Monday, January 9, 2017

Forecast for 2017? Cloudy

by Lori MacVittie, Technology Evangelist, F5 Networks

In 2016, IT professionals saw major shifts in the cloud computing industry, from developing more sophisticated approaches to application delivery to discovering the vulnerabilities of connected IoT devices. Enterprises continue to face increasing and entirely new security threats and availability challenges as they migrate to private, public and multi-cloud systems, which is causing organizations to rethink their infrastructures. As we inch toward the end of the year, F5 Networks predicts the key changes we can expect to see in the cloud computing landscape in 2017.

IT’s  MVP of 2017? Cloud architects 

With more enterprises adopting diverse cloud solutions, the role of cloud architects will become increasingly important. The IT professionals that will hold the most valuable positions in an IT organization are those with skills to define criteria for and manage complex cloud architectures.

Multi-cloud is the new normal in 2017

Over the next year, enterprises will continue to seek ways to avoid public cloud lock-in, relying on multi-cloud strategies to do so. They will aim to regain leverage over cloud providers, moving toward a model where they can pick and choose various services from multiple providers that are most optimal to their business needs.

Organizations will finally realize the full potential of the cloud

Companies are now understanding they can use the cloud for more than just finding efficiency and cost savings as part of their existing strategies and ways of doing business. 2017 will provide a tipping point for companies to invest in the cloud to enable entirely new scenarios, spurred by things like big data and machine learning that will transform how they do business in the future.

The increasing sophistication of cyber attacks will be put more emphasis on private cloud
While enterprises trust public cloud providers to host many of their apps, the lack of visibility into the data generated by those apps causes concerns about security. This means more enterprises will look to private cloud solutions. Public cloud deployments won’t be able to truly accelerate until companies feel comfortable enough with consistency of security policy and identity management.

More devices – More problems: In 2017,  public cloud will become too expensive for IoT 

Businesses typically think of public cloud as the cheaper business solution for their data center needs, yet they often forget that things like bandwidth and security services come at an extra cost. IoT devices generate vast amounts of data and as sensors are installed into more and more places, this data will continue to grow exponentially. This year, enterprises will put more IoT applications in their private clouds, that is, until public cloud providers develop economical solutions to manage the huge amounts of data these apps produce.

The conversation around apps will finally go beyond the “where?”

IT professionals constantly underestimate the cost, time and pain of stretching solutions up or down the stack. We’ve seen this with OpenStack, and we’ll see it with Docker. This year, cloud migration and containers will reach a point that customers won’t be able to just think about where they want to move apps, they’ll need to think about the identity tools needed for secure authentication and authorization, how to protect and prevent data loss from microservices and SaaS apps; and how to collect and analyze data across all infrastructure services quickly.

A new standard for cloud providers is in motion and this year will see major developments in not only reconsidering the value of enterprise cloud, but also modifying cloud strategy to fully extend enterprise offerings and data security. Evaluating the risks of cloud migration and management has never been as vital to a company’s stability as it is now. Over the course of the year, IT leaders who embrace and adapt to these industry shifts will be the ones to reap the benefits of a secure, cost-effective and reliable cloud.

About the Author

Lori MacVittie is Technology Evangelist at F5 Networks.  She is a subject matter expert on emerging technology responsible for outbound evangelism across F5’s entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app security and encryption-related solutions. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University, and is an O’Reilly author.

MacVittie is a member of the Board of Regents for the DevOps Institute, and an Advisory Board Member for CloudNOW.

Hytrust: Transformation for the Cyber Security Industry

The security industry is changing dramatically, says Hemma Prafullchandra, CTO and EVP of Products for Hytrust, driven by IoT, connected automobiles, smart sensors, etc. Security needs to deal with this pace of innovation. It needs to become more agile, easier to use, and easier to move wherever workloads may land.

 

See video: https://youtu.be/lyQDIcF60Ck


Trend Micro Intros Next Gen TippingPoint Intrusion Prevention Systems

Trend Micro released its TippingPoint NX Series Next-Generation Intrusion Prevention Systems (NGIPS), including a first-to-market standalone NGIPS solution that delivers up to 100 Gb inspection throughput with low latency.

The new TippingPoint 7600NX intrusion prevention system is designed to protect data centers and enterprise networks in real-time from known, undisclosed and unknown vulnerabilities without adversely affecting network performance.

“Customers with high traffic environments require a solution that can operate seamlessly and help prioritize the threats they need to focus on first,” said Don Closser, vice president and general manager for Trend Micro TippingPoint. “Our 100 Gb solution’s superior performance as well as exclusive insight into undisclosed vulnerability data through our Zero Day Initiative program provides them real-time, accurate threat prevention between vulnerability discovery and patch availability.”

The TippingPoint 7540NX NGIPS is also available with up to 40 Gb inspection throughput.

http://www.trendmicro.com/us/business/network-security/intrusion-prevention-system

Yahoo to Change Name to Altaba, CEO Bows Out

Yahoo will change its name to Altaba following the close of its acquisition by Verizon.

Marissa Mayer will step down from the company's Board of Directors upon closing of the deal. David Filo, Eddy Hartenstein, Richard Hill, Jane Shaw and Maynard Webb will also resign from the Board.

No timeline was given for completion of the sale.

https://investor.yahoo.net/secfiling.cfm?filingID=1193125-17-5897&CIK=1011006&soc_src=mail&soc_trk=ma

Yahoo! -- One Billion Accounts Compromised

Yahoo! confirmed that hackers stole data and compromised more than one billion user accounts in August 2013. The exploit was first disclosed by Yahoo! in November and is most likely different from incident disclosed on September 22, 2016.

Separately, Yahoo previously disclosed that its outside forensic experts were investigating the creation of forged cookies that could allow an intruder to access users' accounts without a password. Based on the ongoing investigation, the company believes an unauthorized third party accessed the company's proprietary code to learn how to forge cookies. The outside forensic experts have identified user accounts for which they believe forged cookies were taken or used. Yahoo is notifying the affected account holders, and has invalidated the forged cookies. The company has connected some of this activity to the same state-sponsored actor believed to be responsible for the data theft the company disclosed on September 22, 2016.

https://yahoo.com/security-update

Yahoo Cites State Actor for Massive Security Breach

Yahoo believes a state-sponsored actor breached its network in late 2014 and may have stole names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers from at least 500 million accounts.

Yahoo said its ongoing investigation suggests that stolen information did not include unprotected passwords, payment card data, or bank account information.

http://www.yahoo.com

Verizon Confirms $4.8 Billion Acquisition of Yahoo

Verizon confirmed a deal to acquire Yahoo for $4.8 billion in cash. The deal does not include Yahoo’s cash, its shares in Alibaba Group Holdings, its shares in Yahoo Japan, Yahoo’s convertible notes, certain minority investments, and Yahoo’s non-core patents (called the Excalibur portfolio). Yahoo will remain a registered, publicly traded investment company holding these assets, and will change its name once the deal closes.

Yahoo, which was founded in 1994 and is based in Sunnyvale, California, remains one the most visited news and media website, with over 7 billion views per month, along with leading web services with email, sports, etc..

Yahoo claims 600 million monthly active users. Yahoo's email service has 225 million monthly active users.

Verizon said the acquisition, combined with its AOL property, gives its more than 25 digital content/service brands in areas ranging from sports and entertainment news to online information services.

“Just over a year ago we acquired AOL to enhance our strategy of providing a cross-screen connection for consumers, creators and advertisers. The acquisition of Yahoo will put Verizon in a highly competitive position as a top global mobile media company, and help accelerate our revenue stream in digital advertising.” Lowell McAdam, Verizon Chairman and CEO
http://www.yahoo.com

GTT Completes Acquisition of Hibernia Networks

GTT Communications completed its previously announced acquisition of Hibernia Networks.

The acquisition delivers the following assets:

  • Five subsea cables, including Hibernia Express, the lowest latency transatlantic cable system, and eight cable landing stations
  • New global points of presence, expanding GTT’s Tier 1 IP network to over 300 in total
  • Optical and low latency transport, video and CDN services
  • Key relationships with marquee clients, specifically within the financial services, media and entertainment, web-centric and service provider segments


“The addition of Hibernia Networks advances GTT’s growth strategy,” stated Rick Calder, GTT president and CEO. “The transaction expands GTT’s top five global IP network, adds products to our cloud networking portfolio and provides a strong recurring revenue base via established relationships with multinational clients. Our clients will also benefit from a team with deep technical expertise and a proven track record of delivering exceptional client service.”

http://www.gtt.net


New Hibernia Express Cable Timed at Record 58.95ms Latency for NY-London

The new Hibernia Express transatlantic cable is delivering an actual tested latency of better than 58.95ms (milliseconds) from New York to London, which is faster by more than half a millisecond off the original projected speed.

Hibernia Networks said its new undersea cable has undergone rigorous testing over the past two weeks. Testing parameters included power stability, spectral efficiency and latency. The results confirmed the latency on Hibernia Express from LD4 in Slough, England to NY4 in Secaucus, New Jersey to be under 58.95ms.

http://www.hibernianetworks.com/hibernia_express

  • Hibernia Express utilizes a 6-fiber-pair submarine cable, with a portion of the fibers optimized for lowest latency and a portion optimized for 100X100 Gpbs design capacity. The total cross-sectional design capacity of the cable will be over 53 Tbps. Hibernia Express will initially launch with 100 Gbps transmission capacity using TE SubCom’s C100 SLTE platform. Hibernia Express follows the most direct route between the UK and North America, promising to reduce latency by at least 5 milliseconds over existing cables.

Ericsson and Cisco to Deliver IP Upgrade for Telefonica Guatemala

Ericsson and Cisco will provide Telefonica Guatemala with a new IP backbone based on Cisco’s aggregation services routers (ASR 9010 and ASR 1001) and Ericsson’s integration services. The solution, which includes Ericsson’s implementation and integration services, as well as Cisco® routers , will expand Telefonica Guatemala’s current network backbone. It will support new capacity and features, including Ethernet services, VPNs, and IPv6. The network modernization also paves the way for future network requirements based on Network Functions Virtualization (NFV) and cloud implementations. Financial terms were not disclosed.

Daniel Delisante, Regional CTO, Telefonica Central America, says: “We selected Ericsson based on our longstanding relationship, and trust that the new Ericsson and Cisco partnership will bring value to Telefonica in Central America. As the demand for high-speed broadband and application coverage is continually increasing, we are happy to offer our subscribers a modern, IP-based network throughout Guatemala.”

http://www.ericsson.com
http://cisco.com

Citrix Acquires Unidesk for Windows Application Layering

Citrix has acquired Unidesk, which developed a Windows application packaging and management technology known as layering. Financial terms were not disclosed. Unidesk is based in Marlborough, MA.

Unidesk makes it easier to deploy and manage apps and desktops through Citrix XenApp and XenDesktop. Unidesk offers full-stack layering technology, which enhances compatibility by layering the entire Windows workspace as modular virtual disks, including the Windows operating system itself (OS layer), apps (app layers), and a writable persistent layer that captures all user settings, apps, and data.

Citrix said application layering has emerged as the best way to separate apps from the underlying operating system, so they can be managed once and delivered from any end user computing solution to any device.

“Unidesk has been recognized by customers and industry analysts as the clear leader in application layering, offering multiple unique advantages that streamline secure app delivery and VDI deployments and make them easier to manage,” said Jeroen van Rotterdam, senior vice president of Engineering at Citrix. “By incorporating Unidesk technology into XenApp and XenDesktop, Citrix advances its industry leadership by offering the most powerful and easy to deploy application layering solution available for delivering and managing app and desktops in the cloud, on-premises and in hybrid deployment environments.”

Citrix will continue to sell Unidesk as a standalone product for VMware Horizon and Microsoft virtual desktop deployment customers.

http://www.citrix.com

CenturyLink Acquires SEAL Consulting for SAP Services

CenturyLink has acquired SEAL Consulting, Inc., a leading SAP solutions provider for enterprise-wide business and technology needs. Financial terms were not disclosed.

CenturyLink said the deal enhances its application transformation capabilities and expands CenturyLink's commitment to the SAP ecosystem and to providing integrated application/infrastructure solutions.

"We are excited to continue enhancing CenturyLink's IT Solutions and SAP capabilities through the addition of SEAL Consulting," said Girish Varma, president of global IT services and new market development at CenturyLink. "This acquisition significantly expands our existing integrated SAP solutions, leveraging our hosting and cloud infrastructures to add broader SAP implementation and application managed services capabilities to our portfolio. The acquisition also gives us deeper expertise in several additional industry verticals."

http://www.centurylinktechnology.com
http://www.sealconsult.com

See also