Hyper-Converged Infrastructure
Article | July 13, 2023
Communications giant Verizon last week launched 5G for Business Internet in 20 new markets, targeting SMBs and enterprises alike.
The fixed-wireless plans provide download speeds of 100Mbps ($69/month), 200Mbps ($99/month), and 400Mbps ($199/month) with no data limits. Upload speeds are slower. Verizon is also offering a 10-year price lock for new customers with no long-term contract required.
“As 5G Business Internet scales into new cities, businesses of all sizes can gain access to the superfast speeds, low latency and next-gen applications enabled by 5G Ultra-Wideband, with no throttling or data limits,” Tami Erwin, CEO of Verizon Business, said in a statement.
“We’ll continue to expand the 5G Business Internet footprint and bring the competitive pricing, capability, and flexibility of our full suite of products and services to more and more businesses all over the country.”
The service was previously launched in parts of Chicago, Houston and Los Angeles. Verizon started rolling out 5G services last year using lower spectrum bands. According to a study by IHS Markit’s RootMetrics, Verizon offers speeds similar to those of T-Mobile but behind AT&T.
Read More
Hyper-Converged Infrastructure, IT Systems Management
Article | September 14, 2023
As your organization scales, inevitably, so too will its infrastructure needs. From physical spaces to personnel, devices to applications, physical security to cybersecurity – all these resources will continue to grow to meet the changing needs of your business operations.
To manage your changing infrastructure throughout its entire lifecycle, your organization needs to implement a robust infrastructure lifecycle management program that’s designed to meet your particular business needs.
In particular, IT asset lifecycle management (ITALM) is becoming increasingly important for organizations across industries. As threats to organizations’ cybersecurity become more sophisticated and successful cyberattacks become more common, your business needs (now, more than ever) to implement an infrastructure lifecycle management strategy that emphasizes the security of your IT infrastructure.
In this article, we’ll explain why infrastructure management is important. Then we’ll outline steps your organization can take to design and implement a program and provide you with some of the most important infrastructure lifecycle management best practices for your business.
What Is the Purpose of Infrastructure Lifecycle Management?
No matter the size or industry of your organization, infrastructure lifecycle management is a critical process. The purpose of an infrastructure lifecycle management program is to protect your business and its infrastructure assets against risk.
Today, protecting your organization and its customer data from malicious actors means taking a more active approach to cybersecurity. Simply put, recovering from a cyber attack is more difficult and expensive than protecting yourself from one. If 2020 and 2021 have taught us anything about cybersecurity, it’s that cybercrime is on the rise and it’s not slowing down anytime soon.
As risks to cybersecurity continue to grow in number and in harm, infrastructure lifecycle management and IT asset management are becoming almost unavoidable. In addition to protecting your organization from potential cyberattacks, infrastructure lifecycle management makes for a more efficient enterprise, delivers a better end user experience for consumers, and identifies where your organization needs to expand its infrastructure.
Some of the other benefits that come along with comprehensive infrastructure lifecycle management program include:
More accurate planning;
Centralized and cost-effective procurement;
Streamlined provisioning of technology to users;
More efficient maintenance;
Secure and timely disposal.
A robust infrastructure lifecycle management program helps your organization to keep track of all the assets running on (or attached to) your corporate networks. That allows you to catalog, identify and track these assets wherever they are, physically and digitally.
While this might seem simple enough, infrastructure lifecycle management and particularly ITALM has become more complex as the diversity of IT assets has increased. Today organizations and their IT teams are responsible for managing hardware, software, cloud infrastructure, SaaS, and connected device or IoT assets. As the number of IT assets under management has soared for most organizations in the past decade, a comprehensive and holistic approach to infrastructure lifecycle management has never been more important.
Generally speaking, there are four major stages of asset lifecycle management. Your organization’s infrastructure lifecycle management program should include specific policies and processes for each of the following steps:
Planning. This is arguably the most important step for businesses and should be conducted prior to purchasing any assets. During this stage, you’ll need to identify what asset types are required and in what number; compile and verify the requirements for each asset; and evaluate those assets to make sure they meet your service needs.
Acquisition and procurement. Use this stage to identify areas for purchase consolidation with the most cost-effective vendors, negotiate warranties and bulk purchases of SaaS and cloud infrastructure assets. This is where lack of insights into actual asset usage can potentially result in overpaying for assets that aren’t really necessary. For this reason, timely and accurate asset data is crucial for effective acquisition and procurement.
Maintenance, upgrades and repair. All assets eventually require maintenance, upgrades and repairs. A holistic approach to infrastructure lifecycle management means tracking these needs and consolidating them into a single platform across all asset types.
Disposal. An outdated or broken asset needs to be disposed of properly, especially if it contains sensitive information. For hardware, assets that are older than a few years are often obsolete, and assets that fall out of warranty are typically no longer worth maintaining. Disposal of cloud infrastructure assets is also critical because data stored in the cloud can stay there forever.
Now that we’ve outlined the purpose and basic stages of infrastructure lifecycle management, it’s time to look at the steps your organization can take to implement it.
Read More
Application Storage, Data Storage
Article | July 12, 2023
The rollout of 5G networks coupled with edge compute introduces new security concerns for both the network and the enterprise. Security at the edge presents a unique set of security challenges that differ from those faced by traditional data centers. Today new concerns emerge from the combination of distributed architectures and a disaggregated network, creating new challenges for service providers.
Many mission critical applications enabled by 5G connectivity, such as smart factories, are better off hosted at the edge because it's more economical and delivers better Quality of Service (QoS). However, applications must also be secured; communication service providers need to ensure that applications operate in an environment that is both safe and provides isolation. This means that secure designs and protocols are in place to pre-empt threats, avoid incidents and minimize response time when incidents do occur.
As enterprises adopt private 5G networks to drive their Industry 4.0 strategies, these new enterprise 5G trends demand a new approach to security. Companies must find ways to reduce their exposure to cyberattacks that could potentially disrupt mission critical services, compromise industrial assets and threaten the safety of their workforce. Cybersecurity readiness is essential to ensure private network investments are not devalued.
The 5G network architecture, particularly at the edge, introduces new levels of service decomposition now evolving beyond the virtual machine and into the space of orchestrated containers. Such disaggregation requires the operation of a layered technology stack, from the physical infrastructure to resource abstraction, container enablement and orchestration, all of which present attack surfaces which require addressing from a security perspective. So how can CSPs protect their network and services from complex and rapidly growing threats?
Addressing vulnerability points of the network layer by layer
As networks grow and the number of connected nodes at the edge multiply, so do the vulnerability points. The distributed nature of the 5G edge increases vulnerability threats, just by having network infrastructure scattered across tens of thousands of sites. The arrival of the Internet of Things (IoT) further complicates the picture: with a greater number of connected and mobile devices, potentially creating new network bridging connection points, questions around network security have become more relevant.
As the integrity of the physical site cannot be guaranteed in the same way as a supervised data center, additional security measures need to be taken to protect the infrastructure. Transport and application control layers also need to be secured, to enable forms of "isolation" preventing a breach from propagating to other layers and components. Each layer requires specific security measures to ensure overall network security: use of Trusted Platform Modules (TPM) chipsets on motherboards, UEFI Secure OS boot process, secure connections in the control plane and more. These measures all contribute to and are integral part of an end-to-end network security design and strategy.
Open RAN for a more secure solution
The latest developments in open RAN and the collaborative standards-setting process related to open interfaces and supply chain diversification are enhancing the security of 5G networks. This is happening for two reasons. First, traditional networks are built using vendor proprietary technology – a limited number of vendors dominate the telco equipment market and create vendor lock-in for service providers that forces them to also rely on vendors' proprietary security solutions. This in turn prevents the adoption of "best-of-breed" solutions and slows innovation and speed of response, potentially amplifying the impact of a security breach.
Second, open RAN standardization initiatives employ a set of open-source standards-based components. This has a positive effect on security as the design embedded in components is openly visible and understood; vendors can then contribute to such open-source projects where tighter security requirements need to be addressed.
Aside from the inherent security of the open-source components, open RAN defines a number of open interfaces which can be individually assessed in their security aspects. The openness intrinsically present in open RAN means that service components can be seamlessly upgraded or swapped to facilitate the introduction of more stringent security characteristics, or they can simultaneously swiftly address identified vulnerabilities.
Securing network components with AI
Monitoring the status of myriad network components, particularly spotting a security attack taking place among a multitude of cooperating application functions, requires resources that transcend the capabilities of a finite team of human operators. This is where advances in AI technology can help to augment the abilities of operations teams. AI massively scales the ability to monitor any number of KPIs, learn their characteristic behavior and identify anomalies – this makes it the ideal companion in the secure operation of the 5G edge. The self-learning aspect of AI supports not just the identification of known incident patterns but also the ability to learn about new, unknown and unanticipated threats.
Security by design
Security needs to be integral to the design of the network architecture and its services. The adoption of open standards caters to the definition of security best practices in both the design and operation of the new 5G network edge. The analytics capabilities embedded in edge hyperconverged infrastructure components provide the platform on which to build an effective monitoring and troubleshooting toolkit, ensuring the secure operation of the intelligent edge.
Read More
Storage Management
Article | May 3, 2023
Stay ahead of the curve and navigate the complex landscape of regulatory obligations to safeguard data in cloud. Explores the challenges of maintaining compliance and strategies for risk mitigation.
Contents
1. Introduction
2. 3 Essential Regulatory Requirements
2.1 Before migration
2.2. During migration
2.3. After migration
3. Challenges in Ensuring Compliance in Infrastructure as a Service in Cloud Computing
3.1. Shared Responsibility Model
3.2. Data Breach
3.3. Access Mismanagement
3.4. Audit and Monitoring Challenges
4. Strategies for Addressing Compliance Challenges in IaaS
4.1. Risk Management and Assessment
4.2. Encryption and Collaboration with Cloud Service Providers
4.3. Contractual Agreements
4.4. Compliance Monitoring and Reporting
5. Conclusion
1. Introduction
Ensuring Infrastructure as a Service (IaaS) compliance in security is crucial for organizations to meet regulatory requirements and avoid potential legal and financial consequences. However, several challenges must be addressed before and after migration to the cloud. This article provides an overview of the regulatory requirements in cloud computing, explores the challenges faced in ensuring compliance in IaaS, a cloud implementation service and provides strategies for addressing these challenges to ensure a successful cloud migration.
2. 3 Essential Regulatory Requirements
When adopting cloud infrastructure as a service, organizations must comply with regulatory requirements before, during, and after migration to the cloud. This ensures avoiding the challenges, firms may face later and suggest solutions if they do so.
2.1 Before migration:
Organizations must identify the relevant regulations that apply to their industry and geographic location. This includes: Data Protection Laws, Industry-Specific Regulations, and International Laws.
2.2. During migration:
Organizations must ensure that they meet regulatory requirements while transferring data and applications to the cloud. This involves: Ensuring proper access management, data encryption, and data residency requirements.
2.3. After migration:
Organizations must continue to meet regulatory requirements through ongoing monitoring and reporting. This includes: Regularly reviewing and updating security measures, ensuring proper data protection, and complying with audit and reporting requirements.
3. Challenges in Ensuring Compliance in Infrastructureas a Service in Cloud Computing
3.1. Shared Responsibility Model
The lack of control over the infrastructure in IaaS cloud computing is caused by the shared responsibility model of IaaS, where the cloud service provider is responsible for the IaaS security while the customer is responsible for securing the data and applications they store and run in the cloud. According to a survey, 22.8% of respondents cited the lack of control over infrastructure as a top concern for cloud security. (Source: Cloud Security Alliance)
3.2. Data Breach
Data breaches have serious consequences for businesses, including legal and financial penalties, damage to their reputation, and the loss of customer trust. The location of data and the regulations governing its storage and processing create challenges for businesses operating in multiple jurisdictions. The global average total cost of a data breach increased by USD 0.11 million to USD 4.35 million in 2022, the highest it's been in the history of this report. The increase from USD 4.24 million in the 2021 report to USD 4.35 million in the 2022 report represents a 2.6% increase. (Source: IBM)
3.3. Access Mismanagement
Insider threats, where authorized users abuse their access privileges, can be a significant challenge for access management in IaaS. This includes the intentional or accidental misuse of credentials or non-protected infrastructure and the theft or loss of devices containing sensitive data. The 2020 data breach investigations report found that over 80% of data breaches were caused by compromised credentials or human error, highlighting the importance of effective access management. (Source: Verizon)
3.4. Audit and Monitoring Challenges
Large volumes of alerts overwhelm security teams, leading to fatigue and missed alerts, which result in non-compliance or security incidents going unnoticed. Limited resources may also make it challenging to effectively monitor and audit infrastructure as a service cloud environment, including the implementation and maintenance of monitoring tools.
4. Strategies for Addressing Compliance Challenges in IaaS
4.1. Risk Management and Assessment
Risk Assessment and Management includes conducting a risk assessment, including assessing risks related to data security, access controls, and regulatory compliance. It also involves implementing risk mitigation measures to address identified risks, like additional security measures or access controls such as encryption or multi-factor authentication.
4.2. Encryption and Collaboration with Cloud Service Providers
Encryption can be implemented at the application, database, or file system level, depending on the specific needs of the business. In addition, businesses should establish clear service level agreements with their cloud service provider related to data protection. This includes requirements for data security, access controls, and backup and recovery processes.
4.3. Contractual Agreements
The agreement should also establish audit and compliance requirements, including regular assessments of access management controls and policies. Using contractual agreements, organizations help ensure that they are clearly defined and that the cloud service provider is held accountable for implementing effective access management controls and policies.
4.4. Compliance Monitoring and Reporting
Monitoring and Reporting involves setting up automated monitoring and reporting mechanisms that track compliance with relevant regulations and standards and generate reports. They should also leverage technologies such as intrusion detection and prevention systems, security information and event management (SIEM) tools, and log analysis tools to collect, analyze, and report on security events in real time.
5. Conclusion
In accordance with the increasing prevalence of data breaches and the growing complexity of regulatory requirements, maintaining a secure and compliant cloud environment will be crucial for businesses to build trust with customers and avoid legal and financial risks. Addressing these requirements, the cloud helps companies maintain data privacy, avoid legal risks, and build customer trust. Organizations create a secure and compliant cloud environment that meets their needs by overcoming challenges and implementing best practices, working closely with cloud service providers. Ultimately, by prioritizing compliance and investing in the necessary resources and expertise, businesses can navigate these challenges and unlock the full potential of the cloud with confidence.
Read More