Current encryption and security will be null and void by 2030 at the latest – TelecomTV

Even if you could afford it, you couldnt go out and buy a quantum computer today because theyre a long way from being commercially available. However, that doesnt mean the machines dont exist they do. It is known that that there are such devices in the laboratories of commercial companies, in university research labs and military installations in various countries including the US and the UK, and the chances are that China, Russia and other countries also have them.

However,despite the intense international race to be the first to develop fully-functioning, full-sized quantum computers, currently, as far as practical applications are concerned, the experimental models are generally too small to outperform traditional electronic super-computers. That said, some have beendeveloped to the point that they can be used to solve some heavy-duty tasks, such as integer factorisation.

In essence, integer factorisation this is the decomposition of a composite number, which is a number can be made by multiplying other whole numbers. For example, 6 can be made from 2 x 3 and 15 can be made from 1, 3, 5 and 15, and thus is a composite number. When composite numbers become very large, no workable non-quantum integer factorisation algorithm has yet been found (although one might actually exist). The field of research is important because many cryptographic algorithms are based on the extreme difficulty of factorising large composite integers, and this has direct relevance and security of RSA public key encryption and the RSA digital signature.

Three years ago, a team of French researchers factored a 240-digit number that took 900 core-years of computing power to achieve, and from that experiment estimated that the factorisation of 1024-bit RSA modulus would take 500 times as long in other words, 450,000 core years of computing. However, quantum computers can perform such calculations very quickly. A quantum computer utilising superposition, interference, and entanglement could crack and render instantly obsolete the ubiquitous RSA encryption algorithm in a matter of seconds. Soon, keeping information secret will become many orders of magnitude more difficult.

The qubit is the fundamental data processing element of a quantum computer and researchers are building machines with more and more of them whilst simultaneously developing error-correction methodologies that will enable the performance of longer and longer calculations. Its only a matter of time before all current encryption techniques will be rendered null and void. The general consensus within the industry is that this will happen by 2030 at the latest.

Excerpt from:
Current encryption and security will be null and void by 2030 at the latest - TelecomTV

Encrypted Phone Provider Calls It Quits After Failing To Persuade Middlemen To Roll Their Own Device Management Systems – Techdirt

from the passing-the-buck-means-having-no-more-bucks-to-pass dept

Over the past few years, international law enforcement has been cracking down on encrypted device purveyors. Were not just talking about regular device encryption, which has been mainstream for several years now. These would be specialized manufacturers that appear to cater to those seeking more protection than the major providers offer services that ensure almost no communications/data originating from these phones can be obtained from third-party services.

The insinuation is that specialized devices are only of interest to criminals. And there is indeed some evidence backing up that insinuation. But plenty of non-criminals have reason to protect themselves from government surveillance, a fact that often goes ignored as criminal crackdowns continue.

Even if theres a honest market for something international law enforcement considers to be a racket (as in RICO), the market cannot seem to sustain the continuous scrutiny of law enforcement. Another purveyor of specialty phones catering to people who desire the utmost in security and privacy has decided resellers should bear the legal burden of offering its offerings. Heres Joseph Cox reporting for Motherboard:

Encrypted phone firm Ciphr, a company in an industry that caters to serious organized criminals, has made a radical change to how its product can be used and sold, signaling an attempt by the company to distance themselves from, or perhaps cut off, their problematic customers.

How do you cut off perhaps your (previously) most valued customers? Well, in this market, you force the resellers to assume all legal liability.

Now, it is shifting that responsibility away from itself to individual resellers of the devices. The message says that for resellers to continue with new sales or renewals of customers subscriptions, they will need to run their own MDM solution. This essentially puts the management of customers much more in the hands of the resellers and not Ciphr.

Offloading mobile device management (MDM) to third party resellers perhaps provides Ciphr with plausible deniability. If resellers want to have something to sell, theyll need to take direct control of device management to ensure end users dont install apps that might compromise security as well as controlling distribution of software updates and other necessities of cell phone service.

While this move may have ultimately provided Ciphr with plausible deniability when the feds came knocking, it immediately appears it wont be profitable for Ciphr. The offloading of device management to resellers appears to have severely harmed reseller desire for Ciphr phones, as Joseph Cox notes in his follow-up article.

Ciphr will cease operations at the end of the month, according to the message. The reason was that not enough resellers took up Ciphr on its plan to shift the responsibility for Mobile Device Management (MDM) away from the company itself to individual resellers.

Resellers appeared to enjoy their previous relationship with Ciphr, which allowed them to profit heavily from a demanding, but limited market. That relationship allowed Ciphr to absorb the legal liability while third parties cashed checks. Check cashing is still an option, but cashing checks now means a possible increase in legal liability. Obviously, Ciphrs biggest resellers arent on board with assuming additional legal risk.

Since theres no interest from downstream retailers in running their own device management systems, Ciphr could either sell directly to customers it has always tried to distance itself from or call it a day. It chose the latter option, which will likely end up being far less harmful to its profits than dealing with the outcome of raids, arrests, and criminal charges that may have been the end result of its continued existence.

And while it may be easy to cheer on the demise of another company that apparently catered to criminals, lets not forget every failure by device manufacturers like this one make it far easier for government entities to (falsely) claim secure devices and end-to-end encryption only benefit criminals. For that reason alone, we should be concerned about companies like these that shut down rather than offer products that could possibly fend off sustained attacks by state-sponsored hackers and make normal surveillance tools irrelevant.

Filed Under: criminals, encrypted phones, encryptionCompanies: ciphr

Go here to read the rest:
Encrypted Phone Provider Calls It Quits After Failing To Persuade Middlemen To Roll Their Own Device Management Systems - Techdirt

Encryption Software Market Global Industry Research Analysis & Forecast 2022 to 2030 Muleskinner – Muleskinner

United State- Report Ocean (150+ countrys markets analyzed, function on 1,00000+ published and forthcoming reports every year.]presents a research report and top winning strategies for theEncryption Software Market. Best subject matter experts, researchers, and market research professionals organized this report in order to ensure that the information in it is compiled from the most authentic sources and that the forecast is of the highest accuracy. To forecast market growth, specialists employ a variety ofmethodologies and analytical approaches, including S.W.O.T. (analysis methods), P.E.S.T.E.L. analysis, and regression analysis. TheEncryption Softwarestudy also looks at the various regulations and policies that the firm has implemented. This report discusses the industry in terms of research technology and precise prospective utilization, innovation, and future advancements in theEncryption Software Market.

The global encryption software market size is anticipated to reach USD 20.44 billion by 2026 according to a new research published by Report Ocean.

Request To Download Sample of This Strategic Report :-https://reportocean.com/industry-verticals/sample-request?report_id=5148

The report Encryption Software Market Share, Size, Trends, Industry Analysis Report By Deployment Model (On-Premise, Cloud-Based);

By Application (File Encryption, Disk Encryption, Database Encryption, Cloud Encryption, Communication Encryption, Others);

By Organization Size (Large Enterprises, Small and Medium Businesses);

By End-User (BFSI, Healthcare, Aerospace and Defense, Government and Public Utilities, Retail, Others);

By Regions, Segments & Forecast, 2019 2026 provides strong market indices and taps on future growth parameters.

In 2018, the BFSI segment dominated the global market in terms of revenue. North America was the leading contributor to global revenue in 2018. An urgency to protect critical data and growing number of data lapses has boosted the adoption of encryption software. The widespread growth of mobile devices and increasing trend of BYOD further support the growth of this market. The rising spread of virtualization, cloud and big data analytics has supported market growth over the years. Growing investments in technological advancements by vendors, coupled with growing demand for cloud-based encryption software would accelerate the growth of encryption software market during forecast period. However high costs related to advanced encryption solutions and an awareness shortage among small and medium enterprises hinder growth. Growing demand from developing economies and technological advancements are expected to provide several growth opportunities in the future.

North America generated highest revenue for market in 2018 and is expected to lead the global market throughout forecast period. The increase in number of cyber-attacks and growing number of data breaches drive the market growth. A growing trend of BYOD, IoT, big data analytics and virtualization evinces the need of encryption software for data protection and data loss. A rising penetration of mobile devices and technological advancements bolster growth in the region. A greater spending on data protection in BFSI and defense sectors in the region promotes growth in the region.

A rushing request from emerging economies, expanding adoption of the software by BFSI sector and flooding demand for cloud-based encryption solutions are factors boosting growth of product during forecast period.

Enormous walks in strong innovation, data loss among enterprises has made encryption software very crucial for safe data transmissions. Furthermore, as undertakings are pushing forward with distributed computing, the product has become all the more important to prevent data slips by safeguarding touchy information.

Request Full Report :-https://reportocean.com/industry-verticals/sample-request?report_id=5148

Asia Pacific is expected to display highest CAGR during forecast period owing to urging need for data integrity at all levels in the industries in developing countries of the region.

The companies include Microsoft Corporation, Symantec Corporation, IBM Corporation, EMC Corporation, CISCO Systems Inc., Intel Security, Check Point Software Technologies Ltd., Oracle Corporation, Trend Micro, Inc., and Sophos Group Plc. among others.

Report Ocean has segmented the encryption software market report on the basis of deployment, application, organization size, end-use and region.

Encryption Software Deployment Model Outlook (Revenue USD Millions 2015 2026)

On-Premise

Cloud- Based

Encryption Software Application Outlook (Revenue USD Millions 2015 2026)

File Encryption

Disk Encryption

Database Encryption

Cloud Encryption

Communication Encryption

Others

Encryption Software Organization Size Outlook (Revenue USD Millions 2015 2026)

Large Enterprises

Small Enterprises

Medium Enterprises

Encryption Software End-user Outlook (Revenue USD Millions 2015 2026)

BFSI

Healthcare

Aerospace and Defense

Government and Public Utilities

Retail

Others

Request Full Report :-https://reportocean.com/industry-verticals/sample-request?report_id=5148

Encryption Software Regional Outlook (Revenue USD Millions 2015 2026)

North America

U.S.

Canada

Europe

UK

France

Germany

Italy

Asia Pacific

India

Japan

China

Latin America

Brazil

Mexico

Middle East & Africa

What is the goal of the report?

Access full Report Description, TOC, Table of Figure, Chart, etc.-https://reportocean.com/industry-verticals/sample-request?report_id=5148

About Report Ocean:We are the best market research reports provider in the industry. Report Ocean believes in providing quality reports to clients to meet the top line and bottom line goals which will boost your market share in todays competitive environment. Report Ocean is a one-stop solution for individuals, organizations, and industries that are looking for innovative market research reports.

Get in Touch with Us:Report Ocean:Email:sales@reportocean.comAddress: 500 N Michigan Ave, Suite 600, Chicago, Illinois 60611 UNITED STATES Tel: +1 888 212 3539 (US TOLL FREE)Website:https://www.reportocean.com/

Read the original here:
Encryption Software Market Global Industry Research Analysis & Forecast 2022 to 2030 Muleskinner - Muleskinner

What Is TLS/SSL Offloading? – Security Boulevard

What Is TLS/SSL Offloading?97thfloorFri, 09/02/2022 07:48

A common misconception about TLS/SSL encryption is that a persons computer connects directly with a web server and information is sent directly between the two. In reality, the information can be sent to a separate machine or to a different processing device on the same machine. This process is known as TLS/SSL offloading.

Offloading works by taking on the processing load of encryption on a separate device or machine than is being used for the application processing. To configure this process, organizations route TLS/SSL requests to an application delivery control that intercepts the TLS/SSL traffic, decrypts the traffic, and then forwards the traffic to a web server. To configure end-to-end encryption, you must import a valid certificate and key and bind them to the web server.

There are two different ways to accomplish TLS/SSL offloading.

TLS/SSL termination is the simpler approach of the two. In this process, encrypted traffic is intercepted before it hits your servers and decrypted on a dedicated TLS/SSL termination device instead of the application server. Then the decrypted data is forwarded on to the application server.

TLS/SSL bridging adds another layer of security by performing extra checks for malware. Incoming data is decrypted, inspected for malicious code, then is re-encrypted and sent on to the web server. This form of TLS/SSL offloading is meant to increase security rather than reduce processing activities on the application server.

Organizations that handle a lot of encrypted data would benefit from TLS/SSL offloading so application servers can focus on their primary tasks rather than encryption. Reduced TLS/SSL workload can lead to:

Depending on what load balancer youre using, TLS/SSL offloading can also help with HTTPS inspection, reverse-proxying, cookie persistence, and traffic regulation. Attackers can hide in encrypted traffic, and the ability to inspect encrypted HTTPS traffic could save your organization from severe attacks.

Make sure your applications are running securely and efficiently by implementing TLS/SSL offloading. Offloading only works with valid certificates, so certificate lifecycle management is another crucial component of a healthy network. Make sure to keep track of all TLS/SSL certificates in use at your organization and when they expire so they dont cause a certificate-related outage.

Automate the certificate management process with machine identity management. Download our Machine Identity Management for dummies eBook to learn more about securing your applications and preventing certificate-related outages.

Alexa Hernandez

Encrypting data can introduce latency to connections because of the amount of computer processing that it requires. Thats where TLS/SSL offloading comes into play. This method can improve your page loading speeds and user experience. TLS/SSL offloading can also be used to introduce additional security checks for malware.

Off

UTM Campaign

Recommended-Resources

*** This is a Security Bloggers Network syndicated blog from Rss blog authored by 97thfloor. Read the original post at: https://www.venafi.com/blog/what-tlsssl-offloading

Follow this link:
What Is TLS/SSL Offloading? - Security Boulevard

Kingston Ironkey Locker+ 50 (LP50) Hardware Encrypted USB Review Affordable and easy to use – Mighty Gadget

Sharing is caring!

Kingston Ironkey Locker+ 50 (LP50) Review Rating

Summary

I think the Kingston Ironkey LP50 is an excellent choice for anyone looking for a good level of data security that is both affordable and user-friendly.

Pros

Cons

The new Kingston Ironkey Locker+ 50 USB drive is an affordable, secure drive that is a little bit different from all the other encrypted secure drives I have reviewed in the past.

There is no FIPs certification, nor is there any physical security. All the security is built around the hardware encryption built into the drive.

For users wanting a higher degree of security and more storage while still being easy to use, the Kingston IronKey Vault Privacy 80 External SSD is an excellent option.

I doubt this will appeal to the enterprise market, but it is probably the most attractive solutions for home users and small businesses that want to secure important files.

This is one of the easiest drives I have used for setup and management. That is because there is no physical security on the drive itself.

You plug it in, then Windows recognises it has a DVD drive, and from here, you can run the IronKey application.

The first run will guide you through the set up process, and once this is complete, it will load up the drive contents.

For input, you can optionally use the Virtual keyboard to avoid the risks of keyloggers.

The LP50 comes with a licence for ClevX USBtoCloud, which is a useful little application that you should use with caution.

Basically, it will back up the contents of the USB drive to your chosen cloud provider. However, there is no encryption applied beyond that which the provider applies themselves.

On the one hand, this is convenient. If you forget your password and need to reset the USB, you still have your important data.

But, a lot of people dont trust cloud services with sensitive data and would prefer to upload an encrypted file. Therefore, if that service does get hacked, then the data is secured. This is not an unreasonable security concern either; there are plenty of cases where people have had their Google accounts hacked. Even if you have 2FA enabled, SIM swap attacks are quite common and relatively easy to carry out.

For less sensitive data, this is probably not an issue. If you are travelling with work data, it is nice to know you have the data secured on the physical drive in the event you lose it.

Setting up ClevX USBtoCloud is easy. The app automatically loads the setup screen when you first log into the drive. I set it up with Google Drive and just had to authenticate my account via the browser.

Backups are done in the background and quickly.

When I started reviewing this drive, the immediate question that popped up in my head was, why not just use encryption software on a USB drive?

This is a perfectly viable option, and for anyone wanting to save money, this is well worth doing.

However, I decided to set up a VeraCrypt partition on a USB drive, and it is just not as user-friendly as the LP50. There are quite a lot of options to choose from, which is good for some but not so good for someone with limited computer knowledge. You can encrypt an entire drive, but you can have encrypted volumes. I think this could be one of the downfalls of some less competent users. It would be easy to end up creating an encrypted volume and then putting data on the none encrypted part of the drive.

The basic setup also process takes some time, and formatting the new encrypted volume takes several minutes. Again, not an issue for people like myself that are into IT, but plenty of other wants a thing that just works out of the box.

There is not much to write about performance; it is just a USB drive. But, I think it is worth highlighting how easy this is to use. You plug it in, the login dialogue opens, you type in your password, and the drive unlocks.

Performance is good, much better than the FIPS-certified USB drives you get. The drive also exceeds the quoted speeds from Kingston.

The Kingston IronKey Locker+ 50 is available from Amazon via the product boxes below. At the time of writing, it is a touch more expensive than Insight but with free delivery.

Insight Direct appear to be the official partner for Kingston. The prices are lower, but they charge 7 for delivery, so it will work out to be more expensive for individual products.

In comparison, if you went with a FIPS 197 certified 16GB iStorage datAshur Personal2, you would be paying almost double at 60.

This is the first time I have used a secure drive like this, and I quite like it. There are two big selling points, the price and the ease of use. It should also read/write faster than most of the pin-secured drives.

Plugging this in and typing out my password is just much more convenient than trying to press tiny keys on a USB. For a small business owner and homes user such as myself, I dont really have any files sensitive enough to require FIPS 140 or 197 certified drives.

The logical counterargument for this drive would be that you can use VeraCrypt to encrypt your data on any thumb drive achieving the same functionality for much less. The Kingston DataTraveler Exodia is just 6 for a 64GB model. However, that is a little less user-friendly, and I have a strong belief that anything not user-friendly is bad for data security.

Therefore, I think the Kingston Ironkey LP50 is an excellent choice for anyone looking for a good level of data security that is both affordable and user-friendly.

Last update on 2022-09-05 / Affiliate links / Images from Amazon Product Advertising API

Originally posted here:
Kingston Ironkey Locker+ 50 (LP50) Hardware Encrypted USB Review Affordable and easy to use - Mighty Gadget

New ransomware hits Windows, Linux servers of Chile govt agency – BleepingComputer

Chile's national computer security and incident response team (CSIRT) has announced that a ransomware attackhas impacted operations and online services of a government agency in the country.

The attack startedon Thursday, August 25, targeting Microsoft and VMware ESXi servers operated by the agency.

The hackersstopped all running virtual machines and encrypted their files, appending the ".crypt" filename extension.

"The ransomware would use the NTRUEncrypt public key encryption algorithm, targeting log files (.log), executable files (.exe), dynamic library files (.dll), swap files (.vswp), virtual disks (. vmdk), snapshot (.vmsn) files, and virtual machine memory (.vmem) files, among others," -Chile CSIRT

According to CSIRT, the malware used in this attack also had functions forstealing credentials from web browsers, list removabledevices for encryption, and evade antivirus detection using execution timeouts.

In typical double-extortion fashion, the intruders offered Chile'sCSIRT a communication channel to negotiate the payment of a ransom that would prevent leaking the files and unlock the encrypted data.

The attacker set a three-day deadline and threatened to sell the stolen data to other cybercriminalson the dark web.

Chile's CSIRTannouncement doesn't name the ransomware group is responsible for the attack, nor does it provide sufficient details that woul lead to identifying the malware.

The extension appended to the encrypted files does not offer any hint because it has been used by multiple threat actors.

While the little information Chile's CSIRTprovided on the behavior of the malware points to'RedAlert' ransomware (aka "N13V"), an operation launched in July 2022, technical details suggest otherwise.

RedAlert ransomwareusedthe ".crypt" extension in attacks, targets both Windows servers and Linux VMWare ESXi machines, is capable to force-stop all running VMs prior to encryption, and uses the NTRUEncrypt public-key encryption algorithm.

However, the indicators of compromise (IoCs) in Chile's CSIRT announcement are either associated with Contior are return an inconclusive result when fed to automated analysis systems.

Conti has been previously linked to attacks on entire nations, such as the one onCosta Ricain July 2022, which took five days from gaining initial access to stealing and encrypting the systems.

Chilean threat analyst Germn Fernndeztold BleepingComputer that the strain appears to be entirely new, and the researchers he talked to couldn't associate the malware with known families.

Fernandez also commented that the ransom note wasn't generated during the infection, a detail that BleepingComputercan confirm. The researcher said that the note was delivered before deploying the file-locking malware.

"One particular thing about the attack, is that the threat actors distributed the ransom note at a previous stage to the deployment of the ransomware as the final payload, possibly for evasion issues or to avoid having their contact details leaked when sharing the final sample." -Germn Fernndez

BleepingComputerwas able to analyze multiple samples of the malware used for the attack and retrieved a ransom note named 'readme_for_unlock.txt', seen below:

All ransom notes that BleepingComputer has seen when analyzing this ransomware strain includea link to a unique website in the Tor network along with a password to log in.

As far as we've seen a data leak site for this ransomware does not exist, yet. The Tor site is for showing a message box where victims can contact the hackers.

Accessing the above communication channel requires a password, which is included in the ransom note.

The malware configures itself to launch on Windows login and uses the name SecurityUpdateat startup.

From what BleepingComputer could learn so far about this ransomware, this is a new operation that launched at the beginning of August.

Chile's cybersecurity organization recommends all state entities as well as large private organizations in the country to apply the following measures:

Chile CSIRT has provided a set of indicators of compromise for files used in the attackthat defenders can use to protect their organizations.

Read more from the original source:
New ransomware hits Windows, Linux servers of Chile govt agency - BleepingComputer

Everything You Need to Know About SD-WAN – Spiceworks News and Insights

Software-defined WAN or SD-WAN is a virtual wide area network (WAN) that relies on software technologies like internet-based communication tunnels, software-driven network encryption, firewall software, etc. to operate a mid-sized to large-scale computer network spread across locations. This article explains how SD-WAN works, its benefits, and the best SD-WAN solutions in the market.

Software-defined WAN or SD-WAN is defined as a virtual wide area network (WAN) that relies on software technologies like internet-based communication tunnels, software-driven network encryption, firewall software, etc. to operate a mid-sized to large-scale computer network spread across locations.

A software-defined wide area network (SD-WAN) uses software-defined technology and infrastructure. SD-WAN dissociates the networking hardware from the control mechanism and thus streamlines the WANs operation and management. Organizations that use SD-WAN solutions can build higher-performance WANs using inexpensive internet and at significantly lower costs than private WAN connection technologies such as multiprotocol label switching (MPLS).

SD-WAN solutions make it easier for organizations to manage firewalls and routers, upgrade software and firmware, virtual private networks (VPN), and remote clients through a centralized management interface. The centralized management control is used to securely and efficiently route traffic across the WAN directly to trusted providers such as software-as-a-service (SaaS) and infrastructure-as-a-service (IaaS). It also minimizes labor costs by cutting maintenance costs and lowers the cost of equipment.

During the early years, WANs required backhauling of all traffic from branch offices to a data center where they applied advanced security services. Traffic between the source and data centers was based on complex routing protocols such as transmission control protocol (TCP/IP) addresses and control list tables.

Ultimately, it leads to delays resulting in poor application performance, user experience, and huge costs due to expensive bandwidths. Users also had to incur expenses to install MPLS routers at each location. Performing upgrades on firmware or software took longer times due to network complexities. The network architecture was also not optimized for cloud infrastructure. The limitations of traditional WANs drove the change to a better SD-WAN technology that replaced MPLS.

SD-WAN is deployed in an organized way in branch offices and data centers. It is optimized for cloud infrastructure and associates cloud technology with mobile computing. It separates the data plane and control plane of the network. It has a centralized management interface where traffic is managed and monitored. It has a single management portal which reduces complexities and makes it easier to track applications, thus improving performance and operational efficiencies.

By providing lower-cost infrastructure and transport costs, an organization can save. SD-WAN provides end-to-end encryption over the entire network, providing secure connections to its users. Additionally, SD-WAN can prioritize traffic on business-critical applications and route it through the most efficient pathway.

See More: How Does an Edge Network Work and What Does Its Future Hold? AT&Ts Theresa Lanowitz Answers

The main objective of SD-WAN is to connect end-users and the applications, notwithstanding the location of these end-users. SD-WAN drives traffic as per the business requirements of the application. These business requirements vary from the priority of the application to must-enforced security policies or application performance required. Usually, critical mission applications are given the highest priority. The networking approach may vary from MPLS to broadband to 4G LTE.

The SD-WAN architecture separates the control and management functions, applications, and WAN transport services. It has a centralized control plane that stores and manages all the data on the traffic and applications. The centralized control plane monitors and adapts traffic to suit the application demand and delivers the optimum experience.

The following are features of SD-WAN that users should consider before choosing an SD-WAN solution model:

See More: How To Make Networks Ready for Cloud-First Era With SD-WAN

SD-WAN allows organizations and small businesses to securely connect their users to applications by taking advantage of any combination of network services. When choosing the right SD-WAN solution providers, users should consider factors such as security, price, availability of hybrid wide area network (WAN) solutions, and the ease at which they can be deployed. The top 10 SD-WAN solutions include:

Powered by Meraki, Cisco SD-WAN is a scalable, programmable, and open solution that allows users to connect to any application. It offers control, visibility, and real-time analytics to its users. Cisco SD-WAN offers cloud management services and it can also be deployed on-premise. It is integrated with capabilities that allow it to perform optimization of applications, unified communications, multi-cloud services, and security.

Fortinet FortiGate provides a secure networking approach that combines SD-WAN, advanced routing, and next-generation firewall (NGFW) to promote consistent security and network policies and reduce operational costs through automation, self-healing, and deep analytics. This also simplifies wide-area network (WAN) architecture by accelerating network and security convergence. Fortinet FortiGate SD-WAN offers improved multi-cloud application performance through multi-path control, application steering and identification.

Oracle SD-WAN provides users with simplified WAN management services such as SD-WAN, firewall, routing, and WAN optimization. It provides users with high bandwidth and inexpensive internet connections and delivers easy-to-deploy and manages the network. Oracle SD-WAN offers its users reliable, quality, flexible and secure services. With its high availability, users can enjoy faster applications and better networks. It also allows for safer migrations of applications into the public cloud.

Citrix SD-WAN combines cloud-delivered and comprehensive security with SD-WAN, analytics, and secure internet access. It has strong security at the WAN Edge, providing complete protection against all threats. Its Citrix cloud on-ramps feature provides flexible on-ramp options for any cloud access that simplifies multi-cloud transition. Citrix SD-WAN reduces network costs and increases agility.

CenturyLink SD-WAN unifies network management across different network types, creating an agile and responsive wide area network. It enables users access to bandwidth to leverage broadband connections for bandwidth-intensive applications. It provides users with data analytics and reports while offering performance-based application routing. CenturyLink SD-WAN offers a reliable solution that allows users to reduce operating costs for equipment and staff.

Wanify has partnered with VeloCloud to deliver VeloCloud SD-WAN. It manages end-to-end processes and improves network performances by combining multiple connections for its users. It supports network agility and application growth by offering optimized access to cloud applications and data centers. It routes application traffic through efficient routes after gauging the real-time performance of the network. Wanify SD-WAN provides customer support and offers a secure and customizable solution for its clients. It also manages carriers for its users.

See More: What Is a Mesh Network? Meaning, Types Working, and Applications in 2022

Palo Alto Networks offer SD-WAN services through Prisma. It provides networking and security in a single platform. It enables app-defined policies for SD-WAN that eliminate network problems, increase bandwidth, and simplify management for its users. Palo Alto Networks Prims SD-WAN allows users superb control and connection options along with supporting machine learning and automation. It also provides users with router modernization and cloud migration.

Exinda SD-WAN provides businesses with a stable, secure, reliable, and cost-effective solution. It combines and manages up to 12 internet kinds of transport from local service providers. The Exinda SD-WAN network router monitors, detects, and adapts to fluctuations from internet service providers and also monitors traffic changes. It automatically solves network problems, thus avoiding interruptions to internet services and applications.

It allows users to add bandwidths to their networks when they need to increase network capacities. Integrating Exinda SD-WAN and Exinda network orchestrator enhances the ability to accelerate applications to better performance.

Masergy SD-WAN leverages its secure edge network with built-in Fortinet security. It provides clients with end-to-end visibilities and uses artificial intelligence for IT operations (AIOps) to analyze networks and make recommendations to improve reliability. It uses AIOps and shadows IT discovery tools to build overlays to fit networks. It customizes rules to meet network and application requirements. Masergy SD-WAN allows for co-managing with its users to streamline inefficiencies.

Aryaka SD-WAN has a built-in WAN optimization that guarantees application performance for this feature-rich platform. Aryaka SD-WAN service doesnt need the installation of complex appliances or network management software as it is a remote-based cloud system. Users can connect to it through virtual private networks (VPN). Aryaka SD-WAN provides insightful analytics in a secure platform that offers a multi-cloud networking service. It provides reliable throughput, real-time visibility, and single-day deployments for new technology.

See More: What Is Network Management? Definition, Key Components, and Best Practices

The global software-defined wide area network (SD-WAN) market size is expected to increase exponentially from $1.9 billion in 2020 to $8.4 billion by 2025. This figure represents a compound annual growth rate (CGAR) of 34.5%, as per research by MarketsAndMarkets. These figures express an increasing appetite for SD-WAN solutions from enterprises due to a slew of business benefits. These include:

In the recent past, business enterprises and other organizations have embraced advanced technologies to gain an edge against their competitors in the market. However, its adoption has brought on its fair share of problems in the form of cybercrimes.

Most SD-WAN solutions offer basic built-in security features like firewall and VPN functions that improve security for their users. Additionally, users looking for advanced security features can look for SD-WAN solutions offering features to prevent data loss, downtime, and legal liabilities. Popular SD_WAN solutions include next-generation firewalls (NGFW), intrusion prevention systems (IPS), encryption, and sandboxing capabilities.

Users can configure SD-WAN to steer their business traffic through the most efficient route by prioritizing real-time services such as voice over internet protocol (VoIP) and business-critical traffic. SD-WAN, through its flexibility, allows users to vary bandwidth access via any local internet provider to promote increment in speeds to match real-time demand. Varying bandwidth using deduplication and compression also helps in reducing the total cost of ownership (TCO).

SD-WAN allows for bandwidth capacity to be scaled up or down through the direct addition of internet broadband connectivity. A single logical link can be formed when multiple WAN service types, such as direct internet or private multiprotocol label switching (MPLS), are bonded together.

Other optimization techniques that SD-WAN employs to improve network agility include data de-deduplication, data compression, and secure sockets layer (SSL).

According to a 2018 forecast survey by IDC Research, up to two-thirds of respondents expect to save 5-19%, while a quarter expect upwards of 39% savings when using SD-WAN technologies. SD-WAN technology allows for self-managed procedures and automation, which enables organizations to reduce the number of external IT experts required to carry out periodic tests and maintenance, thereby proving to be cost-effective.

SD-WAN aggregates multiple direct-to-internet (DIA) lines for WAN connectivity, thus reducing the overall cost for bandwidth as it requires less network hardware. Organizations can also easily set up new branches online at any location at less time and cost.

As small businesses use more technology solutions such as local, edge, and cloud-based applications, network complexity becomes a common problem. This is due to competition for limited bandwidth, which leads to poor network performance. It might also necessitate hiring more IT specialists on-site to manage local IT infrastructure, leading to increased costs. SD-WAN provides a solution through monitoring and alerting the performance of different data types to ensure enough bandwidth is allocated. Users can configure SD-WAN to prioritize critical traffic through the most efficient path to its destination to improve performance.

SD-WAN is usually managed through a centralized management interface that monitors it and manages traffic. From a single management portal, paths to applications are allocated according to criticality, new sites are provisioned, software and firmware upgrades are performed, and users can flex bandwidth from this point. Using a centralized management plan helps to reduce complexity and makes it easier to track applications and their performances from a single zone.

See More: What Is Network Hardware? Definition, Architecture, Challenges, and Best Practices

Organizations are gradually adopting cloud-based services. SD-WAN enables users to access the cloud remotely without burdening the core network with additional traffic to manage and secure. This may promote cost savings for organizations looking to cut down on office space, equipment and rent as employees can work remotely. The need for additional IT experts to manage and secure data traffic is also minimized.

SD-WAN solutions improve cloud applications performance by emphasizing business-critical applications and allowing them to communicate directly to the internet. SD-WAN guarantees quality and optimizes data, followed by directing network traffic along the most efficient routes.

Even with the gradual increase in the popularity of cloud-based resources, organizations still have to wait for weeks or months to set up new WAN circuits or managed service providers (MSPs). A fully managed cloud-first WAN service could offer cloud-based network offerings comparable with other cloud services through orchestration and automation.

This feature would promote quick turn-up of newer locations globally and services bolstering enterprise flexibility. It would also facilitate troubleshooting and increase the visibility of enterprises.

SD-WAN technologies offer predictive analytics enabling IT specialists to navigate potential outages and mitigate any other potential issues. SD-WAN monitors the system in real time and provides data analytics to determine and predict any problems. This ability helps to reduce resolution time for organizational IT troubleshooting, lowering TCO, and maintaining peak performances at all times. This leads to increased productivity in organizations and decreasing costs, as IT experts are not always required to be on-premises. In case a problem arises, they can quickly identify and fix the issue.

See More: How to Get SD-WAN Security Right?

Software-defined wide area network is a crucial enabler for enterprise digital transformation. It is highly extensible so it can integrate new-age security technologies like SASE with existing network infrastructure. It can also simplify IT operations by paving the way for AIOps alongside network management. Thats why it is vital to understand the working and potential benefits of SD-WAN to prepare for your adoption journey.

Did this article fully inform you about the role of SD-WAN in a modern enterprise? Tell us on Facebook, Twitter, and LinkedIn. Wed love to hear from you!

Follow this link:
Everything You Need to Know About SD-WAN - Spiceworks News and Insights

Trump Could Face The Same Charges As Assange, Snowden – UPROXX

Hyperbole and Donald Trump go together as perfectly as McDonalds burgers and Donald Trump. But in the case of a recent Twitter post about just how damning the potential charges the former president could be facing should he be prosecuted, Newsweek reports that you can believe the hype.

On Thursday, former Homeland Security chief of staff Miles Taylor tweeted about the monumental irony that if legal action is taken against Trump for his hoarding of classified documents, he would essentially be facing the same charges as both WikiLeaks founder Julian Assange and NSA whistleblower Edward Snowden two men who Trump has had lots to say about in the past, including that they both deserved to be executed.

But just how true is Taylors statement? According to Newsweek, its pretty damn accurate especially as it relates to Assange and WikiLeaks, who Trump has both praised (I love WIKILEAKS!!) and deemed disgraceful and deserving of the death penalty. (Though its worth noting that several Trump insiders, including Don Jr., had ongoing correspondences with WikiLeaks leading up to the 2016 election.)

As we learned from the affidavit authorizing the raid on Mar-a-Lago as well as accidentally, and hilariously, from Breitbart Trump is under investigation for violating the Espionage Act, or U.S. Code 793, which is where both Assange and Snowdens alleged crimes also fall, albeit with slight differences. As Tom Norton writes for Newsweek:

Julian Assange has been indicted on 17 charges under the Espionage Act and one charge of computer misuse for WikiLeaks publication of secret American military documents 10 years ago. He faces a potential 175-year prison sentence.

Assanges indictment sheet states a potential violation of section 793(e) of the Espionage Act, the same section of the act, which the DOJ also mentions in its affidavit to search Mar-a-Lago.

In other words: If prosecuted, Trump could be looking at violating both the same act as Assange as well as the same section of the act so, pretty much the same crime.

Snowdens case, however, is slightly different. While he, too, is wanted in the U.S. for violating the Espionage Act, the section of the act is different. Broadly speaking, however, it is true that Trump could face charges under the same U.S. act as Snowden and Assange, if not for the exact number or type of indictments, Norton writes.

Where the real irony comes in is in how hard Trump has publicly come down on both Assange who some have claimed the Trump administration plotted to assassinate, which is a charge he denies and Snowden, whom the former president repeatedly called a traitor and advocated for his execution:

Of course, Trump has (so far) not been charged with any crimes, so all of this is just food for thought.

(Via Newsweek)

Continue reading here:

Trump Could Face The Same Charges As Assange, Snowden - UPROXX

Why Trump will soon be indicted | News, Sports, Jobs – The Sentinel – Lewistown Sentinel

It gives me no joy to write this piece.

Even a cursory review of the redacted version of the affidavit submitted in support of the governments application for a search warrant at the home of former President Donald Trump reveals that he will soon be indicted by a federal grand jury for three crimes: Removing and concealing national defense information (NDI), giving NDI to those not legally entitled to possess it, and obstruction of justice by failing to return NDI to those who are legally entitled to retrieve it.

When he learned from a phone call that 30 FBI agents were at the front door of his Florida residence with a search warrant and he decided to reveal this publicly, Trump assumed that the agents were looking for classified top-secret materials that theyd allege he criminally possessed. His assumptions were apparently based on his gut instinct and not on a sophisticated analysis of the law. Hence, his public boast that he declassified all the formerly classified documents he took with him.

Unbeknownst to him, the feds had anticipated such a defense and are not preparing to indict him for possessing classified materials, even though he did possess hundreds of voluntarily surrendered materials marked top secret.

It is irrelevant if the documents were declassified, as the feds will charge crimes that do not require proof of classification. They told the federal judge who signed the search warrant that Trump still had NDI in his home. It appears they were correct.

Under the law, it doesnt matter if the documents on which NDI is contained are classified or not, as it is simply and always criminal to have NDI in a non-federal facility, to have those without security clearances move it from one place to another, and to keep it from the feds when they are seeking it. Stated differently, the absence of classification for whatever reason is not a defense to the charges that are likely to be filed against Trump.

Yet, misreading and underestimating the feds, Trump actually did them a favor. One of the elements that they must prove for any of the three crimes is that Trump knew that he had the documents. The favor he did was admitting to that when he boasted that they were no longer classified. He committed a mortal sin in the criminal defense world by denying something for which he had not been accused.

The second element that the feds must prove is that the documents actually do contain national defense information. And the third element they must prove is that Trump put these documents into the hands of those not authorized to hold them and stored them in a non-federally secured place. Intelligence community experts have already examined the documents taken from Trumps home and are prepared to tell a jury that they contain the names of foreign agents secretly working for the U.S. This is the crown jewel of government secrets. Moreover, Trumps Florida home is not a secure federal facility designated for the deposit of NDI.

The newest aspect of the case against Trump that we learned from the redacted affidavit is the obstruction allegation. This is not the obstruction that Robert Mueller claimed he found Trump committed during the Russia investigation. This is a newer obstruction statute, signed by President George W. Bush in 2002, that places far fewer burdens on the feds to prove. The older statute is the one Mueller alleged. It characterizes any material interference with a judicial function as criminal. Thus, one who lies to a grand jury or prevents a witness from testifying commits this variant of obstruction.

But the Bush-era statute, the one the feds contemplate charging Trump with having violated, makes it a crime of obstruction by failing to return government property or by sending the FBI on a wild goose chase looking for something that belongs to the government and that you know that you have. This statute does not require the preexistence of a judicial proceeding. It only requires that the defendant has the governments property, knows that he has it and baselessly resists efforts by the government to get it back.

Where does all this leave Trump? The short answer is: in hot water. The longer answer is: He is confronting yet again the federal law enforcement and intelligence communities for which he has rightly expressed such public disdain. He had valid points of expression during the Russia investigation. He has little ground upon which to stand today.

I have often argued that many of these statutes that the feds have enacted to protect themselves are morally unjust and not grounded in the Constitution. One of my intellectual heroes, the great Murray Rothbard, taught that the government protects itself far more aggressively than it protects our natural rights.

In a monumental irony, both Julian Assange, the WikiLeaks journalist who exposed American war crimes during the Afghanistan and Iraq wars, and Edward Snowden, the former National Security Agency employee who exposed criminal mass government surveillance upon the American public, stand charged with the very same crimes that are likely to be brought against Trump. On both Assange and Snowden, Trump argued that they should be executed. Fortunately for all three, these statutes do not provide for capital punishment.

Rothbard warned that the feds aggressively protect themselves. Yet, both Assange and Snowden are heroic defenders of liberty with valid moral and legal defenses. Assange is protected by the Pentagon Papers case, which insulates the media from criminal or civil liability for revealing stolen matters of interest to the public, so long as the revealer is not the thief. Snowden is protected by the Constitution, which expressly prohibits the warrantless surveillance he revealed, which was the most massive peacetime abuse of government power.

What will Trump say is his defense to taking national defense information? I cannot think of a legally viable one.

Today's breaking news and more in your inbox

Read more:

Why Trump will soon be indicted | News, Sports, Jobs - The Sentinel - Lewistown Sentinel

why the giants fight over open source – Gearrice

Open source is the origin of much of the progress that we now enjoy and, in a way, a bastion of some early internet culture that many think is being lost.

Android, Linux or the Firefox browser are the great examples, which have a huge list of software whose code can be freely shared and improved. What is perhaps not so well known is that for quite some time the big technology companies themselves, the ones that do the most business with proprietary software, have been its main promoters.

And that has good and bad things.

Recently, there has just been a turn of events in this throne of benefactors of the Open Source.

Google has increased its commitments to open source software and has overtaken Microsoft in terms of active contributions, according to a new analysis from Aiven using data from OSCI.

Microsoft had been the company that was giving the most resources until this year. Although, yes, the ranking has a certain trick because it breaks off the subsidiaries. For example, Microsofts GitHub or IBMs Red Hat. Counting them together, Microsoft would still be first.

It is perhaps hard to believe that Microsoft, which especially in the 90s had many litigations with Open Source promoters, has led this classification for so long. However, since the arrival of Satya Nadella, his perspective has changed, and a lot.

Google, for its part, has always supported and supported open source. Again, for better or for worse. It has turned Android into a standard, but it has also been criticized for closing APIs of, for example, Chromium, according to its interests.

According to data from the Open Source Contributor Index (OCSI), Google had 5,421 active contributors in August, compared to 5,268 for Microsoft.

Red Hat, Intel and IBM have systematically followed Google and Microsoft in terms of the number of taxpayers this year and also in the last five years.

In the meantime, Amazon is one rung behind, with 1,963 contributions. However, Amazon is showing higher monthly growth than some of the other companies on the list.

There are also differences by language. Looking at the type of projects they work on, Aivens team found that while Google and Amazon mostly work on C++, Java, and Python, Microsoft prefers its own languages: Powershell and C#.

The data is obtained by counting the commits on GitHub. Altogether, the commits Monthly open source projects from Google, Microsoft and Amazon grew 300% in six years, from 2,654 contributors in May 2016 to 10,549 in May 2022.

Heikki Nousiainen, field technology director and co-founder of Aiven, said in the report that the big tech trio is putting more resources and development time into open source, something the community needs to ensure that important projects are sustained.

Their input also helps promote clean, transparent, and secure code, says Nousiainen, which will help ensure that security vulnerabilities like Log4Shell, a javascript vulnerability that caused chaos in IT departments around the world, dont reoccur. the world last year.

This is especially relevant because large companies commonly hide behind security problems to privatize some elements of the code.

That Google has overtaken Microsoft is especially surprising, says Nousiainen. A contributing factor has been the decline in Microsofts year-over-year commitments to open source projects. However, Microsofts commitment to developer freedom and innovation is constant, as the company it is a major player in open source, and even bought GitHub in 2018, he commented.

But, why is it so interesting?. Open source is a neutral no mans land, says Aivens founder. People have always engaged with each other, but now its more because people expect companies to engage more and connect. The ecosystem is a much more powerful thing now and its easier to build.

However, as we mentioned, not always everything is so idyllic. In March 2021, Google limited access to many Chrome APIs within the open source Chromium web browser, which Chrome and many other browsers are based on.

Google justified its decision by saying that Third-party Chromium-based browsers integrate features based on Googles cloud, which were intended only for Google Chrome users.

In other words, this meant that a small fraction of users could access their Google account and store their personal Chrome sync data, such as bookmarks, not only with Google Chrome, but also with some Chromium-based third-party browsers. .

Googles move caused many Chromium developers and maintainers on other versions to see their work disrupted.

It should be noted that almost 90% of the browsers used by all Internet users are based on Chromium. In this way, Google may not be using, as Microsoft did in the 90s, its predominance to sell its products, but it has made it clear that it continues to have the upper hand in some decisions that may be critical.

See the article here:
why the giants fight over open source - Gearrice