Secure access solution delivers SD-WAN connectivity for remote workers


Home working means an expanded threat perimeter which makes enterprise networks more of a challenge to secure.
Secure SD-WAN specialist Versa Networks is launching a new solution aimed at delivering secure SD-WAN services and private connectivity for employees who are remote or working from home.
Microsoft partners with NTT DATA to boost public cloud for digital transformation


Businesses are increasingly looking to bring about digital transformation through agile system integration utilizing cloud computing and other technologies.
NTT DATA is expanding its alliance with Microsoft to bring together NTT's global IT services with Microsoft's cloud to help digital transformation projects using Microsoft Azure as a preferred cloud solution.
Almost 80 percent of companies have had a cloud data breach in the past 18 months


A new survey finds that 79 percent of companies experienced at least one cloud data breach in the past 18 months, and close to half (43 percent) reported 10 or more breaches.
The study for cloud access risk security company Ermetic conducted by IDC covered 300 CISOs and finds that security misconfiguration (67 percent), lack of adequate visibility into access settings and activities (64 percent) and identity and access management (IAM) permission errors (61 percent) are the top concerns associated with cloud production environments.
Thycotic extends its privileged access management range


Privileged access management (PAM) specialist Thycotic is expanding its portfolio with the announcement of three new products.
It's launching Thycotic Remote Access Controller, Thycotic Cloud Access Controller and Thycotic Database Access Controller, following its acquisition of cloud security company Onion ID.
Updated platform offers zero-trust management of multi-clouds


Multi-cloud environments tend to be harder to secure because teams and applications are much more distributed resulting in a larger attack surface.
A zero-trust approach deals with these threats but can introduce overheads that make it hard to manage. Morpheus Data is integrating VMware NSX-T and Unisys Stealth technology into its cloud automation framework to enable microsegmentation and dramatically simplify the implementation of zero-trust processes.
How COVID-19 has accelerated the move from a 'cloud first' to a 'cloud now' approach


Recent market data from Synergy Research Group via CRN suggests 2019 was a milestone for IT and that for the first time ever, enterprises are spending more money annually on cloud infrastructure services than on data center hardware and software. For example, total spend on cloud infrastructure services reached $97 billion, up 38 percent year over year, whereas total spend on data center hardware and software hit $93 billion in 2019, an increase of only 1 percent compared to 2018.
This means that many companies that have historically owned, maintained, and managed their own IT operations in their own data center are now evolving how they support their business operations by transforming their IT to cloud.
Securing the cloud for healthcare


The Cloud is a $200 billion business that analyst firm IDC expects to nearly double in valuation by 2022. It enables collaborative productivity apps, on-demand entertainment, and promises much needed advances in telemedicine. But all this potential will come crashing to a halt unless we take seriously the corresponding rise of cloud-based cybersecurity threats. The increase we have seen in cyber-attacks seeking cloud-based data is worrisome and the potential for crippling the healthcare industry is high especially given the current global climate and their dependency on cloud-based services.
Recent warnings and actual attacks are a prominent example of the active and persistent threats to our global healthcare networks, economy, and connected infrastructure. Organizations involved in national and international COVID-19 responses are being actively targeted by hacking teams and threat groups. This is according to a recent alert from DHS ‘s Cybersecurity and Infrastructure Agency (CISA) Europe’s largest hospital. In addition, the Czech Republic warned of expected cyberattacks targeting healthcare systems designed to damage or destroy computers in critical healthcare infrastructure. And last month, Interpol announced that its Cybercrime Threat Response team had detected a significant increase in ransomware extortion schemes against healthcare organizations and infrastructures. The list goes on…
More than 88 percent of organizations now use the cloud


A new report finds that more than 88 percent of organizations use cloud infrastructure in one form or another, and 45 percent expect to move three quarters or more of their applications to the cloud over the next twelve months.
The study from O'Reilly surveyed 1,283 software engineers, technical leads, and decision-makers from around the globe and finds that 21 percent of organizations are hosting all their applications in a cloud context.
New cloud platform helps protect against business email compromise


Email compromise via spoofed domains or compromised accounts is a major problem. But a new cloud platform from Abnormal Security tracks the reputations of an organization's vendors and customers, and improves detection accuracy of advanced social engineering attacks.
VendorBase is a global database that gives organizations the ability to see detailed views of all vendors, including profile information, the VendorBase risk assessment score, explanations on risk scores, a timeline view of relevant email communication and security activity for that vendor.
AOMEI makes its cloud management tool free for three months


We've seen lots of companies making their products available free during the current crisis. AOMEI has already made its backup tool available free for a year.
It's now added to that by making the full version of its cloud management tool MultCloud available free for three months.
ESET improves security management for Azure users


As organizations move more of their systems to the cloud, they need security solutions that maintain visibility while keeping them safe.
Cybersecurity company ESET is releasing an upgraded version of its Security Management Center for Microsoft Azure, aimed at providing complete, real-time network visibility.
'SideScanning' technology offers deeper multi-cloud visibility


While network scanners and agent-based security tools are commonplace, they come with significant operational costs, but still offer only partial visibility, leaving the organization vulnerable to breaches.
Orca Security has produced a patent pending SideScanning technology, which is based on reading the workloads' run time block storage out of band, and cross-referencing this with cloud context pulled directly from the cloud vendors' APIs.
Clumio adds Microsoft 365 protection to its SaaS enterprise backup solution


Enterprises and their data are vulnerable, perhaps more so than ever right now, with COVID related phishing scams booming.
Backup specialist Clumio is adding Microsoft 365 to its secure backup as a service offering, providing organizations running Microsoft 365 with a globally consolidated data protection service.
Cloud spend soars as organizations adapt to COVID-19


The latest State of the Cloud report from Flexera reveals that 59 percent of enterprises expect their cloud usage to exceed prior plans due to COVID-19.
Organizations are over budget for cloud spending by an average of 23 percent, and expect cloud spend to increase by 47 percent next year. However, respondents estimate that 30 percent of their cloud spend gets wasted.
IBM Cloud boosts security and productivity with Red Hat OpenShift enhancements


As businesses move to the cloud, they want choice, flexibility, and the ability to easily manage and migrate their critical workloads securely across public clouds, private clouds, and on-premise environments.
To help them achieve this IBM is enhancing the Red Hat OpenShift container platform on IBM Cloud by making OpenShift 4.3 generally available as part of its fully managed service.
Recent Headlines
© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.