marketing have evolved over the years, as well. Before leading worldwide marketing strategy and execution as ThreatMetrix CMO, I directed the go-to-market strategy for IBM’s portfolio of Software-as-a-Service solutions. Prior to IBM, I served as a Vice President of Corporate Marketing at DemandTec and focused my role around building a modern demand generation engine and repositioning my company’s business to drastically increase our revenue.

In all of my years as a marketing leader, I’ve learned a few key lessons about what it takes to stay effective and deliver a positive return on investment for my department. Below are five tips for CMOs working to navigate today’s ever-evolving digital and mobile-focused business landscape:

1. Think like a CFO

To succeed as CMO, it’s crucial to embrace financial metrics and look beyond top-line spending numbers. Get comfortable speaking with your finance department about topics such as return on capital, budget variance, accrual accounting and revenue recognition as it applies to your marketing operations. Not only will this help build your credibility amongst other company executives, but it will also help streamline your decision-making process. Furthermore, being well-versed in the responsibilities of your CFO will broaden your business acumen and can also help refine your marketing strategy.

2. Align with sales

In addition to embracing financial metrics, it’s important to establish a close relationship with your sales department, because by deeply understanding the customer journey you’ll be able to strengthen marketing alignment to revenue and ultimately yield a stronger marketing-generated sales pipeline. To build a stronger empathy for your sales team, I’ve found it helpful to start by moving outbound sales development representatives out of the sales team and into marketing. Also, make sure you’re comfortable giving detailed product demonstrations (as sales reps development reps do) and work to ensure you’re prepared to step in and lead the sales department should there ever be a leadership transition.

3. Hire creatively

comic-facebook-friends

It may seem obvious, but it’s important to fully understand that the people you hire will drastically impact your productivity and efficacy as CMO. Build a marketing department of leaders who complement one another. Hire people with extensive business and marketing experience and also hire recent college graduates who can offer digital fluency and an aptitude for lifetime learning. Different perspectives from different generations of workers can offer enormous value, often leading to more creative solutions and better business outcomes. Additionally, by bringing together employees with different backgrounds, you as the CMO can unify your department’s strengths to benefit your individual employees and the business as a whole.

4. Embrace ABM

The school of Account Based Marketing (ABM) may just be gaining traction today, but I predict will be a strategic pillar for all CMOs in the near future. Implementing ABM can result in a variety of benefits, including a more focused sales and marketing strategy, a more closely aligned sales and marketing team, an improved buyer journey and additional revenue.

5. Prioritize content

It’s easy to get caught up in the slew of marketing-specific technologies, analytics solutions and metrics, however to achieve long-term success, it’s important to not lose sight of one of the marketing basics: content. Prioritize writing excellence amongst your team, and orient your department around content publishing. Maintain an editorial calendar to ensure your content marketing themes are upheld, and make sure the content you’re creating is forward-looking and centers around what the market cares about (rather than just what you know or sell).

The role of CMO can be challenging at times, and while it’s unclear how the job may evolve in the future, it’s certain to grow even more complex and all-encompassing as technology and data continue to permeate our world. However, by practicing greater interdepartmental empathy and combining new industry techniques with effective, traditional methods, success can be realized today. Perhaps most importantly, in moving beyond the Chief ‘Marketer’ title and embracing the comprehensive business influence they’re capable of, today’s CMOs can seize the opportunity to serve as dynamic leaders and key, corporate decision-makers along with their CEO and other C-suite colleagues.

By Armen Najarian, CMO, ThreatMetrix

armen-najarianArmen leads worldwide marketing strategy and execution for ThreatMetrix. Previously, he directed the go-to-market strategy for IBM’s $1B portfolio of 100+ SaaS solutions. Armen joined IBM through the $440M acquisition of DemandTec, where as VP of Corporate Marketing he built a modern demand generation engine and repositioned the business supporting a 3x increase in revenue over a 5 year span.

Transparency in the Cloud and the Lack Thereof

Transparency in the Cloud and the Lack Thereof

Cloud Transparency

The enterprise cloud is changing the way we do things from our day jobs, to social media, entertainment, and everyday interactions. While many of today’s enterprises are leading the way to complete digital transformation, one concern they often have is the lack of transparency of cloud computing.

It’s a fact that many cloud service providers do not offer customers visibility into their operating environments. Customers have no idea where their data resides physically or virtually, and are not given access to information about specific services or when those services will be upgraded. While this is generally accepted in the consumer world, the enterprise cannot tolerate this lack of visibility, access, and lack of control of their own data or the services that run the business.

The absence of transparency has led some enterprises to consider building private clouds in their own data centers. While this gives them the control and visibility they want, it also comes with a big price tag, not to mention security and operational issues. In the end, it’s not worth the time and resources, and it doesn’t allow the enterprise to take full advantage of the positive features of public cloud services.

On the flip side, public clouds provide many benefits for the enterprise including the ability to quickly launch services that change the way work gets done.

Some of these services include: 1) virtual machines for developers and quality engineers, 2) storage for backups, 3) desktop productivity applications such as email and calendaring and 4) IT, security, legal and customer service workflow applications. Of course, every enterprise wants all these services but unfortunately, the transparency and control that enterprises want is not there today in most public clouds.

In order to make the enterprise cloud the platform that drives all enterprise workflow, a compromise has to be made. Cloud service providers need to give their customers greater visibility and the control they are used to having in their own data centers. Customers should expect the following from their cloud service provider:

  • Choose where your data goes – One primary factor in achieving true visibility and control of data in a cloud service is that customers should be able to request and know where their service and data physically resides (i.e. datacenter locations). This knowledge will help customers overcome some of the fear and lack of confidence that can at times occur with the seemingly ominous idea of data floating around somewhere in “the cloud.”
  • Real availability – An additional element of customers achieving increased visibility of their data in the cloud is the level at which data availability and metrics are available. Instead of customers all being grouped together in large sets of data without the ability to distinguish one from another, availability should be achieved at the customer instance level. With availability at this granular level, customers can be presented with customized metrics specific to each of their instances, instead of a more generic set of metrics applying to a group of customers. This is real availability, and combined with knowledge of the physical location of data and services, customers can achieve true visibility into their data and have a significantly higher level of confidence and trust in the cloud service provider.
  • Deal with the issues – If there is an availability issue then customers should have access to the root cause incident with all the details. If the incident results in a problem that needs to be fixed in the service provider’s software or a change that needs to happen on the infrastructure, then this should remain transparent to the customer. Customers entrust their data to the cloud service provider, and in return they should expect an honest and realistic view into the service provider’s management of that data. When problems arise, they should not be invisible to the customer, the customer should be given information about the issues and insight into how the issues are being resolved.

CloudTweaks Comic

  • Granular transparency – In addition to remaining transparent when issues arise, service providers should also provide customers with a high level of transparency every day, with all transactions impacting a customer instance. Customers are used to running their own services, with the ability to monitor and see their data on a daily basis. As such, service providers should provide customers with the ability to view and download every transaction that is performed on their instance, and remove one of the main hurdles customers face in handing over data to a service provider on the cloud.
  • Full control – Whether it is for compliance, testing or user acceptance purposes, enterprises want complete control of their instances including when their service will be upgraded or when new features will be enabled. Customers should be able to have input on the date and time of upgrades as well as all aspects of the management of their instances. This moves beyond the visibility and availability of services and data and ensures that when services are being changed or updated, the customer has more than just transparency, they have control.

While it’s not a perfect system, cloud service providers are catching on that they need to build and operate a service similarly to how an enterprise runs their services, giving them full access to their data. This transparency will help enterprises have greater confidence in the cloud and will strengthen the relationship between provider and customer.

By Allan Leinwand

4 Cloud Tools To Help Your Business Save Money

4 Cloud Tools To Help Your Business Save Money

Low Cost Cloud Tools

If you own a business or simply work in an office setting, you’re likely familiar with how pricey standard professional software can be. Between your company’s word processing software, network backup and protection tools and internal documentation programs, you can guess that a solid amount of money has been put into just these business operations alone.

However, many of these tools have cloud-based alternatives that are much less expensive, if not free. Keep reading to learn about a few of them.

1. Use Google Drive Instead of Paying for Microsoft Word

Although Microsoft Word is a leading word-processing program, it’s not your only option. Rather than purchasing the software for your computer, consider using Google Drive to handle document-creation needs. Every keystroke is automatically saved in the cloud-based service, helping you breathe easier if you’re working on a project and experience a power outage or technical glitch.

Plus, Google Drive encourages collaboration. You can grant privileges to certain people, and allow them to edit, make comments or view the documents. Simply send the Google Drive-generated link to an individual to permit document access.

2. Subscribe to a Cloud-Based Backup Service

cartoon-comic-data

Backup storage drives can be costly, and there’s always the chance they’ll wear out. When your on-site hardware breaks down, it adds to the stress and workload of in-house IT support staff and could interfere with your ability to meet client deadlines or other expectations.

There are several things to consider when buying new equipment for your workplace, such as environmental factors, the needs common to your industry and whether you can easily scale the system. It’s always smart to purchase trustworthy industrial computing equipment because support costs can use up 70 to 80 percent of total ownership costs.

You can also switch your storage system from physical hard drives to a cloud-based backup service to make things easier for IT experts while cutting costs. Third-party vendors take care of hardware maintenance, and all your files are stored securely offsite, ready for you to access as needed.

3. Use Document-Sharing Apps to Buy Fewer Paper Products and Printer Ink

Cloud services can also reduce your use of paper, printer cartridges and folders. Document storage and sharing applications let you send paperwork to people in seconds, giving them the option to view documents in a digital format or print them using their own equipment. There are also cloud services that allow recipients to add digital signatures to documents such as W-9 forms and independent contractor agreements.

Besides the money-saving advantage, digitally storing files rather than printing them could provide welcome peace of mind. Some people appreciate holding physical documents in their hands, but there’s always the chance the papers could become damaged or lost. It’s easier to access a digital document when it’s convenient and organize digital folders on a computer.

4. Keep Computers Free from Threats with Cloud-Based Antivirus Protection

Anti-virus software is expensive, but it’s necessary for keeping computers functioning properly. It can also quickly become outdated, especially if you don’t have it set up to automatically install updates and security patches. Because of those potential downsides, some people have decided to use cloud-based anti-virus options instead.

Virus protection in the cloud is heavily automated, so it’s very current — and very effective for safeguarding against the newest threats. Because there’s no software residing on your computer, cloud choices free up your computer’s CPU.

Cloud services do more than prevent you from having to buy updated virus scanners. They can also make your computer run smoother and offer more thorough protection. The initial cost for a cloud service may be comparable to a traditional virus scanner, but having a computer that’s immune against current cyber threats could save you money in the long term.

Switch to the cloud if you want to enjoy more cash in your bank account and less physical equipment to track or maintain.

By Kayla Matthews

How Wearable Devices Are Making A Healthy Society Around Us

How Wearable Devices Are Making A Healthy Society Around Us

Wearable Devices

Having smartphones to smarter the way we communicate or stay connected is an old fable. Technology has evolved itself impeccably and over its boulevard, it has created footprints on the health industry in form of wearable devices.

A few decades back, wearable technology started to mold not only itself but the way humans used to live.

How and when it started?

For the former question, ‘necessity is the mother of invention’, I believe is the perfect answer. Here necessity points towards the need to live a comfortable life while the invention is nothing other than our wearable devices.

Turning the pages of time and a little after juggling the nerves in my brain, I can recall the calculator watch that got released somewhere in the 1980s. I’m sure many of you might have noticed their entrance. However, things changed with time, and technology started to create new benchmarks. This is where the need to create new standards raised.

In lieu of the same, I can recall the HugShirt (release at the CyberArt festival in Bilbao, Spain in 2004).

Since then wearable technology didn’t look back. Around ten years after this, Statista published a report, which shared 75 million wearable devices got sold in 2012. If this excites you, sit back and be prepared, as the figures for the year 2015 rose in an unmatched manner and exceeded the 2 billion mark. Sounds pretty exciting, isn’t it?

Wearable devices and healthy society

Apart from contributing into travel and entertainment segment, wearable and mobile devices have commendably created their space in the world of health care. Wearable devices today have a remarkable place in the healthcare industry. They not only track your fitness but also recommend you required things and share the same with your doctor. They can work as a remedy and can assist you and your doctor by monitoring your health issues and sharing the reports.

If we talk about the figures, according to a report in 2014 around 29.7 million people were using the wearable devices for fitness, while the very next year it almost doubled and touched the mark of 58.7 million.

stat

Wearable devices have faced a massive acceptance in the United States and this is why it generates maximum revenue of over one billion dollars from the region.

The role played by wearable devices in making a healthy society?

A study reveals that wearable devices are widely preferred for living a healthy life. The figures are expected to increase for all good reasons. However, to attract millennials it might take little more time but the parents have shown huge interest.

Let us have a look at some of the ways in which wearable devices are making us live a healthy life:

  1. Creates awareness: Wearable devices don’t get partial and thus they share the truth. Someday you might feel tired after walking for let’s say 15 minutes, but this doesn’t mean that you walked some extra steps. While you might consider it this way, wearable devices will share the exact number of steps you have taken and the calories you burnt.
  1. Educates: With a wearable device housed around your wrist you can monitor your health at any time while being anywhere. With this, you can understand the loopholes better; subsequently, make better decisions to improve your health. Imagine having a personal nutritionist with you 24 hours a day, guiding you as per your body requirements.
  1. Competition: Let us accept the fact we humans need a push in order to achieve goals, and I believe competition indeed could be a remarkable way. For this, you can have a wearable device that kicks you towards having positive competition with your near and dear ones. Imagine yourself stepping out of the gym with dual feelings; winning over your competitor and burning some extra calories.
  1. Check your sleep: ‘The subconscious state’ is what describes sleep in the best way. At such a stage if you have a device that stays awake for you, just to check if you slept well, your heart rate has been smooth, and the movements throughout the duration, this definitely gives a relaxed feeling. Not only these, but wearable devices can also accordingly plan your wake up time and make sure you follow it by reminding you.
  1. Workout becomes easy: Someday you might be tired, someday active. The same results in fluctuating workouts. While the odd days make you exhausted early, the other days you are a storm. On one hand while being in the former state you work out less and get whacked early, on the other the latter allows you to work more. With a wearable device, you can easily check your workout and eventually maintain a healthy lifestyle.
  1. Assistant for physicians and patients: Some wearable devices are designed to share your health data with your physician. Like this, your physician can’t just have a deep sneak into your health issues but also can diagnose you better. While on one side this allows you to remotely get yourself checked, on the other hand, it saves the time of your doctor without compromising with the health vitality.

Conclusion

Wearable devices aren’t just a new trend that is gaining all the attention due to their design and style, but they have proved their entity by assisting, guiding, and motivating the general people towards the health. Maybe this is why the wearable device market is increasing high above with every passing day.

By Shahid Mansuri

Distil Networks Releases Bot Mitigation Industry’s First Hi-Def Fingerprinting Solution

Distil Networks Releases Bot Mitigation Industry’s First Hi-Def Fingerprinting Solution

Distil Networks Releases Bot Mitigation Industry’s First Hi-Def Fingerprinting Solution, Enabling Defenders to Respond to Threats with Unprecedented Certainty

Hi-def device fingerprinting delivers fewer false positives, optimizing web infrastructure and resources

SAN FRANCISCO, CA–(Marketwired – November 03, 2016) – Distil Networks, Inc., the global leader in bot detection and mitigation, today announced the bot mitigation industry’s first Hi-def fingerprinting solution. Hi-def device fingerprinting goes beyond IP- and header-centric identification by actively pulling additional data from the browser to identify devices with precision. This unique approach minimizes false positives and creates an even clearer picture of web traffic, allowing web defenders to make access decisions with certainty.

Combating bots is a science that requires accuracy,” said Rami Essaid, CEO and co-founder of Distil Networks. “The process begins with gaining a clear understanding of web traffic and the devices that access your website, and for this reason, Hi-def device fingerprinting is the first step in successful bot detection and mitigation. Distil’s Hi-def fingerprinting identifies 60% more unique devices than an IP address alone, and 24% more unique devices than an IP address combined with header information. Instead of leaving those unaccounted for devices hidden from defenders, Distil’s Hi-def fingerprinting adds in over 200 additional attributes, increases accuracy, reduces false positives, and gives website defenders the confidence to not just throttle traffic, but to block it outright.

Distil’s Hi-def fingerprinting technology:

  • Inspects traffic at the perimeter, identifies malicious devices, and intercepts bad bots before they can wreak havoc on a website
  • Fingerprints stick to the bot even if it attempts to reconnect from random IP addresses or hide behind peer-to-peer networks or anonymous proxies
  • Goes well beyond IP- and header-centric identification by analyzing over 200 additional device attributes
  • Includes a tamper proofing layer, which detects manipulation of data values inside the fingerprint
  • Gives users complete visibility into false positives
  • Shares the Hi-def fingerprint across Distil customers in a globally-distributed, known violators database, and is made available for other security products like SIEM

A key distinction to Distil’s Hi-def fingerprinting is the assertive PULL of data from the client, as opposed to relying on headers that are pushed. This gathers specific data that improves identification without relying simply on the data that the client chooses to send,” said David Monahan, Research Director, Security and Risk Management at EMA. “Distil Networks’ Hi-def fingerprinting is really more like current facial recognition software. The subject can change aspects of its appearance to avoid recognition, but there is enough information in other data points to make a positive identification.”

Drupal.org is one of the largest open source development communities in the world, and our high Google authority score makes us a target for SEO agencies looking to spam our forums with links to their clients’ sites. Every week, these agencies were creating hundreds of dubious Drupal.org accounts and posting thousands of pieces of comment spam,” said Ryan Aslett, backend developer services engineer at Drupal.org. “Distil’s Hi-def fingerprinting technology allows us to block these bad actors from registering accounts, and prevents them from polluting our site.

To learn more about Distil’s Hi Def Fingerprinting:

About Distil Networks

Distil Networks, the global leader in bot detection and mitigation, is the only easy and accurate way to protect web applications from bad bots, API abuse, and fraud. With Distil, you automatically block 99.9% of malicious traffic without impacting legitimate users. Distil Web Security defends websites against web scraping, competitive data mining, account takeovers, transaction fraud, unauthorized vulnerability scans, spam, man-in-the-middle attacks, digital ad fraud, and downtime. Distil API Security protects public and partner-facing APIs against developer errors, integration bugs, automated scraping, and web and mobile hijacking. For more information on Distil Networks, visit us at http://www.distilnetworks.com or follow @DISTIL on Twitter.

Data Management and the Internet of Things

Data Management and the Internet of Things

Data Management

The Internet of Things (IoT) has taken software development to new levels and with the many points of contact it provides creates a myriad of opportunities and, of course, challenges. The number of developers working on IoT applications are consistently increasing as businesses across industries recognize the value of such apps and search for new ways to keep ahead of their competitors. In the past, SAP SQL Anywhere has operated as an embeddable database option for mobile devices, but the upsurge of IoT has seen constant evolution of this product and the latest version delivers ‘mission-critical services to Internet of Things systems and data-intensive apps.’

Managing the Data

The number of Internet of Things devices and applications being managed today is prodigious, and Gartner estimates that by 2020 we’ll have 25 billion connected devices. This will undoubtedly provide many positive gains for our day to day personal and business lives, but it’s easy to feel overwhelmed when considering the massive volumes of data collected and sent off by each one these devices. Due to the processing, sharing, and analysis requirements of data, it’s become essential to implement effective database management systems to help developers structure new builds and manage applications going forward.

cloud-sap

For developers building database-powered IoT applications, data management, synchronization, and data exchange technologies are essential to swift design, build, and deployment. Moreover, database management software ensures data is synchronized across mobile devices and remote offices meaning that vital data can be accessed from countless locations at any time. Working together with SAP HANA or SAP Business Suite software, SAP SQL Anywhere offers data management and collection solutions for mobile and remote environments through data synchronization technology that helps ensure transactions are replicated between the enterprise and remote devices in a consistent and scalable manner. Deployments consisting of tens of thousands of devices can be carried out, involving complex operations over the long term with zero data loss. Furthermore, because SAP HANA provides communication via satellite locations organizations are now able to collect and access data from locations with only intermittent connections or low bandwidths. Thanks to smart and secure synchronization for both on-premise and cloud systems, along with always-on and always-available operations, organizations benefit from reduced downtown and improved data protection encryption and data isolation.

Secure & Always On Solutions

When considering the volume of data flowing into and out of our connected devices a primary concern is security. Countless data breaches have come to light in recent times, and due to the often highly private nature of data, it’s essential that data management systems provide the necessary level of security. Customized mobile and IoT applications certainly have their advantages, but when controlling and synchronizing data across numerous IoT systems, mobile devices, and remote environments, it’s essential that the chosen data management solution is able to provide secure and reliable processes when required. SAP SQL Anywhere manages these needs through data protection encryption and data isolation and allows intelligent devices to connect to the enterprise securely while collecting data reliably and safely delivering it into the SAP HANA platform for consolidation and analysis. The strong encryption capabilities of SAP SQL Anywhere ensure data is protected and secured even during transmission and exchange.

For professionals needing progressive and reliable SQL database solutions, SAP SQL Anywhere provides an extensive range of tools and features able to create data-drive applications for remote operation, collection, and aggregation of massive amounts of data generated by IoT devices and applications, flexible, standards-based platforms, and much more. And due to increased developer productivity and optimized performance and availability, developers are able to swiftly release new applications and accurately monitor them going forward, thus ensuring businesses make the most of today’s IoT opportunities while surmounting the relevant challenges.

You can now purchase SAP SQL Anywhere in the SAP Store, and until Dec 31 receive 15% off your purchase with promo code SQL15.

Sponsored spotlight series by SAP

By Jennifer Klostermann

Intel Security Outlines Strategy For Protecting New Digital Economy

Intel Security Outlines Strategy For Protecting New Digital Economy

Intel Security Enhances Unified Defense Architecture to Safeguard Against Threats to Trust, Time and Money

News Highlights:

  • Intel Security to strengthen threat defense lifecycle through integration, automation and orchestration.
  • Unified architecture is enabled by four key integrated systems: Dynamic Endpoint, Pervasive Data Protection, Data Center and Cloud Defense, and Intelligent Security Operations.
  • Across unified architecture, Intel Security announces 10 new products that feature organically developed capabilities including machine learning-based malware classification and cloud-based advanced threat detection service as well as cloud access security broker (CASB).
  • New Open McAfee Data Exchange Layer (DXL) marks the next phase of Intel Security’s renewed commitment to help the industry accelerate the threat defense lifecycle.

FOCUS 16, Las Vegas, Nov. 2, 2016 – Today Intel Security announced an enhanced unified defense architecture designed to empower organizations to more effectively protect today’s new digital economy of trust, time and money. No longer is our economy a physical one, but one of connected networks and systems where cybercriminals have put us on the defensive. This new second economy, has put us in a world where more than money is at stake and where private and public sectors are fighting against time and working to justify trust.

Cybercriminals are forcing cybersecurity companies to redraft the rules of engagement for defending the civilized world; to effectively counteract them, we have to abandon old security playbooks to become more unpredictable and collaborative and make cyber defense a priority,” said Chris Young, senior vice president and general manager of Intel Security Group. “Our strategic charter is simple, yet disruptive: integrate, automate and orchestrate the threat defense lifecycle to drive better security outcomes – ultimately reducing more risk, faster and with fewer resources.”

Built upon the industry’s largest open ecosystem leveraging a proven integration program, Intel Security’s unified defense architecture is enabled by four protection systems – Dynamic Endpoint, Pervasive Data Protection, Data Center and Cloud Defense, and Intelligent Security Operations – that are intelligently integrated to multiply effectiveness.

Dynamic Endpoint – Isolated solutions can be effective against individual assaults, but there are too many examples where isolated solutions can’t keep up with the wide range of sophisticated, emerging threats. Tactical security firefighting needs to be replaced with integrated, dynamic security defenses designed to outsmart attackers. Intel Security’s Dynamic Endpoint solution uses advanced protection, shared intelligence and unified workflows on a single management console to unify endpoint protection, detection and correction to guard against today’s most pervasive threats. This solution, delivered in McAfee® Endpoint Security 10.5 and McAfee® Active Response 2.0 software, includes capabilities like:

  • Patient Zero Protection – Dynamic Application Containment improves protection against patient zero and ransomware threats and isolates the rest of the network from infection by monitoring and intercepting post-malicious process actions based on file reputation.
  • Advanced, Persistent Threat Protection with Containment and Machine Learning – Intel Security is the first and only vendor to offer machine learning based malware classification using both static pre-execution analysis and dynamic post-execution analysis from the cloud that is designed to help detect zero-day malware in near real time, tracing behavior when deemed suspicious and remediating without relying on traditional signatures.
  • Enhanced Protection with Integrated Web and Endpoint Protection – Only Intel Security seamlessly integrates a connection between its endpoint client and web gateway technology to enable quick-to-deploy, pervasive protection both on and off the corporate network that is designed to prevent zero-day malware from reaching the endpoint.
  • Real-Time Advanced Threats Protection – McAfee Active Response 2.0 software uses the cloud to accelerate investigations by dynamically tracing process behavior and allowing administrators to access threat context in real time during an investigation. Quickly hunt and respond using single click correction and then automate responses to address future attacks.

Pervasive Data Protection – The rise of software as a service (SaaS) applications and a highly mobile workforce has created the need to securely enable cloud-driven business. Organizations are looking for a unified solution that extends security outside the traditional perimeter covering on and off-network users and cloud services. Intel Security’s approach to pervasive data protection is to unify SaaS security across web protection, cloud access security broker, data loss prevention and encryption to provide the industry’s broadest solution across endpoints, networks and cloud-based services all centrally managed. With a foundation in unified management, along with common rulesets, policies and encryption, Intel Security will help organizations maximize business efficiency and employee productivity. Organizations are empowered to make sensitive data readily available to the people who need it, while minimizing the risk of data leakage and misuse by unauthorized personnel. Components of the integrated solution include:

  • Increased Productivity with Centralized Data Protection – McAfee® DLP for Mobile Email 10.0 software introduces unified policies and incident management for both endpoint and network DLP. It also offers end-user empowerment tools such as end-user manual classification, and end- user initiated DLP scanning and self-remediation. Not only do these capabilities help strengthen the corporate security culture, it also alleviates administrative burden.
  • Ubiquitous Web Security – McAfee Web Gateway Cloud Service is designed to enable security teams to gain the same benefits of advanced threat protection as on-premises web gateway appliances but without the cost of hardware or the resources used to maintain it. With 3x the data centers of our previous web SaaS solution, better performance and improved uptime our new cloud service has never been more ready for the enterprise.
  • Cloud Application Governance – McAfee Cloud Data Protection, available as a beta, features cloud access security broker (CASB)) technology, to provide an integrated view of risky endpoint and cloud events, including the ability to perform a real-time endpoint health check, ensuring only trusted devices are able to access sensitive information.

Data Center and Cloud Defense – Organizations are increasingly adopting cloud computing, which introduces unique security requirements that many legacy security solutions cannot address. Consequently, many struggle with weak and inconsistent cloud security controls, slow resolution of security issues and inefficient compute and staffing resource utilization. Intel Security cloud security products are designed to protect data centers with industry-leading security that detects advanced targeted attacks and manages security efficiently across physical, virtual and cloud infrastructures. Intel Security’s Data Center and Cloud Defense solution combines server security, network security and threat intelligence sharing to enable a single view of security across data center environments. This solution, delivered through McAfee® Server Security Suite 4.5 and McAfee Virtual Network Security Platform (vNSP) 8.3, includes capabilities like:

  • Cloud Security Visibility – Cloud workload discovery provides deep visibility across public and private clouds for virtual machines, associated workloads, networks and storage, enabling organizations to establish a strong and consistent security posture.
  • Threat Intelligence Sharing and Unification – Unification of perimeter and virtual machine protection thwarts advanced targeted attacks while ensuring efficient resource utilization within highly virtualized server environments to allow organizations to detect more threats, faster and with fewer resources. Once a threat has been detected, this knowledge is shared across the data center and corrective actions can be taken.
  • Integration and Orchestration – Tight integration across McAfee Management for Optimized Virtual Environments Anti-Virus (MOVE AV), McAfee Virtual Network Security Platform (vNSP), McAfee® Advanced Threat Defense, and McAfee Threat Intelligence Exchange along with virtualization platforms like VMWare NSX and OpenStack enable orchestration of security efficiently and more easily.

Intelligent Security Operations – Organizations looking for rapid response and remediation need a closed loop threat defense lifecycle framework that makes it easy to integrate, monitor and orchestrate security solutions. New Intel Security capabilities integrate with the above solutions and Security Innovation Alliance partners to enhance and unify visibility, investigation workflows and reporting.

  • Flexible Advanced Malware Detection – Expanded options include a new cloud-based machine learning-driven malware analysis service, McAfee Cloud Threat Detection, as well as a virtual McAfee Advanced Threat Defense appliance that makes the most of an improved user experience, more Windows OS coverage, and a significant throughput rate increase.
  • Improved Visibility and Investigation – McAfee Enterprise Security Manager introduces a new HTML 5-based interface with an intuitive, analyst-centric user experience and simpler, faster search results to expedite threat management and incident response.
  • Expanded Strategy and Incident Response Services – New consulting, deployment, assessment and incident response services enable long-term maturation of an organization’s approach to risk and threat management and improve ROI. Retainer and on-demand based managed security and emergency response augment in-house expertise.

OpenDXL Initiative

The industry has long needed a way to make different technologies work better together, and we paved the way with the most highly adopted technology across major players with the McAfee Data Exchange Layer (DXL). To accelerate that, today Intel Security announced its intent to open the McAfee Data Exchange Layer to the industry as a concrete means of disrupting the cyberattackers’ advantage. Through an open source strategy and the beta release of a new software development kit (SDK) for DXL, “white hats” (both organizations and technology providers) will gain the ability to attach to a shared real-time communication fabric and exchange security intelligence as well as orchestrate actions for the shortest possible execution of the threat defense lifecycle. DXL provides a standardized application framework to integrate technologies from different vendors with each other and with in-house developed applications. The OpenDXL initiative will expand access and capabilities of the DXL SDK and the management and community infrastructure that will support it, enabling developers within ISVs, enterprises, colleges and even competitors to gain the many real-time integration and operational benefits of the Data Exchange Layer.

For more information on all new products announced at FOCUS 2016, visit: http://www.mcafee.com/us/business-home.aspx.

About Intel Security

Intel Security, with its McAfee product line, is dedicated to making the digital world safer and more secure for everyone. Intel Security is a division of Intel. www.mcafee.com

The 2016 Cloud Computing Tipping Points

The 2016 Cloud Computing Tipping Points

Cloud Computing Tipping Points

In a piece of the latest cloud research by ServiceNow, 52% of enterprises surveyed affirm that cloud is the default choice for IT projects. The report confirms that the reality of cloud adoption is finally akin to the hype but points to a few game-changing effects for IT departments as the influence of DevOps extends across enterprises. Michael Hubbard, Vice President of Inspire Team, ServiceNow, explains to CloudTweaks, “Reality is catching up with the cloud hype and IT has the opportunity to put the ‘IT will be obsolete’ threat to rest. Seventy-two percent of enterprises that have made the cloud-first shift said this shift actually made IT more relevant to the business. IT definitely has their work cut out for them. Where IT needs to focus first is working with stakeholders to pinpoint how a cloud-first strategy will drive desired business outcomes. Next, they must realize all the very discrete and fine-grained services that can leverage the cloud paradigm… leaving the old binary ‘all or nothing’ strategy decisions behind them as they rapidly optimize each project and budget line decision in their portfolio to cloud-first.”

Three Significant Findings

Surveying 1,850 mid- to senior-level managers, this global study was split evenly among IT leaders, line-of-business management, and DevOps professionals, and three meaningful conclusions have come to light. Firstly, the reality of adoption finally measures up to the hype of cloud computing. Though just over half already choose cloud over on-premise data center computing, 77% of respondents will be shifting to the cloud over the next two years.

Secondly, ServiceNow suggests that DevOps has been the primary driver behind the move to cloud as a massive 94% of respondents reported involvement of some kind or other with the DevOps movement. An attitude originating in the agile development community, the aim of DevOps is driving fast development and hosting of new services and apps through the encouragement of regular collaboration between IT and developers. With 76% of those surveyed agreeing that the rise of DevOps is driving the move to cloud-first due to new pressures on how organizations deploy applications and bottlenecks detected when hosting apps on on-premise infrastructure it’s apparent that cloud allows for the speedy addition of new streams of revenue-driving apps which fuel business growth.

jobs-it

Finally, it’s evident that our new cloud-first world requires its own set of IT skills. With 89% of companies that have already shifted to a cloud-first model stating current IT staff lack the required skills for real success, and 88% suggesting cloud could replace formal IT departments at least in part, organizations are playing a game of catch-up regarding employee proficiencies and competencies. Notably, the cloud shift has not reduced the relevance of IT, but instead 72% of respondents believe the cloud shift raises IT’s significant to their businesses, and 68% consider IT to be wholly essential in the future.

The Consequences of the Cloud-First Shift to IT Departments

It’s possible that business developments with regards to cloud adoption will result in poorer IT visibility and cost predictions and respondents note two top priorities in the cloud shift. 64% point to the necessity for achieving 360-degree visibility and 63% to the projection of the cost of computing. IT should have an unrestricted view across an organization’s entire computing environment, cloud-based applications and services included, for the most efficient management of demand, utilization of both cloud- and on-premise resources, project execution, cost assessment, and regulatory compliance. Moreover, it’s likely that IT teams will notice more business application projects filtering up from below and while implementing greater tools to code will have to maintain control of their environments for adequate security and compliance. And, of course, as cloud growth leads to cloud sprawl, IT departments will have their hands full implementing and managing best practices and policies for cloud management as they negotiate with an ever increasing number of vendors over the expanding set of cloud tools and services available.

By Jennifer Klostermann

CloudTweaks Comics
Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services Cloud Banking Insights Series focuses on big data in the financial services industry and whether it is a security threat or actually a massive opportunity. How does big data fit into an overall cloud strategy? Most FI’s have a positive mind-set towards cloud IT consumption as it not only enables…

The Storytelling Machine: Big Content and Big Data

The Storytelling Machine: Big Content and Big Data

Bridging The Gap Between Big Content and Big Data Advances in cloud computing, along with the big data movement, have transformed the business IT landscape. Leveraging the cloud, companies are now afforded on demand capacity and mobile accessibility to their business-critical systems and information. At the same time, the amount of structured and unstructured data…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

Cloud Infographic: The Explosive Growth Of The Cloud

Cloud Infographic: The Explosive Growth Of The Cloud

The Explosive Growth Of The Cloud We’ve been covering cloud computing extensively over the past number of years on CloudTweaks and have truly enjoyed watching the adoption and growth of it. Many novices are still trying to wrap their mind around what the cloud it is and what it does, while others such as thought…

Do Small Businesses Need Cloud Storage Service?

Do Small Businesses Need Cloud Storage Service?

Cloud Storage Services Not using cloud storage for your business yet? Cloud storage provides small businesses like yours with several advantages. Start using one now and look forward to the following benefits: Easy back-up of files According to Practicalecommerce, it provides small businesses with a way to back up their documents and files. No need…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…