+ Mobile Cloud Storage Users 20 + Containers in Cloud Architecture 81

Total Page:16

File Type:pdf, Size:1020Kb

+ Mobile Cloud Storage Users 20 + Containers in Cloud Architecture 81 Contents | Zoom in | Zoom out For navigation instructions please click here Search Issue | Next Page + Mobile Cloud Storage Users 20 + Containers in Cloud Architecture 81 SEPTEMBER 2014 www.computer.org/cloudcomputing Contents | Zoom in | Zoom out For navigation instructions please click here Search Issue | Next Page qM qMqM Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM THE WORLD’S NEWSSTAND® Call for Papers Legal Clouds: How to Balance Privacy with Legitimate Surveillance and Lawful Data Access Submission deadline: 1 Mar 2015 • Publication date: July-Aug 2015 ith the increasing popularity of cloud services and •Cloud incident response their potential to either be the target of or the tool Wused in a cybercrime activity, organizational cloud • Cloud information leakage detection and prevention service users need to ensure that their (cloud) data is secure, • Enhancing and/or preserving cloud privacy and in the event of a compromise, they must have the capa- bility to collect evidential data. • Cloud surveillance • Crime prevention strategies Surveillance of citizens by their governments is not new. The relatively recent revelations of Edward Snowden (former NSA • Legal issues relating to surveillance contractor) of the extensive surveillance (including of cloud • Enhancing privacy technology for cloud-based apps service providers and users) by NSA, however, reminded us • High quality survey papers on the above topics are of the need to balance a secure cloud computing system with welcome. the rights of individuals to privacy. This is further complicated by the need to protect the community from serious and organized crimes, terrorism, cyber-crime, and other threats to Special Issue Guest Editors national security interests. This presents serious implications Kim-Kwang Raymond Choo, University of South Australia for the ability of governments to protect their citizens against Rick Sarre, University of South Australia cyber security threats. It remains an under-researched area due to the interdisciplinary challenges specifi c to this fi eld. Submission Information This special issue will focus on cutting edge research from both Submissions will be subject to IEEE Cloud Computing academia and industry on the topic of balancing cloud user magazine’s peer-review process. Articles should be at most privacy with legitimate surveillance and lawful data access, 6,000 words, with a maximum of 15 references, and should with a particular focus on cross-disciplinary research. For be understandable to a broad audience of people interested in example, how can we design technologies that will enhance cloud computing, big data, and related application areas. The “guardianship” and the “deterrent” effect in cloud security at the writing style should be down to earth, practical, and original. same time as reducing the “motivations” of cybercriminals? All accepted articles will be edited according to the IEEE Topics of interest include but are not limited to: Computer Society style guide. Submit your papers through • Advanced cloud security Manuscript Central at https://mc.manuscriptcentral.com/ ccm-cs. Contact the guest editors at ccm4-2015@computer • Cloud forensics and anti-forensics _____ _______________ .org. www.computer.org/cloudcomputing qM qMqM Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM THE WORLD’S NEWSSTAND® EDITOR IN CHIEF Mazin Yousif, T-Systems International, [email protected] EDITORIAL BOARD Zahir Tari, RMIT University Omer Rana, Cardiff University Rajiv Ranjan, CSIRO Computational Informatics Beniamino Di Martino, Second University of Naples Eli Collins, Cloudera Samee Khan, North Dakota State University Kim-Kwang Raymond Choo, University of South Australia J.P. Martin-Flatin, EPFL Ivona Brandic, Vienna University of Technology Pascal Bouvry, University of Luxembourg David Bernstein, Cloud Strategy Partners Laura Taylor, Relevant Technologies Alan Sill, Texas Tech University STEERING COMMITTEE Manish Parashar, Rutgers, the State University of New Jersey V.O.K. Li, University of Hong Kong Steve Gorshe, PMC-Sierra (Communications Society (Communications Society liaison) liaison; EIC Emeritus IEEE Communications) Rolf Oppliger, eSecurity Technologies Carl Landwehr, NSF, IARPA (EIC Emeritus IEEE S&P) Hui Lei, IBM Dennis Gannon, Microsoft Kirsten Ferguson-Boucher, Aberystwyth University. EDITORIAL STAFF CS MAGAZINE Brian Kirk • Lead Editor • [email protected] OPERATIONS COMMITTEE Joan Taylor • Content Editor Paolo Montuschi (chair), Erik R. Altman, Maria Ebling, Miguel Encarnação, Lars Heide, Cecilia Metra, San Murugesan, Shari Lee Garber, Keri Schreiner, Jenny Stout Lawrence Pfleeger, Michael Rabinovich, Yong Rui, Forrest • Contributing Editors Shull, George K. Thiruvathukal, Ron Vetter, Daniel Zeng Carmen Garvey, Jennie Zhu-Mai • Production & Design Robin Baldwin • Senior Manager, Editorial Services Evan Butterfield • Products and Services Director CS PUBLICATIONS BOARD Sandy Brown • Senior Business Development Manager Jean-Luc Gaudiot (VP for Publications), Alain April, Marian Anderson • Senior Advertising Coordinator Laxmi N. Bhuyan, Angela R. Burgess, Greg Byrd, Robert Dupuis, David S. Ebert, Frank Ferrante, Paolo Montuschi, Linda I. Shafer, H.J. Siegel, Per Stenström IEEE Cloud Computing (ISSN 2325-6095) is published quarterly by the IEEE Computer Subscription rates: IEEE Computer Society members get the lowest rate of US$39 Society. IEEE headquarters: Three Park Ave., 17th Floor, New York, NY 10016-5997. per year. Go to www.computer.org/subscribe to order and for more information on IEEE Computer Society Publications Office: 10662 Los Vaqueros Cir., Los Alamitos, CA other subscription prices. 90720; +1 714 821 8380; fax +1 714 821 4010. IEEE Computer Society headquarters: 2001 L St., Ste. 700, Washington, DC 20036. qM qMqM Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM THE WORLD’S NEWSSTAND® What will the future of cloud computing look like? What are some of the issues professionals, practitioners, and researchers need to address when utilizing cloud services? IEEE Cloud Computing magazine serves as a forum for the constantly shifting cloud landscape, bringing you original research, best practices, in-depth analysis, and timely columns from luminaries in the fi eld. FEATURED ARTICLES 24 Guest Editors’ Introduction: 46 Effi cient and Secure Transfer, Securing Big Data Applications in Synchronization, and Sharing of Big the Cloud Data Bharat Bhargava, Ibrahim Khalil, and Ravi Sandhu Kyle Chard, Steven Tuecke, and Ian Foster 27 Enhancing Big Data Security with 56 Location-Based Security Collaborative Intrusion Detection Framework for Cloud Perimeters Zhiyuan Tan, Upasana T. Nagar, Xiangjian He, Priyadarsi Chetan Jaiswal, Mahesh Nath, and Vijay Kumar Nanda, Ren Ping Liu, Song Wang, and Jiankun Hu 65 Multilabels-Based Scalable Access 34 Risk-Aware Virtual Resource Control for Big Data Applications Management for Multitenant Hongsong Chen, Bharat Bhargava, and Fu Zhongchuan Cloud Datacenters Abdulrahman A. Almutairi and Arif Ghafoor qM qMqM Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM THE WORLD’S NEWSSTAND® September 2014 Volume 1, Issue 3 www.computer.org/cloudcomputing COLUMNS 4 News 72 What’s Trending? In Brief Bringing Big Data Systems to the Cloud Lee Garber Amandeep Khurana 8 From the Editor in Chief 76 BlueSkies A Focus on Security and Application Security through Privacy in the Cloud Federated Clouds Mazin Yousif Paul Watson 10 Cloud and the Government 81 Cloud Tidbits FedRAMP: History and Future Direction Containers and Cloud: From LXC Laura Taylor to Docker to Kubernetes David Bernstein 15 Standards Now Cloud Standards and the Spectrum of Development Alan Sill 23 Advertising Index 45 IEEE CS Information 20 Cloud and the Law Mobile Cloud Storage Users Kim-Kwang Raymond Choo Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use: 1) is not made for profit; 2) includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any third-party products or services. Authors and their companies are permitted to post the accepted version of their IEEE-copyrighted material on their own Web servers without permission, provided that the IEEE copyright notice and a full citation to the origin al work appear on the first screen of the posted copy. An accepted manu- script is a version which has been revised by the author to incorporate review suggestions, but not the published version with copyediting, proofreading and formatting added by IEEE. For more information, please go to: http://www.ieee.org/publications_standards/publications/rights/paperversionpolicy.html. Permission to reprint/republish this material for commercial, advertising, or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to the IEEE Intellectual Property Rights Office, 445 Hoes
Recommended publications
  • Before the Public Utilities Commission of the State of California
    F I L E D 07-10-13 04:59 PM BEFORE THE PUBLIC UTILITIES COMMISSION OF THE STATE OF CALIFORNIA Order Instituting Rulemaking to Consider Smart Grid Technologies Pursuant to Federal Legislation Rulemaking 08-12-009 and on the Commission’s own Motion to Actively (Filed December 18, 2008) Guide Policy in California’s Development of a Phase III Energy Data Center Smart Grid System. (U39E) WORKING GROUP REPORT PURSUANT TO FEBRUARY 27, 2013 ADMINISTRATIVE LAW JUDGE’S RULING CHRISTOPHER J. WARNER Pacific Gas and Electric Company 77 Beale Street San Francisco, CA 94105 Telephone: (415) 973-6695 Facsimile: (415) 972-5220 E-Mail: [email protected] Attorney for Dated: July 10, 2013 PACIFIC GAS AND ELECTRIC COMPANY Pursuant to Ordering Paragraph 4 of the February 27, 2013, “Administrative Law Judge’s Ruling Setting Schedule to Establish ‘Data Use Cases,’ Timelines for Provision of Data, and Model Non-Disclosure Agreements,” as subsequently modified (February 27 ALJ Ruling), Pacific Gas and Electric Company (PG&E), on behalf of itself, Southern California Edison Company (SCE), San Diego Gas & Electric Company (SDG&E), and Southern California Gas Company (SoCalGas), provides the Working Group Report that summarizes the results of the collaborative working group in the areas of use cases, definitions, and non-disclosure agreements in this phase of the proceeding.1/ The Working Group Report is attached as Appendix A to this pleading. A draft of the Working Group Report was provided for comment to the working group participants and other parties on July 3, 2013, and the Working Group Report reflects comments received by the close of business July 9, 2013, including alternate views incorporated directly into the Report.
    [Show full text]
  • Introduction
    BEDES V2.2 - Marked Changes - Introduction Introduction BEDES, the Building Energy Data Exchange Specification, has been created by Lawrence Berkeley National Laboratory (LBNL), with the help of the many stakeholders of the BEDES Working Group, and funded by the U.S. Department of Energy (DOE), to help standardize and facilitate the exchange of information on building characteristics and energy use. It is intended to be used in tools and activities that help stakeholders make energy efficiency investment decisions, track building performance, and implement energy efficiency policies and programs. This spreadsheet represents the BEDES Dictionary Version 2.2 which will be used to support the analysis of the performance of buildings by providing a common set of terms and definitions for building characteristics, efficiency measures, and energy use. The terms and definitions in this BEDES Dictionary were taken from a variety of sources in order to be as complete as possible as well as being inclusive of the existing implementations that characterize the energy use in buildings. In order for the standardized terms and definitions of the BEDES Dictionary to be incorporated into different implementations, schemas and import/export formats will need to be developed for specific use cases by the appropriate stakeholders. This will allow compliance with BEDES, as described on the BEDES technical website (bedes.lbl.gov). After the release of version 2.0 in 2016, LBNL and DOE continued to work with numerous adopters of BEDES. Version 2.2 is based on feedback from this process, as well as from stakeholders in general. We have also updated the online interactive website that contains the BEDES Dictionary in a searchable format.
    [Show full text]
  • Federal Transformation with SASE-Based TIC 3.0 Solutions
    WHITE PAPER Federal Transformation with SASE-based TIC 3.0 Solutions Zero-trust access with cloud-native advanced data and threat protection for cloud and web INTRODUCTION The Trusted Internet Connection (TIC) version 3.0 advances to a cloud-first perspective providing federal teams the opportunity to leverage cloud and mobility. While zero-trust network access (ZTNA) can replace legacy VPNs for direct access to private apps and resources in public cloud or private data centers, it requires pairing with cloud-native secure access service edge (SASE) networking and defenses. The difference from legacy web solutions that are cloud hosted—or in the cloud—from defenses designed to decode cloud traffic—or for the cloud—becomes very apparent when analyzing capabilities. At the core of SASE defenses is data context of cloud communications for granular policy controls, plus advanced data and threat protection. Why TIC 3.0? The modernization to version 3.0 of TIC expands upon the original program to drive security standards and leverage advances in technology as agencies adopt mobile and cloud environments. The goal of TIC 3.0 is to secure federal data, networks, and boundaries while providing visibility into agency traffic, including cloud communications. Originally established in 2007, TIC is a federal cybersecurity initiative intended to enhance network and perimeter security across the Federal Government. The Office of Management and Budget (OMB), the Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security agency (CISA), and the General Services Administration (GSA) oversee the TIC initiative, setting requirements and an execution framework for agencies to implement a baseline perimeter or multi-boundary security standard.
    [Show full text]
  • Exabeam Cloud Connectors Reliably Collect Logs from Over 40 Cloud Services
    Data Sheet Exabeam Cloud Connectors Reliably collect logs from over 40 cloud services Cloud services and infrastructure are commonplace Enhance Your Visibility in today’s modern network. Your business doesn’t stop at the firewall, and neither should your security Prebuilt, turnkey Cloud Connectors are available for a program. Ensuring your security teams have visibility broad range of cloud services, such as AWS, GitHub, into activities within your cloud services requires Google, Microsoft Office 365, Salesforce, Zoom, the right information being sent to your SIEM. But, and many other cloud security, identity and access collecting logs from cloud services isn’t always as management, infrastructure and easy as collecting them from on-premise solutions business applications. - coding is often required, and if you don’t have the skills in-house to do this, you will need to involve a Extend Behavioral Analytics to the Cloud consultant. Cloud security solutions typically offer limited Exabeam Cloud Connectors allow you to reliably detection of malicious insiders, compromised collect logs from over 40 cloud services into credentials and other unknown threats. Exabeam Data Lake, Exabeam Advanced Analytics For example, imagine a disgruntled employee or any other SIEM. Updates are made automatically downloading your customer list from Salesforce or whenever there are API changes, so you don’t stealing source code from Github. Pairing Cloud need coding skills or costly professional service Connectors with Exabeam Advanced Analytics allow engagements to ensure the right data is being you to combine cloud services activities with data collected. from on-premises applications, to improve detection of attacker tactics, techniques and procedures using behavior-based threat detection.
    [Show full text]
  • Formatting Guide: Colors & Fonts
    SAAS & CLOUD M&A AND VALUATION UPDATE Q1 2016 BOSTON CHICAGO LONDON LOS ANGELES NEW YORK ORANGE COUNTY PHILADELPHIA SAN DIEGO SILICON VALLEY TAMPA CONTENTS Section Page Introduction . Research Coverage: SaaS & Cloud 3 . Key Takeaways 4-5 M&A Activity & Multiples . M&A Dollar Volume 7 . M&A Transaction Volume 8-10 . LTM Revenue Multiples 11-12 . Revenue Multiples by Segment 13 . Highest Revenue Multiple Transaction for LTM 14 . Notable M&A Transactions 15 . Most Active Buyers 16-17 Public Company Valuation & Operating Metrics . SaaS & Cloud 125 Public Company Universe 19-20 . Recent IPOs 21 . Stock Price Performance 22 . LTM Revenue, EBITDA & P/E Multiples 23-25 . Revenue, EBITDA & EPS Growth 26-28 . Margin Analysis 29-30 . Best / Worst Performers 31-32 Notable Transaction Profiles 34-43 Public Company Trading & Operating Metrics 45-50 Technology & Telecom Team 52 1 INTRODUCTION RESEARCH COVERAGE: SAAS & CLOUD Capstone’s Technology & Telecom Group focuses its research efforts on the follow market segments: ENTERPRISE SAAS & MOBILE & WIRELESS CONSUMER INTERNET CLOUD • Analytics / Business Intelligence • Cloud & IT Infrastructure • Cloud Computing / Storage • Communication & Collaboration • Content Creation & Management • CRM & Customer Services • ERP, Supply Chain & Commerce CONSUMER IT & E-COMMERCE • Finance & Administration TELECOM HARDWARE • Human Resources • Marketing & Advertising • Software Conglomerates • Vertical Markets 3 KEY TAKEAWAYS – M&A ACTIVITY & MULTIPLES LTM M&A dollar volume continued to increase in Q1’16, representing
    [Show full text]
  • Magic Quadrant for Secure Web Gateways
    15/11/2019 Gartner Reprint Licensed for Distribution Magic Quadrant for Secure Web Gateways Published 11 November 2019 - ID G00380121 - 35 min read By Analysts Lawrence Orans, John Watts, Peter Firstbrook Rapid growth of cloud-based secure web gateway services has become a disruptive force in the market. SWG vendors are adding cloud access security broker, remote browser isolation, firewall and other advanced features to enhance the security of their platforms. Market Definition/Description The rapid adoption of SaaS applications such as Microsoft Office 365, Salesforce and others is driving enterprises to adopt cloud-based secure web gateway (SWG) services. Enterprises are rearchitecting their WANs so that web traffic from remote offices flows directly to the internet (via local internet breakout connections), instead of backhauling it over expensive MPLS links to a centralized data center. As part of this rearchitecture, enterprises are utilizing cloud-based security stacks, so that web traffic from remote offices first flows through a cloud security service (mostly SWG services) before it reaches its final internet destination. A secondary driver for the adoption of these cloud services is the need to protect mobile laptops when they are off the corporate network. We continue to see interest from enterprises seeking to integrate cloud access security broker (CASB) and SWG functionality. SWG vendors are responding to this trend, by either acquiring CASB technology or partnering with CASB providers (mainly Microsoft and its Cloud App Security service) to deliver more tightly integrated CASB and SWG solutions. CASB vendor Netskope is also addressing this trend, as it continues the development of its SWG solution introduced in 2018.
    [Show full text]
  • (12) United States Patent (10) Patent No.: US 9,191,722 B2 Alexander Et Al
    US009 191722B2 (12) United States Patent (10) Patent No.: US 9,191,722 B2 Alexander et al. (45) Date of Patent: Nov. 17, 2015 (54) SYSTEMAND METHOD FOR MODIFYING (58) Field of Classification Search ADVERTISEMENT RESPONSIVE TO EPG USPC ............................................ 725/9–11, 13,46 INFORMATION See application file for complete search history. (71) Applicant: Gemstar Development Corporation, (56) References Cited Santa Clara, CA (US) U.S. PATENT DOCUMENTS (72) Inventors: Ronald Alexander, Needham, MA (US); Stephen Dias, Sharon, MA (US); 3,440,427 A 4, 1969 Kammer Kenneth S. Hancock, Nashua, NH (US); 3.492.577 A 1/1970 Reiter et al. Elsie Y. Leung, South Pasadena, CA (US); Douglas B. Macrae, Weston, MA (Continued) (US); Arthur Y. Ng, Waltham, MA (US); Shawn P. O'Neil, Danville, NH FOREIGN PATENT DOCUMENTS (US); P. Christopher Shoaff, Westford, AU T31010 7, 1998 MA (US); Jonathon Sutton, Concord, AU 5619898 7, 1998 MA (US); Thomas E. Ward, Weston, (Continued) MA (US); Thomas E. Westberg, Stow, OTHER PUBLICATIONS MA (US); Henry C. Yuen, Pasadena, CA (US) US 5,047,897.9/1991, Strubbe et al. (withdrawn). (73) Assignee: Rovi Guides, Inc., Santa Clara, CA (US) (Continued) (*) Notice: Subject to any disclaimer, the term of this Primary Examiner — Nasser Goodarzi patent is extended or adjusted under 35 Assistant Examiner — Fred Peng U.S.C. 154(b) by 0 days. (74) Attorney, Agent, or Firm — Ropes & Gray LLP (21) Appl. No.: 14/094,573 (57) ABSTRACT (22) Filed: Dec. 2, 2013 A system and method for utilizing data stored in an EPG database for modifying advertisement information.
    [Show full text]
  • RFI Response to Securing Critical Electric Infrastructure
    RFI Response Prepared By: Ensuring the Continued Security of the United Merlin Cyber States Critical Electric 8330 Boone Blvd, Infrastructure 8th Floor Vienna, VA 22182 Merlin Cyber Confidential June 7, 2021 Energy Resilience Division of the Office of Electricity U.S. Department of Energy 1000 Independence Avenue SW, Washington, DC 20585 Attention: Michael Coe Reference: Notice of Request for Information (RFI) on Ensuring the Continued Security of the United States Critical Electric Infrastructure To Whom It May Concern, Merlin International, Inc. (Merlin) is pleased to provide the Energy Department (DOE) with the following submission in support of Ensuring the Continued Security of the United States Critical Electric Infrastructure. Merlin International is a leading provider of next-generation cybersecurity solutions that protect government and commercial organizations. Merlin offers a broad portfolio of solutions that secure the enterprise from endpoints to networks, from governance to risk management, from infrastructure to information. Combining solutions with deep industry expertise and experience, Merlin delivers the cybersecurity solutions that organizations need to protect their most critical business assets while furthering their mission. Merlin appreciates your consideration of our response. We look forward to building an enduring, long-term professional relationship, and will do our utmost to ensure complete satisfaction. Should you have any questions regarding this RFI response, please do not hesitate to contact Tom Steiner
    [Show full text]
  • Reflections of a Successful Exit
    Reflections on a Successful Exit A Post-Post-Mortem of the GreenButton Story Written By Dan Khan Image credit: thenextweb.com Earlier this year I met Suse Reynolds and Marcel Van Den Assum from The Angel Association and both asked if I’d spend some time capturing the lessons learned from the GreenButton journey from idea through to exit, an event which was relatively fresh on the startup horizon in New Zealand. I’m no stranger to startups, having built and scaled CEO, Scott Houston’s story, the more I felt the in- a few in my time, as well as seeing one through to sights and lessons of just what it took for them to get acquisition by the largest Internet Service Provider to exit, was a goldmine which could help accelerate in the UK back in 2000. I’ve been in New Zealand other entrepreneurs and early investors alike. now for 10 years, and even today count the number of similar acquisitions in our nascent community on This short-form article sharing a more personalised two hands, so GreenButton’s journey was particu- account of their journey comes off the back of more larly interesting. in-depth and objective research I carried out over the course of this year for the Angel Association of Since designing, leading, and running the first two New Zealand (supported by New Zealand Trade and programme cohorts of startup accelerator Lightning Enterprise). This article gives a brief summary of Lab over the last few years, I’ve been looking at ways some of the key lessons that I personally decided to companies can not only get a leg up starting up and draw out, but I urge readers to also review the in- getting initial seed investment, but critically, what depth work linked below to draw their own insights.
    [Show full text]
  • Top Questions to Ask Your Cloud Dlp Vendor
    Mistake #1 TOP QUESTIONS TO ASK YOUR CLOUD DLP VENDOR Data Protection remains a top priority for organizations worldwide. As new communication and collaboration norms evolve, it’s imperative to ensure your organization’s security posture is up-to-date and capable of reducing risk of data loss, exposure and exfiltration across your multi-cloud, web and email environment. This check list will provide guidance on how to choose the right data protection solution for your organization. QUESTION: CAN I PROTECT SENSITIVE DATA FROM ALL Over 20% of users have sensitive data moving THE WAYS IT CAN LEAVE MY ORGANIZATION? between cloud apps EXPLANATION: 37% of this data is involved With the explosive growth of cloud applications and in DLP violations services, combined with an increasing number of remote workers, data loss vulnerabilities are more 97% increase for personal prevalent than ever before. Security teams must be use of managed devices able to discover, monitor and protect sensitive data – Netskope Cloud and Threat regardless of location, application, and device type. Report, 2020 | 1 The top two causes of NETSKOPE ADVANTAGE: data breaches: The Netskope Security Cloud facilitates the most comprehensive monitoring and control at the activity and content level, whether users 1) Hacking / malware are on-premises or remote, on a mobile device or even using mobile from an outside party, apps, browsers, or sync clients. Moreover, Netskope lets you dierentiate (32%), and your policy enforcement between managed (corporate) and unmanaged (personally-owned) devices. Netskope is the only cloud security solution that covers all possible cloud traic regardless of 2) Insider Threats location, device, or network.
    [Show full text]
  • Communications & New Media Nov. 2014 I Vol. 28 No. 11
    Novmagazine_Layout 1 10/30/14 11:18 AM Page 1 Communications & new media Nov. 2014 I Vol. 28 No. 11 November 2014 | www.odwyerpr.com Novmagazine_Layout 1 10/30/14 11:18 AM Page 2 Novmagazine_Layout 1 10/30/14 11:18 AM Page 3 Novmagazine_Layout 1 10/30/14 11:18 AM Page 4 Vol. 28, No. 11 November 2014 EDITORIAL FROM TECH STORYTELLING The tradition of American hysteria. TO STORYSHOWING In order to stand out, communicators INCIDENTS OF ANONYMOUS 6 20 today must do more than simply tell a ATTACKS SURGE ONLINE story — they need to share it. A new study shows that more than a quarter of Americans now admit to partici-8 BREAKING INTO THE pating in malicious online activity. INTERNATIONAL CES What smaller companies can do to get 10 PR COUNCIL TOLD TO 21 noticed and make a big splash at the EMBRACE DISRUPTION Consumer Electronics Show. Panelists discussed the perils that await complacent companies at an9 WANT TO TELL STORIES? OFFER October 24 PR Council forum. A STRATEGIC NARRATIVE Tech companies should talk less about PR SHOULD LEAD CHARGE 24 themselves, and more about the world in FOR ORGANIC SEARCH which they live. PR sits in a perfect position to10 DO YOU REALLY KNOW capitalize on the emerging trend of favor- YOUR COMPETITION? ing quality of content. 25 Knowing your competitors is essential GETTING CLEANTECH to success, and effective differentiation is critical in acquiring market leadership. 43 THROUGH ITS TEEN YEARS www.odwyerpr.comDaily, up-to-the-minute PR news Cleantech is finally on steady foot- TECH’S CHANCE AT CORPORATE ing for success.
    [Show full text]
  • A Cloud-Based Consumer-Centric Architecture for Energy Data Analytics
    A Cloud-Based Consumer-Centric Architecture for Energy Data Analytics Rayman Preet Singh, S. Keshav, and Tim Brecht {rmmathar, keshav, brecht}@uwaterloo.ca School of Computer Science, University of Waterloo, Waterloo, Ontario, Canada ABSTRACT of a monthly visit by a meter reader. The time series of me- With the advent of utility-owned smart meters and smart ter readings, originally meant only for customer billing, has appliances, the amount of data generated and collected about unanticipated uses. On the one hand, customers who have consumer energy consumption has rapidly increased. Energy access to their usage data can get a real-time, fine-grained usage data is of immense practical use for consumers for view into their electricity consumption patterns. When suit- audits, analytics, and automation. Currently, utility com- ably analysed, this can reveal potential cost savings and cus- panies collect, use, share, and discard usage data at their tomized guidance on the benefits from energy conservation discretion, with no input from consumers. In many cases, measures, such as installing insulation, solar panels, or pur- consumers do not even have access to their own data. More- chasing energy-efficient products. On the other hand, this over, consumers do not have the ability to extract actionable same data stream can reveal private information about the intelligence from their usage data using analytic algorithms customer, for example, when they are home and when they of their own choosing: at best they are limited to the analy- are not, the appliances they own, and even, in some cases, sis chosen for them by their utility.
    [Show full text]