Insights

Find where a user is logged on in a domain

To detect where your users are logged on in real-time, watch this 2-minute overview of UserLock. It will also show you how to react and respond to any login, direct from the UserLock console, and how to start controlling and restricting how your users can connect.

Video Thumbnail

Real-Time Visibility

UserLock allows you to see and react in real-time to all user activity across your network. The intuitive console gives you real-time information on user habits such as currently active and locked sessions, users with multiple sessions and connections to web applications such as Outlook Web Access.

React & Respond to Access Activity

From the console, you can interact with your users by sending a pop-up message to an open session. You can also perform daily tasks such as logging off an open or locked session. For helpdesk requests, you can easily identify where the user has an open session and remote desktop into that machine, to troubleshoot the issue.

Report on all Session History

You can right-click on a specific user to access some quick reports such as the session history, where you can see all the connections of that user for the last 30 days. You can customize your reports by selecting a predefined one under the reports tab. Simply enter the criteria you’d like to add such as session types, a specific group of users, as well as a time frame. You can choose to schedule this report or launch it in real-time. And here I see all the connection attempts for those users during that time.

Report on Working Hours

You can use the working hours reports to see how long your users are connected throughout the day. This report quickly shows you the users first and last connection of the day as well as total active time. Use the dynamic filters below to search for users’ first logon after a certain time for example or those with the total session time of under 8 hours. Click print data to export the report as proof of users total working hours including active versus locked time.

Control Access Restrictions

To manage who connects to your network, create a protected account for a user, group or OU from your Active Directory to put in place access policies that secure your environment without disrupting your users. To comply with security policies you can limit your users to a maximum amount of concurrent sessions. Then use the workstation restrictions to further reduce your attack surface by allowing these users access to a specific computer OU from your Active Directory.

So that’s how you can manage access policies across your network while monitoring and protecting all connections with UserLock.

A Free Fully Functional 30 Day UserLock Trial

Don’t take our word for it, download now the fully functional free trial and see for yourself how easily UserLock can help you identify and manage all logins to your domain.

*** This is a Security Bloggers Network syndicated blog from Enterprise Network Security Blog from ISDecisions authored by Chris Bunn. Read the original post at: https://www.isdecisions.com/blog/it-security/find-where-a-user-is-logged-on-in-a-domain-and-more/IT Security

Login Logout Time Tracking for Employees

With more and more organizations allowing flexible work hours and users working remotely, it is increasingly important to be able to manage and monitor employee’s working hours.  Being able to track not only login and logout times, but lock and unlock activities a manager can obtain an accurate view of how their employees spend time at their computer and view an attendance report per user.

The access management and security software UserLock can help you do this and more. By also applying restrictions on when, how and where an employee can login, an organization can also control connection times and force logoff when outside of authorized hours.

Why do you need attendance monitoring?

There are many different reasons for accurately tracking employee hours.

Human resources needs

It can be a question of wanting to control the working time of the employees in order to value overtime, or to ensure daily, weekly, monthly or annual maximum working time thresholds are respected.

Compliance/litigation needs

For several countries, regulations insist that the employer must keep documents available that can demonstrate the working hours performed by each employee.

In the event of a control from the labor inspectorate or a dispute with an employee, the employer must be able to explain and justify the working hours for the company. This will allow them to show that they respect the rules relating to the various limits defined in the matter, the allocation of rest days, the compensation for work on public holidays and/or non-working days, etc…

Information security needs

This is about monitoring user connection times to detect suspicious access times. In the event where compromised credentials are used to logon at 3 a.m. on a Saturday morning, a notification on this access could alert the IT team that an attack is possibly underway.

Employee login logout software

To manage and react to employees’ attendance, overtime thresholds, productivity and suspicious access times, UserLock offers detailed and interactive reporting on users’ connection times.

These reports allow you to better manage users’ connection times, and provide accurate, detailed data required by management.

reports are available:

Working hours history:

Overall view of users working hours by day.

Working Hours History

Working hours by week:

More detailed analysis of your users’ working hours, illustrating clearly the user’s daily activity.

Working hours by week

Working hours by month:

A broader view of the hours worked, highlighting the total active and locked session time.

Working hours by month

Unauthorized working hours:

Report on connection times outside of what is defined as the authorized working hours.

Unauthorized working hours

Discover UserLock’s new reports:

Video Thumbnail

Going further by limiting connection times

If you want to avoid paying overtime, make sure that your employees respect certain working time quotas or even avoid suspicious access, you only have to limit connection times.

With UserLock, you can limit access to specific time limits. Set connection time restrictions, maximum time quotas, and force logoff automatically outside of authorized hours.

Font: https://securityboulevard.com/

Centauro

Os paulistas acabam de ganhar mais uma loja da Centauro, com um novo e inédito formato na Av. Paulista.  Provadores inteligentes, caixas móveis e experiencia de bikes são apenas algumas das novidades.  A SYMMETRY Informática muito se orgulha de fazer parte desse time inovador.  Viabilizamos a solução Aruba, a Hewlett Packard Enterprise Company além da parceria com a LAB3 DVLP para prover serviços de Captive Portal (o Ctrl Spot).  A Centauro pode assim atender seus clientes com maior conforto, provendo uma estrutura de WiFi sólida, com excelente experiência para o usuário (algo inédito e diferenciado) e em total conformidade com o Marco Civil da Internet e a nova LGPD. Aos nossos amigos da SBF Centauro desejamos MUITO SUCESSO. Contem conosco para tornar essa nova realidade um sucesso na experiência dos clientes.

Aruba Delivers the First and Only Family of Wi-Fi CERTIFIED 6™ Access Points

Last fall, the Wi-Fi Alliance announced their Wi-Fi CERTIFIED 6™ program which is designed to ensure that Wi-Fi 6 capable devices meet the highest standards for security and interoperability. Certification ensures reliability and service quality that cannot otherwise be delivered by other products available in the market today.

Well I’m happy to share today that Aruba leads the industry with the official certification of all the Aruba 500, 510, 530, and 550 Series Wi-Fi 6 access points!

Undergoing certification is our commitment to customers that Aruba wireless networks can interoperate with Wi-Fi 6 client devices with no technical impact to your business. This also ensures that user experience is unaffected – which is critical as iPhone 11, new Galaxy S20 and Galaxy Note 10 (the top 3 selling phones in the world) – now support Wi-Fi 6.

But in order for all these new mobile devices to realize the benefits of Wi-Fi 6, the network needs to be ready. Let’s look at what Aruba has to offer in terms of Wi-Fi 6 today.

Aruba’s Market Leading Solution

Interest in Aruba Wi-Fi 6 has been astounding – not just from existing customers, but also from our new ones. Based on the most recent Q3 Wi-Fi 6 market share report from 650 Group, Aruba is the reigning market leader, with over 35% of global Wi-Fi 6 market share in terms of both product sales and shipments. Recent analyst reports also view Aruba favorably – the Forrester New Wave™: Wireless Solutions, Q3, 2019 and the 2019 Gartner Magic Quadrant and Critical Capabilities for the Wired and Wireless LAN Access Infrastructure have all placed Aruba as a leader in the networking industry.

Aruba’s Wi-Fi 6 portfolio has also grown tremendously to provide AI-powered capabilities and expanded IoT connectivity options to meet a range of customer use cases. Today, the portfolio includes the 500, 510, 530 and 550 Series to provide secure connectivity for a range of uses from entry-level to high-density environments.

Wi-Fi for the Future
There’s no doubt that IoT and cloud have had a major impact on the IT infrastructure and Aruba views Wi-Fi 6 as the critical industry mechanism to enable enterprises to tap into the full potential of their IT organizations to leap forward into a future where connectivity is not just high-performing, but seamless, immersive and experiential.

To learn more about Aruba’s Wi-Fi 6 capabilities, please visit our Wireless LAN portfolio page.

Fonte: https://blogs.arubanetworks.com

Welcome to the 2020s: What Does It Mean for Your Data Center Network?

We’ve just kicked off a new decade and while it might not be as spectacular as a new millennium with all of the Y2K suspense from 20 years ago, a decade is still a significant period of time where technology can bring major changes to how we live, work and play. In particular, data center networks are now facing a major transition in this edge-to-cloud world we live in.

Data center evolution
Look back to the dotcom bubble and the evolution of the modern enterprise data center. We saw significant growth in data centers during the 1990s, driven by the need to power workloads across the World Wide Web – ahem – I mean the Internet.

Following the mass proliferation of data centers in the 1990s and 2000s, enterprises began their quest to consolidate those data centers and continue to do so today. In parallel, we saw the launch of AWS and the public cloud, which brought the hyperscale data center and another option for hosting enterprise workloads.

The 2020s will be all about the edge
As we enter the 2020s, it’s becoming apparent that another data center evolution is under way.

After two decades marked by centralization of compute and infrastructure, the pendulum is swinging back toward the edge. Digital transformation and the need to harness data from connected devices to create real-time, connected experiences at the edge is driving this paradigm shift.

According to Gartner, today 90% of data is created and processed inside centralized data centers or the cloud. But by 2025, about 75% of data will need to be processed, analyzed, and acted upon at the edge. With this swing, you should expect some changes to your data center.

First, expect traditional data centers to continue to shrink, due to higher density from hyperconvergence and also because workloads continue to move to the cloud.

Secondly, as more workloads are placed at “the centers of data” to optimize performance and costs, expect the emergence of “edge” data centers. Enterprise-owned data centers will likely consist of two types:

  1. A blending of traditional data centers and campus environments.
  2. Mini data centers with IoT-enabled environments, such as large manufacturing centers.

Last, as we continue to see more DevOps and agile practices from application teams, we will see more pressure on network teams to optimize around workload-driven operations.

Data center evolution in the edge to cloud era

Three networking requirements for the edge-to-cloud era
Change is imminent for the network, too, as you seek to balance the new requirements of edge data centers with growing use of cloud and your remaining on-prem footprint.

While you are likely already on your journey toward this new era of data center networking, here are three top considerations to keep in mind. In fact, these three requirements are applicable for any type of data center including private cloud, co-location, and edge.

1. Simplification through automation
Application teams continue to adopt DevOps and other agile methodologies to accelerate software development. To better support these teams and the business, expect networking operations to become far more automated and simpler than they are today.

What you’ll need are solutions that align with current and future operating models and existing investments. Look for turnkey automation to simplify common, yet time-consuming configuration tasks. For teams with more mature DevOps practices, extending common automation platforms like Ansible to network-related workflows will be a must. Finally, as we continue to see more DevOps and agile practices in application teams within IT, expect those practices to influence how the other organizations within IT function.

2. Actionable insights via analytics
There is perhaps no bigger resource drain on network operations than trying to troubleshoot issues. Having better network visibility is imperative to shortening MTTR, improving IT service delivery, and keeping short-staffed teams focused on more strategic matters.

Gaining network-wide telemetry, captured and processed natively on each node, will be a huge leap forward. These analytics with built in remediation will be instrumental in providing better network assurance and helping troubleshooters proactively identify or even preempt user- or business-impacting issues.

Predictive analytics can also help anticipate issues before they arise and also help with capacity planning efforts, especially during periods of high usage, ensuring the network is right-sized to deliver on user experience demands.

3. Always-on availability
Five 9s of availability is by no means a new data center requirement. However, you can argue that the need for highly resilient networks will only intensify in a digital era where even a minor hiccup has huge ramifications for the business.

Automating day-to-day operations will help improve uptime by avoiding human error. But what networking teams also need is a far simpler, more reliable way of ensuring high availability, while also delivering on the promise of non-disruptive upgrades. Having a cloud-native, microservices-based operating system will ensure added resiliency at the software level, and being able to orchestrate live software upgrades to eliminate maintenance windows will also be critical.

HPE + Aruba = Data Center Nirvana
Like previous decades, we’re not seeing a decline of traditional data centers, but rather an evolution. In this case, the emergence of edge data centers to power IoT and other digital initiatives at distributed business locations.

As your organization begins this latest transition, you won’t be alone. HPE and Aruba are leading the way in providing technology solutions for the data center with our CX portfolio.

Aruba CX Networking for the Evolving Data Center

Explore our data center networking solutions to see how we can help transform your data center once more.

Font: https://blogs.arubanetworks.com/

Empresa de cibersegurança disponibiliza todos os seus cursos gratuitamente

No total, são 24 cursos com certificação, os quais abrangem de conhecimentos básicos a níveis avançados na área de segurança da informação

A Fortinet, empresa de cibersegurança, disponibilizou gratuitamente todos os seus treinamentos, antes abertos apenas a parceiros, a quem quiser expandir seus conhecimentos na área. Em um cenário que torna os usuários mais suscetíveis a ameaças cibernéticas, o objetivo é diminuir a exposição de organizações e pessoas físicas.

No total, são 24 cursos que abrangem de conhecimentos básicos a níveis avançados de cibersegurança. Os módulos, em sua maioria provenientes do currículo oficial do instituto Network Security Expert (NSE) – programa de treinamento que fornece validação a profissionais técnicos em segurança de rede – serão gratuitos até o fim de 2020.

“O momento forçou muitas organizações a enfrentarem mudanças rápidas e novos riscos à medida que adotaram modelos de trabalho remotos. As equipes de TI estão sob pressão para proteger efetivamente suas empresas em ambientes altamente dinâmicos e que exigem extensas habilidades de segurança. Como uma empresa de tecnologia e também de treinamento, disponibilizamos todo o nosso catálogo de cursos avançados gratuitamente online e em ritmo personalizado, para que qualquer pessoa possa expandir seus conhecimentos e habilidades”, explicou John Maddison, vice-presidente executivo de produtos e diretor de marketing da Fortinet.

Reprodução

Os 24 cursos disponibilizados pela empresa podem ser cursados de acordo com a agenda individual. Imagem: Pixabay

Desde que passou a oferecer gratuitamente os módulos básicos NSE 1 e 2 e o curso avançado FortiGate Essentials no início de abril, a empresa vem recebendo, globalmente, cerca de uma nova inscrição a cada 30 segundos. Já são mais de 48 mil pessoas inscritas nos módulos básicos e mais de 14 mil no FortiGate Essentials.

Vale lembrar que os cursos podem ser realizados conforme a disponibilidade de cada pessoa e o único pré-requisito para acompanhá-los é a fluência em inglês. Os vídeos já disponíveis para visualização serão complementados com transmissões ao vivo, programadas regularmente com instrutores certificados pela Fortinet. Ao fim de cada módulo, os participantes receberão certificados.

Para aqueles que se interessarem, os cursos gratuitos poderão ser acessados via site da Fortinet

Fonte: https://olhardigital.com.br/

Back to square one: The Capital One breach proved we must rethink cloud security

By all accounts, Capital One defended its customers’ data with the imposing array of cyber security tools that you’d expect from one of the largest banks in the United States. And yet a lone hacker managed to bypass those tools and obtain the sensitive personal information of more than one hundred million people, a breach that will likely cost the bank well over a hundred million dollars when all is said and done.

The hacker — a former employee of Amazon Web Services, which hosted the compromised database — gained access to the sensitive data by exploiting a misconfiguration in one of Capital One’s application firewalls. Such misconfigurations along the customer’s interface with the cloud have become a favorite target for cyber-criminals. In fact, according to Gartner, 99% of cloud security failures will be the customer’s responsibility through 2023.

The fundamental flaw

At a time when virtually all enterprises have adopted cloud infrastructures that expand and evolve as needed, configuring firewalls and other endpoint protections to remain properly positioned can be a daunting challenge. These conventional security tools are designed to defend the digital perimeter — an antiquated strategy given today’s borderless networks. Moreover, modern developers now have the ability to spin up a cloud instance in minutes, often without having to consult their firm’s security team. As a consequence, the overwhelming majority of organizations lack visibility over their own cloud environments.

While nearly half of organizations don’t even bother looking for malware on the cloud, Capital One had a relatively mature cloud security posture — at least by traditional standards. It is therefore all the more alarming that the bank didn’t become aware of the breach until more than three months after the fact, when it received a tip from an outsider who’d stumbled upon the stolen data. That a major financial institution was blind to this level of compromise further demonstrates the urgency of rethinking cloud security.

Of course, there is no silver bullet when it comes to cyber defense — and that goes double for the cloud. Motivated attackers will inevitably find a way inside the nebulous perimeters of IaaS and SaaS environments, whether via insider knowledge, critical misconfigurations, personalized phishing emails, or mechanisms that have yet to be seen. The path forward, then, is to use artificial intelligence to understand how users behave within those perimeter walls, an understanding that shines a light on the subtle behavioral shifts indicative of a threat.

Demystifying the cloud

The latest cyber AI security tools aim to do just that: observing traffic activity on AWS and other CSPs to learn an evolving sense of ‘self’ for each unique cloud environment they protect. Indeed, this ability to distinguish between normal and abnormal behavior proved decisive when a financial services company faced an attack strikingly similar to the Capital One breach. The firm was hosting a number of critical servers on virtual machines — some of which were meant to be public-facing, some of which were not. When configuring its native cloud controls, however, the firm mistakenly left one of its private servers exposed to the internet, rather than isolated behind a firewall.

The exposed server was eventually discovered and targeted by cyber-criminals who were scanning the internet via Shodan, a search engine that locates internet-connected assets. Within seconds, Darktrace’s AI detected that the device was receiving an unusual amount of incoming connection attempts from a wide range of rare external sources and alerted the security team — which had been unaware of the misconfiguration. This “unusual” volume of “rare” connections might well have been normal for a different company or a different server, but the AI’s knowledge of ‘self’ revealed the activity to be anomalous in this exact case.

By employing such AI systems, we can gain the necessary knowledge of complex cloud environments to catch threats in their nascent stages — before they escalate into crises. Ultimately, the cloud promises to unlock new heights of efficiency and novel forms of collaboration, so long as we’re willing to adopt equally innovative security tools. Because while there may never be a silver bullet for safeguarding cloud services, AI does offer hope for a silver lining.

Font: https://www.darktrace.com/

1,000+ Customers and Counting with the Aruba CX Switching Portfolio

What do 1,000+ companies across a number of industries from all over the world have in common? Well, for one, they’ve all deployed Aruba CX Switching to power their network cores.

For a little perspective, we launched the AOS-CX operating system and Aruba CX 8400 in June 2017. In those two years, we’ve been helping more and more companies modernize their networks with a next-gen switching platform.

The value of the Aruba CX is evident across the myriad industries where our switching platforms, software, and management tools are leveraged. Let me share a few examples of why customers are deploying this next-gen switching platform.

Full Programmability to Automate and Simplify Management
One reason so many companies embrace the Aruba CX portfolio is because it greatly enhances IT agility and efficiency. Driving these benefits is AOS-CX, the most modern network operating system in the industry.

We built AOS-CX from the ground up and it is based on cloud-native principles. It offers advanced levels of programmability via full RESTful API coverage. This allows IT staff to program their network to seamlessly communicate with other network services, devices, and apps—streamlining workflows and automating many common tasks to enhance the network operator experience and greatly simplify management.

Most companies find they can better allocate their scarce IT staffs after deploying Aruba CX switches by automating what were once resource-dependent processes. For example, Mid-South Energy uses the REST APIs in AOS-CX to “infuse [their] network with self-healing properties” and thus obtain “smoother IT operations.”

Watch this short video to see the innards of Aruba CX and the software innovations that have led to broad adoption of our next-gen switching portfolio.

Error-Free Deployments with NetEdit
Network teams are often overtaxed by frequent adds, changes, and moves required to support today’s digital workplace. Such changes are highly manual, requiring lines of CLI commands implemented on a device-by-device basis.

Aruba alleviates the complexity with NetEdit, a configuration orchestration tool for Aruba CX switches. NetEdit arms IT teams with the power to smoothly coordinate end-to-end service roll outs, automate rapid network-wide changes, and ensure policy conformance after network updates. This intelligent assistance and continuous validation assure that network-wide configuration changes are consistent, compliant and error-free.

For one Aruba customer, a grocery chain in Europe, this level of automation drives significant improvements in operational efficiency. This customer had a café printer that needed a specific port configuration, but pushing out an update required searching each store, locating the printer, and making a hard change on each switch. With Aruba, pushing out an update is done seamlessly from a central management console, across all devices.

Resilient by Design for Unrivaled Availability
Today, network downtime equates to lost productivity and revenue. Even a millisecond of poor network performance can cost a high-frequency trader millions of dollars.

With AOS-CX, such hiccups aren’t a threat, as its resilient design ensures networks are always on. This is made possible through a robust, yet simple solution for high availability, known as Aruba Virtual Switching Extension (VSX). Powered by AOS-CX, VSX also enables live upgrades at the aggregation and core layers, so business is never disrupted, even during necessary maintenance windows.

Built-In Analytics Accelerate Troubleshooting andRoot Cause Analysis
If performance issues do arise, operators need actionable insights to quickly pinpoint and address the root cause. Unfortunately, traditional methods of identifying problems—such as using probes and show commands—are too reactive and slow. Moreover, the use of third-party monitoring tools creates additional gaps in visibility, as they often sample data and offer little to no correlation to root cause.

To address these visibility issues, the Aruba Network Analytics Engine (NAE) is built into every CX switch, capturing important data to help operators optimize network performance. NAE automatically interrogates and analyzes any network event that can impact performance or security. By capturing telemetry natively on the switch, NAE provides real-time, network-wide insights so operators can quickly detect, prioritize, and fix problems. This helps reduce mean time to resolution (MTTR), minimizing business disruptions as well as operational costs tied to troubleshooting issues.

Network operators can also use analytics from NAE to predict or even preempt problems. For example, Friesland College uses “the analytics and trending information available from [NAE to] make adjustments before a service experiences latency or capacity issues due to growth.”

Innovation-as-a-Service
We’ve applied our customer-first, customer-last mentality to the Aruba CX switching portfolio by fostering community-driven, opensource development. AOS-CX allows IT staff to build their own innovations into the platform on demand. Python scripts can be shared and consumed around the world via an official Aruba Solutions Exchange as well as GitHub. This allows IT staff from disparate companies to work together to solve common issues and then pick and choose the innovation to deploy in their own environment.

It’s Time to Make the Switch
The Aruba CX switching portfolio is delivering immense value to businesses worldwide. However, we’re not stopping here. Over the past several months, we’ve been busy building on these innovations to bring more automation, intelligence, and performance to your network.

Join us during our live launch event on Oct. 22 as we unveil new innovations. See how you can displace your legacy network with an architecture designed to propel you and your business forward into the future of IoT, cloud, and mobile.

Fonte: https://blogs.arubanetworks.com

Break Free from Legacy Network Constraints with Aruba CX Switching

Businesses can’t move forward with digital transformation using networks that are stuck in the past. Characterized by manual processes, fragmented operations, and a lack of visibility and control, these legacy networks present IT with a number of obstacles when trying to deliver on the expectations of modern users—be they customers, employees, partners, or citizens.

As organizations expand their adoption of cloud, mobile, and IoT, these network constraints will only become more pronounced. Legacy switching infrastructure, in particular, is overtaxing network operators, as they must grapple with disparate operating systems and even entirely different operating models at each layer of the network.

Aruba has broken these constraints. Today, we announced significant innovations to our Aruba CX Switching Portfolio that will equip network operators with the industry’s first, end-to-end platform that spans campus, branch, and data center networks.

Included in this release are revolutionary hardware platforms, new software innovations, and enhanced analytics and automation capabilities, all purpose-built for the network operator tasked with supporting today’s frenzied business environment.

Let’s take a closer look at each of these enhancements.

Unrivaled Scale and Flexibility with Aruba CX 6400 and CX 6300 Switch Series

Cloud, video, and collaboration apps were already pushing legacy switches to their limit. Now, the advent of IoT is flooding networks with even more traffic. That’s why we’ve introduced two new switching families to support these new demands, with plenty of capacity to accommodate tomorrow’s technologies.

The Aruba CX 6400 Switch Series is a family of modular switches that come in 5-slot and 10-slot chassis, with a non-blocking, distributed architecture capable of delivering 2.8 Tbps per slot. Scaling from 1G PoE access to 100G core, the 6400 switches are a true Swiss Army Knife for today’s network operators, supporting any use case or workload across the enterprise, from campus access to data center environments.

The Aruba CX 6300 Switch Series is a family of stackable switches ideal for network access, aggregation and core use cases. With support for up to 10-member VSF stacking and offering built-in wire speed 1/10/25/50 gigabit uplinks, the 6300 switches deliver unrivaled investment protection with the flexibility to support significant growth around emerging technologies such as IoT and Wi-Fi 6.

Delivering 140+ Rich Access-layer Features with AOS-CX 10.4

Organizations embarking on or broadening their IoT initiatives will get significant mileage out of AOS-CX 10.4. This fifth major release of our cloud-native operating system brings core-proven reliability to the access layer with 140+ rich software features.

Among these is new support for always-on PoE, as well as VxLAN with EVPN in both campus and data center networks—important capabilities for IoT deployments. Always-on PoE ensures Wi-Fi access points and critical IoT devices, such as healthcare sensors, will never lose power, even during network upgrades. Meanwhile, EVPN over VxLAN delivers a simple, yet highly scalable way to segment the ever-increasing diversification of IoT-enabled workloads and devices.

AOS-CX 10.4 also extends Aruba Dynamic Segmentation to campus access, further simplifying an operator’s task of providing unified policy and secure connectivity across wired and wireless networks for every user and IoT device.

Distributed Intelligence and Automation with NetEdit 2.0 and Network Analytics Engine

One of the guiding principles of the Aruba CX Switching Portfolio is to simplify and enhance the network operator experience. That’s why we’re excited to introduce significant enhancements to Aruba NetEdit, our intelligent configuration tool that automates many aspects of deploying and managing CX switches.

Central to these enhancements is the integration of NetEdit and the Aruba Network Analytics Engine (NAE), an on-box application enabled by AOS-CX that captures rich analytics on every CX switch to automate many aspects of network monitoring and troubleshooting.

The integration between NetEdit and NAE reduces the burden on network operators when investigating user- and network-impacting issues. And now that CX has been extended to the access layer of campus networks, network operators can benefit from distributed analytics and real-time, network-wide visibility.

NetEdit 2.0 also provides a topology view for fast insights into network health and conformance with green/yellow/red statuses for every deployed CX switch. Dynamic, tailored views of the network are then triggered based on the layers an operator selects, offering more granular visibility into Aruba CX device status and health. This includes detailed diagnostics on what may be contributing to a performance issue—be it an application, client, or network service such as routing or segmentation.

Another new capability of NetEdit 2.0 comes in the form of GUI-driven wizards that enable operators to deploy common, yet complex configurations using only a few prompt-driven commands and clicks. This feature brings even more efficiency to short change windows and includes pre-built solutions for configs like establishing VxLAN tunnels between switches.

Make the Switch to Aruba CX

Now’s the time to switch to a next-gen network. Learn more about these exciting innovations to the Aruba CX Switching Portfolio, and get ready to displace your legacy network with a single, end-to-end architecture that will propel your business into the future of IoT, cloud, and mobile.

Fonte: https://blogs.arubanetworks.com/

63% of SMBs believe cloud storage providers should do more to protect their data

Almost two-thirds of small- to medium-sized businesses (SMBs) believe that more work needs to be done to protect their data in the cloud, according new research from cybersecurity firm IS Decisions.

Since moving to the cloud for storage, 29% of SMBs have suffered a breach of files or folders, according to the same research. Almost a third (31%) said that since moving to the platform, detecting unauthorised access has become much more difficult, and 22% admitted that hackers have gained external access using an employee’s login credentials.

The new report entitled “Under a cloud of suspicion,” is based on research conducted with 300 heads of security within small- to medium-sized businesses across the UK, US and France who are using Dropbox for Business, Google Drive, Box and Microsoft OneDrive. It examines the current perceptions of cloud storage security and how these perceptions are driving data-related security decisions.

Also, according to the report, just 52% of SMBs actively monitor sensitive files for unauthorised access, while the rest only do so either on an ad hoc basis or after a breach has occurred — or in some cases, not at all. Furthermore, while many SMBs are managing a hybrid-approach whereby they use a combination of on-premises and cloud storage, 56% of those surveyed say that it’s difficult to manage the security of data living in these hybrid infrastructures.

Commenting on the research, IS Decisions founder and CEO François Amigorena said: “There’s no doubt that the cloud has considerably enhanced the way that SMBs do business. But businesses who have moved to the cloud for storage are finding it harder to detect unauthorised access to company files and folders. The ease of sharing data among teams and simple integrations their storage can have with other cloud applications significantly increases the prospect of unauthorised access. Without the right access controls in place, the risk of employee credentials being misused or stolen makes detecting unauthorized access even harder”

“The last thing any business wants is to suffer a breach of data. Therefore, there needs to be a stronger and more efficient way to ensure that data in the cloud remains safe.”

To learn more about how SMBs perceive the security of the cloud storage and what they are doing to protect their data in the cloud, download “Under a cloud of suspicion”.

Fonte: https://businesscomputingworld.co.uk/