SA Tech Global

 

Synology® Presents C2 Object Storage

C2 Object Storage, a simple, scalable, and affordable cloud object storage service for organisations to store unstructured data at scale, was recently announced by Synology.

C2 Object Storage, which is natively built with the Amazon S3 API, allows users to build a sophisticated object storage architecture and use the existing tools and code for a variety of practical user cases such as building a data lake, hosting web and media assets, running and developing cloud apps, backing up and restoring data, and establishing data archives.

Intuitive file browser

Furthermore, C2 Object Storage’s user-friendly file browser enables users to upload multiple files with simple drag-and-drop selection and manage all content from a simple web portal.

CrowdStrike and Humio deliver the industry’s most advanced data platform for index-free XDR.

CrowdStrike has extended its leadership with a true multi-tenant, cloud-native platform by adding the best-in-class data ingestion that the industry has to offer.

CrowdStrike Holdings, Inc. a leader in cloud-delivered endpoint and cloud workload protection, announced it has agreed to acquire Humio, a leading provider of high-performance cloud log management and observability technology.

CrowdStrike’s innovative Threat GraphTM technology processes 5 trillion security-related events every week, making it the industry’s most comprehensive security solution for protecting endpoints and workloads. By ingesting and correlating data from any log, application, or feed, CrowdStrike is able to provide actionable insights and real-time security to its customers. This purchase allows CrowdStrike to further expand its eXtended Detection and Response (XDR) capabilities.

Existing security providers are unable to provide their customers with the concise, contextual insights required to realise the true promise of XDR. Customers are left with large, complex data sets that lack context and hide the important insights security teams require in the absence of key technological advances, such as CrowdStrike’s cloud-scale AI running on a purpose-built graph database and patented smart-filtering technology that reduces ingestion of unneeded, irrelevant data.

CrowdStrike will now be able to provide deep, contextual, index-free XDR at a speed and scale no other vendor can match. CrowdStrike’s decade-long leadership in EDR and XDR is built in combining endpoint events with network visibility, account and identity insights, and enormous telemetry from all workloads, on premise, in the cloud, or in a container.

By combining their respective strengths, Humio and CrowdStrike have created an enterprise-level solution that helps organisations collect, observe, analyse, and act upon all structured and unstructured data in their environment.

How can you adopt the Zero-Trust Model?

The pandemic introduced many changes to how we go about our work life. From an employer’s perspective, many office spaces closed down and enabled employees to work from home, some who were adamant not to entertain remote access were forced to enable remote access without any other options. Some had to hastily allow employees to use their own devices to connect to corporate networks due to the inability of providing resources.

One area that gained a lot of focus during the pandemic is the cyber security readiness of organizations. If you have been following the news closely you would have noticed that there has been a drastic increase of cyber security related incidents within the country and across the world. One main reason for this development is that the new working arrangements have forced enterprises to drift into uncharted territories making them even more vulnerable to ever evolving cyber security threats. A simple example would be enterprises opening their doors to employees connecting through remote VPNs, these could be users who use their own devices to carry out official duties. These arrangements in return expand the attack surface of the organization. With no proper controls in place a seemingly harmless user could get compromised and unknowingly let a malicious party through the front door into your enterprise network

Developments such as these have accelerated the need to adopt the concept of zero trust. In simple terms zero trust is rooted on the principle “Never Trust, Always Verify”. The zero-trust model throws away the traditional castle-andmoat mentality which made organizations focus on defending their perimeter assuming everything within the perimeter didn’t pose a threat. As a matter of fact the traditional castle-and-moat mentality is what made the attack in the previous example possible.

Another factor that has accelerated the requirement of adopting the zero-trust model is the fact that the digital drive has made it hard to exactly pinpoint the perimeter of an organization. Many organizations have moved to cloud or use hybrid setups which are accessed by various parties such as users, employees, partners who might be physically located all around the globe.