Welcome!

Agile Computing Authors: XebiaLabs Blog, Elizabeth White, Yeshim Deniz, Carmen Gonzalez, Pat Romanski

Blog Feed Post

Secure VDI In The Age Of Botnets

By David Parkinson, strategic development manager, UK & Ireland, for Wick Hill

It's not often that news from the information security industry reaches the early evening TV slots. However, the major disruption caused recently to the Gameover Zeus (GOZ) botnet certainly did.

In a collaborative effort to combat the botnet, the intelligence agencies of different countries, as well as leading information security vendors, worked together on the problem. They managed to give users a two week clear window in which to get their house in order, before command and control of the botnet was likely to have been won back by the instigators.

This collaborative action to stymie GOZ will surely be something we see more of in the future, as we strive to disrupt the increasingly fast, global spread of malware.

Indeed, this global collaboration theme was a key topic at the CPX Barcelona event in May, when Check Point announced the launch of ThreatCloud IntelliStore, a global marketplace for customers to select highly specific, relevant intelligence feeds from the likes of Crowdstrike and iSIGHT Partners ,and convert that intelligence automatically into additional protection, without further infrastructure change.

While GOZ itself is extremely dangerous, because it looks for banking and financial information on an infected host, its ability to download and install other malware, routinely CryptoLocker, makes it especially treacherous. As the FBI.gov page on the disruption action notes, it is estimated that around $30 million was paid in CryptoLocker ransoms between September and December 2013 alone. It's not surprising that Sky News ran a story reporting Cybercrime to be 'As lucrative as the drugs trade'.

While GOZ and CryptoLocker are undeniably an enormous problem for consumers worldwide, their effect on organisations from small businesses through to enterprises and public sector bodies is just as serious.

For a small business, with say twenty to two hundred PCs out in the (often remote) field, some infrastructure needs to be deployed, configured and trusted so malware can be detected and removed at the endpoint, and of course, preferably prevented from reaching the network and endpoint in the first place. For larger organisations, that problem is magnified, though they may have more resource with which to tackle the complexities.

While the viewpoint that we need new ways of looking at the problem can be wholly understood, and that we need to encourage vendors to be innovative, we also need to recognise that organisations need to work with the tools that are available to them today.

The increased publicity around PC malware infestation may encourage organisations to look again at centrally hosted desktop services, for at least a portion of their users, and may encourage service providers to take the opportunity to look again at their offerings.

For example, Virtual Desktop Infrastructure (VDI) could be considered if it could provide the benefit of improved security, and better management of that security.

One of the problems with endpoint protection in VDI is the potential replication of the endpoint agent to each guest operating system. This can cause storms of traffic during updates, create replicas of databases, and create a high processing overhead during scans. Hypervisor level protection can provide a solution to this, though that is often limited to file level scanning.

One solution would be a virtual appliance sitting on a host, with a small agent within each guest on the host, that then communicates with the virtual appliance.

The "Light Agent" approach from Kaspersky Lab provides the benefits of hypervisor level protection, along with the fuller protections associated with an agent installed on a desktop (malware control, application control, device control etc).

Having more desktops within just such a centralised environment means that they can often be kept secure more reliably, that they can provide a safer working environment for the user, and that they can be backed up more effectively. This might be a strategy worth looking at again. It will be interesting to see which service providers look to differentiate their services by providing such levels of protection.

Quite rightly, a centralised desktop infrastructure requires secure and flexible access to the data centre. This access might be required by regular VDI users who are looking to centralise desktop resources as described earlier, remote workers in the field, or perhaps users who are invoking a disaster recovery plan.

These different user groups may have very different requirements from their local computing hardware. A regular user would possibly find a tablet cumbersome to work with throughout the day and require a laptop or conventional "PC" setup, with keyboard and mouse, while remote workers may find access from a tablet far more convenient for the tasks they need to complete away from a desk.

A key user needing occasional access, or an IT Manager looking for a convenient ICE (In case of emergency) solution, might find a palm sized system-on-chip device that can be plugged into any HDMI monitor and connect wirelessly to network and input devices, the ideal solution for distribution and portability.

Such flexibility of device choice, tied with the security that only centralised management across all devices can provide (including remote device wipe), together with port and application control, makes Becrypt's tVolution suite suitable for any organisation looking to provide comprehensive secure access options into VDI services.

All this isn't at all to say that VDI is a panacea to the current wave of high profile malware distribution, but it is another tactic that can be considered after carefully looking at the tools at our current disposal.

About Wick Hill
Established in 1976, value added distributor Wick Hill specialises in secure IP infrastructure solutions. The company sources and delivers best-of-breed, easy-to-use solutions through its channel partners, with a portfolio that covers security, performance, access, networking, convergence, storage and hosted solutions.

Wick Hill is part of the Wick Hill Group, based in Woking, Surrey with sister offices in Hamburg. Wick Hill is particularly focused on providing a wide range of value added support for its channel partners. This includes a strong lead generation and conversion programme, technical and consultancy support for reseller partners in every stage of the sales process, and extensive training facilities. For more information about Wick Hill, please visit http://www.wickhill.com/company/company-profile or www.twitter.com/wickhill

ENDS

For further press information, please contact Annabelle Brown on 01326 318212, email [email protected]. For reader queries, contact Wick Hill on 01483 227600. Web http://www.wickhill.com

Source: RealWire

Read the original blog entry...

More Stories By RealWire News Distribution

RealWire is a global news release distribution service specialising in the online media. The RealWire approach focuses on delivering relevant content to the receivers of our client's news releases. As we know that it is only through delivering relevance, that influence can ever be achieved.

@ThingsExpo Stories
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology.
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, introduced the technologies required for implementing these idea...
Every successful software product evolves from an idea to an enterprise system. Notably, the same way is passed by the product owner's company. In his session at 20th Cloud Expo, Oleg Lola, CEO of MobiDev, will provide a generalized overview of the evolution of a software product, the product owner, the needs that arise at various stages of this process, and the value brought by a software development partner to the product owner as a response to these needs.
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open.
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT depl...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at Dell EMC, introduced a methodology for capturing, enriching and sharing data (and analytics) across the organization...
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now ...
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, John Jelinek IV, a web developer at Linux Academy, will discuss why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers...
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal ...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.