Securing the 5G edge

November 11, 2021 | 7 views

5G_edge
The rollout of 5G networks coupled with edge compute introduces new security concerns for both the network and the enterprise. Security at the edge presents a unique set of security challenges that differ from those faced by traditional data centers. Today new concerns emerge from the combination of distributed architectures and a disaggregated network, creating new challenges for service providers.
Many mission critical applications enabled by 5G connectivity, such as smart factories, are better off hosted at the edge because it's more economical and delivers better Quality of Service (QoS). However, applications must also be secured; communication service providers need to ensure that applications operate in an environment that is both safe and provides isolation. This means that secure designs and protocols are in place to pre-empt threats, avoid incidents and minimize response time when incidents do occur.

As enterprises adopt private 5G networks to drive their Industry 4.0 strategies, these new enterprise 5G trends demand a new approach to security. Companies must find ways to reduce their exposure to cyberattacks that could potentially disrupt mission critical services, compromise industrial assets and threaten the safety of their workforce. Cybersecurity readiness is essential to ensure private network investments are not devalued.

The 5G network architecture, particularly at the edge, introduces new levels of service decomposition now evolving beyond the virtual machine and into the space of orchestrated containers. Such disaggregation requires the operation of a layered technology stack, from the physical infrastructure to resource abstraction, container enablement and orchestration, all of which present attack surfaces which require addressing from a security perspective. So how can CSPs protect their network and services from complex and rapidly growing threats?

Addressing vulnerability points of the network layer by layer

As networks grow and the number of connected nodes at the edge multiply, so do the vulnerability points. The distributed nature of the 5G edge increases vulnerability threats, just by having network infrastructure scattered across tens of thousands of sites. The arrival of the Internet of Things (IoT) further complicates the picture: with a greater number of connected and mobile devices, potentially creating new network bridging connection points, questions around network security have become more relevant.

As the integrity of the physical site cannot be guaranteed in the same way as a supervised data center, additional security measures need to be taken to protect the infrastructure. Transport and application control layers also need to be secured, to enable forms of "isolation" preventing a breach from propagating to other layers and components. Each layer requires specific security measures to ensure overall network security: use of Trusted Platform Modules (TPM) chipsets on motherboards, UEFI Secure OS boot process, secure connections in the control plane and more. These measures all contribute to and are integral part of an end-to-end network security design and strategy.

Open RAN for a more secure solution

The latest developments in open RAN and the collaborative standards-setting process related to open interfaces and supply chain diversification are enhancing the security of 5G networks. This is happening for two reasons. First, traditional networks are built using vendor proprietary technology – a limited number of vendors dominate the telco equipment market and create vendor lock-in for service providers that forces them to also rely on vendors' proprietary security solutions. This in turn prevents the adoption of "best-of-breed" solutions and slows innovation and speed of response, potentially amplifying the impact of a security breach.

Second, open RAN standardization initiatives employ a set of open-source standards-based components. This has a positive effect on security as the design embedded in components is openly visible and understood; vendors can then contribute to such open-source projects where tighter security requirements need to be addressed.

Aside from the inherent security of the open-source components, open RAN defines a number of open interfaces which can be individually assessed in their security aspects. The openness intrinsically present in open RAN means that service components can be seamlessly upgraded or swapped to facilitate the introduction of more stringent security characteristics, or they can simultaneously swiftly address identified vulnerabilities.

Securing network components with AI

Monitoring the status of myriad network components, particularly spotting a security attack taking place among a multitude of cooperating application functions, requires resources that transcend the capabilities of a finite team of human operators. This is where advances in AI technology can help to augment the abilities of operations teams. AI massively scales the ability to monitor any number of KPIs, learn their characteristic behavior and identify anomalies – this makes it the ideal companion in the secure operation of the 5G edge. The self-learning aspect of AI supports not just the identification of known incident patterns but also the ability to learn about new, unknown and unanticipated threats.

Security by design

Security needs to be integral to the design of the network architecture and its services. The adoption of open standards caters to the definition of security best practices in both the design and operation of the new 5G network edge. The analytics capabilities embedded in edge hyperconverged infrastructure components provide the platform on which to build an effective monitoring and troubleshooting toolkit, ensuring the secure operation of the intelligent edge.

Spotlight

Sagarsoft, Inc

Sagarsoft delivers diverse range of Information Technology Solutions by leveraging Domain Expertise and Knowledge acquired over the years in serving Global Organizations across different Industry verticals.

OTHER ARTICLES
APPLICATION INFRASTRUCTURE

Infrastructure Lifecycle Management Best Practices

Article | November 23, 2021

As your organization scales, inevitably, so too will its infrastructure needs. From physical spaces to personnel, devices to applications, physical security to cybersecurity – all these resources will continue to grow to meet the changing needs of your business operations. To manage your changing infrastructure throughout its entire lifecycle, your organization needs to implement a robust infrastructure lifecycle management program that’s designed to meet your particular business needs. In particular, IT asset lifecycle management (ITALM) is becoming increasingly important for organizations across industries. As threats to organizations’ cybersecurity become more sophisticated and successful cyberattacks become more common, your business needs (now, more than ever) to implement an infrastructure lifecycle management strategy that emphasizes the security of your IT infrastructure. In this article, we’ll explain why infrastructure management is important. Then we’ll outline steps your organization can take to design and implement a program and provide you with some of the most important infrastructure lifecycle management best practices for your business. What Is the Purpose of Infrastructure Lifecycle Management? No matter the size or industry of your organization, infrastructure lifecycle management is a critical process. The purpose of an infrastructure lifecycle management program is to protect your business and its infrastructure assets against risk. Today, protecting your organization and its customer data from malicious actors means taking a more active approach to cybersecurity. Simply put, recovering from a cyber attack is more difficult and expensive than protecting yourself from one. If 2020 and 2021 have taught us anything about cybersecurity, it’s that cybercrime is on the rise and it’s not slowing down anytime soon. As risks to cybersecurity continue to grow in number and in harm, infrastructure lifecycle management and IT asset management are becoming almost unavoidable. In addition to protecting your organization from potential cyberattacks, infrastructure lifecycle management makes for a more efficient enterprise, delivers a better end user experience for consumers, and identifies where your organization needs to expand its infrastructure. Some of the other benefits that come along with comprehensive infrastructure lifecycle management program include: More accurate planning; Centralized and cost-effective procurement; Streamlined provisioning of technology to users; More efficient maintenance; Secure and timely disposal. A robust infrastructure lifecycle management program helps your organization to keep track of all the assets running on (or attached to) your corporate networks. That allows you to catalog, identify and track these assets wherever they are, physically and digitally. While this might seem simple enough, infrastructure lifecycle management and particularly ITALM has become more complex as the diversity of IT assets has increased. Today organizations and their IT teams are responsible for managing hardware, software, cloud infrastructure, SaaS, and connected device or IoT assets. As the number of IT assets under management has soared for most organizations in the past decade, a comprehensive and holistic approach to infrastructure lifecycle management has never been more important. Generally speaking, there are four major stages of asset lifecycle management. Your organization’s infrastructure lifecycle management program should include specific policies and processes for each of the following steps: Planning. This is arguably the most important step for businesses and should be conducted prior to purchasing any assets. During this stage, you’ll need to identify what asset types are required and in what number; compile and verify the requirements for each asset; and evaluate those assets to make sure they meet your service needs. Acquisition and procurement. Use this stage to identify areas for purchase consolidation with the most cost-effective vendors, negotiate warranties and bulk purchases of SaaS and cloud infrastructure assets. This is where lack of insights into actual asset usage can potentially result in overpaying for assets that aren’t really necessary. For this reason, timely and accurate asset data is crucial for effective acquisition and procurement. Maintenance, upgrades and repair. All assets eventually require maintenance, upgrades and repairs. A holistic approach to infrastructure lifecycle management means tracking these needs and consolidating them into a single platform across all asset types. Disposal. An outdated or broken asset needs to be disposed of properly, especially if it contains sensitive information. For hardware, assets that are older than a few years are often obsolete, and assets that fall out of warranty are typically no longer worth maintaining. Disposal of cloud infrastructure assets is also critical because data stored in the cloud can stay there forever. Now that we’ve outlined the purpose and basic stages of infrastructure lifecycle management, it’s time to look at the steps your organization can take to implement it.

Read More
APPLICATION INFRASTRUCTURE

The Drive with Direction: The Path of Enterprise IT Infrastructure

Article | June 10, 2022

Introduction It is hard to manage a modern firm without a convenient and adaptable IT infrastructure. When properly set up and networked, technology can improve back-office processes, increase efficiency, and simplify communication. IT infrastructure can be utilized to supply services or resources both within and outside of a company, as well as to its customers. IT infrastructure when adequately deployed aids organizations in achieving their objectives and increasing profits. IT infrastructure is made up of numerous components that must be integrated for your company's infrastructure to be coherent and functional. These components work in unison to guarantee that your systems and business as a whole run smoothly. Enterprise IT Infrastructure Trends Consumption-based pricing models are becoming more popular among enterprise purchasers, a trend that began with software and has now spread to hardware. This transition from capital to operational spending lowers risk, frees up capital, and improves flexibility. As a result, infrastructure as a service (IaaS) and platform as a service (PaaS) revenues increased by 53% from 2015 to 2016, making them the fastest-growing cloud and infrastructure services segments. The transition to as-a-service models is significant given that a unit of computing or storage in the cloud can be quite cheaper in terms of the total cost of ownership than a unit on-premises. While businesses have been migrating their workloads to the public cloud for years, there has been a new shift among large corporations. Many companies, including Capital One, GE, Netflix, Time Inc., and others, have downsized or removed their private data centers in favor of shifting their operations to the cloud. Cybersecurity remains a high priority for the C-suite and the board of directors. Attacks are increasing in number and complexity across all industries, with 80% of technology executives indicating that their companies are unable to construct a robust response. Due to lack of cybersecurity experts, many companies can’t get the skills they need on the inside, so they have to use managed security services. Future of Enterprise IT Infrastructure Companies can adopt the 'As-a-Service' model to lower entry barriers and begin testing future innovations on the cloud's basis. Domain specialists in areas like healthcare and manufacturing may harness AI's potential to solve some of their businesses' most pressing problems. Whether in a single cloud or across several clouds, businesses want an architecture that can expand to support the rapid evolution of their apps and industry for decades. For enterprise-class visibility and control across all clouds, the architecture must provide a common control plane that supports native cloud Application Programming Interfaces (APIs) as well as enhanced networking and security features. Conclusion The scale of disruption in the IT infrastructure sector is unparalleled, presenting enormous opportunities and hazards for industry stakeholders and their customers. Technology infrastructure executives must restructure their portfolios and rethink their go-to-market strategies to drive growth. They should also invest in the foundational competencies required for long-term success, such as digitization, analytics, and agile development. Data center companies that can solve the industry's challenges, as well as service providers that can scale quickly without limits and provide intelligent outcome-based models. This helps their clients achieve their business objectives through a portfolio of 'As-a-Service' models, will have a bright future.

Read More
APPLICATION INFRASTRUCTURE

A Look at Trends in IT infrastructure and Operations for 2022

Article | June 6, 2022

We’re all hoping that 2022 will finally end the unprecedented challenges brought by the global pandemic and things will return to a new normalcy. For IT infrastructure and operations organizations, the rising trends that we are seeing today will likely continue, but there are still a few areas that will need special attention from IT leaders over the next 12 to 18 months. In no particular order, they include: The New Edge Edge computing is now at the forefront. Two primary factors that make it business-critical are the increased prevalence of remote and hybrid workplace models where employees will continue working remotely, either from home or a branch office, resulting in an increased adoption of cloud-based businesses and communications services. With the rising focus on remote and hybrid workplace cultures, Zoom, Microsoft Teams, and Google Meet have continued to expand their solutions and add new features. As people start moving back to office, they are likely to want the same experience they had from home. In a typical enterprise setup, branch office traffic is usually backhauled all the way to the data center. This architecture severely impacts the user experience, so enterprises will have to review their network architectures and come up with a roadmap to accommodate local egress between branch offices and headquarters. That’s where the edge can help, bringing it closer to the workforce. This also brings an opportunity to optimize costs by migrating from some of the expensive multi-protocol label switching (MPLS) or private circuits to relatively low-cost direct internet circuits, which is being addressed by the new secure access service edge (SASE) architecture that is being offered by many established vendors. I anticipate some components of SASE, specifically those related to software-defined wide area network (SD-WAN), local egress, and virtual private network (VPN), will drive a lot of conversation this year. Holistic Cloud Strategy Cloud adoption will continue to grow, and along with software as a service (SaaS), there will be renewed interest in infrastructure as a service (IaaS), albeit for specific workloads. For a medium-to-large-sized enterprise with a substantial development environment, it will still be cost-prohibitive to move everything to the cloud, so any cloud strategy would need to be holistic and forward-looking to maximize its business value. Another pandemic-induced shift is from using virtual machines (VMs) as a consumption unit of compute to containers as a consumption unit of software. For on-premises or private cloud deployment architectures that require sustainable management, organizations will have to orchestrate containers and deploy efficient container security and management tools. Automation Now that cloud adoption, migration, and edge computing architectures are becoming more prevalent, the legacy methods of infrastructure provisioning and management will not be scalable. By increasing infrastructure automation, enterprises can optimize costs and be more flexible and efficient—but only if they are successful at developing new skills. To achieve the goal of “infrastructure as a code” will require a shift in the perspective on infrastructure automation to one that focuses on developing and sustaining skills and roles that improve efficiency and agility across on-premises, cloud, and edge infrastructures. Defining the roles of designers and architects to support automation is essential to ensure that automation works as expected, avoids significant errors, and complements other technologies. AIOps (Artificial Intelligence for IT Operations) Alongside complementing automation trends, the implementation of AIOps to effectively automate IT operations processes such as event correlation, anomaly detection, and causality determination will also be important. AIOps will eliminate the data silos in IT by bringing all types of data under one roof so it can be used to execute machine learning (ML)-based methods to develop insights for responsive enhancements and corrections. AIOps can also help with probable cause analytics by focusing on the most likely source of a problem. The concept of site reliability engineering (SRE) is being increasingly adopted by SaaS providers and will gain importance in enterprise IT environments due to the trends listed above. AIOps is a key component that will enable site reliability engineers (SREs) to respond more quickly—and even proactively—by resolving issues without manual intervention. These focus areas are by no means an exhaustive list. There are a variety of trends that will be more prevalent in specific industry areas, but a common theme in the post-pandemic era is going to be superior delivery of IT services. That’s also at the heart of the Autonomous Digital Enterprise, a forward-focused business framework designed to help companies make technology investments for the future.

Read More

A new era of automation with Cisco ACI and the Citrix ADC Manager app

Article | February 12, 2020

Since it was first available, Citrix has worked with Cisco Application Centric Infrastructure (ACI) to integrate Citrix ADC with the Cisco Application Policy Infrastructure Controller (APIC). As a valued technology partner, Citrix has a device package — a software module — that enables users to configure the Citrix ADC directly from a Cisco APIC. This setup has run in many customer production environments over the years. Let’s consider one of those customers — Jim. He was the first to deploy the integrated solution in his data center. The solution gave him the automation he needed and a single view to configure, deploy, and manage applications. However, his application admins preferred to use the Citrix ADC user interface to manage L4-L7 services.

Read More

Spotlight

Sagarsoft, Inc

Sagarsoft delivers diverse range of Information Technology Solutions by leveraging Domain Expertise and Knowledge acquired over the years in serving Global Organizations across different Industry verticals.

Related News

APPLICATION INFRASTRUCTURE

Runecast partners with SVA Software, Inc.

Runecast | June 29, 2022

Runecast, a leading provider of patented, predictive analytics for on-premises, hybrid and multi cloud environments, today announced a strategic partnership with SVA Software, Inc., a leading IT infrastructure services provider. The existing relationship between parent-company SVA GmbH, of Germany, and Runecast is now expanded to include SVA Software, Inc. and further the reach of both companies across North America. The SVA Software portfolio includes mainframe optimization solutions, VMware license assessments, infrastructure analytics, data archival and a disaster recovery runbook. SVA models its business on its software and service solutions scaling to meet the needs of its customers' stages of growth and to assist customers in making sense of the data that their systems produce. Customers therefore gain in-depth insights across their systems, enabling them more control in negotiating the next ELA with a vendor. "The strength of our partnership with SVA GmbH in Germany made it an easy choice to extend that partnership also to SVA Software, Inc. in North America. "Having a channel-first approach to market means that we rely on finding the best local partners to enable Runecast growth." Ched Smokovic, Chief Revenue Officer at Runecast Runecast has evolved to be the go-to solution for stabilizing and securing mission-critical IT operations ranging from online shopping and banking to emergency call services and air-traffic control. Runecast is an enterprise platform which brings a proactive approach to various areas of hybrid and multi cloud management and protection. Runecast provides automated best practices, actionable insights and proactive monitoring for VMware, Amazon Web Services (AWS), Microsoft Azure and Kubernetes, as well as OS-level support for Windows and Linux. Coverage for Google Cloud Platform (GCP) is planned for its July release. Recently, G2 reviews ranked Runecast a 'High Performer' in the Spring and Summer 2022 G2 Grid® Reports for the categories Security Risk Analysis, Cloud Workload Protection Platforms (CWPP), Vulnerability Scanner, Cloud Compliance and Cloud Security. "We are happy to add Runecast's unique solution and strength in the VMware space to our portfolio," said Lisa Schwab, VP of Sales and Marketing. "The partnership confirms the commitment in extending an award-winning platform like Runecast to the North American market. Runecast is a perfect complement to SVA's BVQ data analytics platform providing customers with a robust set of solutions to maximize and optimize their IT infrastructures." The Runecast vision for the future is to stay ahead of the challenges that organizations face in a fast-paced and rapidly changing IT environment, to provide the best possible proactive means of mitigating vulnerabilities and maintaining security compliance and uptime – which aligns well with the SVA approach to business. About Runecast Runecast Solutions Ltd. is a leading global provider of a patented solution for IT Security and Operations teams. Forward-focused enterprises like Avast, DocuSign, and Merck rely on Runecast for proactive risk mitigation, security compliance, operational efficiency, and mission-critical stability. Headquartered in London, U.K., Runecast is a Gartner Cool Vendor and has won Computing awards for Cloud Security Product of the Year and Best Place to Work in Digital. About SVA Software, Inc. SVA Software, Inc. is a 100% subsidiary of SVA System Vertrieb Alexander GmbH, a German company. SVA Software, Inc. was founded in 2016 selling SVA GmbH developed solutions combined with value added services. SVA System Vertrieb Alexander GmbH is the largest privately owned system integrator in Germany in the fields of Datacenter Infrastructure and is the largest global IBM Systems Integrator. The company was founded in 1997 in Wiesbaden, Germany. SVA GmbH now employs more than 2,200 employees at 25 branch offices throughout Germany with a revenue of more than $1.3 Billion (2021) servicing over 3,000 customers worldwide.

Read More

IT SYSTEMS MANAGEMENT

Oak9 improves cloud and infrastructure-as-code security

Oak9 | July 04, 2022

According to Oak9, a developer-first infrastructure-as-code (IaC) security solution, businesses are starting to approach apps like code. For instance, technologies that specify governance or policy concepts as code, like HashiCorp Sentinel, are available. By applying the proper security in accordance with SaC blueprints to risk-appropriately secure a cloud application's architecture, Oak9's platform is powered by its patented Security as Code (SaC) technology. SaC is designed to assess changes to cloud-native infrastructure. According to the corporation, organizations today use a variety of tools, technologies, etc. Multicloud/multi-IaC language environments are becoming more and more common because of this. In addition, the technology-agnostic nature of Oak9 reduces the need to manage security across several technologies at once. In order to allow developers to utilize their preferred IaC languages, clouds, multi-clouds, workflows, etc., the company claims to work with integrated development environments (IDEs), code repositories, continuous integration and continuous deployment (CI/CD) pipelines, and chat ops tools. The market's adoption of IaC has accelerated, making the security of cloud apps a crucial need that Oak9 can address, according to Alex Brown at the venture capital company HPA, which oversaw a recent investment round for Oak9. According to Oak9, its technology speeds up the delivery of cloud-native applications while providing security to find and fix any weaknesses. The platform is made to inform users of the location of security flaws in a company's cloud, their criticality, the reasons for their existence, and how to fix them. Organizations can use the tool to apply the security fix to their whole cloud infrastructure. In order to strengthen security in IaC and cloud environments, Oak9 just announced $8 million in new funding. The money will be used, in part, by Oak9, which recently announced an IaC remediation capability, to expand its free community version and introduce a new generation of Security as Code offerings. Within the last 15 months, Oak9 has now raised $14 million. Menlo Ventures, which took the initiative in the most recent round, and HPA, which upped its investment in Oak9, are also participating.

Read More

APPLICATION INFRASTRUCTURE

Linux Foundation Announces Open Programmable Infrastructure Project to Drive Open Standards for New Class of Cloud Native Infrastructure

The Linux Foundation | June 22, 2022

The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced the new Open Programmable Infrastructure (OPI) Project. OPI will foster a community-driven, standards-based open ecosystem for next-generation architectures and frameworks based on DPU and IPU technologies. OPI is designed to facilitate the simplification of network, storage and security APIs within applications to enable more portable and performant applications in the cloud and datacenter across DevOps, SecOps and NetOps. Founding members of OPI include Dell Technologies, F5, Intel, Keysight Technologies, Marvell, NVIDIA and Red Hat with a growing number of contributors representing a broad range of leading companies in their fields ranging from silicon and device manufactures, ISVs, test and measurement partners, OEMs to end users. "When new technologies emerge, there is so much opportunity for both technical and business innovation but barriers often include a lack of open standards and a thriving community to support them," said Mike Dolan, senior vice president of Projects at the Linux Foundation. "DPUs and IPUs are great examples of some of the most promising technologies emerging today for cloud and datacenter, and OPI is poised to accelerate adoption and opportunity by supporting an ecosystem for DPU and IPU technologies." DPUs and IPUs are increasingly being used to support high-speed network capabilities and packet processing for applications like 5G, AI/ML, Web3, crypto and more because of their flexibility in managing resources across networking, compute, security and storage domains. Instead of the servers being the infrastructure unit for cloud, edge or the data center, operators can now create pools of disaggregated networking, compute and storage resources supported by DPUs, IPUs, GPUs, and CPUs to meet their customers' application workloads and scaling requirements. OPI will help establish and nurture an open and creative software ecosystem for DPU and IPU-based infrastructures. As more DPUs and IPUs are offered by various vendors, the OPI Project seeks to help define the architecture and frameworks for the DPU and IPU software stacks that can be applied to any vendor's hardware offerings. The OPI Project also aims to foster a rich open source application ecosystem, leveraging existing open source projects, such as DPDK, SPDK, OvS, P4, etc., as appropriate. The project intends to: Define DPU and IPU, Delineate vendor-agnostic frameworks and architectures for DPU- and IPU-based software stacks applicable to any hardware solutions, Enable the creation of a rich open source application ecosystem, Integrate with existing open source projects aligned to the same vision such as the Linux kernel, and, Create new APIs for interaction with, and between, the elements of the DPU and IPU ecosystem, including hardware, hosted applications, host node, and the remote provisioning and orchestration of software With several working groups already active, the initial technology contributions will come in the form of the Infrastructure Programmer Development Kit (IPDK) that is now an official sub-project of OPI governed by the Linux Foundation. IPDK is an open source framework of drivers and APIs for infrastructure offload and management that runs on a CPU, IPU, DPU or switch. In addition, NVIDIA DOCA, an open source software development framework for NVIDIA's BlueField DPU, will be contributed to OPI to help developers create applications that can be offloaded, accelerated, and isolated across DPUs, IPUs, and other hardware platforms. "The emerging DPU market is a golden opportunity to reimagine how infrastructure services can be deployed and managed. With collective collaboration across many vendors representing both the silicon devices and the entire DPU software stack, an ecosystem is emerging that will provide a low friction customer experience and achieve portability of services across a DPU enabled infrastructure layer of next generation data centers, private clouds, and edge deployments." Geng Lin, EVP and Chief Technology Officer, F5 Intel is committed to open software to advance collaborative and competitive ecosystems and is pleased to be a founding member of the Open Programmable Infrastructure project, as well as fully supportive of the Infrastructure Processor Development Kit (IPDK) as part of OPI. We look forward to advancing these tools, with the Linux Foundation, fulfilling the need for a programmable infrastructure across cloud, data center, communication and enterprise industries making it easier for developers to accelerate innovation and advance technological developments. Patricia Kummrow, CVP and GM, Ethernet Products Group, Intel About the Linux Foundation Founded in 2000, the Linux Foundation and its projects are supported by more than 1,800 members and is the world's leading home for collaboration on open source software, open standards, open data, and open hardware. Linux Foundation's projects are critical to the world's infrastructure including Linux, Kubernetes, Node.js, Hyperledger, RISC-V, and more. The Linux Foundation's methodology focuses on leveraging best practices and addressing the needs of contributors, users and solution providers to create sustainable models for open collaboration.

Read More

APPLICATION INFRASTRUCTURE

Runecast partners with SVA Software, Inc.

Runecast | June 29, 2022

Runecast, a leading provider of patented, predictive analytics for on-premises, hybrid and multi cloud environments, today announced a strategic partnership with SVA Software, Inc., a leading IT infrastructure services provider. The existing relationship between parent-company SVA GmbH, of Germany, and Runecast is now expanded to include SVA Software, Inc. and further the reach of both companies across North America. The SVA Software portfolio includes mainframe optimization solutions, VMware license assessments, infrastructure analytics, data archival and a disaster recovery runbook. SVA models its business on its software and service solutions scaling to meet the needs of its customers' stages of growth and to assist customers in making sense of the data that their systems produce. Customers therefore gain in-depth insights across their systems, enabling them more control in negotiating the next ELA with a vendor. "The strength of our partnership with SVA GmbH in Germany made it an easy choice to extend that partnership also to SVA Software, Inc. in North America. "Having a channel-first approach to market means that we rely on finding the best local partners to enable Runecast growth." Ched Smokovic, Chief Revenue Officer at Runecast Runecast has evolved to be the go-to solution for stabilizing and securing mission-critical IT operations ranging from online shopping and banking to emergency call services and air-traffic control. Runecast is an enterprise platform which brings a proactive approach to various areas of hybrid and multi cloud management and protection. Runecast provides automated best practices, actionable insights and proactive monitoring for VMware, Amazon Web Services (AWS), Microsoft Azure and Kubernetes, as well as OS-level support for Windows and Linux. Coverage for Google Cloud Platform (GCP) is planned for its July release. Recently, G2 reviews ranked Runecast a 'High Performer' in the Spring and Summer 2022 G2 Grid® Reports for the categories Security Risk Analysis, Cloud Workload Protection Platforms (CWPP), Vulnerability Scanner, Cloud Compliance and Cloud Security. "We are happy to add Runecast's unique solution and strength in the VMware space to our portfolio," said Lisa Schwab, VP of Sales and Marketing. "The partnership confirms the commitment in extending an award-winning platform like Runecast to the North American market. Runecast is a perfect complement to SVA's BVQ data analytics platform providing customers with a robust set of solutions to maximize and optimize their IT infrastructures." The Runecast vision for the future is to stay ahead of the challenges that organizations face in a fast-paced and rapidly changing IT environment, to provide the best possible proactive means of mitigating vulnerabilities and maintaining security compliance and uptime – which aligns well with the SVA approach to business. About Runecast Runecast Solutions Ltd. is a leading global provider of a patented solution for IT Security and Operations teams. Forward-focused enterprises like Avast, DocuSign, and Merck rely on Runecast for proactive risk mitigation, security compliance, operational efficiency, and mission-critical stability. Headquartered in London, U.K., Runecast is a Gartner Cool Vendor and has won Computing awards for Cloud Security Product of the Year and Best Place to Work in Digital. About SVA Software, Inc. SVA Software, Inc. is a 100% subsidiary of SVA System Vertrieb Alexander GmbH, a German company. SVA Software, Inc. was founded in 2016 selling SVA GmbH developed solutions combined with value added services. SVA System Vertrieb Alexander GmbH is the largest privately owned system integrator in Germany in the fields of Datacenter Infrastructure and is the largest global IBM Systems Integrator. The company was founded in 1997 in Wiesbaden, Germany. SVA GmbH now employs more than 2,200 employees at 25 branch offices throughout Germany with a revenue of more than $1.3 Billion (2021) servicing over 3,000 customers worldwide.

Read More

IT SYSTEMS MANAGEMENT

Oak9 improves cloud and infrastructure-as-code security

Oak9 | July 04, 2022

According to Oak9, a developer-first infrastructure-as-code (IaC) security solution, businesses are starting to approach apps like code. For instance, technologies that specify governance or policy concepts as code, like HashiCorp Sentinel, are available. By applying the proper security in accordance with SaC blueprints to risk-appropriately secure a cloud application's architecture, Oak9's platform is powered by its patented Security as Code (SaC) technology. SaC is designed to assess changes to cloud-native infrastructure. According to the corporation, organizations today use a variety of tools, technologies, etc. Multicloud/multi-IaC language environments are becoming more and more common because of this. In addition, the technology-agnostic nature of Oak9 reduces the need to manage security across several technologies at once. In order to allow developers to utilize their preferred IaC languages, clouds, multi-clouds, workflows, etc., the company claims to work with integrated development environments (IDEs), code repositories, continuous integration and continuous deployment (CI/CD) pipelines, and chat ops tools. The market's adoption of IaC has accelerated, making the security of cloud apps a crucial need that Oak9 can address, according to Alex Brown at the venture capital company HPA, which oversaw a recent investment round for Oak9. According to Oak9, its technology speeds up the delivery of cloud-native applications while providing security to find and fix any weaknesses. The platform is made to inform users of the location of security flaws in a company's cloud, their criticality, the reasons for their existence, and how to fix them. Organizations can use the tool to apply the security fix to their whole cloud infrastructure. In order to strengthen security in IaC and cloud environments, Oak9 just announced $8 million in new funding. The money will be used, in part, by Oak9, which recently announced an IaC remediation capability, to expand its free community version and introduce a new generation of Security as Code offerings. Within the last 15 months, Oak9 has now raised $14 million. Menlo Ventures, which took the initiative in the most recent round, and HPA, which upped its investment in Oak9, are also participating.

Read More

APPLICATION INFRASTRUCTURE

Linux Foundation Announces Open Programmable Infrastructure Project to Drive Open Standards for New Class of Cloud Native Infrastructure

The Linux Foundation | June 22, 2022

The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced the new Open Programmable Infrastructure (OPI) Project. OPI will foster a community-driven, standards-based open ecosystem for next-generation architectures and frameworks based on DPU and IPU technologies. OPI is designed to facilitate the simplification of network, storage and security APIs within applications to enable more portable and performant applications in the cloud and datacenter across DevOps, SecOps and NetOps. Founding members of OPI include Dell Technologies, F5, Intel, Keysight Technologies, Marvell, NVIDIA and Red Hat with a growing number of contributors representing a broad range of leading companies in their fields ranging from silicon and device manufactures, ISVs, test and measurement partners, OEMs to end users. "When new technologies emerge, there is so much opportunity for both technical and business innovation but barriers often include a lack of open standards and a thriving community to support them," said Mike Dolan, senior vice president of Projects at the Linux Foundation. "DPUs and IPUs are great examples of some of the most promising technologies emerging today for cloud and datacenter, and OPI is poised to accelerate adoption and opportunity by supporting an ecosystem for DPU and IPU technologies." DPUs and IPUs are increasingly being used to support high-speed network capabilities and packet processing for applications like 5G, AI/ML, Web3, crypto and more because of their flexibility in managing resources across networking, compute, security and storage domains. Instead of the servers being the infrastructure unit for cloud, edge or the data center, operators can now create pools of disaggregated networking, compute and storage resources supported by DPUs, IPUs, GPUs, and CPUs to meet their customers' application workloads and scaling requirements. OPI will help establish and nurture an open and creative software ecosystem for DPU and IPU-based infrastructures. As more DPUs and IPUs are offered by various vendors, the OPI Project seeks to help define the architecture and frameworks for the DPU and IPU software stacks that can be applied to any vendor's hardware offerings. The OPI Project also aims to foster a rich open source application ecosystem, leveraging existing open source projects, such as DPDK, SPDK, OvS, P4, etc., as appropriate. The project intends to: Define DPU and IPU, Delineate vendor-agnostic frameworks and architectures for DPU- and IPU-based software stacks applicable to any hardware solutions, Enable the creation of a rich open source application ecosystem, Integrate with existing open source projects aligned to the same vision such as the Linux kernel, and, Create new APIs for interaction with, and between, the elements of the DPU and IPU ecosystem, including hardware, hosted applications, host node, and the remote provisioning and orchestration of software With several working groups already active, the initial technology contributions will come in the form of the Infrastructure Programmer Development Kit (IPDK) that is now an official sub-project of OPI governed by the Linux Foundation. IPDK is an open source framework of drivers and APIs for infrastructure offload and management that runs on a CPU, IPU, DPU or switch. In addition, NVIDIA DOCA, an open source software development framework for NVIDIA's BlueField DPU, will be contributed to OPI to help developers create applications that can be offloaded, accelerated, and isolated across DPUs, IPUs, and other hardware platforms. "The emerging DPU market is a golden opportunity to reimagine how infrastructure services can be deployed and managed. With collective collaboration across many vendors representing both the silicon devices and the entire DPU software stack, an ecosystem is emerging that will provide a low friction customer experience and achieve portability of services across a DPU enabled infrastructure layer of next generation data centers, private clouds, and edge deployments." Geng Lin, EVP and Chief Technology Officer, F5 Intel is committed to open software to advance collaborative and competitive ecosystems and is pleased to be a founding member of the Open Programmable Infrastructure project, as well as fully supportive of the Infrastructure Processor Development Kit (IPDK) as part of OPI. We look forward to advancing these tools, with the Linux Foundation, fulfilling the need for a programmable infrastructure across cloud, data center, communication and enterprise industries making it easier for developers to accelerate innovation and advance technological developments. Patricia Kummrow, CVP and GM, Ethernet Products Group, Intel About the Linux Foundation Founded in 2000, the Linux Foundation and its projects are supported by more than 1,800 members and is the world's leading home for collaboration on open source software, open standards, open data, and open hardware. Linux Foundation's projects are critical to the world's infrastructure including Linux, Kubernetes, Node.js, Hyperledger, RISC-V, and more. The Linux Foundation's methodology focuses on leveraging best practices and addressing the needs of contributors, users and solution providers to create sustainable models for open collaboration.

Read More

Events