Archive

Category Archives for "Networking"

Chrome OS gets cryptographically verified enterprise device management

Companies will now be able to cryptographically validate the identity of Chrome OS devices connecting to their networks and verify that those devices conform to their security policies.On Thursday, Google announced a new feature and administration API called Verified Access. The API relies on digital certificates stored in the hardware-based Trusted Platform Modules (TPMs) present in every Chrome OS device to certify that the security state of those devices has not been altered.Many organizations have access controls in place to ensure that only authorized users are allowed to access sensitive resources and they do so from enterprise-managed devices conforming to their security policies.To read this article in full or to leave a comment, please click here

Chrome OS gets cryptographically verified enterprise device management

Companies will now be able to cryptographically validate the identity of Chrome OS devices connecting to their networks and verify that those devices conform to their security policies.On Thursday, Google announced a new feature and administration API called Verified Access. The API relies on digital certificates stored in the hardware-based Trusted Platform Modules (TPMs) present in every Chrome OS device to certify that the security state of those devices has not been altered.Many organizations have access controls in place to ensure that only authorized users are allowed to access sensitive resources and they do so from enterprise-managed devices conforming to their security policies.To read this article in full or to leave a comment, please click here

Extreme becomes major WLAN player with Zebra buy

There are many factors to consider when a technology vendor decides to pull the trigger on an acquisition. Things such as impact to channel, customer reaction, product rationalization and other issues must be thought out.However, sometimes an acquisition seems to be a great fit and the decision is “black and white,” meaning it’s crystal clear with no shades of grey. This appears to have been the case for Extreme Networks, which earlier this week scooped up the wireless LAN (WLAN) business from Zebra Technologies for $55 million.To read this article in full or to leave a comment, please click here

Extreme becomes major WLAN player with Zebra buy

There are many factors to consider when a technology vendor decides to pull the trigger on an acquisition. Things such as impact to channel, customer reaction, product rationalization and other issues must be thought out.However, sometimes an acquisition seems to be a great fit and the decision is “black and white,” meaning it’s crystal clear with no shades of grey. This appears to have been the case for Extreme Networks, which earlier this week scooped up the wireless LAN (WLAN) business from Zebra Technologies for $55 million.To read this article in full or to leave a comment, please click here

IDG Contributor Network: In an attempt to disrupt Splunk, Elastic makes another acquisition

Elastic is the commercial vendor that sits behind the Elasticsearch, Kibana, Logstash and Beats open source projects. Elasticsearch was created back in 2010 by Shay Banon, co-founder and CTO of the Elastic company, and is built upon the Apache Lucene information retrieval project. All of the different projects focus on taking structured and unstructured data and delivering search, logging and analytics on top of it.Since that time, its commercial products—Elastic Stack, X-Pack and Elastic Cloud—have seen over 70 million cumulative downloads.Elastic has been smart about making strategic acquisitions. It acquired visualization vendor Kibana, and a year or so ago it acquired Norwegian company Found, which was commercializing Elasticsearch and offering it as a service on top of Amazon Web Services. This strategy appears to have worked, and it is interesting to look at the graph below that tracks the relative exposure of Elasticsearch and one of the competitive offerings, Splunk.To read this article in full or to leave a comment, please click here

The Era of Identity-based Applications

Identity and access management (IAM) has always been a heavy burden for large organizations.  Why?  Multiple folks across companies – business people, software developers, IT operations, human resources, security, compliance auditors, etc. – play some role across the IAM spectrum.As a result of this IAM group hug, technology decisions tend to be made tactically without any central oversight or integrated strategy but this behavior may be changing.  According to ESG research, 49% of large organizations claim they now have a formal enterprise-wide strategy in which IAM technology decisions are managed by central IT (note: I am an ESG employee).  In other words, someone in IT is now responsible and accountable for all IAM technology.To read this article in full or to leave a comment, please click here

The era of identity-based applications

Identity and access management (IAM) has always been a heavy burden for large organizations. Why? Multiple folks across companies—business people, software developers, IT operations, human resources, security, compliance auditors, etc.— play some role across the IAM spectrum.As a result of this IAM group hug, technology decisions tend to be made tactically without any central oversight or integrated strategy. But this behavior may be changing. According to ESG research, 49 percent of large organizations claim they now have a formal enterprise-wide strategy in which IAM technology decisions are managed by central IT. In other words, someone in IT is now responsible and accountable for all IAM technology.To read this article in full or to leave a comment, please click here

Asana’s new feature lets users ‘track anything’

Asana is making it easier for users to adapt its work-tracking software to more than just task management.The company announced Thursday that it's launching support for creating custom fields inside the product, so that it's possible for people to use the same service they rely on for tracking work tasks to also manage other things. So, a recruiting team could use custom fields to track a candidate's name, status, interview times and more.The custom fields feature was first announced last year at an Asana press event. It's an important part of how the company plans to expand its product to reach not only its current user base, but also businesses with more complicated and customized workflows.To read this article in full or to leave a comment, please click here

IDG Contributor Network: SIM cards on the way out in cellular IoT

The miniscule slivers of plastic known as the SIM card are on their way out, at least in the machine-to-machine (M2M) space. The adoption of an embedded specification by the wireless industry is behind the change, explains Juniper Research in a press release about its recent report (subscription) on M2M for the Mobile Network Operator (MNO) vertical.To read this article in full or to leave a comment, please click here

Pokémon Go guide app with half a million downloads hacks Android devices

Security researchers have found a malicious application on Google Play that had over 500,000 downloads and was designed to gain complete control over Android devices.The application masqueraded as a guide for the popular Pokémon Go game and used multiple layers of obfuscation to bypass Google Play's malware detection mechanisms, researchers from Kaspersky Lab said in a blog post.The app contains a malicious module that doesn't execute immediately. Instead, the app waits for another application to be installed or uninstalled in order to determine if it's running on a real device or in an emulated environment, like the ones used to detect malware.To read this article in full or to leave a comment, please click here

Pokémon Go guide app with half a million downloads hacks Android devices

Security researchers have found a malicious application on Google Play that had over 500,000 downloads and was designed to gain complete control over Android devices.The application masqueraded as a guide for the popular Pokémon Go game and used multiple layers of obfuscation to bypass Google Play's malware detection mechanisms, researchers from Kaspersky Lab said in a blog post.The app contains a malicious module that doesn't execute immediately. Instead, the app waits for another application to be installed or uninstalled in order to determine if it's running on a real device or in an emulated environment, like the ones used to detect malware.To read this article in full or to leave a comment, please click here

Tech leaders, activists call for Obama to pardon Snowden

Tech luminaries Steve Wozniak, co-founder of Apple, and Jimmy Wales, founder of Wikipedia, have joined a new campaign pushing for a pardon of National Security Agency leaker Edward Snowden.Other supporters of the PardonSnowden.org campaign, launched Wednesday, are Harvard law professor and tech policy author Lawrence Lessig; tech investor Esther Dyson; noted cryptographer and MIT professor Ron Rivest; and Electronic Frontier Foundation co-founder John Perry Barlow.The campaign, supported by the American Civil Liberties Union, Amnesty International, and Human Rights Watch, asks supporters to sign a letter asking President Barack Obama to pardon the former NSA contractor. "Snowden’s actions ... set in motion the most important debate about government surveillance in decades, and brought about reforms that continue to benefit our security and democracy," the letter says.To read this article in full or to leave a comment, please click here

Tech leaders, activists call for Obama to pardon Snowden

Tech luminaries Steve Wozniak, co-founder of Apple, and Jimmy Wales, founder of Wikipedia, have joined a new campaign pushing for a pardon of National Security Agency leaker Edward Snowden.Other supporters of the PardonSnowden.org campaign, launched Wednesday, are Harvard law professor and tech policy author Lawrence Lessig; tech investor Esther Dyson; noted cryptographer and MIT professor Ron Rivest; and Electronic Frontier Foundation co-founder John Perry Barlow.The campaign, supported by the American Civil Liberties Union, Amnesty International, and Human Rights Watch, asks supporters to sign a letter asking President Barack Obama to pardon the former NSA contractor. "Snowden’s actions ... set in motion the most important debate about government surveillance in decades, and brought about reforms that continue to benefit our security and democracy," the letter says.To read this article in full or to leave a comment, please click here

FCC Chair’s update on 5G wireless, robocalls, business data services & more

The following statement was made by FCC Chairman Tom Wheeler before the Committee on Commerce, Science and Transportation of the United States Senate during a hearing on "Oversight of the Federal Communications Commission" on Sept. 15.Chairman Thune, Ranking Member Nelson, and Members of the Committee, thank you for this opportunity to discuss our work at the Federal Communications Commission. Since we last met six months ago, the Commission has continued to make strong progress on our policy agenda.  While I am pleased with this progress, our work is far from done.  With each passing day, communications technology grows more important to our economy and quality of life.  That means there’s no letting up at the Commission.  We must continue to promote core values like universal access, public safety, consumer protection, and competition at the same bold pace we have consistently maintained. To read this article in full or to leave a comment, please click here

FCC Chair’s update on 5G wireless, robocalls, business data services & more

The following statement was made by FCC Chairman Tom Wheeler before the Committee on Commerce, Science and Transportation of the United States Senate during a hearing on "Oversight of the Federal Communications Commission" on Sept. 15.Chairman Thune, Ranking Member Nelson, and Members of the Committee, thank you for this opportunity to discuss our work at the Federal Communications Commission. Since we last met six months ago, the Commission has continued to make strong progress on our policy agenda.  While I am pleased with this progress, our work is far from done.  With each passing day, communications technology grows more important to our economy and quality of life.  That means there’s no letting up at the Commission.  We must continue to promote core values like universal access, public safety, consumer protection, and competition at the same bold pace we have consistently maintained. To read this article in full or to leave a comment, please click here