Build the Bridge Between Cloud and Network Security With Meraki MDM

Build the Bridge Between Cloud and Network Security With Meraki MDM

Build the Bridge Between Cloud and Network Security With Meraki MDM

Systems Manager lays the foundation for a zero-trust security model with Meraki and Cisco security integrations. As Cisco’s endpoint management solution, Cisco Meraki™ Systems Manager supports a variety of platforms, allowing for the diverse ecosystem often found in today’s mobile-centric world. This places Systems Manager in prime position to alleviate the concerns of security teams in various industries, empower teachers to run their digital classrooms, and ease the burden of enterprise IT teams with distributed sites.

Endpoint, Network and App Security in One Platform.

Meraki Systems Manager’s integration with Cisco Meraki networking products allows organisations to unify IT administration from one cloud dashboard.

img

Automatically authenticate identity based on SM installation status with Duo.

Extra Security Without Extra Work

Scalability and security via intelligent automation. With the easy-to-use web-based dashboard, organisations can manage distributed deployments quickly from any location.

Automatically import configurations from security applications and deploy changes to thousands of devices within a few clicks

Deliver unrivalled security based on network status with real-time monitoring and remote remediation

Endpoint, Network and App Security in One Platform.

Meraki Systems Manager’s integration with Cisco Meraki networking products allows organisations to unify IT administration from one cloud dashboard.

Enterprise Storage Trends That CIOs Need to Grasp for the Remainder of 2022

Enterprise Storage Trends That CIOs Need to Grasp for the Remainder of 2022

Enterprise Storage Trends That CIOs Need to Grasp for the Remainder of 2022

Being at the forefront of enterprise storage in the Fortune 500 market, Infinidat has broad visibility across the market trends that are driving changes CIOs cannot ignore. To help make it quick and easy for IT leaders to get a reliable snapshot of the enterprise storage trends, we put together this “trends update” for the second half of 2022.

In less than five minutes, you can take hold of useful and relevant information that will help you make more insights-driven decisions over the next few months. The following five trends can be summed up in eight words: cyber resilience, automation, hybrid cloud, performance, availability, and consolidation.

 

 

Trend #1: Critical nature of data and cyber resilience in the face of increasing cyberattacks

We predicted at the start of 2022 that cyber resilience from the storage estate would be critical this year because of the threats of cyberattacks. The 2022 KPMG Fraud Outlook report “A Triple Threat” affirmed the increasing challenges; 77% of respondents to the KPMG survey say their cyber risk will grow over the next year. Out of the respondents from companies with at least $10 billion USD in revenue, 85% say they experienced fraud losses in the last year, driven by cyber breaches.

Furthermore, supply chain vulnerability has become a bigger issue in 2022. Indeed, 82% of CIOs believe their software supply chains are vulnerable. Software supply chain attacks have hit three out of five companies in the past year. The shift to DevOps and cloud-native development have made security more complex.

Enterprise storage cyber resilience continues to need to be part of your corporate cybersecurity strategy.

 

 

Trend #2: Incorporating intelligent automation throughout the entire storage platform and modern data protection infrastructure

We have not been surprised to see the adoption of automation in the enterprise market, but what has made our prediction more relevant is the increasing demand for not only automation, but specifically autonomous automation.

The evidence that enterprises want the “autonomous” component to be built into storage platforms underscores what we forecasted for 2022. Enterprises want to autonomously automate their platforms for the variety of benefits they will obtain, including easier management, substantially more efficient use of IT resources, lower CAPEX and OPEX, sustainability, and self-learning capabilities for continuous improvement.

 

 

Trend #3: Integration of storage technologies based on hybrid cloud and container tech

Storage-as-a-service (STaaS) is emerging in 2022 in a new light. The flexibility that enterprises and service providers have with STaaS is only increasing. IT leaders are turning to STaaS for a multitude of reasons, one of which is to take costs and convert them to a cloud-like consumption model, lowering CAPEX and OPEX and freeing up IT resources to work on other projects.

Integral to meeting customer demand amid this trend, Infinidat was named by DCIG, a leading IT and storage analyst firm, one of 2022’s top 5 Enterprise STaaS solution providers in the world.

 

 

Trend #4: Leveraging storage technology to ensure application and workload performance and availability

We predicted at the beginning of 2022 that there would be an enhanced focus on application latency of sub-100 microseconds. While there is a variety of storage performance metrics to consider, latency is the most critical determinant of your real-world transactional application and workload performance. We need to adjust this prediction because a new benchmark for latency was set in April 2022: sub-35 microsecond latency.

The impact of lower latency in the enterprise storage infrastructure is dramatically transforming storage performance, increasing efficiency, and reducing the total cost of ownership (TCO).

 

 

Trend #5: The power of storage consolidation

We have gathered information over the past six months to warrant our introducing a trend for the second half of the year that we had not included on our list in January: enterprise storage consolidation.

Part of the reason that consolidation makes it on our mid-year trends update is not only because enterprises can significantly reduce their costs (which they have been with Infinidat for several years), but also because storage consolidation has emerged as a first pass for enterprises to turn their IT environment into AIOps-based data centres.

Storage consolidation essentially paves the way, giving enterprises the opportunity to evolve their platform strategy and reduce the physical assets in their storage estates.

Consolidation also simplifies the work of storage administrators, cybersecurity managers, and other IT personnel.

At the same time, consolidation of storage arrays delivers savings, including power, cooling, rack space, security, floor space, and operational manpower. It fits perfectly into environmentally friendly “green IT” strategies to meet organisational sustainability goals, which are increasingly part of overarching enterprise digital transformations.

This article was from CIO and was legally licensed through the Industry Dive Content Marketplace. Please direct all licensing questions to legal@industrydive.com.

Smarter Workspaces. Epic Experiences.

Smarter Workspaces. Epic Experiences.

Smarter Workspaces. Epic Experiences.

Like business complexes, schools, and data centres, smart spaces also need firm foundations. But unlike your building’s foundation, which is designed to be solid and immovable, the framework for your smart space is strongest when founded in the cloud—decentralised, agile, scalable, and secure.

Meraki has always lived in the cloud.

Smarter, Happier People Everywhere

Nurture employee and visitor well-being, security, and health with Meraki technology. Our cloud-first, API-driven IoT technologies transform yesterday’s static office buildings into today’s adaptable hubs of collaboration.

Improving usage of space results in more satisfied and productive employees.

Tracking assets provides valuable new insight into equipment usage and location

Responding rapidly to changes in how spaces are used creates new opportunities and benefits.

Experience the Power of Meraki Smart Spaces Bundles

Easily deliver intuitive smart space experiences everywhere for guests, employees, and students, with advanced IoT technologies.

Better insight into footfall trends via heatmaps utilising MV smart cameras and MR access points

Personalised communications that delight employees and customers as a result of Wi-Fi location analytics and Meraki partners

Protect people, places, and critical IT infrastructure through MT sensors that offer real-time visibility and alerts

For a limited time only, enjoy up to 60% discount on Meraki wireless access points (MR) when bundled with at least 5 qualifying Meraki sensors (MT) or Meraki smart cameras (MV).

Complete the form to learn more about the offer details.

6 + 13 =

Simplified Management and Robust Protection for Small Offices

Simplified Management and Robust Protection for Small Offices

Simplified Management and Robust Protection for Small Offices

Simplify your security. With 1000 Series firewalls and Cisco Defence Orchestrator, you get class-leading security while spending less time on firewall administration. Defence Orchestrator upgrades firewalls with one touch, automatically de-conflicts overlapping security policies, and even centralises management of your AWS VPC image security rules. Best of all, it manages firewalls with both Adaptive Security Appliance (ASA) and Firepower NGFW software.

Introducing Cisco FirePower 1000 Series

Enhance your business resiliency with superior threat defence. The Firepower 1000 Series protects against malware, with automatic daily security updates from Cisco Talos. With its unique architecture, the Firepower 1000 Series maintains throughput in real-world conditions, even when next-generation IPS threat inspection is activated.

Why Cisco 1000 Series Firewalls?

World-class security controls

Get industry-leading Cisco Talos threat intelligence, automatically updated daily.

Consistent policy and visibility

Simplify security management, with visibility across your networks.

Integrate network and security

Transform your network into an extension of your security architecture.

Features and Benefits

At Cisco, they’re building a network security vision, NetWORK, that enables a more agile, automated, and integrated approach for harmonising policies and enforcement across modern dynamic applications and increasingly heterogeneous networks. Secure Firewall gives you the deepest set of integrations between core networking functions and network security, delivering the most secure architecture ever. The result is a complete security portfolio that protects your applications and users everywhere.

Simpler Management

Simpler means faster configuration, less costly management, and more time to focus on driving your business. Select the management option that fits your environment and the way you work. Choose between cloud-based Defence Orchestrator, centralised on-premise, or on-box management.

Core to the Value of Open Security Platform

As you grow, Cisco’s open platform approach protects your security investment. Cisco’s open platform enables
time-saving policy harmonisation and threat correlation across network, cloud, endpoints, email, web, and more.

Quiet Operation, With Switchports and PoE

Firepower 1010 provides switch ports and Power-of-Ethernet (PoE) in a fanless desktop form factor. Perfect for connecting an IP phone or printer.

Let the Experts Secure Your Network

Cisco offers a wide array of advisory, implementation, managed, technical, and optimisation services to help you protect your business.

How Can I Prevent a Ransomware Attack on My Company?

How Can I Prevent a Ransomware Attack on My Company?

How Can I Prevent a Ransomware Attack on My Company?

In 2021, there was a significant increase in the use of ransomware against organisations across the world.

Ransomware is malware that encrypts users’ data and grants network access to threat actors. Once they have access to an organisation’s data, they threaten to leak sensitive information and halt business operations until the victim pays a ransom, hence the name.

Unfortunately, paying the ransom does not guarantee that the threat actor will unencrypt your files or keep your data secure. In fact, the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA) does not recommend paying ransoms at all, since the more profitable ransomware is, the more common and complex it could become.

Instead, CISA – alongside the United Kingdom’s National Cyber Security Centre (NCSC-UK) and the Australian Cyber Security Centre (ACSC) – has specific recommendations for how to prevent ransomware attacks and minimise their impact.

How Has Ransomware Become More Common and More Dangerous?

The increase in ransomware attacks can be attributed to the COVID-19 pandemic in more ways than one: First, the use of cloud networks by businesses, government bodies, and schools has made sensitive information and critical infrastructure accessible to bad actors on the web. Second, the pandemic has lowered the income of many households as lockdowns and supply-chain issues have persisted, making online illicit activities – like the use of ransomware – a more accessible way of earning money.

As ransomware has become more profitable and accessible, ransomware enterprises have become more complex. There are now entire organisations with customer support services that walk victims through the process of paying the ransoms and unencrypting their files.

These enterprises have increased their profitability by selling stolen data to other scam artists. That means that once a victim’s data has been stolen, multiple criminal organisations could use it to threaten and extort them.

How Could Ransomware Get Into My Network?

The most common strategy threat actors employ is phishing. Phishing is a fear tactic in which cyber criminals pose as a legitimate entity – such as the IRS, law enforcement, or antimalware software – and contact individuals to inform them of a problem – say, an issue with their most recent tax filing, an arrest warrant, or most ironically, a security breach in their network.

To address the problem, they tell users to click on a link, which then downloads ransomware onto the user’s computer, giving the threat actor access to their data and network.

How Can I Prevent Ransomware from Impacting My Organisation?

Here are the measures that CISA, ACSC, and NCSC-UK recommend an organisation take to prevent ransomware attacks:

  • Keep software up to date.
  • Train employees on how to spot phishing and how to handle ransomware attacks.
  • Use unique passwords and enable multi-factor authentication (MFA), especially on administrative accounts.
  • Segment networks so that breaches only impact portions of it rather than the whole thing.
  • Limit operations that take place on the cloud.
  • Enable spam filters.
  • Back up files regularly, separately from one another, and onto a separate network.

Most importantly, they recommend not paying the ransom, since that would encourage cybercriminals to continue using ransomware to extort money.

How Should I Respond to a Ransomware Attack?

Should ransomware breach your organisation’s network, it is important to act fast and follow these best practices:

  1. Record the name of the file that was downloaded and the contents of the ransom note. This can be done quickly by taking a picture of the screen with your phone. It’s also useful when working with IT professionals and the authorities.
  2. Turn off the infected device. This interrupts the encryption process, and it may even prevent ransomware from spreading through the network. Do not turn the device back on yourself – enlist the help of an IT professional.
  3. Manually disconnect all other devices in the network. By turning them off using the power button or by unplugging them, they are disconnected from the network, which may slow the spread.
  4. Change your passwords. Enable MFA if you haven’t already.
  5. Locate backups. Do not connect uninfected backups to the network, as that will expose them to the malware. If you have no uninfected backups, an IT professional may be able to help recover your encrypted data, but there is no guarantee that they’ll be able to.
  6. Remove ransomware. This is done by wiping infected drives and devices and reinstalling their operating systems, which permanently deletes the data that was stored on them.
  7. Restore information from the backup. Once your computer and network are ransomware-free, it is safe to upload uninfected backups.
  8. Notify authorities of the attack. This can help to protect you from being targeted again and prevent threat actors from targeting others.

While ransomware has become more commonplace in the era of working from home, your organisation can take steps to prevent and recover from attacks. By quickly responding to security breaches and reporting them, you minimise both their impact on your organisation and the likelihood that they will strike again.

Scalable IoT Deployments: From Little Things, Big Things Grow

Scalable IoT Deployments: From Little Things, Big Things Grow

Scalable IoT Deployments: From Little Things, Big Things Grow

 

 

The number of connected devices is growing rapidly, with the Internet of Things (IoT) enabling businesses to improve operations, marketing, and customer service while using fewer resources and saving money.

Many IoT applications require wide bandwidth, low latency and performant network connectivity after the proof-of-concept phase to transfer and integrate data. Businesses are often used to configuring a few devices on “plug and play” wireless networks. However, not all networks are designed with IoT in mind, and scaling from 100 to hundreds of thousands of sensors is not straightforward. Adopters often have difficulty scaling a solution. 

IoT is frequently used to transform businesses, generate new business models, and disrupt whole industries. Aruba is the industry leader in wired, wireless and security networking solutions for today’s experience edge. Aruba’s network solutions can grant scale and mitigate hurdles in IoT projects. This article explores the effectiveness of Aruba solutions in large-scale IoT efforts. 

Case Study: Golden State Warriors Stadium 

Chase Center, home of the Golden State Warriors and host to countless music and cultural events, is technologically equipped with leading solutions from HPE and Aruba. The whole estate exemplifies how IoT can improve customer experiences, while recovering from the pandemic and re-engaging the community. 

The data centre is the core of the building, powering the visitor and employee experience. The Command Center oversees over 1,100 televisions, 36 restaurants, 9,500 square feet of LEDs, and the NBA’s largest visual board. Over 7,500 edge devices, including Aruba WiFi 6 access points, point of sale registers, IP-TV displays, building management devices, security cameras, lighting controls, and VOIP telephones, distribute and collect data throughout the whole campus. 

The network is comprised of an Aruba core and edge switches. Aruba Bluetooth low-energy beacons allow location services within a mobile app, while ClearPass Policy Manager secures the network and authenticates users and devices. Aruba AirWave delivers real-time operational telemetry, which is essential on an event day. 

The solution significantly impacts growth and engagement. The Golden State Warriors now have a rapid, versatile, and responsive IT infrastructure with the capacity for growth enabled by HPE and Aruba. The structure is a great example of how to start small and scale IoT technology to meet growing company demands. 

Case Study: Disney theme parks 

When people visit Disney parks, one thing they’re sure to love is the engaging guest experience – but they may not realise how much IoT technology contributes.

Disney parks aim to provide each guest with the most immersive experience possible, allowing them to become a part of the story. Disney is continuously implementing new approaches and processes to understand better what is happening at various park locations. Large volumes of data are collected to closely monitor the condition of the attractions. One of the main components enables Disney to link several data streams. Because everything is interconnected, Disney can offer more interesting and immersive consumer experiences. 

The happiest place on the planet is also one of the most connected. Aruba WiFi infrastructure and IoT solutions have been used at Disney resorts to improve employee and visitor experiences by providing connection, security, and bridging the digital and physical worlds.

Numerous Disney properties are using Aruba’s solutions to improve on-site operations. Disney uses Aruba’s location-ready access points, ClearPass for wireless authentication and secure access, Airwave for network administration, and Aruba ALE (Analytics and Location Engine).

Aruba’s WiFi infrastructure makes processes at Disney resorts more efficient and effective. Aruba’s Edge Services Platform (ESP) offers parks an open networking solution that interacts seamlessly with ecosystem partners and provides a single point of management and configuration for all parks and resort areas. 

The large-scale implementation at Disney parks demonstrates the agility and scalability of IoT and how it can be used to assist businesses of all sizes. 

Conclusion 

To serve as a platform for addressing future business objectives, IoT solutions should be scalable and adaptive. The Aruba solutions used in the Chase Center and Disney examples above are extremely scalable and extensible to support a variety of use cases, from a small network of devices to a large web. 

IoT is driving innovation across many industries, and when businesses transition from a prototype IoT project to full-scale production, they should ensure their infrastructure is sufficient. Rather than investing in a separate overlay network to aid employee safety, customer experiences, or other IoT use cases, businesses can instead use a single platform. 

A separate overlay network isn’t required if you invest in Aruba’s unique access points, which support Bluetooth, Zigbee, and Wi-Fi 6. If a new protocol is required, Aruba WiFi 6 APs include a USB port where a dongle can be plugged in. When APs support various protocols, they can communicate more effectively with app-enabled services such as automated door locks and climate controls. This improves both the consumer and staff experience. Contact us, your IT partner, to learn how Aruba and HPE can help start or scale your IoT initiative.