APPLICATION INFRASTRUCTURE

Ciena Expands Edge and 5G Capabilities with Acquisition of Vyatta Routing and Switching Technology from AT&T

Ciena | September 08, 2021

Ciena Expands Edge and 5G Capabilities with Acquisition of Vyatta Routing and Switching Technology from AT&T
Ciena Corporation has entered into a definitive agreement with AT&T to acquire its Vyatta virtual routing and switching technology.

The acquisition reflects Ciena’s continued investment in its Routing and Switching roadmap to address the growing market opportunity to transform the edge, including 5G networks and cloud environments. Specifically, these key technologies and expertise will serve to expand and accelerate Ciena’s Adaptive IP solution set. In addition, Ciena has agreed to support the Vyatta routing platform in AT&T’s wireless network across multiple 5G use cases, enterprise business services and virtual networks with cloud scalability. Ciena plans to integrate the team of engineering specialists into its Routing and Switching research and development (R&D) organization.

“The addition of the Vyatta talent and assets to our Routing and Switching business will extend Ciena’s success in helping customers create virtualized networks and deploy new features faster and cost effectively across 5G, enterprise and cloud use cases,” said Scott McFeely, Senior Vice President, Global Products and Services at Ciena.

“This agreement is a sign of the maturity of the ecosystem and encompasses years of innovation, collaboration and expertise,” said Andre Fuetsch, Chief Technology Officer of Network Services at AT&T. “Our acquisition of the Vyatta assets in 2017 helped us virtualize 75% of our network and led to the development of the first telco grade open-source network operating system. We’re looking forward to the continued use of Vyatta and the development of new use cases as a result of this transaction.”

The acquisition of the Vyatta talent and certain intellectual property is expected to close by the end of the calendar year. Financial terms were not disclosed.

About Ciena
Ciena is a networking systems, services and software company. We provide solutions that help our customers create the Adaptive NetworkTM in response to the constantly changing demands of their end-users. By delivering best-in-class networking technology through high-touch consultative relationships, we build the world’s most agile networks with automation, openness and scale.

Spotlight

Hyperconverged Infrastructure (HCI) continues to gain traction in the marketplace. Analyst firm IDC projects that the HCI market will grow by 94 percent by year’s end, from $800 million worldwide in 2015 to more than $1.5 billion in 2016, while the analysts at Gartner forecast a $5 billion market by 2019. Our new infographic below presents the top reasons that IT leaders are moving their organizations to HCI, which combines compute, networking, virtualization, and storage functions using highly scalable commodity servers. In the broadest sense, HCI is about simplifying IT implementation and reducing costs to make your workforce more productive.

Related News

Hackers Using Google's Cloud Infrastructure to Dupe Users with Phishing Emails

Google | June 02, 2020

According to Cyware, researchers at Trustwave recently discovered numerous hackers infecting users with malware by targeting them via Google's Cloud infrastructure. By leveraging Google Cloud’s infrastructure in their campaigns, threat actors have attached Google Firebase storage URLs to various phishing emails. Once a user clicks on the Firebase link in the email, they are directed to a fake login page that requests their login credentials. According to Cyware, researchers at Trustwave recently discovered numerous hackers infecting users with malware by targeting them via Google's Cloud infrastructure. A number of phishing campaigns uncovered by the team of researchers found that threat actors are using Google Firebase storage URLs to dupe users into giving up their login credentials. By leveraging Google Cloud’s infrastructure in their campaigns, threat actors have attached Google Firebase storage URLs to various phishing emails. Once a user clicks on the Firebase link in the email, they are directed to a fake login page that requests their login credentials. Once an unsuspecting user has entered their credentials, she fake page shares them with the hackers. Per Trustwave: “This phishing campaign although low in volume seems to be targeting a range of industries, as well as being detected by our spam traps. Some exemplar phishing messages used in this campaign are illustrated here. The major themes include payment invoice, upgrade email account, release pending messages, verify account, account error, change password, etc.” Trustware also observed threat actors using the coronavirus pandemic and internet banking lures to trick victims into accessing fake vendor-payment forms designed to harvest users’ login credentials. Other tactics the hackers used included Microsoft Outlook and Office 365 phishing pages that harvest corporate login credentials. Read more: NET ONE SYSTEMS ADOPTS JUNIPER'S CONTRAIL ENTERPRISE SOLUTION TO FURTHER NETWORKING INFRASTRUCTURE The use of cloud infrastructure is gaining popularity among cyber criminals as they are not easily flagged by security controls, Cyware explained, adding, Because of the large user base of Google cloud services, such phishing emails can often be overlooked by the security teams. ~ Google The use of cloud infrastructure is gaining popularity among cyber criminals as they are not easily flagged by security controls,” Cyware explained, adding, Because of the large user base of Google cloud services, such phishing emails can often be overlooked by the security teams. To combat such phishing attempts, individuals and tech leaders should ensure that they’re up to date on hackers’ latest endeavors. As one might imagine, the more knowledgeable a user is, the better prepared they are to avoid falling victim to nefarious phishing campaigns. Hackers have been abusing Google’s cloud computing service to redirect and intercept web and mail traffic on an array of vulnerable consumer routers. Google Cloud’s infrastructure in their campaigns, threat actors have attached Google Firebase storage URLs to various phishing emails. Once a user clicks on the Firebase link in the email, they are directed to a fake login page that requests their login credentials. The fraudulent emails cut through industries to take control of the Firebase’s data storage API in a Google Cloud Storage bucket and secretly keep malicious URLs in phishing emails, which then direct users to fraudulent pages. Fahim Abbasi, a researcher at Trustware, spoke about these phishing campaigns in his blog post and mentioned, while these campaigns deployed common phishing baits, the adoption of Google Firebase storage URLs made them look unique and authentic. He added, actors have taken undue advantage of Google’s reputation and cloud infrastructure to carry out phishing credential harvesting pages. Additionally, Abbasi also presented about nine examples with major themes of the phishing campaigns, which include release pending messages, payment invoice, verify account, upgrade email account, change password, account error, and several other similar to these. Google Cloud Platform (GCP), offered by Google, is a suite of cloud computing services that runs on the same infrastructure that Google uses internally for its end-user products, such as Google Search, Gmail and YouTube. Alongside a set of management tools, it provides a series of modular cloud services including computing, data storage, data analytics and machine learning. Registration requires a credit card or bank account details. Google Cloud Platform provides infrastructure as a service, platform as a service, and serverless computing environments. In April 2008, Google announced App Engine, a platform for developing and hosting web applications in Google-managed data centers, which was the first cloud computing service from the company. The service became generally available. Since the announcement of the App Engine, Google added multiple cloud services to the platform. Read more: COVID-19 HAS ACCELERATED THE LONG-DUE INVESTMENTS INTO DIGITAL INFRASTRUCTURE

Read More

APPLICATION INFRASTRUCTURE

Platform9 is the first company to offer managed Kubernetes as a service with IPv6 support for 5G deployments.

Platform9 | March 31, 2021

Platform9, the main SaaS Managed Kubernetes supplier for private, edge, and crossover mists, today declared its most recent adaptation of the Platform9 Managed Kubernetes (PMK) item. The business' first SaaS Managed Kubernetes with IPv6 support for 5G arrangements flaunts a few progressed organizing advancements and backing capacities to improve 5G assistance conveyance, offers the capacity to halfway associate and oversee AWS EKS groups, and binds together administration of virtual machines and compartments. "Our most recent item discharge tends to the particular difficulties looked by DevOps and stage groups with disseminated Kubernetes arrangements in 5G framework move outs, multi-bunch the executives openly mists, and siloed the board of VMs and compartments," said Madhura Maskasky, VP of Product at Platform9 frameworks. "We keep on conveying these new capacities through our SaaS conveyance model which eliminates operational weight by offloading the perplexing undertakings of arrangement, support, redesigns, observing, and investigating across all groups, regardless of where they are sent." For correspondences specialist organizations (CSPs) and their biological system of organization programming suppliers, Platform9 presently gives a few progressed organizing highlights intended to convey close to line-rate execution for network bundles. Besides, the new delivery empowers completely computerized arrangement and reconciliation of host, physical, and virtual organizations with Kubernetes bunches for sending and overseeing cloud-local 5G RAN, IMS, Packet Core, Edge Virtual Network Functions, and Container Network Functions.

Read More

IT SYSTEMS MANAGEMENT

Prisma Cloud Adds Multi-Cloud Drift Detection to Bridgecrew to Help Organizations Keep Cloud Infrastructure Aligned and Secure

Palo Alto Networks | August 31, 2021

Palo Alto Networks announced that Bridgecrew by Prisma Cloud has added Multi-Cloud Drift Detection to identify and flag discrepancies between how cloud resources were defined in infrastructure as code (IaC) and how they are currently configured in runtime. With misconfigurations a leading cause of cloud breaches, Drift Detection helps improve cloud security posture and enables teams to effectively manage IT infrastructure (GitOps). The initial deployment of Drift Detection supports Amazon Web Services (AWS), Microsoft Azure, and Google Cloud. According to Gartner, "Through 2025, more than 99% of cloud breaches will have a root cause of preventable misconfigurations or mistakes by end users."1 While DevSecOps helps keep misconfigurations to a minimum by codifying and enforcing security policies, out-of-band changes are inevitable because of maintenance, incident response tasks and ad hoc changes these out-of-band changes are known as drift. Regardless of why drift occurs, being able to detect and address it when it does is crucial to maintaining GitOps practices and mitigating cloud risk. "The most effective way to avoid misconfigurations is by adopting infrastructure as code and making all changes through git and a secure continuous integration/continuous delivery (CI/CD) pipeline. That way, misconfigurations are identified and fixed in code before they're provisioned," said Idan Tendler, vice president of DevSecOps, Prisma Cloud at Palo Alto Networks. "However, even organizations that follow GitOps best practices have 'break glass' emergencies where operations teams need to make quick changes to cloud resources directly in production that can result in drift. Detecting this drift is one of the keys to maintaining a secure cloud infrastructure." Bridgecrew Drift Detection is powered by the company's latest open source project Yor, which automatically tags IaC templates with attribution and ownership details as well as a unique ID that gets carried across to cloud resources. Drift Detection builds on top of Yor's code-to-cloud tracing abilities by alerting developers when a drift occurs and allowing them to automatically fix it straight from the Bridgecrew platform. Because of the visibility and control that Drift Detection allows, it is an important critical capability for any organization that is shifting security left and embracing DevSecOps. About Bridgecrew Bridgecrew by Prisma Cloud is the developer-first cloud DevSecOps platform that enables teams to automate infrastructure security throughout the development lifecycle. With support for infrastructure as code (IaC) scanning, security-as-code fixes, and native developer tools integrations, Bridgecrew shifts security left and makes it accessible to developers. About Palo Alto Networks Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest security challenges with continuous innovation that seizes the latest breakthroughs in artificial intelligence, analytics, automation, and orchestration. By delivering an integrated platform and empowering a growing ecosystem of partners, we are at the forefront of protecting tens of thousands of organizations across clouds, networks, and mobile devices. Our vision is a world where each day is safer and more secure than the one before.

Read More

Spotlight

Hyperconverged Infrastructure (HCI) continues to gain traction in the marketplace. Analyst firm IDC projects that the HCI market will grow by 94 percent by year’s end, from $800 million worldwide in 2015 to more than $1.5 billion in 2016, while the analysts at Gartner forecast a $5 billion market by 2019. Our new infographic below presents the top reasons that IT leaders are moving their organizations to HCI, which combines compute, networking, virtualization, and storage functions using highly scalable commodity servers. In the broadest sense, HCI is about simplifying IT implementation and reducing costs to make your workforce more productive.