IAAS Reference Architectures: For AWS

This document provides guidance on architecting security for cloud-based web applications using the leading WAF solution  in the market today, Imperva SecureSphere, along with other Imperva security solutions for Amazon Web Services (AWS). Leveraging this document and the Imperva family of products, data center, IT and Operations Architects can now secure their web applications whether those are on-premise, in a virtual environment or in the most popular public cloud, AWS.

Spotlight

CISO Executive Network

CISO Executive Network is the fastest growing peer-to-peer network of information security, IT risk management, and audit & compliance executives.

OTHER ARTICLES
Enterprise Mobility

Ericsson’s 5G platform adds unique core and business communication capabilities

Article | June 15, 2023

To leverage the full benefits of 5G and cloud native investments, orchestration and automation are now a critical matter of business. Ericsson’s 5G platform is now being strengthened with new solutions that enable smarter business. David Bjore, Head of R&D and Portfolio, Business Area Digital Services, Ericsson, says: “Through our core networks, service providers can get to market faster and can capitalize on new services, through leading consumer and enterprise communication and monetization solutions, enabling them to stay ahead in the race for 5G business, today and tomorrow.”

Read More
Network Infrastructure, Network Management

Ericsson researchers top 4.3Gbps downlink on 5G millimeter wave

Article | July 27, 2023

With a technical specification comprising 8 component carriers (8CC) aggregating 800MHz of millimeter wave spectrum, Ericsson engineers achieved delivery rates of 4.3Gbps – the fastest 5G speed to date. Ericsson Radio System Street Macro 6701 delivered data with downlink speeds of 4.3Gbps over-the-air to an industry partner test device during interoperability testing. The commercial solution, including network and terminal support, will be available to 5G consumers during 2020.

Read More
Network Management, Network Security

Intelligence Brief: How is 5G changing network ownership?

Article | July 17, 2023

5G necessitates a different network strategy. Unlike previous generations, 5G deployment is not only about adding more sites and increasing backhaul capacity. In fact, it is more about rethinking the whole network architecture to make it agile. The high capacity requirements of 5G will necessitate the use of small cells in cities and areas of high footfall (such as airports) to complement national macro networks. Private networks (for example to sell into enterprise customers) and the concept of a neutral host (such as for sports stadiums) are further examples of diversification.

Read More

5G Needs Edge Computing to Deliver on Its Promises

Article | February 11, 2020

Edge computing will be a key enabler for 5G to deliver on its bandwidth and latency requirements. In the short term, it can enable developers to provide a “5G experience” at scale. In the long term, it will be necessary to optimise customer experience for real-time, data hungry applications. Telecoms operators have reported that 5G in the lab can deliver network speeds that are more than twenty times faster than LTE1. But, this does not reflect the experience of the average user. And 5G roll out in many countries will be limited in terms of coverage and capabilities for several more years, given that the ultra-low latency standards will only be revealed in 3GPP’s Release 16 later this year. This is why it is likely that, for 5G to deliver on its promises, it must be coupled with edge computing.

Read More

Spotlight

CISO Executive Network

CISO Executive Network is the fastest growing peer-to-peer network of information security, IT risk management, and audit & compliance executives.

Related News

Report reveals significant rise in exploits targeting three major IoT vulnerabilities

IoT News | August 16, 2018

Cybersecurity solutions provider Check Point Software Technologies’ latest Global Threat Index for July 2018 reveals a significant rise in exploits targeting three major IoT vulnerabilities. According to the company, these attacks, which are linked to the propagation of IoT malware like Mirai, IoTroop/Reaper and VPNFilter, have more than doubled since May. The top 10 ‘most exploited’ list includes MVPower DVR router Remote Code Execution at fifth position; D Link DSL-2750B router Remote Command Execution at seventh; and Dasan GPON router Authentication Bypass at tenth position. The data shows 45% of organisations around the globe getting affected by attacks targeting these vulnerabilities, compared with 35% in June 2018 and 21% in May. These vulnerabilities allow attackers to execute malicious code and gain remote control of the target devices. July’s top three ‘most wanted’ malware includes: Coinhive, Cryptoloot, and Dorkbot. The month’s top 3 ‘most vulnerabilities’ include: Lokibot, Triada, and Guerilla. Maya Horowitz, threat intelligence group manager at Check Point, said: “Known vulnerabilities offer cyber-criminals an easy, relatively frictionless entry point into corporate networks, enabling them to propagate a wide range of attacks. IoT vulnerabilities in particular are often ‘the path of least resistance’, as once one device is compromised, it can be straightforward to infiltrate further connected devices.

Read More

Oracle Launches Its Blockchain Cloud Service to GA

eWeek | July 16, 2018

Oracle claims its blockchain cloud service is the only one on the market that provides users with a development platform to build their own networks. Oracle, in its latest step to move its franchise to cloud services, launched its Oracle Blockchain Cloud ServiceJuly 16 to general availability. It has been in the development stage for more than a year. The service allows organizations to build blockchain networks to enable more secure and efficient transactions and to track goods through supply chains on a global scale. The use of blockchain’s digital ledger is a growing trend because it offers a new level of security in business transactions that wasn’t available previously. With security at the top of everybody’s list for finding new solutions fast, this idea has caused a lot of interest in a short period of time. The high-level is this: Blockchain is all about trust—namely, trust among vetted partners in business transactions. Blockchain is a type of data structure that enables identifying and tracking transactions digitally and sharing this information across a distributed network of computers, creating a trusted network. It's All About Peer-to-Peer Networks. Blockchain originally was designed to be the underlying peer-to-peer network support structure for transactions made in Bitcoin or another cryptocurrency. Constantly growing as “completed” blocks (the most recent transactions) are recorded and added to it in chronological order, a blockchain allows market participants to keep track of digital currency transactions without central record-keeping. Each node (a computer connected to the network) gets a copy of the blockchain, which is downloaded automatically. Early adopters of Oracle's blockchain cloud service include Arab Jordan Investment Bank, CargoSmart, Certified Origins, Indian Oil, Intelipost, M2O, Neurosoft, Nigeria Customs, Sofbang and Solar Site Design.

Read More

What Is SDNFV & Why Should You Use It?

June 14, 2016

Industry perspectives on the relationship between network functions virtualization (NFV) and software-defined networking (SDN) are evolving, and for the better. NFV has long been championed by telcos as a way first to reduce capex by eliminating proprietary appliances, and more recently as the key to virtualizing much of their operations. SDN was described as orthogonal and complementary, but not essential for NFV; neither SDN nor NFV depended on the other.

Read More

Report reveals significant rise in exploits targeting three major IoT vulnerabilities

IoT News | August 16, 2018

Cybersecurity solutions provider Check Point Software Technologies’ latest Global Threat Index for July 2018 reveals a significant rise in exploits targeting three major IoT vulnerabilities. According to the company, these attacks, which are linked to the propagation of IoT malware like Mirai, IoTroop/Reaper and VPNFilter, have more than doubled since May. The top 10 ‘most exploited’ list includes MVPower DVR router Remote Code Execution at fifth position; D Link DSL-2750B router Remote Command Execution at seventh; and Dasan GPON router Authentication Bypass at tenth position. The data shows 45% of organisations around the globe getting affected by attacks targeting these vulnerabilities, compared with 35% in June 2018 and 21% in May. These vulnerabilities allow attackers to execute malicious code and gain remote control of the target devices. July’s top three ‘most wanted’ malware includes: Coinhive, Cryptoloot, and Dorkbot. The month’s top 3 ‘most vulnerabilities’ include: Lokibot, Triada, and Guerilla. Maya Horowitz, threat intelligence group manager at Check Point, said: “Known vulnerabilities offer cyber-criminals an easy, relatively frictionless entry point into corporate networks, enabling them to propagate a wide range of attacks. IoT vulnerabilities in particular are often ‘the path of least resistance’, as once one device is compromised, it can be straightforward to infiltrate further connected devices.

Read More

Oracle Launches Its Blockchain Cloud Service to GA

eWeek | July 16, 2018

Oracle claims its blockchain cloud service is the only one on the market that provides users with a development platform to build their own networks. Oracle, in its latest step to move its franchise to cloud services, launched its Oracle Blockchain Cloud ServiceJuly 16 to general availability. It has been in the development stage for more than a year. The service allows organizations to build blockchain networks to enable more secure and efficient transactions and to track goods through supply chains on a global scale. The use of blockchain’s digital ledger is a growing trend because it offers a new level of security in business transactions that wasn’t available previously. With security at the top of everybody’s list for finding new solutions fast, this idea has caused a lot of interest in a short period of time. The high-level is this: Blockchain is all about trust—namely, trust among vetted partners in business transactions. Blockchain is a type of data structure that enables identifying and tracking transactions digitally and sharing this information across a distributed network of computers, creating a trusted network. It's All About Peer-to-Peer Networks. Blockchain originally was designed to be the underlying peer-to-peer network support structure for transactions made in Bitcoin or another cryptocurrency. Constantly growing as “completed” blocks (the most recent transactions) are recorded and added to it in chronological order, a blockchain allows market participants to keep track of digital currency transactions without central record-keeping. Each node (a computer connected to the network) gets a copy of the blockchain, which is downloaded automatically. Early adopters of Oracle's blockchain cloud service include Arab Jordan Investment Bank, CargoSmart, Certified Origins, Indian Oil, Intelipost, M2O, Neurosoft, Nigeria Customs, Sofbang and Solar Site Design.

Read More

What Is SDNFV & Why Should You Use It?

June 14, 2016

Industry perspectives on the relationship between network functions virtualization (NFV) and software-defined networking (SDN) are evolving, and for the better. NFV has long been championed by telcos as a way first to reduce capex by eliminating proprietary appliances, and more recently as the key to virtualizing much of their operations. SDN was described as orthogonal and complementary, but not essential for NFV; neither SDN nor NFV depended on the other.

Read More

Events