Search This Blog

Monday, July 21, 2014

Ayehu extends IT automation into security automation

Network World IT Best Practices - Newsletter - networkworld.com
Enterprises increasingly look to the private cloud | Open user group specs out SDN expectations

Network World IT Best Practices

Forward this to a Friend >>>


Ayehu extends IT automation into security automation
This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  There's hardly a person in IT that doesn't have too much to do and too little time to do it. Since few IT departments are on a hiring binge, it's probably safe to say there are too few people handling the routine tasks to keep systems up and running along with the never ending firefighting. In short, most IT professionals are overworked and some might even be overwhelmed.In the "work smarter, not harder" category of tools are those that provide for IT process automation. Such tools create a script of some sort that automatically executes every time certain conditions are met. The script contains a workflow of very specific tasks that a person would normally have to do, but in this case they can be automated to be completed with or without input from a human.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: HP

Why you need a next-generation firewall
This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations. Learn More

WHITE PAPER: BMC Software

Deliver Better Service and Support, More Efficiently
People and businesses can do amazing things when technology runs at its best. Changing requirements and expectations have placed new demands on IT; now it's time for a new approach to service and support. Learn More

Enterprises increasingly look to the private cloud
Private cloud gives enterprises best of both worlds, say analysts Read More

Open user group specs out SDN expectations
The Open Networking User Group (ONUG) this week established working groups to address what it sees as the biggest pain points in networking and issued a white paper describing the current challenges and future needs.The group, which includes some of the biggest end user IT organizations in the industry, is looking to persuade network vendors to meet its requirements for greater multivendor interoperability and diversity, and relieve the bottleneck networking currently presents in moving IT operations forward. And ONUG will vote on the best remedy with its dollars.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: APC by Schneider Electric

Infrastructure Management Software Improves Planning & Costs
This paper demonstrates, through a series of examples, how data center infrastructure management software tools can simplify operational processes, cut costs, and speed up information delivery. View more

Why a Media Giant Sold Its Data Center and Headed to the Cloud
Two weeks ago, venerable media company Condé Nast — publisher of magazines like Vogue, The New Yorker and Wired — decommissioned its Newark, Del. data center. The 67,200 square feet facility had already been sold and the deal closed. The 105-year-old company had gone all-in with the cloud.10 of the Most Useful Cloud Databases "Our job in the technology group at Condé Nast is to provide the content makers in the company with the best tools to create content," says Joe Simon, executive vice president and CTO of Condé Nast. "Now most of our content is distributed across all sorts of places. We've got to ensure that we have the platform and technology flexibility to enable this content to be distributed wherever our editors want it to be. And, of course, we also continue to manage the traditional IT functions like HR and finance and sales."To read this article in full or to leave a comment, please click here Read More

How to Set Up a New Business Using Only Cloud Services
As recently as five years ago, setting up a new business and equipping it for a PC-literate workforce was a costly affair. You needed to acquire server hardware and pay various software licensing fees.The availability of mature, cloud-based services means that the situation is radically different today. Businesses can access the capabilities they require with little capital outlay. With this in mind, here are six important "digital" steps that a modern business needs to take.MORE ON NETWORK WORLD: How to build a private cloud Secure the Necessary Domains The first step for any new business today is establishing an online presence by registering a domain name bearing either its name or its brand. This is a relatively simple step that can be done with any ICANN-accredited domain registrar. As it is, the hardest bit is figuring out an appropriate domain name that best represents your business but has yet to be acquired by someone else.To read this article in full or to leave a comment, please click here Read More


WHITE PAPER: VCE

University of San Diego Advances Academic Excellence
This case study highlights how Vblock System enabled them to speed the rollout of new infrastructure by 75% while reducing IT implementation costs by 50%. Learn More

The CISO-centric Information Security Triad
What is the information security triad? Just about everyone knows the answer to this question is CIA – Confidentiality, Integrity, and Availability. Security professionals, service providers, and technology vendors are responsible for these three infosec pillars in one way or another. CISOs also take part of CIA oversight, but their responsibilities extend beyond confidentiality, integrity, and availability alone. In fact, the CISO role is changing rapidly and becoming so critical that these security executives deserve a cybersecurity triad of their own. The modern CISO triad equates to: Security efficacy. In some ways, this requirement supports the status quo as CISOs have always been accountable for cyber defense. So what’s changed? Security efficacy used to be closely associated with risk management – identifying and quantifying risk, and then putting the right controls in place for risk mitigation. While CISOs still own this part of the job, they are increasingly tasked with putting up security fences as well as overseeing top-notch intelligence and emergency response agencies. These responsibilities require a vast improvement in internal and external security intelligence supported by intensification of specialized security analytics skills, which can be difficult to find. Finally, CISOs need to be able to translate geek speak and a cyber-gumshoe lexicon into business metrics.   Operational efficiency. In the past, CISOs tended to disregard security operations in favor of a dogmatic focus on security efficacy. This led to a best-of-breed security technology mentality, where organizations purchased the best email security, AV software, firewalls, and IDS/IPSs they could find. While well-intended, this strategy made mighty enterprise organizations dependent upon an army of point tools, manual processes, and a plethora of individual contributors from the IT security organization. This situation is not only an operational nightmare, but it also detracts from security efficacy as modern malware circumvents security defenses and “kill chain” phases are viewed as autonomous events. Modern CISOs hired over the past few years are in charge of supplanting this mess with a mix of coordinated processes, integrated technologies, organizational cooperation, and far more automation. Business enablement. Some industry pundits have dumbed down this necessity with statements like: “Information security can no longer get in the way of the business.” That may be true, but it’s overly simplistic and not the point. CISOs are supposed to hold up a stop sign when the organization embarks on initiatives that exacerbate cyber risk, but this assumes that they understand the IT initiatives and business processes involved. Based upon cybersecurity history, this may be a bold supposition. Modern CISOs have to approach business enablement in two distinct ways: 1) Business process expertise, and 2) Cybersecurity services that can support business initiatives. The latter requirement could include a flexible infrastructure for Identity and Access Management (IAM), flexible security services that are extensible to IaaS and SaaS infrastructure, fine-grained network access control policies/enforcement, and strong data security and enterprise Digital Rights Management (eDRM). In aggregate, it’s not about holding back the business; it’s about enabling the business to be creative while constantly managing IT risk. A few final observations:To read this article in full or to leave a comment, please click here Read More

10 Top Jobs by Salary for Social Media Pros
Social Media Skills in High DemandImage by ThinkstockOf the 20 most common jobs that require social media skills, 11 pay above the national average with a median salary of $43,400, according to data provided by PayScale to CIO.com. While some of these jobs are more readily available at smaller businesses, the pay doesn’t usually match that provided by larger companies. The typical median pay in this field for businesses with up to 100 employees is $40,900 while businesses with more than 1,000 employees will pay an average of $58,400 for that same position, according to PayScale. Overall, the market value and demand for social media skills is increasing on a continuing basis. These are the 10 most common jobs, ranked by their median respective salaries that require social media skills.To read this article in full or to leave a comment, please click here Read More

How the Internet of Things will – and won't – change IT
Like too many other trends barreling down on beleaguered CIOs and IT managers, right now the Internet of Things is something to worry about, but not necessarily something to do anything about.At least, that’s my takeaway from a recent Spiceworks survey of 440 IT pros in North America and Europe, the Middle East, and Asia. Depending on which vendor or analyst you listen to, the IoT – new connected sensors, machines, and other non-human stuff – is about to dump anywhere from 26 billion to 50 billion new devices onto worldwide networks over the next few decades. Estimates of the value of this new market run up to almost $15 trillion in just 8 years.To read this article in full or to leave a comment, please click here Read More


SLIDESHOWS

Worst data breaches of 2014…So far

We identified the worst of these for the first quarter of the year, and now we show you the worst for April though June.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Cisco customers are brutally consolidating too

2. Microsoft to lay off 18,000 in next year

3. 10 Web Services That Make Your Life Easier

4. Say goodbye to desktop phones

5. 17 obscure Windows tools and tricks too powerful to overlook

6. Microsoft may announce its biggest layoffs ever on Thursday

7. Y2K bug resurfaces and sends draft notices to 14,000 men born in the 1800s

8. Ubuntu 14.04: Is Canonical taking on too much

9. 10 disturbing attacks at Black Hat USA 2014

10. Microsoft researchers: Re-use the same password across sites likely to be hacked


Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_it_best_practices_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: