OK – so that’s probably not the perfect headline to be announced by anyone who whistles through their teeth…
Been having some interesting conversations recently around the idea of zero trust security; primarily why there was ever anything but zero trust in the first place?
An obvious answer is that it suited the limitations of an old-school security architecture. A basic firewall, by definition, lets nothing or everything through it. So, unless you provide an element of trust, it would simply have blocked EVERYTHING. Pretty secure – at the time – but not massively productive… And, honestly, I’ve never locked myself out of the network by accident when testing firewalls in the past – just a squalid rumour -)
Now, of course, that ‘perimeter’ is bypassed c/o any number of alternative ways to “leave the building”, via Azure, AWS or whatever. VPNs obvious provide secure paths between two given endpoints, but how many people do you know who say “I love my VPN connection”? That’s not to say there aren’t great solutions out there – I’ve worked with some of them – but then there are the others that we won’t air in public…
All of which makes today’s conversation with Symantec, and its acquisition of Luminate, all the more interesting. I had a rather excellent update chat with Symantec very recently, where the slimmed-down, focus-sharpened, platform-based (Integrated Cyber Defense) approach it now employs, makes huge amounts of sense. Many times in this blog I’ve talked about the confused security industry and even more confused IT decision-makers within the enterprise, scratching their heads while thinking they need to acquire and integrate 14 products from eight different vendors into their existing strategy and setup.
We all know this does not – and cannot – work. Which is why a platform-based approach is the only away forward. Like a house built with no foundations, a security strategy based around loosely tying several arbitrary products together, does not stop the big bad wolf from blowing the house down.
So, Luminate could be classed, I guess, as the latest building block in this reconstruction project (which has had full planning permission granted). The idea behind Luminate is to create a zero trust application access architecture without traditional VPN appliances. It is designed to securely connect any user from any device, anywhere in the world to corporate applications, whether OnPrem, or in the cloud, while cloaking all other corporate resources. And there are no agents – and, ask any football manager, no one likes agents if they can get away without them! Again, rather like VPNs, I’ve worked with agent-based technologies that are so transparent they work perfectly. And then there are the others – AKA “how intrusive can you get?”. So, in terms of speeding up on-boarding of applications securely, the Luminate approach makes a lot of sense, but especially more so as part of an integrated platform, a point made by Gerry Grealish, Head of Product Marketing – Cloud & Network Security Products – at Symantec.
It also sounds like a good test project in the making -)
Anyone out there right now could be more than excused for thinking we’re drowning in security start-ups; too many “me too” vendors trying to resolve the same perceived problems – niche or broad.
Recently I met with the affable Liz Rice of Aqua Security – reverse cue the drowning gag -) to find a relatively early stage company that actually has.a more individual focus than most – in this case securing containers and notably the Kubernetes environment. This is a smart move as Kubernetes is beginning to rule the container world (no “shipping” figures here!) – see my forthcoming follow-up report with Densify for evidence of this. The point is that the DevOps community, who love Kubernetes, are not generally immersed in security. They want speed and flexibility; security – think of any gate, door, wall – just potentially – or deliberately – gets in the way. It’s the same scenario I’ve encountered over the decades when performing network optimisation testing and how to secure that network without compromising on the performance improvements being generated – it’s not a trivial task.
Aqua’s starting point is looking at the typical approach to container security – studying logs to identify malicious activity, raising alerts and stopping the machines – i.e. only after the proverbial horse has bolted, possibly weeks or months ago. As container adoption rates surge, and – additionally – cloud-native (gotta get the “c” word in there) infrastructure evolves to include Container-as-a-Service (CaaS), the security tools need to move in the same direction. A recent report from Forrester suggests that “vendors in or adjacent to the container ecosystem are all racing to show that they have relevant solutions for enterprise customers” and that enterprises should “explore both container-native and traditional security vendor solutions – innovations are coming fast and furious from both camps.” It’ll be interesting to see who wins the race, but Aqua is certainly going round the track in the right direction!
So I applaud Aqua for its focus here. Its bottom line is that a company should get the DevOps and security teams together in the same room (real or virtual) and work together to identify the potential attack vectors and assemble a container security program that is proactive in identifying and blocking potential threats. As I said, It is a reality that more enterprises are deploying containers and other tools to help build and ship applications faster – solutions designed to be easy-to-use and to improve developer agility – not with production deployments and associated security requirements in mind. Aqua’s view is right there with my own – a solution is not to slow deployments down, it’s to automate the operations and security processes around these tools so everyone wins (and gets longer holidays).
A lot of the work I’ve been doing over the past 12-18 months has been around unifying security with the rest of IT (i.e. as it should have been from the start) and thereafter automating as much of it as possible, in order to remove the “Friday afternoon error syndrome” and this focus is going to take a massive step forward this year (but I can’t talk about it right now!) so Aqua’s approach definitely feeds in that direction – I look forward to furthering the Aqua story in the near future.
Of course, a lot of end user companies out there trying to understand what “digital transformation” actually means (hopefully not as painful as Kodak found it in their own way), let alone the bringing together of “islands of IT” and automating what can be automated, need HELP. I also recently met with Mark Cook, Group CEO of Getronics, a company wot is trying to bring IT into what is very soon the be the next decade – (argh – where has the rest of this century gone – I still remember the cheap Chinese fireworks I bought to celebrate the millennium shooting off at shin height around the garden…?).
The old cliché about businesses focusing on their core business and not turning into IT shops (if you make biscuits, make and market biscuits, not Windows 10 and endpoint security) has never rang louder and more true, as many traditional companies are struggling or going under – cue more drowning gags. While the cloud is marketed as making life easier, that’s only true if you know how to manage it, as my recent report for Densify showed – some of the costs that companies are incidentally racking up are frankly shocking. So it will be interesting to see how the likes of Getronics can help get companies up to speed on their IT – in all aspects – even as the next tech start-up emerges; oh, and there’s the next – and the next… just to make that vendor/tech decision-making process all the harder (albeit often in a good way).
It’s the same challenge for investors looking to back the right tech. One interesting diversion for Getronics is its recently established Investment Services Group. This is aimed at providing the private equity community with a combination of services – digital evaluation, transformation and management thereof, that are designed to rapidly assess, value and unlock the value of acquisitions, end to end – from initial due diligence to final exit. Given my involvement in such areas, I’m especially interested in how this pans out, so here’s yet another case of “let’s revisit” and “watch this space”.
One common theme with recent product tests and vendor briefings and that is – automation.
Not that there’s anything new here per se; back in the mid-90s I remember working on an extensive project with the splendid Roger Green of Boole & Babbage (long since part of BMC – the company that is, not Roger) to fully automate the network fault finding and remediation thereof.
Possibly in the interests of keeping a million networking SEs in work still, automation seemed to take something of a back seat (computerised cars gag?) for a while, but now it’s back with a bang (i.e. what happens when you get one human driver on the same road as otherwise computerised cars) as I noted in an excellent briefing with Mike Wood, now of Apstra. As Mike himself said, I’ve got such an extensive collection of his biz cards over the years, I could probably decorate my walls with them, but then he’s far from the only one – and all you others, you know who you are!
Apstra has defined “intent-based networking” with the aim of fully automating the whole network service lifecycle, which kind of brings us full circle from those mid-90s days with B&B. Key to this is the validation of what you create, before you get it catastrophically wrong. Definitely a company to keep an eye or two (one, if you’re an octopus) on and I will be chatting more about Apstra, post deep dive demo in Feb. Meantime, it will be interesting to monitor how many other vendors decide that they too are “intent-based networking” oriented -)
Meantime x2, back on the automation front, I’ve just finished a test report on Densify (the artist formerly known as Cirba, as we all say) whose multi-cloud/hybrid management and optimisation tech has recently become fully automated, thanks to Cloe. Now, I haven’t met her, but I have seen her in action and what she can do with one line of code is nobody’s business… Rather than wax lyrical about the tech here, far better an option is to take a look at the report itself (it’s got plenty of pictures between the words):
And please do proffer feedback – that’s what these blogs are all about! More to come on Densify this quarter, so be watching of this space…
And finally, a Happy New (Brexit – what’s that?) Year to all!
Two and a bit years ago – I should remember, it was on my birthday! – I was presenting a panel debate on the latest Cybersecurity deterrents. With four vendors and two consultants on the panel, it was the general consensus that deciding exactly which combination of products and services a company needed to invest in was more difficult than sorting out Brexit…
One of the issues was: exactly what replaces what, and what compliments what? The problem here was that few of the products on offer actually appeared to truly replace and consolidate existing products – and haven’t we all spent enough on different security products already? The concerns here are two-fold; not just CapEx and OpEx, but the complications of integrating and managing that increasingly large portfolio of products. One configuration slip and you leave a gaping security hole the size of the NHS defence strategy.
So, it was with a combination of pleasure and relief that, at another event (both organised by Mark “Mr Netevents” Fox) I rejoiced in the company of JASK (even if the name grates – Just ASK, in case you just ask) and one particular slide from a Citi Research CIO report, which showed individual vendors replacing incumbent vendors and – in some cases – more than one! In the case of JASK – which itself consolidates security alerts and feeds from multiple platforms – it showed the company displacing IBM QRadar AND Splunk. And it gets better for this Yorkshire – the commentary on why it achieved this? Saving MONEY!!! Shock heading – IT SAVES MONEY -) Not before time…
At the same event, another vendor – this time in the SD-WAN space – Versa, has a similar take on its own market, that of cutting out the middle man and doing it all itself. The Versa solution is a complete SD-WAN stack, all software, that even includes the security element. One to definitely get my paws on. This is a valid message that Versa is promoting as, post WanOp market (as defined by Gartner/Riverbed), that same level of confusion has arisen, as in: “what do I keep, what do I chuck, what else do I need to buy?”. The Versa answer is – “buy our product, end of story”, or pretty much so. Of course, I have clients wot can add still to the Versa offering, but that’s another story…
And while we’re on the subject of feature consolidation, another company I’ve been following recently, Avi Networks, in the – what was historically – Load-Balancing/App Delivery Controller market, is simplifying the decision-making process too. In addition to load-balancing traffic in any direction on pretty well any platform – real, virtual, container – locally, and globally, multi-cloud etc – it combines now with Istio to create what it calls a Universal Service Mesh. Basically, Istio manages a network of microservices that make up such applications and the interactions between them. As a service mesh grows in size and complexity, its’ requirements can include discovery, load balancing, failure recovery, metrics, and monitoring. A service mesh also often has more complex operational requirements, like A/B testing, canary releases, rate limiting, access control, and end-to-end authentication. Istio provides behavioural insights and operational control over the service mesh as a whole. So, we now have macro and micro control of applications, in addition to identity-based security, real-time application monitoring, and enterprise-grade authentication and authorisation, as well as the Web App Firewall (WAF) security that Avi already offers.
Seems like the decision-making processes in IT are finally becoming streamlined – or is this wishful thinking? Either way, sounds like a good IT New Year’s Resolution – must consolidate…
Ah – tomorrow – the dreaded Black Friday, yet another unwanted import from Trumpland.
But, JASK – already previously subjected here to the blogging treatment – has some security advice to offer as they, rightly, note that the criminal fraternity have a great window of opportunity to take advantage of the online buying frenzy.
The company advises that stealing from and defrauding shoppers too excited by the lure of a huge discount to be aware they are being scammed, is accompanied by very focused campaigns, planned well in advance and that follow to the date and specific product detail offers that shoppers may publish in order to orchestrate and disguise their attack campaigns. JASK also notes that said malicious actors have the capability of affecting or even preventing stores operating online, but then a badly designed website/capacity/redundancy is equally capable of achieving the same result -)
Rod Soto, Director of Security at JASK, suggests a few damage limitation methods, such as using a credit card, rather than a debit card, so there are at least some safeguards, shop at familiar (to you) sites and use common sense where an offer appears too good to be true and don’t click on that link!
Two more pieces of advice are equally applicable to general online activity – one, never repeat your passwords in other online shops and use password vaults to generate strong and random passwords (and don’t use your phone browser) and two, make sure your computer is up to date with patches and security fixes.
I have one further piece of advice to proffer: forget stupid Black Friday shopping and just go down the pub instead…
I remember long ago, in an unlikely setting for a bleeding-edge test-labs – an old winery surrounded by vines where the only “blood” came from crushed grapes – yes, my old French test labs, where we created the world’s first globally load-balanced, server/content distribution system.
OK, so it was all simulated, but it worked. I won’t reveal the vendor concerned, but it never went into production as tested – ahead of its time? And why didn’t I copyright it????
Fast forward well over a decade and we have a similar situation regarding the cloudy IT scenario. Why have one cloud when you can have several? Then if one turns black you still have another with a silver lining… But then how do you load-balance them? Not even Carol Kirkwood knows how to do that… And our American readers don’t get that reference -)
So, along comes the knight in shining armour to match that silver-lined cloud, in the form of Avi Networks, who I met up with recently at IP Expo and was suitably impressed by. Its solution, logically, is SaaS-based and provides web app firewalling and service mesh for containers, as well as load-balancing and global server load-balancing across a multi-cloud environment. Avi rightly argues that appliance-based L-B solutions are not designed for the public cloud; correct, in the same way that Dartmouth’s Victorian streets were not designed for car parking, something I have first-hand experience of. If only I could park in the cloud…
The Avi solution, then, comes as a cloud-managed service; a true SaaS-based L-B controller, meaning very fast deployment, no field engineers required to be onsite across the globe (bang go your airmiles guys!) and adds/changes are simple as, so OpEx is bound to be lower too.
If only I’d taken out that copyright, would I be due royalties? Regardless, it would be most interesting to get my virtual hands on said virtual solution to see how closely it resembles my own creation!
So, in recent blogs I’ve talked about all things migration-wise; Windows migration issues and the testing thereof, migrating to the cloud, even migrating the cloud back to OnPrem, from OnPrem to VDI (in the cloud) and all stops in between seemingly…
Shortly, my focus will be turned by to the issue of cloud migration with a look at Densify’s service solution but, meantime, I also decided to migrate my own website, aka a makeover, and have just put the report on Rimo3’s ACTIV Windows migration solution, as blogged about recently, up there, so check out the new look: www.broadband-testing.co.uk
Interestingly, for the vendors concerned, my record on testing migration products – starting with a Netware 4.1 migration tool company, whose name escapes me (and Wikipedia) currently – and that vendor then getting acquired by either the obvious candidate, or a suitable suitor, is very high, so watch this space!
Unsurprisingly, whatever the IT genre and whatever the weather, cloud is always on the horizon right now.
One of several top meetings I had last week within IP Expo’s confines was with Morteza Esteki of Liquidware (glamorously assisted by Jane Rimmer of Hiviz Marketing of course, from an original idea by Declan “when’s my next guitar lesson?” Waters of Water Comms). One issue that many IT departments are finding themselves in right now, is in feeling they are potentially trapped within a world of VMware, Citrix, Google, Amazon, Azure… you get the picture.
For the VDI crowd who chose the thin client route many moons ago, the potential migration to the cloud/DaaS world (one mainframe substitute to another?) can, I guess, be a little scary – two IT worlds that make lots of sense, meshing logically but… What Liquidware offers is a platform-agnostic helping hand. For example, its Stratusphere UX product, sits atop and provides that all important end-to-end visibility of the combo of physical, virtual and cloud-based workspaces – as a single entity. Think migration, performance assessment and optimisation, as well as problem solving and – ideally – avoiding those problems in the first case. Endpoint client support is also open – Windows, Mac and Linux are all supported (not sure about Oric Atmos and ZX Spectrum though…).
As an example of real-world use of this tech, legal expenses insurance company DAS, in the UK, has recently taken on Stratusphere UX and is looking to put it to use it in areas such as:
⦁ The on-boarding of VDI from home.
⦁ Windows 10 testing and on-boarding.
⦁ Scaling the environment.
⦁ To provide a real time dashboard for BAU (business as usual) incidents and alerts so they are ahead of the game should an issue arise – fix it before it’s a problem!
⦁ Troubleshooting for users who have reported issues from a previous date, pulling historical info that will prove useful when working on longer standing issues.
⦁ Measuring Network and SAN performance during an issue (let’s not forget good old SANs – they won’t be disappearing anywhere quickly!).
Timing isn’t always my strong point, but there’s a definite alliance of technology here, given that I’m involved in very complimentary product projects with the likes of Fedr8 and Rimo3 in the UK and Canada-based Densify, not to mention some top secret due diligence on tech breakthroughs that impact on all of these areas by a mad professor from West Virginia (oops, too late).
Maybe I’m unintentionally assembling the next IT dream team?
Last week’s IP Expo at EXCEL wasn’t all bad news; we escaped the first night into proper London, to a brewery disguised as a pig restaurant and then, naturally, to a (posh) curry house. Well, it is London, not Heckmondwike…
Focus of said evening was Cloudistics, the company that created “cloud for the paranoid”; i.e. it’s a private OnPrem cloud – the idea being all of the scalability benefits while maintaining control. I guess one of the issues – however well thought-out the concept (and it is well thought-out) – you’ll always get with a “Cloudistics” trying to change the world is the “Cloud-who?” response the CFO proffers when smart IT geek says “we need to go in this direction”. That’s why we often talk about ” a big guy” needing to onboard the concept in order to validate a new market (or Goodwood), usually in the eyes of a Gartner or IDC. Well, let’s face it – Gartner. Now, this isn’t right or honourable or morally sound, but it is reality!
Now let’s go flip-side; you are a multi-billion dollar global vendor, doing very nicely, thank you, in a range of markets, but ideally needing an angle to get yourself into the emerging markets the likes of Cloudistics are creating. Well, sometimes the stars do align – in the guise of Lenovo in this instance. Now, for those of you who still think Lenovo = laptops, the DC/storage sector has been an increasingly major play for them in recent times. However, for Lenovo to create their own, in-house “Cloudistics” requires a leap of faith, as well as many person-years of development.
So, in a simple ceremony, with boardroom preferred to Westminster Abbey, the two have entered an exclusive relationship – meaning both get what they want. Yet another example of Common Sense as a Service. Lenovo provides the boxes, the global reach and the “big name brand”, Cloudistics provides the youthful makeover and a new lease of life. For the record (or mp3) the Lenovo-labelled product is called “ThinkAgile CP Series” – more snappy, corporate marketing at work there – but it promises to be right, right good (technical term), and definitely a keeper, kind of private cloud in a box (maybe comes delivered with optional “install pizza”?). As one Dell guy said once at a Netevents, we’re looking for our customers to have “a pleasant, out of the box experience”. You don’t hear that kind of language in Barnsley… And, talking of food, here’s the real story from that encounter – Chris (all-US boy) Myhill of Cloudistics declared the ribs at Cinnamon Kitchen to be “the best he’s ever tasted”. The Texan fan club has disbanded…
Meantime, I shall watch the Cloudistics/Lenovo development with a great deal of interest and hopefully get my paws on the tech. We might not be able to control the weather, but it looks like we can now control clouds at least 🙂
Me and Load-Balancers (the artist wot became known as the Application Delivery Controller at some point in its life, even though it always did this anyway) go back a long way; 20 years basically, when “cloud” was merely a snowflake in the natural world of IT.
Think Alteon and Arrowpoint – kind of wild-west country where L-Bs were concerned; inventing concepts such as reverse proxy, sticky cookies (I wonder if Cadbury as was ever invested in this tech?) and global, load-balanced content delivery systems (actually created the world’s first in our old labs).
One issue with the classic, H/W-based solutions was that, eventually they ran out of silicon puff and had to be re-engineered, ground up. This was great for repeat test work but patently (pun there?) not the future. Fast forward to the cloud era and meeting with AVI Networks at IP Expo in the culture desert that is EXCEL in East London, and the tech has most definitely been brought bang up to date. Instead of investing “X” in an L-B solution (well, X+Y as companies always wanted a redundant stack) and then trying to get your $$$ wotsits out of it, the idea here is what AVI flashily (well someone has to employ marketeers) calls Intent-Based Application Services (IBAS). In English, a business works out what it needs in terms of handling its traffic requirements/SLAs etc and then auto-provisioning takes over, scaling up or down as necessary to handle volume efficiently. Common Sense as a Service…
AVI is rightly aiming high with this solution; multi-cloud environments, xSPS, Times Fortune Top 500 or whatever it’s called, but essentially those whose need is greatest and loss is most painful. Talk with AVIs David Moss, whose CV is almost a mapping of my vendor clients since the early 90s, did turn to how an AVI-Lite might be achievable, so watch this space on that one. Suffice to say, L-B/ADC is alive and well in the cloud era. The snowflakes have melted long ago…