Laura DiDio

Two-Thirds of Corporations Now Require 99.99% Database Uptime, Reliability

A 64% majority of organizations now require that their databases deliver a minimum of four, “nines” of uptime 99.99% or better for their most mission critical applications . That is the equivalent of 52 minutes of unplanned downtime per database/per annum or just over one minute of downtime per week as a result of an unplanned outage.

Those are the results of ITIC’s 2013 – 2014 Database Reliability and Deployment Trends Survey, an independent Web-based survey which polled 600 organizations worldwide during May/June 2013. The nearly two-thirds of respondents who indicated they need 99.99% or greater availability is a 10% increase over the 54% who said they required a minimum of four nines reliability in ITIC’s 2011-2012 Database Reliability survey.

This trend will almost certainly continue unabated owing in large part to an increase in mainstream user deployments of databases running Big Data Analytics, Business Intelligence (BI), Customer Relationship Management (CRM) and Enterprise Resource Planning (ERP) applications. These applications are data intensive and closely align with organizations’ main-line-of-business and recurring revenue stream. Hence, any downtime on a physical, virtual or cloud-based DB will likely cause immediate disruptions that will quickly impact the corporation’s bottom line. …

Two-Thirds of Corporations Now Require 99.99% Database Uptime, Reliability Read More »

Andrew Baker Q&A: Security

Andrew Baker has been an IT manager specializing in security for over 25 years. He has worked at a variety of firms ranging from large enterprises like Sanford Bernstein, Bear Stearns, Warner Music Group and the Princeton Review, to SMBs like Send Word Now. In the wake of the 9/11 World Trade Center bombings, Baker was tasked with getting the network up and running and defending its data from any potential hacks. As a lifelong security expert, Baker knows that there is no such thing as absolute foolproof security. But he’s also aware that even the strongest security mechanisms can be undermined by human error and lack of strong security policies and procedures and corporation’s failure to enforce common sense security practices. Baker is President and founder of BrainWave Consulting Company, LLC in Gassaway, West Virginia where he provides Virtual CIO services for small/medium businesses.   See BrainwaveCC.com

ITIC: What has been the greatest security threat to emerge in the last 10 years?

Andrew Baker: Since 2003 we’ve seen the modernization of the hacker community and organized crime has appeared on the scene. Organized crime views the Internet as a bonanza: it allows them to operate out of the limelight with fewer resources. We’ve also witnessed nation-states and state-sponsored cyber-terrorism. Countries are all spying on one another. But there are certain countries that represent a big security threat: China, Asia in general (North Korea), Romania, Russia, Bulgaria and former Soviet satellites and the Middle East. The difference between China and everyone is that China has swiftly morphed into state-sponsored cyber-security threats and the country is tightly regulated. Any country that can prevent Google from free-search can easily stop hackers from inside their borders – if it wanted to. In Romania and other countries there are towns like “Hackertown” that promote ‘Cybercrime as a Service.’ Here in the U.S. the bulk of the problem is people, specifically stupid human error among the bulk of the population. Additionally, the U.S. Government has yet, to my knowledge, catch a single cyber criminal either the Russian or Italian organized. These cyber security syndicates have modularized cybercrime; they outsource a lot of their criminal activities and they can operate from anywhere, which makes it more difficult (but not impossible to catch them.

ITIC: As both an IT professional and a consumer how much more dangerous and pervasive are the security threats now than they were even three to five years ago?

AB: It’s insane.It’s no longer college students or kids out make their reputation for fun and glory. You now have specific kits and organized crime and “hacktavists.” Security threats are everywhere and they’ve risen by orders of magnitude.

ITIC: Against this backdrop we now have the Bring Your Own Device (BYOD) and IT as a service, trends which make security even tougher for businesses. What do you do for your corporate clients?

AB: The first thing I dois review and test and their environment. I also construct a checklist and ask them if they are able to do the things they want to do and to ascertain whether or not any of those actions potentially compromise the organization’s security.

ITIC: What do you look for?

AB: I examine the entire network environment including application configurations, the manageability of systems and I examine how the corporation mitigates risk and manages host-based security. Many organizations haven’t done anything to regulate network access – they’re wide open and oftentimes have not changed/updated security parameters and permission.

ITIC: Upon examination what gaps do you typically identify?

AB: I do penetration testing but for the most part I don’t need to do that. In fact, the companies that need to do penetration testing to show where the flaws are – just don’t get it or they’re reasonably secure and I’m running an automated tool to uncover something obscure. For most SMBs, the gaps in their security are very evident; they are issues like firewall configuration or misconfiguration. Every rule in the firewall should apply to something that’s happening. I typically see a mismatch between the rules and the systems that the rules pertain to. What you want to see is more systems than rules. When you see more rules than systems, you will almost always find that you have openings in the firewalls for devices that no longer exist or no longer performs the specific function for which it was originally provisioned. For example, a firewall that is configured to secure or filter inbound Web access can be a security hazard, if the servers it applies to have been outsourced to GoDaddy. In this scenario, if the organization never changed the firewall rules and if the organization built a new server to control inbound Intranet traffic and gave it the same IP address as the old Internet Web server, the firewall rules from the outside will still work. But that means the company has unwittingly created a doorway into the network.

ITIC: What other common configuration errors do you encounter?

AB: Rules that are too broad and allow too much access; default passwords not being changed; people still putting in intentional back doors into the system (which is leftover from the 1980s) which they forget to secure. For example, many corporations allow the use of intentional backdoors so an administrator can manage the system from home, but when he or she leaves the company, the rest of the organization has forgotten about it, so it remains a possible source of exploitation. Organizations and their IT departments and security IT managers must monitor all the entry points into the system. This includes obvious things like user logins and of course, the still popular “shared passwords.”

ITIC: In terms of securing the environment where organizations are most likely to skimp on security and what types of security issues do some businesses ignore altogether?

AB: The areas of greatest weaknesses usually involve mobility and data leaks. Many companies pay attention to inbound traffic but they mistakenly ignore outbound data traffic. For example a small or midsized organizations that has 500 or fewer employees and that are not in a heavily regulated vertical market environment like healthcare, financial or pharmaceutical, you’ll find that 90% of the security rules are about connecting into the environment and only 10% are about connecting out. This goes beyond regulating social media or URL usage – with Web filtering – that’s more focused on productivity than it is for security. Most firewalls are intended to secure inbound traffic – most of the newer devices do support bi-directional security. The average lifespan of a firewall is about five or six years; the key is ensuring that the tool services the corporation’s security needs. A 10 or 20MB connection with multi-year support is available for a list price of less than $2,000. So it’s affordable for even an SMB with 10 employees. There is really no excuse for any company not to install a state-of-the-art firewall with network level anti-virus, intrusion prevention and different types of application analysis and multiyear support for subscription and signatures.

ITIC: Firewalls are the first level of defense. What are other must-have security tools?

AB: Adequate monitoring is crucial.The first rule of security is that you won’t catch everything; there’s no such thing as 100% foolproof security unless it’s the device is disconnected and physically locked up. Monitoring encompasses many tools (e.g. audit trails) that enable the company to consolidate network data traffic in at least near-real-time so the organization can perform forensics. Corporations also need to send firewall, application and switching log data and consolidate them to a single location where you can monitor them. Since you can’t stop everything, you need to be able to monitor all network traffic in hindsight, so you can determine if a breach has occurred, where it occurred and duration so you can determine what happened. Intrusion detection is typically included in new firewalls. Audit trails are directly linked to monitoring. Policy falls into two categories: policy as a matter of legal definition and procedures to facilitate the goal. Companies should also distinguish between their Business policy and their Technology policy. The Business policy sets the rules and guidelines governing who has what levels of access. The technology policy should enforce the business policy.So if the firewall is replaced with another brand all you have to do is figure out how to configure it, but the basic business premise doesn’t change. You have to identify risks to mitigate them to an acceptable level. You will never totally eliminate risk.

ITIC: What risks should organizations look for and eliminate?

AB: First, the security teams need to identify all technology and business-based risks. Next, they should suggest anything that can be used to mitigate these risks and pay equal attention to everyday human actions which can elevate physical security risks. For example, if everyone has a key card to get into the office but they ignore who comes in behind them, then you’ve just created a big security risk by human action, which has nothing to do with technology. Similarly, if a company has 50 people in the office but only 20 keycard swipes, it could institute a policy that requires a key card swipe and not allow visitors to roam unescorted throughout the premises. Finally, IT security professionally should proactively communicate with management, provide them with updates and bring security risks to their [management’s] attention. Set up a meeting with the goal being to have management sign off on some of the proposals and agree to accept or mitigate risks.

ITIC: That’s a bold suggestion. As we all know politics plays an important role in security. What’s your advice to internal Security IT pros, who are being told to provide administrative access to end users – particularly those that are connected to the corporate revenue stream like a doctor or a lawyer – even though it represents a big security risk?

AB: There are different approaches to saying “No.” Again, security professionals must be proactive about identifying the risks and getting management to recognize and sign off on them. Cite statistics and studies to bolster your argument; make an objective argument. Don’t make it personal. The objective of the corporate IT security professional is to gain better control or have the other parties accept the risk. There are three (3) outcomes. The first is they stay within the system because they don’t have a pressing need – the “convenience” argument for a knowledge worker to have Administrative access isn’t strong enough, or alternatively, the IT department will accommodate pressing needs by providing elevated access. The second path is that you can’t convince them and you tell senior management that we’ll do it, but you need to sign off on the elevated risk so if a breach occurs, they accept the responsibility for acquiescing to elevated access rights. If that’s the case, the security IT administrators need to state specifically that the physics of the system don’t allow them to grant elevated access rights and still maintain security. I recognized that depending on the relationship between C-level executive managers and the IT department, that it may be difficult to get senior management to put it in writing. The way to get the paper trail you desire is after the meeting, you send out an Email recapping the meeting events and stating “…As per our discussion, we have made an exception even though it’s a greater security risk….” The third scenario is to work with the individual(s) who want the elevated access and to work out some compromises. It could be that the IT department will monitor them to a greater degree and expect them to keep IT informed of their activities. It becomes a reciprocal relationship; even though it raises risks you still get another set of eyes. It takes a great degree of cooperation and you still have to be vigilant. The people who cooperate are rarely the source of trouble.

ITIC: BYOD and mobility are the new business paradigms. Smart phones and tablets are high security risks both in terms of device theft and potential security breaches. What are the best security defense methods?

AB: There are a variety of tools to manage mobile devices. But it still comes back to having strong corporate security policies, that the company enforces. Security IT professionals should assume that their worst security nightmares it will happen and find the tools and policies they need to secure it. There are mobile-only products – MDM (mobile device management) like. Mobile Iron and ManageEngine has a tool called Desktop Manager, to name just two. Consumer users can opt to store their contacts in the cloud Apple, Google, Microsoft and others all provide ways to do this. Google and Apple’s cloud solutions support storage of pictures and videos – and you can backup your data locally. There are also tools that enable you to wipe the device in case it’s lost or stolen e.g. AndroidLost which is free.

ITIC: What emerging security threats are on the horizon?

AB: It’s not so much new threats as it is sophistication of existing threats. Corporations can expect that hackers will employ technologies like cryptography to their advantage when attempting an intrusion. We see that hackers are now digitally signing their malware so it appears legitimate and authentic. We can also expect more meaningful and pernicious attacks against mobile devices. We’re going to see further proliferation of Root Kits and we’re also witnessing cross-platform attacks that can affect any connected platform, so the malware goes from Android to Windows to Apple or whatever. No connected platform or device is immune.

ITIC: For years Apple benefitted from security by obscurity is that going away?

AB: Thanks to its burgeoning popularity, Appleis absolutely much more of a target. In the last six months alone we’ve seen a lot of malware that is Mac-specific – it hasn’t done anything specific yet but the fact that it’s available and it’s targeting an environment where many users don’t expect it and have a false sense of security – is troubling.

ITIC: What’s the bottom line with security?

AB: At the end of the day, security in principle is straightforward. It’s the charts you see from companies that do business process re-engineering. You identify, assess and take the appropriate remedial action – or not. The problem with security is that it is not static. The hackers don’t stand still. Security is continually evolving process. Even if you never changed your technology, the security still evolves. Every new feature and function and product has unintended uses and consequences. Security is a 65% to 35% — between process and people it’s 65% and 35% is the technology. Security should be baked into the entire environment. You always pay the price when you do it in hindsight and bolt it on. Certain environments are more security-sensitive. In a financial organization, whatever the platform, people will be secure.

Andrew Baker Q&A: Security Read More »

nCrypted Cloud secures, stores BYOD, Cloud-based Information

Cloud computing and Bring Your Own Device (BYOD) are inarguably two of the hottest trends in high tech today. These enabling technologies increase productivity but they also present corporations and consumers with significant security, privacy and manageability challenges.

A new software service from nCrypted Cloud, a Boston-based startup, secures and encrypts cloud-based data in a straightforward, easy-to-use and affordable manner.

nCrypted Cloud encrypts data from recognized cloud services like Dropbox, Google Drive and Microsoft’s SkyDrive. nCrypted Cloud comes in three versions: a basic Consumer version which is free; a Consumer Pro version and an Enterprise edition aimed at corporate users. …

nCrypted Cloud secures, stores BYOD, Cloud-based Information Read More »

IBM Offers Rock Solid Reliability, Best in Class Server Performance

Big Blue Hardware is Rock Solid

IBM hardware retains its status as being best in class in terms of reliability, stability and performance and customer satisfaction. IBM’s System z mainframes recorded the least amount of downtime of any hardware platform. In the server hardware category systems with relatively small market shares, including Stratus Technologies ftServer 6300 and 4500 series and Fujitsu’s Primequest and Primergy Servers continue to score very high reliability.

Stratus Technologies of Maynard, MA offers Intel Xeon-based systems with mainframe-like fault tolerance and reliability with 99.999 % reliability. The Fujitsu Primergy and Fujitsu SPARC systems similarly deliver a high level of reliability and fault tolerance with 48% of reporting 99.999% or just over five minutes of per server/ per annum downtime due to unplanned outages.

The length and severity of Tier 1, Tier 2 and Tier 3 unplanned outages and the patching actions related to each correspond to specific line item capital expenditure (CAPEX) and operational expenditure (OPEX) costs for the business. Reliability, measured by downtime, can positively or negatively impact TCO and accelerate or delay ROI. …

IBM Offers Rock Solid Reliability, Best in Class Server Performance Read More »

Human Error, IT Staff Shortages and Aging Hardware Undercut Reliability

To reiterate, ITIC’s fifth annual reliability survey results indicate that the inherent reliability and uptime of nearly all of the 14 major server hardware and 18 server operating system distributions continues to improve. But at the same time, user error is becoming more of a factor undercutting overall reliability.

This is based on technical advances in the underlying processor technology from companies like Intel Corp. and Advanced Micro Devices, memory and disk technology, as well as improvements to the core server hardware and server OSs that improve performance, scalability, security and the ability to support heavier workloads.

As organizations strive to accomplish more with fewer resources, IT departments must rely even more heavily on their vendors to deliver more reliable servers and server OS platforms and top notch technical support in the form of regular patches and documentation. …

Human Error, IT Staff Shortages and Aging Hardware Undercut Reliability Read More »

IBM, Dell, Fujitsu & Stratus Get Highest Marks in ITIC Reliability Survey

For the fifth year in a row, IBM servers delivered the highest levels of reliability and uptime among 14 server platforms.

Those are the results of the latest independent ITIC 2013 Global Server Hardware and Server OS Reliability Survey which polled C-level executives and IT managers at over 550 organizations worldwide from August 2012 through January 2013.

Among the high-end mainframe class systems, both the IBM System z and the Stratus Technologies’ ftServer 6310 delivered the highest inherent reliability: both had no instances – 0% – of the most severe Tier 3 outages lasting four hours or more of duration. Among the mainstream “work horse” servers, IBM’s Power Systems recorded the least amount of unplanned downtime, approximately 13 minutes per server/per year. By contrast, some 6 percent of organizations using Oracle (formerly Sun Microsystems) x86-based servers experienced of over four (4) hours of per server/per annum downtime. This was the highest percentage of lengthy Tier 3 server outages among the 14 platforms surveyed. …

IBM, Dell, Fujitsu & Stratus Get Highest Marks in ITIC Reliability Survey Read More »

IBM Intros New Power Servers for SMBs, Enterprises

IBM’s latest generation of Power Systems introduced this week are all about “power,” emphasizing:

  • The power to support compute intensive workloads
  • The power to deliver business analytics
  • The power to drive business efficiencies through server consolidation
  • The power to conserve resources by consolidating floor space and lowering energy consumption
  • The power to cut costs by reducing the number of licensing core requirements
  • The power to leverage new product features and capabilities that simplify the IT experience

IBM’s new Power enterprise and entry servers also align with the company’s strategy to address organizations’ need to support compute-intensive workloads and more complex application environments, which include physical, virtual, cloud and mobile environments.

The new solutions – which support IBM’s AIX, and IBM i operating systems, as well as Red Hat Enterprise Linux and SuSE Linux Enterprise operating system environments – use the same underlying advanced processor technology that powers its Watson supercomputer, the system so famously displayed in 2011 when it trumped Jeopardy! grand champions during a nationally televised match. …

IBM Intros New Power Servers for SMBs, Enterprises Read More »

Windows 8 Surface Tablet: Wait and See Attitude Prevails Users Want to be Wowed

ITIC’s Windows 8 Survey Data shows that companies and the industry at large is taking a “wait and see” attitude towards the Windows 8 Surface Tablet which Microsoft formally unveils this week.

Reviews so far have been mixed but there’s no doubt that this is Microsoft’s attempt to beat Apple at its own game in the tablet market AND one-up the iPad maker by delivering a tablet-like device that also has the power of a full-blown computer.

Hence, the mood is more cautious with respect to the Windows 8 RT Surface Tablet. This is Microsoft’s first foray into the tablet arena which is dominated by Apple’s iPad with 68% marketshare. Just over one third – 34% — of the over 500 ITIC survey respondents said their Windows 7 desktops were fine; another 24% indicated they’re already using the Apple iPad and are satisfied with its performance; 18% said other device purchases take priority and 16% said they were waiting to see how the Windows 8 Surface Tablet is priced. Ironically, only nine percent of survey participants said the Touch screen factored into their decision not to purchase the Windows 8 Surface Tablet. Interestingly, only 12% of survey participants said they would pass on the Windows 8 Surface Tablet because they’re already using an Android-based tablet. …

Windows 8 Surface Tablet: Wait and See Attitude Prevails Users Want to be Wowed Read More »

Windows 8: ITIC Survey Data Shows Good Performance but No Compelling Need to Migrate Yet

Let’s be blunt: the biggest issue with Windows 8 is not the much-maligned Metro touch interface; it’s that 60% majority of corporations say they have “no compelling business need” to upgrade to the latest Microsoft desktop or the Windows 8 RT Surface Tablet which debut this week.

Those are the findings of ITIC’s latest independent ITIC Windows 8 Deployment and Usage Trends Survey which polled over 500 organizations during September.

The Web-based survey found that only 10% of respondents – or one-in-10 companies – have definitive plans to migrate to Windows 8 once it’s released on October 26. That’s in stark contrast to the 64% of the respondents to ITIC’s Windows 7 poll who stated their intentions to migrate to Windows 7 just Microsoft released that operating system in the fall of 2009.

Similarly, only 9% of those polled currently plan to purchase a Windows 8 Surface Tablet compared with 49% who say they will not buy the forthcoming Windows 8 Surface Tablet. …

Windows 8: ITIC Survey Data Shows Good Performance but No Compelling Need to Migrate Yet Read More »

Security is Imperative for BYOD, Mobile Deployments

Nearly two-thirds of businesses – 62% — now allow their end users to “bring their own devices (BYOD)” and use them as their corporate desktops or mobile devices to access organizational data including Email, applications and sensitive data. However, 71% of businesses that allow BYOD, have no specific policies and procedures in place to support BYOD deployment and ensure security.

That’s according to the latest independent joint survey conducted by ITIC and KnowBe4.com, a Clearwater, Florida company that specializes in security awareness training. The ITIC/KnowBe4.com survey, polled 550 companies worldwide in July and August. The survey survey found that only 13% of respondents said their firms have specific policies in place to deal with BYOD deployments, while another nine percent indicated they were in the process of developing BYOD procedures.

“These survey findings should act as a wake-up call to galvanize corporations into proactively managing and securing corporate data accessed by mobile BYOD devices before they suffer an expensive and potentially crippling loss or hack,” said ITIC principal analyst Laura DiDio. She continued, “Every firm regardless of size should conduct a risk assessment review and adopt strong security and management policies to deal with increasingly mobile BYOD deployments.” …

Security is Imperative for BYOD, Mobile Deployments Read More »

Scroll to Top