CSC SPV and IIT Bombay signs MOU to enable Wi-Fi services in Rural India

January 27, 2017 | 150 views

CSC SPV and IIT Bombay signed MOU to enable Wi Fi services in rural India while using different technologies. On this occasion, Prof. Abay Karandikar, IIT Bombay and Dr. Dinesh Tyagi, CEO CSC SPV exchanged MOUs.

Spotlight

Offensive Security

Offensive Security is the leading provider of online penetration testing training and certification for information security professionals. Created by the founders of Kali Linux, Offensive Security offers a unique mix of practical, hands-on training, performance-based certification programs, virtual lab access, and very successful open source projects. These offerings work together to provide practitioners with a one-of-a-kind opportunity to develop the highly sought-after skills that will advance their careers and better protect their organizations. Additionally, Offensive Security is committed to funding and growing Kali Linux, the leading operating system for penetration testing, ethical hacking and network security assessments

OTHER ARTICLES
IT SYSTEMS MANAGEMENT

Adapting Hybrid Architectures for Digital Transformation Implementation

Article | July 14, 2022

For the majority of businesses, digital transformation (DX) has emerged as a significant priority. By incorporating digital technologies into all aspects of an organization's operations, digital transformation is a continuous process that alters how organizations operate as well as how they supply goods and services to customers and connect with them. Employing hybrid network infrastructures can aid businesses in putting DX strategies into action. An IT architecture and environment is a hybrid infrastructure that combines on-premises data centers with private or public clouds. Operating systems and applications can be deployed anywhere in this environment, depending on the needs and specifications of the firm. Managing and keeping an eye on an organization's whole IT infrastructure requires the use of hybrid IT infrastructure services, sometimes referred to as cloud services. Given the complexity of IT environments and needs, this is essential for digital transformation. What Does Hybrid Network Infrastructure Have To Offer? Flexibility Companies can employ the appropriate tools for the job, thanks to flexibility. For instance, a business needs access to a lot of data if it wants to use machine learning (ML) or artificial intelligence (AI). Utilizing public cloud services like AWS or Azure can help with this. However, these services might be pricey and not provide the performance required for some applications. Durability Hybrid networks are more tolerant of interruptions. For instance, a business can continue to function if there is a problem with its public cloud by using its private data center. This is due to the fact that the outage in the public cloud has no impact on the private data center. Security Businesses can utilize a hybrid cloud strategy to protect sensitive data while utilizing the resources and services of a public cloud, potentially lowering the chance of crucial information being compromised. While analytics and applications that use data kept in a private environment will probably still need to function in a public cloud, you can use encryption techniques to reduce security breaches. Scalability and Efficiency Traditional networks can't match the performance and scalability of hybrid networks. This is due to the fact that public clouds offer enormous bandwidth and storage that may be used as needed. By using a hybrid architecture, a company can benefit from the public cloud's flexibility and capacity while still keeping its business-critical data and operations in the private cloud or on-premises data center. Conclusion A cultural shift toward more flexible and intelligent ways of conducting business, supported by cutting-edge technology, involves integrating digital technologies throughout all company activities, improving current processes, developing new operational procedures, and offering higher value to clients. Infrastructures for hybrid networks are necessary for the success of digital transformation.

Read More
IT SYSTEMS MANAGEMENT

Network Security: The Safety Net in the Digital World

Article | July 27, 2022

Every business or organization has spent a lot of time and energy building its network infrastructure. The right resources have taken countless hours to establish, ensuring that their network offers connectivity, operation, management, and communication. Their complex hardware, software, service architecture, and strategies are all working for optimum and dependable use. Setting up a security strategy for your network requires ongoing, consistent work. Therefore, the first step in implementing a security technique is to do so. The underlying architecture of your network should consider a range of implementation, upkeep, and continuous active procedures. Network infrastructure security requires a comprehensive strategy that includes best practices and continuing procedures to guarantee that the underlying infrastructure is always safe. A company's choice of security measures is determined by: Appropriate legal requirements Rules unique to the industry The specific network and security needs Security for network infrastructure has numerous significant advantages. For example, a business or institution can cut expenses, boost output, secure internal communications, and guarantee the security of sensitive data. Hardware, software, and services are vital, but they could all have flaws that unintentional or intentional acts could take advantage of. Security for network infrastructure is intended to provide sophisticated, comprehensive resources for defense against internal and external threats. Infrastructures are susceptible to assaults like denial-of-service, ransomware, spam, and illegal access. Implementing and maintaining a workable security plan for your network architecture can be challenging and time-consuming. Experts can help with this crucial and continuous process. A robust infrastructure lowers operational costs, boosts output, and protects sensitive data from hackers. While no security measure will be able to prevent all attack attempts, network infrastructure security can help you lessen the effects of a cyberattack and guarantee that your business is back up and running as soon as feasible.

Read More
APPLICATION INFRASTRUCTURE

Data Center as a Service Is the Way of the Future

Article | August 3, 2022

Data Center as a Service (DCaaS) is a hosting service that gives clients access to actual data center infrastructure and amenities. Through a Wide-Area Network, DCaaS enables clients to remotely access the provider's storage, server, and networking capabilities (WAN). Businesses can tackle their on-site data center's logistical and financial issues by outsourcing to a service provider. Many enterprises rely on DCaaS to overcome the physical constraints of their on-site infrastructure or to offload the hosting and management of non-mission-critical applications. Businesses that require robust data management solutions but lack the necessary internal resources can adopt DCaaS. DCaaS is the perfect answer for companies that are struggling with a lack of IT help or a lack of funding for system maintenance. Added benefits data Center as a Service allows businesses to be independent of their physical infrastructure: A single-provider API Data centers without Staff Effortlessly handle the influx of data Data centers in regions with more stable climates Data Center as a Service helps democratize the data center itself, allowing companies that could never afford the huge investments that have gotten us this far to benefit from these developments. This is perhaps the most important, as Infrastructure-as-a-Service enables smaller companies to get started without a huge investment. Conclusion Data center as a service (DCaaS) enables clients to access a data center remotely and its features, whereas data center services might include complete management of an organization's on-premises infrastructure resources. IT can be outsourced using data center services to manage an organization's network, storage, computing, cloud, and maintenance. The infrastructure of many businesses is outsourced to increase operational effectiveness, size, and cost-effectiveness. It might be challenging to manage your existing infrastructure while keeping up with the pace of innovation, but it's critical to be on the cutting edge of technology. Organizations may stay future-ready by working with a vendor that can supply DCaaS and data center services.

Read More
IT SYSTEMS MANAGEMENT

Enhancing Rack-Level Security to Enable Rapid Innovation

Article | July 6, 2022

IT and data center administrators are under pressure to foster quicker innovation. For workers and customers to have access to digital experiences, more devices must be deployed, and larger enterprise-to-edge networks must be managed. The security of distributed networks has suffered as a result of this rapid growth, though. Some colocation providers can install custom locks for your cabinet if necessary due to the varying compliance standards and security needs for distinct applications. However, physical security measures are still of utmost importance because theft and social engineering can affect hardware as well as data. Risk Companies Face Remote IT work continue on the long run Attacking users is the easiest way into networks IT may be deploying devices with weak controls When determining whether rack-level security is required, there are essentially two critical criteria to take into account. The first is the level of sensitivity of the data stored, and the second is the importance of the equipment in a particular rack to the facility's continuing functioning. Due to the nature of the data being handled and kept, some processes will always have a higher risk profile than others. Conclusion Data centers must rely on a physically secure perimeter that can be trusted. Clients, in particular, require unwavering assurance that security can be put in place to limit user access and guarantee that safety regulations are followed. Rack-level security locks that ensure physical access limitations are crucial to maintaining data center space security. Compared to their mechanical predecessors, electronic rack locks or "smart locks" offer a much more comprehensive range of feature-rich capabilities.

Read More

Spotlight

Offensive Security

Offensive Security is the leading provider of online penetration testing training and certification for information security professionals. Created by the founders of Kali Linux, Offensive Security offers a unique mix of practical, hands-on training, performance-based certification programs, virtual lab access, and very successful open source projects. These offerings work together to provide practitioners with a one-of-a-kind opportunity to develop the highly sought-after skills that will advance their careers and better protect their organizations. Additionally, Offensive Security is committed to funding and growing Kali Linux, the leading operating system for penetration testing, ethical hacking and network security assessments

Related News

Software security flaws and human behavior are major network vulnerability points, Ixia finds

RCRWireless News | April 22, 2019

Software security flaws — including those with available fixes that haven’t been applied — and human behavior continue to be the top sources of network vulnerabilities, according to a new report from Keysight Technologies’ Ixia group. In its third annual security report, Ixia’s Application and Threat Intelligence Research Center (a legacy of Ixia’s 2012 acquisition of BreakingPoint, which established ATI in 2005)) said that “poor cyber hygiene continues to persist year after year,” including the use of default login and password credentials; and that attacks that date back as far as 2009 remain effective because vulnerabilities are either unpatched or because patches aren’t available for legacy systems. “Software security flaws contributed to a record number of security incidents in 2018. We saw more new devices than ever before, but we also saw more devices designed and deployed without proper measures to stop, or even limit, threats,” Ixia said. Phishing that exploits human behavior continues to be a reliable first step toward compromising network systems, Ixia found, noting that “a well-crafted and well-timed phishing attempt can confuse even the most tech-savvy expert into making a mistake that leads to a network compromise.” The company said that it detected 662,618 phishing pages in the wild, and 8,546,295 pages hosting or infected by malware.

Read More

AWS Maintains Total Cloud Market Dominance Over Microsoft, Google

SDxCentral | June 25, 2018

According to new data from Synergy Research Group, Amazon Web Services (AWS) again beat out competitors during the first quarter as the largest public cloud provider. AWS, ranked by public infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) revenues, topped Microsoft, Google, IBM, Alibaba, Salesforce, and Tencent in every region. Microsoft held onto the No. 2 position in every region except for the Asia-Pacific (APAC) region where local Chinese cloud provider Alibaba held the second position. Google Cloud ranked third in all regions except for APAC. While AWS reported strong growth in their cloud businesses — up 49 percent for AWS in its Q1 2018 earnings — Microsoft Azure continues to report the highest revenues. In the fiscal first quarter of 2018, Microsoft reported $6 billion in commercial cloud revenues, a 58 percent increase year over year. Google didn’t report its specific Q1 growth. John Dinsdale, a chief analyst and research director at Synergy Research Group, said this continued pattern of growth is unusual. “One of the most notable features of the market development is the continued strength in the market growth rate.” he said. “It is usual for growth percentages to start declining … but in the last two quarters the year-over-year growth rate has actually increased.” The Synergy rankings are based on public IaaS and PaaS revenues as these segments of the cloud infrastructureservices market are the most prominent and account for the majority of revenues. Managed or hosted cloud services balance the remainder of the revenues. According to Synergy, “the dominance of AWS, Microsoft, and Google is even more marked than in the larger cloud market,” with AWS accounting for 40 percent of that market, and the combined AWS, Microsoft, Google accounting for more than 60 percent. China, which accounts for one-third of the total APAC market, is a bit of an anomaly within these numbers as the top five cloud providers in the country are local companies. Dinsdale noted that while the worldwide cloud market is demonstrating strong growth, the growth rate in APAC is about 10 percentage points higher, with China the highest growth in that region.

Read More

Letters: Missed opportunity

March 01, 2016

We are on the brink of a new information society galvanised by social media. This is the era of mobile phones doubling up as payment gateways; thanks to it, we can have a bank in our pocket. Broadband and Wi-fi access can become game changers in delivering governmental benefits to farmers, students, and employees in the government and the organised sector. But little is being done to beef up the e-governance infrastructure. Kerala has shown the way forward by becoming the first state to be declared a digital state. Digital infrastructure can pave the way for the success of e-governance programmes.

Read More

Software security flaws and human behavior are major network vulnerability points, Ixia finds

RCRWireless News | April 22, 2019

Software security flaws — including those with available fixes that haven’t been applied — and human behavior continue to be the top sources of network vulnerabilities, according to a new report from Keysight Technologies’ Ixia group. In its third annual security report, Ixia’s Application and Threat Intelligence Research Center (a legacy of Ixia’s 2012 acquisition of BreakingPoint, which established ATI in 2005)) said that “poor cyber hygiene continues to persist year after year,” including the use of default login and password credentials; and that attacks that date back as far as 2009 remain effective because vulnerabilities are either unpatched or because patches aren’t available for legacy systems. “Software security flaws contributed to a record number of security incidents in 2018. We saw more new devices than ever before, but we also saw more devices designed and deployed without proper measures to stop, or even limit, threats,” Ixia said. Phishing that exploits human behavior continues to be a reliable first step toward compromising network systems, Ixia found, noting that “a well-crafted and well-timed phishing attempt can confuse even the most tech-savvy expert into making a mistake that leads to a network compromise.” The company said that it detected 662,618 phishing pages in the wild, and 8,546,295 pages hosting or infected by malware.

Read More

AWS Maintains Total Cloud Market Dominance Over Microsoft, Google

SDxCentral | June 25, 2018

According to new data from Synergy Research Group, Amazon Web Services (AWS) again beat out competitors during the first quarter as the largest public cloud provider. AWS, ranked by public infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) revenues, topped Microsoft, Google, IBM, Alibaba, Salesforce, and Tencent in every region. Microsoft held onto the No. 2 position in every region except for the Asia-Pacific (APAC) region where local Chinese cloud provider Alibaba held the second position. Google Cloud ranked third in all regions except for APAC. While AWS reported strong growth in their cloud businesses — up 49 percent for AWS in its Q1 2018 earnings — Microsoft Azure continues to report the highest revenues. In the fiscal first quarter of 2018, Microsoft reported $6 billion in commercial cloud revenues, a 58 percent increase year over year. Google didn’t report its specific Q1 growth. John Dinsdale, a chief analyst and research director at Synergy Research Group, said this continued pattern of growth is unusual. “One of the most notable features of the market development is the continued strength in the market growth rate.” he said. “It is usual for growth percentages to start declining … but in the last two quarters the year-over-year growth rate has actually increased.” The Synergy rankings are based on public IaaS and PaaS revenues as these segments of the cloud infrastructureservices market are the most prominent and account for the majority of revenues. Managed or hosted cloud services balance the remainder of the revenues. According to Synergy, “the dominance of AWS, Microsoft, and Google is even more marked than in the larger cloud market,” with AWS accounting for 40 percent of that market, and the combined AWS, Microsoft, Google accounting for more than 60 percent. China, which accounts for one-third of the total APAC market, is a bit of an anomaly within these numbers as the top five cloud providers in the country are local companies. Dinsdale noted that while the worldwide cloud market is demonstrating strong growth, the growth rate in APAC is about 10 percentage points higher, with China the highest growth in that region.

Read More

Letters: Missed opportunity

March 01, 2016

We are on the brink of a new information society galvanised by social media. This is the era of mobile phones doubling up as payment gateways; thanks to it, we can have a bank in our pocket. Broadband and Wi-fi access can become game changers in delivering governmental benefits to farmers, students, and employees in the government and the organised sector. But little is being done to beef up the e-governance infrastructure. Kerala has shown the way forward by becoming the first state to be declared a digital state. Digital infrastructure can pave the way for the success of e-governance programmes.

Read More

Events