Proact launches new updates to its flexible managed cloud service, Proact Hybrid, ideally suited for organizations that seek the benefits of an integrated cloud platform but still need to adhere to strict requirements on data sovereignty and data location. As digitalisation accelerates, customers are looking to use more flexible cloud solutions to better enable innovation, accelerate growth and drive value through data. But these opportunities also come with new types of challenges and threats involving … More
The post Proact Hybrid updates offer customers flexibility in moving data between different platforms appeared first on Help Net Security.
HITRUST announced a major feature enhancement to its information risk management platform, HITRUST MyCSF, that significantly streamlines how organizations capture and present regulatory compliance evidence. HITRUST also introduced a new, no-cost Regulatory Assistance Center to further support organizations with a HITRUST CSF® Certification as they prepare for and undergo regulatory audits. Both the new Compliance and Reporting Pack feature for HITRUST MyCSF and the new Regulatory Assistance Center initially focus on the Health Insurance Portability … More
The post HITRUST MyCSF streamlines regulatory compliance reporting appeared first on Help Net Security.
CodeZero has launched the ZERO BrandCard, a digital identity card of the future, backed by LISNR to enable a secure and contactless digital identity exchange. Strategically tailored for the “new normal”, CodeZero’s future identity card pushes the envelope to what a business card can be. In one easy to access portal, a company can upload, design and digitize their corporate profile, brochures, and even an entire sales kit, saving time, cost, and the environment. An … More
The post CodeZero ZERO BrandCard: Enabling a secure and contactless digital identity exchange appeared first on Help Net Security.
Okera announced the next evolution of the Okera Dynamic Access Platform (ODAP) and the introduction of the industry’s first “co-located” deployment mode for the Okera Adaptive Security Plane (OASP). This trailblazing innovation ensures consistency of policy enforcement at nScale (infinite scale). With Okera’s nScale, organizations can deploy OASP on the same infrastructure as existing compute resources and scale elastically with them. This eliminates the complexity of manually managing a separate cluster while also enabling Okera’s … More
The post Okera launches adaptive security plane with nScale elasticity appeared first on Help Net Security.
NETSCOUT announced the extension of its Smart Perimeter Protection to AWS. The combination of NETSCOUT’s Cyber Investigator (NCI) and CyberStream software with new AWS packet access services helps contain costs and achieve better efficiencies in mitigating novel security threats as enterprises move applications to the cloud. As the threat surface expands, the solution uses packet data and powerful cyber analytics to get to the root cause of cybersecurity issues quickly. NETSCOUT has collaborated with AWS … More
The post NETSCOUT extends its Smart Perimeter Protection to AWS appeared first on Help Net Security.
WekaIO announced that Weka File System (WekaFS), with its Kubernetes Container Storage Interface (CSI) plug-in, has successfully completed interoperability testing with Rancher Labs’ Kubernetes management platform. Together, the companies will offer enterprises an integrated, end-to-end tested solution that enables accelerated DataOps. With this certification, Rancher Labs (now a SUSE company) and Weka have joined each other’s Technology Alliance Partner Programs. A complete software stack for teams adopting containers, Rancher is a leading choice for enterprises … More
The post WekaIO and Rancher Labs team up to help enterprises run containers and Kubernetes in production appeared first on Help Net Security.
CloudKnox Security extended support for serverless functions on Amazon Web Services (AWS), Azure, and Google Cloud Platform (GCP). The enhancement adds serverless functions to a substantial list of permissions management capabilities, including users, bots, service accounts, access keys, and other resources. The company also announced an integration with ServiceNow, the next step of many towards realizing CloudKnox’s next gen cloud security and permissions management vision. Together, the support for serverless functions and ServiceNow integration underscore … More
The post CloudKnox extends support for serverless functions on AWS, Azure, and Google Cloud appeared first on Help Net Security.
Trend Micro announced the world’s first cloud-native, fully serverless file storage security tool for organizations building applications in the cloud. Trend Micro Cloud One – File Storage Security is designed to mitigate threats across the cloud environment and support strict compliance requirements.
The explosion of cloud-based file and object storage presents a new attack vector for threat actors to target with malicious files. Cloud One – File Storage Security provides automated anti-malware scanning to keep information safe and ease compliance needs.
“Global organizations are increasingly looking to public cloud providers to drive IT agility, cost savings and business growth. But while the provider deals with security of the cloud, the customer is responsible for everything inside their cloud environment,” said Mark Nunnikhoven, vice president of cloud research for Trend Micro.
“This is a highly scalable, automated scanning tool that’s fast to deploy with no added infrastructure, allowing organizations to confidently store cloud files and data associated with their cloud applications.”
Backed by Trend Micro’s 30+ years of cybersecurity experience and industry leading threat intelligence, the tool blocks known bad files, and looks for hidden or changing malware variants.
The scanner itself is a lightweight, cloud-native serverless function that’s designed for minimal operational overhead. This architecture enables fast, seamless deployment and flexible integration with organizations’ existing custom workflows for added value.
The tool supports various compliance requirements that call for anti-malware scanning of cloud files while maintaining data sovereignty.
Trend Micro Cloud One – File Storage Security is available now for AWS S3, with support for Microsoft Azure Blob storage and Google Cloud Storage coming soon.
Using Trend Micro’s Cloud One platform, teams can implement a range of security services and compliance checks without hindering agile cloud development and deployment. This single cloud-native security seamlessly complements and integrates with existing AWS, Microsoft Azure, VMware, and Google Cloud toolsets.
DigiCert helps companies provision and manage digital certificates at any point during the product lifecycle with the new release of the IoT Device Manager.
Manufacturers can now embed certificates on chipsets prior to and during manufacturing, or directly to an edge device, for complete end-to-end device security. IoT Device Manager is built on DigiCert ONE, which enables rapid, automated PKI deployment as a customer-managed, on-premises or cloud solution, or managed by DigiCert for any environment.
A challenge manufacturers face when implementing PKI is figuring out how to provision certificates to devices during the manufacturing and assembly process. Changing manufacturing processes by implementing new technology can be a time consuming and expensive undertaking.
To address this challenge, DigiCert provisions authentication and signing certificates to chips prior to arriving at the manufacturing plant for assembly. Having certificates pre-provisioned allows manufacturers, without changing any processes, to achieve the benefits of device identity, strong mutual authentication, and secure boot and over-the-air updates through the use of digital signatures.
Additionally, as manufacturers look for more device-level data and management capabilities, metadata on the device’s characteristics — including serial numbers, batch numbers and digital certificate data — can be loaded into DigiCert IoT Device Manager to support full device management capabilities throughout a device’s lifetime.
“Signing is a critical component of strong IoT security, and manufacturers are continually signing a variety of programming elements to ensure the integrity of interactions with their devices, and the data coming from it,” said DigiCert SVP of Product Brian Trzupek.
“Together with assuring the identity of the device at the time of manufacture and enabling certificate requests directly from any deployed device, IoT Device Manager is part of a holistic security and threat response platform for IoT device security.”
Manufacturers are simplifying the complexity of IoT deployments by pushing more activity to the edge device. To support this transition, a device-centric API in the IoT Device Manager enables unique devices to request, update and manage the lifecycle of certificates.
Complicated and expensive service layers that take time and effort to develop are no longer necessary for certificate provisioning and management. This feature allows manufacturers to simplify deployments, accelerate time to market and reduce the overall risk of their PKI.
IoT Device Manager uses a container-based, cloud-native implementation to:
- allow organizations to provision and embed device identity at any stage of the device lifecycle, from the factory to device deployment in a variety of environments to provide trusted and secure operations.
- simplify device identity, authentication, encryption and integrity with a single click and marry device data visualization with cryptographic, manufacturing and factory process data.
- support standards-based interoperability with third-party manufacturing and provisioning systems and enable technology partners to address a variety of use cases for today’s IoT security requirements.
Secure Software Manager can be utilized together with IoT Device Manager to:
- deploy modern PKI automation for frictionless secure code signing and private key management.
- sign all files at any stage of the development cycle, not only for specific code but also clusters and containers.
42Crunch announced the release of new IDE OpenAPI (Swagger) editing plugins for both Eclipse and JetBrains family of IDEs including IntelliJ and PyCharm.
42Crunch’s free OpenAPI security audit plugins simplify REST API development by delivering features such as OpenAPI navigation, code snippets, intellisense, and HTML preview.
More importantly, the plugins help developers take their API security to the next level by delivering audit reports right to the developer’s IDE. Thus, engineers discover and address security vulnerabilities as early as API design and development time.
APIs are projected to be the number one attack vector by 2022. Transition to cloud-native architectures, microservices, and serverless functions led to the proliferation of APIs. Companies now have thousands of APIs: constantly changing and network-accessible, thus representing the new, vastly expanded attack surface.
Research shows that detecting and fixing vulnerabilities during production or post-release time is 30 times more difficult than earlier in the API lifecycle. By taking a shift-left approach and addressing API security during design time, companies will establish and maintain the security of their systems while staying agile and delivering business requirements – this starts with developers.
“42Crunch’s mission is to provide API security technology for each stage of the API lifecycle from design, to development, to testing, to runtime protection and monitoring,” says Dmitry Sotnikov, Chief Product Officer at 42Crunch.
“By bringing API security audit right into developers’ IDEs of choice, we are making API security easier. Developers get actionable security advice within their development environment and are thus enabled to improve the security of their product.”
The Eclipse and IntelliJ/PyCharm extensions both add rich support for the OpenAPI Specification (Swagger) in JSON or YAML format and allow developers to:
- Perform 200+ security checks of the OpenAPI specification definition, with detailed feedback for security improvements
- Easily view security issues in-line with contract based on the severity level
- And remediate issues without ever having to leave your IDE
Shifting security left
The release of these two new plugins comes as part of 42Crunch’s overall strategy of taking a shift-left approach to simplify and automate security.
With a combined 100k+ users of their API Security Platform, IDE and CI/CD plugins, 42Crunch is creating a natural way for development, security and operations teams to naturally enable a DevSecOps process across the API security lifecycle.
WatchGuard announced the release of its new Firebox M4800 and M5800 appliances. These new firewalls provide the powerful performance, security services and flexibility businesses need as they become increasingly distributed and have more employees on the move or working outside the traditional corporate network perimeter.
“Organizations of all types and sizes have undergone a profound transformation over the past year, and many are grappling with how best to maintain security from the core network to remote employees and endpoints,” said Brendan Patterson, vice president of product management at WatchGuard.
“The industry-leading speed and performance of our new M Series appliances, paired with their simplicity, modularity and affordability gives our partners and customers a Unified Security Platform that can adapt to remote work deployments and evolve along with the business.”
Recent WatchGuard threat intelligence shows that organizations that aren’t able to effectively analyze encrypted traffic will miss 54% of incoming attacks, emphasizing the need for HTTPS inspection in today’s threat landscape.
The new Firebox M4800 and M5800 achieve throughput of 5.2 Gbps and 11.3 Gbps respectively with UTM services enabled. The Firebox M5800 has achieved certified performance results through open, standardized testing developed by NetSecOPEN and adopted by the Internet Engineering Task Force (IETF).
In the NetSecOPEN testing, the Firebox M5800 is certified for speeds up to 4.9 Gbps with all security scanning and HTTPS content inspection enabled. As WatchGuard’s highest performing Firebox appliances to date, these new models ensure that users don’t have to choose between throughput and security. The complete report is available for download here.
As business operations continue to change in response to COVID-19, organizations and their trusted IT solution providers need a security platform that can adapt as networks evolve.
Both new M Series appliances provide this flexibility through two available slots for network modules with additional fiber and copper port options (two 40 Gb fiber, four 10Gb fiber, eight 1Gb fiber or eight 1Gb copper).
The M4800 and M5800 expansion modules match those of WatchGuard’s mid-range Firebox appliances, further enabling users with the flexibility they need to quickly and simply adjust and reinforce their network security posture over time.
The new Firebox M4800 and M5800 offer a range of additional features and benefits, including:
- Secure remote access made easy – Usage of Access Portal, WatchGuard’s clientless VPN service for secure remote access, has grown by over 85% over the past year. With the M4800 or M5800, users can simply leverage web browsers to securely connect to third-party web applications, internal applications, and Microsoft Exchange services, as well as create RDP and SSH sessions to local resources, wherever they are.
- Simplified cloud-based visibility and management – The WatchGuard Cloud platform makes it easy for users to quickly and simply manage these appliances, and provides deep network visibility that makes it possible to execute timely, informed, and effective security actions anytime, anywhere. WatchGuard Cloud offers over 100 dashboards and reports, displaying both high-level and in-depth insights on trends and anomalies. M4800 and M5800 appliances with the Total Security option come with one month of log and report retention included at no extra charge.
- Automation to the core – The new M Series appliances are designed with automation to the core, allowing both midmarket organizations and IT solution providers to do more with less. WatchGuard’s automated capabilities make it possible to deploy new appliances from the cloud, block threats, update signatures, detect and kill malware, and streamline management processes.
“Our top priority as a managed service provider today is to be able to deploy and maintain high-performing and secure networks for our customers. We have got a significantly lower latency and increased performance, while extending protection to our remote workforce,” said Carsten Alnoe, CEO at aimIT Denmark.
“WatchGuard’s new M4800 – M Series firewalls allow us to consolidate critical network and security functions under a single platform to better inspect encrypted traffic, handle remote work security considerations, and in general, simplify how we manage and secure our customers’ distributed enterprise deployments.”
Blockchain has many enterprise applications that go beyond cryptocurrency, including smart contracts, supply chain, and healthcare records. To help tech professionals get a stronger grasp on the important technology and how to leverage it within their own organizations, ISACA has released two new resources: Blockchain Framework and Guidance and Blockchain: An Executive View.
Blockchain Framework and Guidance offers a comprehensive blockchain reference, including overview, history, information about types and their benefits and features, as well as use cases and a framework for enterprise adoption.
The framework goes into depth into key considerations—like stakeholder management, implementation considerations, interoperability concerns, governance model and management guidelines, and digital asset/token requirements. It also provides a complete set of high-level blockchain control objectives that include key questions that enterprises need to answer, including:
- Do the proposed blockchain control objective domains adequately cover risk vectors and business process objectives for the organization transacting in this space?
- Have we identified the relevant stakeholders of blockchain control objectives?
- Do we understand our engagement with the larger blockchain ecosystem in evaluating risk and control objectives?
Offering another primer on blockchain, the paper Blockchain: An Executive View explains blockchain technology in clear business language and explores the opportunities and challenges that enterprises may face when using blockchain.
It shares use cases, outlines the enterprise benefits and risks, provides a guide to getting started with blockchain, and shares security, privacy and legal considerations, including offering security mitigation methods such as:
- Use standardized and tested libraries and interfaces.
- Conduct internal or peer code reviews.
- Leverage bug bounty programs to crowdsource other testing perspectives.
“Enterprises considering the implementation of blockchain technology should first do their due diligence and take some key steps—including asking themselves strategic questions, exploring enterprise risks, and assessing how blockchain adoption would map to their existing technologies, both now and in the future,” says Ron Quaranta, chairman and CEO of the Wall Street Blockchain Alliance, member of ISACA Emerging Technology Advisory Group, and lead author of the Blockchain Framework and Guidance.
“The benefits of this technology can be powerful, provided that enterprises have strong governance, controls and security protocols in place. This framework is an important step in understanding blockchain technology and realizing those benefits.”
Adds Nader Qaimari, ISACA chief product officer, “The use of blockchain solutions is increasingly becoming a strategic priority for enterprises across sectors, and whether someone is hands-on in implementing blockchain or making a business case for it at the C-Suite level, education is key.
“Through these new resources, professionals have the foundational knowledge and tools to take the next steps in effectively adopting this unique technology.”
Mindtree announced the launch of a dedicated Microsoft go-to-market business unit centered on building new solutions based on Microsoft platforms and technologies, as well as developing the next generation of talent across the Mindtree organization globally.
The Microsoft go-to-market business unit is a component of Mindtree’s multi-tiered initiative to support the continued demand of cloud services and solutions.
Mindtree will also expand its Global Azure Experience Center in Redmond, WA and will leverage its Microsoft Excellence Academy to ensure all technical professionals are proficient and certified on Microsoft Azure technologies.
“As long-standing partners, our mutual goal is to bring together our complementary strengths to deliver specialized capabilities, industry solutions and services that will help our customers get maximum value out of their investment in Microsoft technologies,” said Debashis Chatterjee, Chief Executive Officer and Managing Director, Mindtree.
“Today’s announcement broadens Mindtree’s reach and expertise within Microsoft’s business which continues to grow at scale and underscores the unwavering commitment that Mindtree has made to drive strategic work for common enterprise clients.”
Through Microsoft’s partner-led sales model, Mindtree delivers best-in-class, Azure-based solutions to drive clients’ digital transformation initiatives and help them thrive in a cloud-first world. Mindtree’s team of experts have accumulated a vast base of knowledge and skills in Microsoft 365, Dynamics 365, Power Platform, Azure, and related capabilities.
“By enhancing the focus on a dedicated Microsoft business unit, Mindtree is taking a critically important step forward in our collaboration and making further investments in the Microsoft ecosystem,” said Gavriella Schuster, Corporate Vice President, One Commercial Partner, Microsoft.
“As a result, enterprise customers will further benefit from the innovative products and services tailored to their digital and cloud transformation initiatives, as well as Mindtree’s world-class talent around the globe to develop and apply industry specific solutions to solve customers’ business challenges.”
Accelerating Mindtree’s go-to-market strategy in collaboration with Microsoft will rely on three growth pillars. First, enhancing Mindtree’s Microsoft go-to-market business unit headquartered in Redmond, where Mindtree Minds will continue to support enterprise clients with their digital transformation journeys.
Second, a 135,000-square-foot, state-of-the-art Global Azure Experience Center, housing a highly skilled talent pool, will help deliver best-in-class cloud solutions that enterprise clients require. Third, a global, Microsoft Excellence Academy will provide every Mindtree Mind technical professional training and certification on Azure technologies.
CipherCloud announced that it has formally introduced its Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) solutions capabilities.
This new offering enables CipherCloud customers to prevent unintended cloud misconfigurations that lead to data loss, while enabling more consistent compliance with industry standards such as GDPR, CCPA, HIPAA and PCI.
Delivered as an integrated component of the market-leading CASB+ solution, CipherCloud CSPM and SSPM directly address the leading cause of cloud security and data breaches — unseen cloud configuration errors.
CipherCloud CSPM and SSPM deliver continuous oversight and real-time guardrails that enable practitioners to protect critical administrative and configuration controls across their numerous SaaS and IaaS environments, including Salesforce.com, Office 365, Amazon AWS, Microsoft Azure, and Google Cloud.
In the Gartner 2020 “Magic Quadrant for Cloud Access Security Brokers” CipherCloud was highlighted for market-leading CSPM/SSPM capabilities suitable to replace stand-alone tools.
“Our customers are asking us to provide them with all the security and GRC capabilities they need to address their cloud security challenges in an integrated solution, and CSPM has become a huge requirement based on the sheer number of related breaches,” said Pravin Kothari, CipherCloud Founder and CEO.
“The growing scale and complexity of SaaS and cloud environments have made it impossible for security teams to properly address this issue using manual processes. Organizations need automated analysis and remediation to prevent risky configuration exposures and remain both protected and compliant.”
Integrated multi-cloud configuration monitoring and remediation
CipherCloud’s CSPM and SSPM continuously scan SaaS and cloud services to discover problematic configurations, user errors, and perform automatic remediation of identified exposures, securing cloud accounts from unintended data loss due to security blindspots or configuration oversight.
The solution also defines pre-built rules to reflect leading security methodologies and compliance frameworks, including CIS Foundations Benchmarks, GDPR Compliance, HIPAA Compliance, and PCI DSS Best Practices, along with providing the option to validate cloud security posture against the native CipherCloud Best Practices framework.
Key processes addressed by CipherCloud CSPM and SSPM include:
- Configuration changes: Detecting less secure configurations on new resources and unintentional access/configuration changes on all existing resources.
- Compliance: Ensuring that the IaaS platform is deployed securely and appropriately configured to meet regulatory standards, security policies & CIS benchmarks.
- Continuous monitoring: Continuously monitoring configuration changes to alert on insecure configurations, applying tags to inform further analysis.
- Reporting: Periodically running security assessments to analyze and detail changes, and generate corrective actions.
CipherCloud CASB+ platform
The CipherCloud CASB+ platform enables complete control of SaaS and cloud applications to provide advanced visibility, data security, threat protection and compliance. CASB+ protects any cloud service or application from unauthorized data access, upload, download, and sharing to meet corporate governance, compliance, and cybersecurity policies.
The cloud-native platform ensures that confidential and sensitive data is protected at all locations — in the cloud and on users’ devices. CASB+ provides one centrally controlled unified platform for enterprises to safely use the largest and most diverse multi-cloud environments — email, SaaS, PaaS, or IaaS, and custom clouds.
CipherCloud CASB+ has the ability to scale to fit any enterprise — as users scale their use of the platform, elasticity will support increased demand without impacting customer service, cost or manageability.
NICE Actimize’s X-Sight Marketplace, which has grown to include more than 60 technology partners, is the first financial crime and compliance ecosystem that connects financial services organizations with data, applications, tools and service providers, providing both the value of choice and the ability to reduce integration timelines.
Until recently, financial services organizations relied on alphanumeric matching to screen their customers against watchlists to fulfill their Know Your Customer (KYC) and Anti-Money Laundering / Counter Terrorism Financing (AML-CTF) regulatory obligations.
Common names, transliteration issues, missing secondary identifiers, identity theft and impersonation contributed disproportionately to the high number of alerts, making it difficult not to miss true positives without a corresponding snowballing of false positives.
FACEPOINT complements and enhances NICE Actimize’s AML screening and KYC solutions by offering an alternative to traditional name-based screening. FACEPOINT uses facial recognition to disambiguate potential matches, reduce false positive rates and identify emerging threats such as those posed by unnamed persons of interest that are not covered by watchlists.
In the context of KYC screening processes, FACEPOINT’s “picture intelligence” maintains a worldwide image database of “people of interest”, and offers a real-time risk mitigation solution thanks to cutting-edge image analysis.
Biometric identification offers greater precision, accuracy and speed and therefore enormous potential for improved operational efficiency and reduction in compliance costs.
“Financial crime evolves continuously. Financial institutions must face numerous sophisticated challenges with targeted applications that solve these problems efficiently and effectively,” said Craig Costigan, CEO, NICE Actimize.
“The X-Sight Marketplace offers dozens of highly specialized capabilities which support best-in-class financial crime, risk and compliance management and which, in the case of FACEPOINT, complement our integrated AML solutions suite with enhancements to our AML and KYC risk screening capabilities.”
“FACEPOINT has truly disrupted the industry’s risk screening operations with its picture intelligence capabilities designed to enhance risk screening tools, understanding that identifying high-risk individuals is a growing challenge for financial institutions,” said Damien Martinez, CEO and Co-Founder, FACEPOINT.
“Our unique biometrics risk engine is an ideal fit with NICE Actimize’s suite of anti-money laundering solutions, providing additional advanced capabilities to its robust lineup.”
The NICE Actimize Integrated AML solution suite uses advanced artificial intelligence and machine learning, as well as its domain expertise and robotic process automation, to provide complete customer lifecycle risk coverage – from onboarding to ongoing CDD, EDD and transaction monitoring processes.
Intelligent automation, AI and machine learning are combined with KYC-AML domain expertise to continuously assess risk and provide a holistic view of the customer across all business lines and products.
NICE Actimize’s X-Sight Marketplace partner offerings address such categories as customer and counterparty intelligence, data management, device and channel intelligence, identity verification, screening and adverse media, user authentication and fraud, CDD/KYC, transaction monitoring, and alert and case management.
SoftServe has achieved AWS Migration Competency status. This designation recognizes SoftServe’s expertise in helping businesses successfully move to AWS through all phases of complex migration projects, including discovery, planning, migration, and operations.
The AWS Migration Competency marks SoftServe’s sixth AWS Competency designation, following the AWS Retail Competency, AWS SaaS Competency, AWS Financial Services Competency, AWS DevOps Competency, and AWS Data & Analytics Competency.
“The AWS Migration Competency highlights our proficiency in guiding customers through their transition from legacy infrastructure to AWS to realize transformative business impact across their organization,” said Andrew Greene, Associate Vice President, Global Cloud Partnerships & Alliances at SoftServe.
“We accelerate cloud adoption by enabling our customers to overcome some of the toughest migration challenges. Whether it’s reskilling people or upgrading processes, changing software applications, or addressing operating system incompatibility, SoftServe has the tools, talent, and technology to make securely shifting workloads painless and efficient at every stage.”
AWS enables scalable, flexible, and cost-effective solutions to businesses, from startups to global enterprises. To support the seamless integration and deployment of these solutions, AWS established the AWS Competency Program to help customers identify AWS Consulting and Technology Partners with deep industry experience and expertise.
AWS Migration Competency Partners provide expertise and training to help develop customers’ cloud capabilities while offering migration, DevOps, application, and environment modernization consulting to set customers on the path to success.
Future-proof your business by successfully moving business’ infrastructure to AWS. SoftServe takes you through every step of the process, regardless of complexity or the size of your deployment.
Blaize fully unveiled the Blaize AI Studio offering, the industry’s first open and code-free software platform to span the complete edge AI operational workflow from idea to development, deployment and management.
AI Studio dramatically reduces edge AI application deployment complexity, time, and cost by breaking the barriers within existing application development and machine learning operations (MLOps) infrastructure that hinder edge AI deployments.
Eliminating the complexities of integrating disparate tools and workflows, along with the introduction of multiple ease-of-use and intelligence features, AI Studio reduces from months to days the time required to go from models to deployed production applications.
“While AI applications are migrating to the Edge with growth projected to outpace that of the Data Center, Edge AI deployments today are complicated by a lack of tools for application development and MLOps,” says Dinakar Munagala, Co-founder and CEO, Blaize.
“AI Studio was born of the insights to this problem gained in our earliest POC edge AI hardware customer engagements, as we recognized the need and opportunity for a new class of AI software platform to address the complete end-to-end edge AI operational workflow.”
“AI Studio is open and highly optimized for the AI development landscape that exists across heterogeneous ecosystems at the edge,” says Dmitry Zakharchenko, VP Research & Development, Blaize.
“With the AI automation benefits of a truly modern user experience interface, AI Studio serves the unique needs in customers’ edge use cases for ease of application development, deployment, and management, as well as broad usability by both developers and domain expert non-developers.”
The combination of AI Studio innovations in user interface, use of collaborative Marketplaces, end-to-end application development, and operational management, collectively bridge the operational chasm hindering AI edge ROI.
Deployed with the Blaize AI edge computing hardware offerings that address unserved edge hardware needs, AI Studio makes AI more practical and economical for edge use cases where unmet application development and MLOps needs delay the pace of production deployment.
“In our work for clients, which may include developing models for quality inspection within manufacturing, identifying stress markers to improve drug trials or even predicting high resolution depth for autonomous vehicles, it is vital that businesses can build unique AI applications that prove their ideas quickly,” says Tim Ensor, Director of AI, Cambridge Consultants.
“AI Studio offers innovators the means to achieve this confidence in rapid timeframes, which is a really exciting prospect.” Cambridge Consultants, part of Capgemini Group, helps the world’s biggest brands and most ambitious businesses innovate in AI, including those within the Blaize ecosystem.
Code-free assistive UI for more users, more productivity
The AI Studio code-free visual interface is intuitive for a broad range of skill levels beyond just AI data scientists, which is a scarce and costly resource for many organizations.
“Hey Blaize” summons a contextually intelligent assistant with an expert knowledge-driven recommendation system to guide users through the workflow. This ease of use enables AI edge app development for wider teams from AI developers to system builders to business domain subject matter experts.
Open standards for user flexibility, broader adoption
With AI Studio, users can deploy models with one click to plug into any workflow across multiple open standards including ONNX, OpenVX, containers, Python, or GStreamer.
No other solution offers this degree of open standard deployment support, as most are proprietary solutions that lock in users with limited options. Support for these open standards allows AI Studio to deploy to any hardware that fully supports the standards.
Marketplace support allows users to discover models, data and complete applications from anywhere – public or private – and collaborate continuously to build and deploy high-quality AI applications.
AI Studio supports open public models, data marketplaces and repositories, and provides connectivity and infrastructure to host private marketplaces. Users can continually scale proven AI edge models and vertical AI solutions to effectively reuse across enterprises, choosing from hundreds of models with drag and drop ease to speed application development
Easy-to-Use application development workflow
The AI Studio model development workflow allows users to easily train and optimize models for specific datasets and use cases, and deploy quickly into multiple formats and packages. With the click of a button, AI Studio’s unique Transfer Learning feature quickly retrains imported models for the user’s data and use case.
Blaize edge-aware optimization tool, NetDeploy, automatically optimizes the models to the user’s specific accuracy and performance needs. With AI Studio, users can easily build and customize complete application flows other than neural networks, such as image signal processing, tracking or sensor fusion functions.
Ground-breaking edge MLOps/DevOps features
As a complete end-to-end platform, AI Studio helps users deploy, manage, monitor and continuously improve their edge AI applications. Built on a cloud-native infrastructure based on microservices, containers and Kubernetes, AI Studio is highly scalable and reliable in production.
Blaize AI Studio Early Adopter Customers Results
In smart retail, smart city and industry 4.0 markets, Blaize customers are realizing new levels of efficiency in AI application development and deployment using AI Studio. Examples include:
- Complete end-to-end AI development cycle reduction from months to days
- Reduction in training compute by as much as 90%
- Edge-aware efficient optimizations and compression of models with a < 3% accuracy drop
- New revolutionary contextual conversational interfaces that eclipse visual UI
Versa Networks announced a new capability connecting Versa Secure SD-WAN, on-premises, and cloud branches with applications and resources in Amazon Web Services (AWS) using the new high-performance AWS Transit Gateway Connect feature, an AWS Transit Gateway attachment type that enables AWS customers to connect third-party SD-WAN hubs and network virtual appliances with AWS Transit Gateway.
As a result, businesses can now benefit from AWS Transit Gateway peering connections for up to 5 Gbps of bandwidth per GRE tunnel, while continuing to leverage the high-performance, application and SLA-aware network via the Versa Traffic Engineered Protocol.
AWS Transit Gateway connects Amazon Virtual Private Clouds (Amazon VPCs) and on-premises networks through a central hub. Versa Director now integrates with AWS Transit Gateway Connect APIs to deliver an automated, one-click solution for connecting Versa Secure SD-WAN, on-premises and multi-cloud branch locations to each other and with Amazon VPCs.
Versa customers can now easily connect Versa Secure SD-WAN with AWS Transit Gateway for a high-performance and simplified connection between their branch offices, applications and resources in Amazon VPCs.
The native integration with AWS Transit Gateway Connect allows customers to deploy high-bandwidth Versa Cloud Gateways in AWS leveraging the Versa centralized management and orchestration. Customers can also leverage Versa Analytics and monitoring capabilities for end-to-end visibility and tracking of application performance all in one dashboard.
“Organizations are rapidly migrating their applications and data to AWS,” said Mayumi Hiramatsu, Vice President, Amazon EC2 Networking, Amazon Web Services, Inc. “We are pleased to work with Versa Networks so customers can leverage the new AWS Transit Gateway Connect feature for seamless connectivity between their branch offices and their Amazon VPCs.”
By integrating with AWS Transit Gateway Connect, Versa enables customers to monitor user traffic when accessing cloud-based AWS applications over Versa Secure SD-WAN or using AWS as the transit network to connect on-premise branches.
Customers also benefit from Layer-7 application and SLA-aware networking features, and performance enhancing features such as application acceleration provided by Versa Secure SD-WAN. Versa Secure SD-WAN is uniquely positioned to leverage AWS Transit Gateway due to its differentiated architecture, Versa Traffic Engineered Protocol, and robust feature set.
New Versa Director capabilities integrate with AWS Transit Gateway Connect APIs using workflows and automation to abstract the configuration requirements of AWS and deliver a simplified, guided experience for configuration.
AWS Transit Gateway Connect seamlessly integrates into customers’ enterprise networking architecture as a transit hub to connect their branches with each other and with Amazon VPCs.
“Versa’s customer base is increasingly leveraging cloud services for hosting applications and connecting branch offices using high quality links,” said Dogu Narin, Head of Product Management for Versa Networks.
“This new integration with AWS Transit Gateway Connect enables customers to benefit from a very high-performance peer-to-peer network. This will be particularly important for our global multi-national customers that require scalable cloud-delivered and highly reliable connectivity between globally distributed branches.”
Versa is the leader in SASE and Secure SD-WAN, uniquely combining full-featured SD-WAN, comprehensive integrated security, scalable advanced routing, genuine multi-tenancy, and sophisticated analytics on-premises and in the cloud to meet WAN Edge requirements for small to very large enterprises, as well as Service Providers.
Versa enables secure, scalable, and reliable enterprise-wide networking, increasing multi-cloud application performance and dramatically driving down costs (CapEx and OpEx). Versa Secure SD-WAN and SASE are available on-premises, hosted through Service Providers, cloud-delivered, and via the Versa Titan service for Lean IT.
IBM Security announced new technology initiatives leveraging Amazon Web Services (AWS), designed to help clients simplify and extend their security visibility across AWS and hybrid cloud environments.
The projects include integrations with AWS security services, quick start deployment for key IBM Security technologies, as well as expert consulting and managed security services support.
As businesses move further into hybrid cloud operations, security teams may struggle to protect increasingly diverse and complex IT environments. Security system complexity is also a challenge and was identified as the top factor increasing data breach costs amongst surveyed organizations in the 2020 Cost of a Data Breach Report from IBM and Ponemon Institute.
As a result, companies are seeking solutions to streamline and modernize their security operations for the hybrid cloud era, which may be achieved through integrated offerings and collaboration between security leaders and cloud service providers.
“IBM Security is focused on an open approach, allowing for deeper connections and visibility across the broader security, cloud and IT ecosystem,” said Aarti Borkar, Vice President, IBM Security. “Working with cloud providers like AWS is a critical part of this equation, helping provide a more seamless client experience in order to reduce security complexity for customers as they move further into the cloud.”
Through a unique combination of security technology and services that embrace AWS services, IBM Security can work to help clients securely migrate to AWS and modernize workloads as part of their broader hybrid cloud strategy.
Extend visibility and insights into the most critical issues
IBM Security QRadar (Security Information and Event Management solution) is now available as a paid listing on the AWS Marketplace, allowing customers to easily deploy advanced security analytics within their environments.
IBM Security is an AWS Technology Partner and QRadar delivers integrations across a broad set of AWS security services – including the recently announced AWS Network Firewall service, AWS CloudTrail, AWS Security Hub and Amazon GuardDuty among others.
Simplify and accelerate threat investigation
IBM has published a Quick Start guide to help clients simplify and automate deployment of IBM’s flagship open security platform, IBM Cloud Pak for Security, across AWS environments.
Cloud Pak for Security runs on Red Hat OpenShift containerized software and includes pre-built connectors for AWS, allowing security teams to search for threats across AWS and other environments from a single, unified security platform without migrating data.
Reduce complexity and manage overall security posture
IBM Security Services is recognized as an AWS Premier Consulting Partner that has achieved the AWS Security Competency designation, demonstrating consulting and managed security services (MSS) technical proficiency and evidence of customer success across a broad set of AWS security services offerings.
IBM Security Services includes support for a number of AWS native security services including AWS Network Firewall, AWS CloudTrail, Amazon Inspector, Amazon Detective and Amazon GuardDuty.
Datadog announced the Datadog Vulnerability Analysis GitHub Action, Datadog’s first action listed on the GitHub Marketplace. GitHub Actions provide powerful, flexible CI/CD with the ability to automate any software development workflow.
The Datadog action continuously monitors dependency and version information of code being deployed. By integrating this data with Datadog’s Continuous Profiler and Snyk’s Vulnerability database, this provides a real-time view of what code is actually accessible and vulnerable in production.
Scanning applications for known vulnerabilities often yields a long list of issues that are difficult to prioritize and subsequently fix. With the data collected by the new action, vulnerability analysis will be performed by the Datadog Continuous Profiler based on Snyk vulnerability metadata.
This allows engineering teams to immediately detect when and how often vulnerable methods are invoked in live environments and prioritize their security fixes based on real-world application behavior.
The Datadog Vulnerability Analysis GitHub Action can be found and installed directly from the GitHub Marketplace without needing to manage scripts or infrastructure.
“Maintaining strong security posture is critical for modern applications, but with traditional vulnerability analysis it can be difficult to distinguish the signal from the noise,” said Ilan Rabinovitch, Vice President, Product and Community at Datadog.
“Integrating the Continuous Profiler with the vulnerability database highlights meaningful security vulnerabilities, while utilizing the GitHub Action automates this process by bringing security directly into application development.”
“We’re moving towards a world where security, testing, and even responsibility for production operations are shifting left towards the developer,” said Jeremy Epling, Vice President, Product Management at GitHub.
“Partnering with full-stack monitoring leaders like Datadog makes it easy for developers and DevOps teams to incorporate critical operations tooling as part of their everyday work environment, so teams can focus on delivering value, at greater velocity.”
“By combining Snyk-enriched vulnerability metadata with the Datadog Continuous Profiler, for the first time developers can precisely pinpoint when an application actually calls vulnerable code, to better prioritize remediation efforts,” said Geva Solomonovich, CTO Global Alliances, Snyk.
“Our partnership with Datadog will allow developers to deploy their security resources with greater efficiency.”
IDEMIA and Kudelski IoT announced a joint solution for mobile network operators (MNOs), mobile virtual network operators (MVNOs), original equipment manufacturers (OEMs) and service providers to enable efficient IoT device provisioning at scale, without compromising on connectivity or data security.
With the growth of IoT deployments globally, the security of devices and client data stored or collected within the device has become one of the biggest concerns across the ecosystem and its users.
IDEMIA, member of the Trusted Connectivity Alliance (TCA), and Kudelski IoT are taking on the challenge of data privacy and device protection with a simplified, end-to-end security solution for IoT deployments designed to securely connect devices to the cloud.
This solution is particularly relevant since OEMs and service providers are looking for solutions using embedded Secure Elements to protect content.
IDEMIA’s IoT SAFE solution provides the added benefit of remote management and provisioning of over-the-air (OTA) security certificates and application updates directly to the highly secure SIM environment. This also provides the ability to keep the solution up-to-date with evolving security standards.
By seamlessly integrating the Kudelski IoT Root of Trust applet and keySTREAM system within IDEMIA’s secure elements and OTA platform, OEMs, MNOs and service providers now have a solution to leverage for their own security services for their customers and end users.
The combination of IDEMIA and Kudelski’s leading positions within their respective areas of excellence ensures a simplified approach to enabling security for IoT devices and platforms, allowing plug & play installation for connected security use cases.
“The industry has been expecting standards to be defined for IoT Security. Together with GSMA and the TCA, those standards and guidelines are now in place with IoT SAFE. Thanks to our partnership with Kudelski, IDEMIA is proud to bring this technology breakthrough solution to the market.
“The market can now benefit from an independent technology with the added benefit of ensuring end-to-end device and data security for IoT,” said Fabien Jautard Executive Vice-President for Mobile Operators activities at IDEMIA.
“By combining IDEMIA’s Mobile Network SIMs and OTA platform with Kudelski IoT keySTREAM into a solution specifically tailored for cellular machine-to-machine communications, we bring to the market the first truly standard and dedicated end-to-end IoT security solution for mobile networks,” said Hardy Schmidbauer, SVP, Kudelski IoT.