Filtering By Tag 'Infrastructure'x clear filter
Serverless computing is the modern methodology most companies are using to create flexible and highly scalable applications as opposed to the old way of building out a server with defined resources; this older methodology creates issues when demand spikes or architectural changes are needed. With serverless computing, the architecture is built by defining each task as a micro-service and using APIs to trigger those tasks.
Everyone knows you need a firewall, but installing one isn’t the final step in keeping your computer network safe. Hackers are continually refining their techniques, and the proof is in the numbers; the number of data breaches in the United States has been steadily rising since 2008. That’s an unfortunate truth; however, the trend doesn’t have to continue.
Working with software, whether it be as applications or infrastructure, can be challenging to manage and track when changes/improvements are being made regularly. Manually testing new versions of code can be time consuming and significantly slow down the workflow of your deployments. Even when your code has made it through the testing phase, hidden errors can arise when you try to push it to your production environment, which can potentially have a negative impact on your customers.
Surveys indicate that under normal circumstances, 57% of issues are detected by end users before IT personnel are aware of them. Moreover, 34% of end users cite poor network connectivity or poor web/cloud/SaaS performance at their workplace. With this data in mind, it should come as no surprise that one of the top three gripes end users have about their IT department is reduced app viability.
Networks used to be much more straightforward, consisting of a few devices with rules manually written by a few individuals. As such, systems were relatively stable. Technologies such as Cloud Computing, Virtualization, and the Internet of Things created complex and dynamic networks comprised of countless devices. Now, our partner, Firemon, shows us how to better manage firewall rulesets in the latest Vandis Insight's Blog webinar recap.
Nathan J. Lichtenstein is a Senior Network Engineer at Vandis; he is a critical player in ensuring that our clients' network infrastructure needs are met, whether on-premise or in the cloud. Recently, Nathan headed out on vacation to Las Vegas, but taking an engineer out of the office doesn't quell curiosity; he quickly discovered that the Casino's network security was less than ideal.
Deception Technology lures attackers to strategically placed, heavily-instrumented decoys throughout the network. When an attacker trips over one of these decoys, the solution is triggered to begin generating reports and recording the attacker's actions, providing reliable forensics to see what attackers are doing and where they are going in the network.