Network Security - AI-Tech Park https://ai-techpark.com AI, ML, IoT, Cybersecurity News & Trend Analysis, Interviews Mon, 24 Jun 2024 05:00:32 +0000 en-US hourly 1 https://wordpress.org/?v=5.4.16 https://ai-techpark.com/wp-content/uploads/2017/11/cropped-ai_fav-32x32.png Network Security - AI-Tech Park https://ai-techpark.com 32 32 Broadcom’s Symantec Cloud SWG Receives FedRAMP Authorization https://ai-techpark.com/broadcoms-symantec-cloud-swg-receives-fedramp-authorization/ Fri, 21 Jun 2024 14:00:00 +0000 https://ai-techpark.com/?p=170491 U.S. public sector entities can now leverage leading web security as they transition to the cloud Broadcom Inc. (NASDAQ: AVGO) today announced its Symantec Cloud Secure Web Gateway (SWG) solution received Federal Risk and Authorization Management Program (FedRAMP®) authorization, further expanding Broadcom’s portfolio of FedRAMP authorized solutions for the U.S....

The post Broadcom’s Symantec Cloud SWG Receives FedRAMP Authorization first appeared on AI-Tech Park.

]]>
U.S. public sector entities can now leverage leading web security as they transition to the cloud

Broadcom Inc. (NASDAQ: AVGO) today announced its Symantec Cloud Secure Web Gateway (SWG) solution received Federal Risk and Authorization Management Program (FedRAMP®) authorization, further expanding Broadcom’s portfolio of FedRAMP authorized solutions for the U.S. sector. Symantec Cloud SWG delivers comprehensive, cloud-hosted security for U.S. federal agencies adopting a Security Service Edge (SSE) architecture. The solution enables U.S. federal agencies to cost-effectively migrate security services from on-premises data centers to cloud-native services without sacrificing security or designing new policy and workflows.

This FedRAMP authorized service is available as part of Symantec Gov Cloud – Web Protection to deliver one solution with flexible deployment options. Many federal agencies still have requirements to support on-premises security environments as they migrate to the cloud. Gov Cloud – Web Protection uniquely provides cloud-hosted security while also supporting full licensing of Symantec’s network security solutions. Customers can choose to deploy security components on-premises or use the cloud. Gov Cloud – Web Protection includes market-leading Symantec Secure Web Gateway, Reverse Proxy, Deep Content Inspection, Management Center and Cloud Reporting, Intelligence Services for application visibility and control, and Full-Traffic Decryption.

Key Benefits of Symantec Gov Cloud – Web Protection

  • Protects users, devices, and data from known and unknown threats across all locations (remote, branch, and HQ). Deploys across a cloud-native, highly scalable, and performance-intensive infrastructure built on top of a leading cloud service provider. This is the same backbone that delivers YouTube, Google Search, and other world-class services.
  • Simplify and streamline purchasing, provisioning, training, and management, through simple user-based licensing that supports cloud, on-prem, or hybrid deployments.
  • Provides a strong foundation for Secure Access Service Edge (SASE), facilitating secure and fast web access for any user, from any device, from any location.

“Numerous U.S. Federal agencies rely on Symantec security solutions to protect mission-critical data, resources, and thousands of users,” said Rob Greer, vice president and general manager of the Enterprise Security Group at Broadcom. “With Symantec’s Cloud SWG solution now achieving FedRAMP Authorized status, these agencies know their security needs are met and they can transition to the cloud at their own pace. We are excited about this achievement that shows our commitment to securing federal agencies and ensuring the highest protection standards are met.”

“Obtaining FedRAMP certification is a critical step for establishing trust with U.S. federal agencies moving their infrastructure to the cloud,” said Frank Dickson, Group Vice President, Security & Trust at IDC. “This rigorous certification not only ensures the security and compliance of cloud solutions but also opens a gateway for security solution vendors to better serve the stringent needs of the federal space.”

Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

The post Broadcom’s Symantec Cloud SWG Receives FedRAMP Authorization first appeared on AI-Tech Park.

]]>
Adtran joins LU-CIX community as a Gold Member https://ai-techpark.com/adtran-joins-lu-cix-community-as-a-gold-member/ Thu, 20 Jun 2024 12:15:00 +0000 https://ai-techpark.com/?p=170315 LU-CIX member ecosystem enhances Luxembourg’s digital infrastructure through strategic alliances and technological innovation Adtran’s membership reinforces a longstanding collaboration, with its open FSP 3000 transport technology integral to LU-CIX’s infrastructure ALM fiber monitoring technology elevates LU-CIX’s service reliability, boosting network availability and stability across the country Adtran and the Luxembourg...

The post Adtran joins LU-CIX community as a Gold Member first appeared on AI-Tech Park.

]]>
  • LU-CIX member ecosystem enhances Luxembourg’s digital infrastructure through strategic alliances and technological innovation
  • Adtran’s membership reinforces a longstanding collaboration, with its open FSP 3000 transport technology integral to LU-CIX’s infrastructure
  • ALM fiber monitoring technology elevates LU-CIX’s service reliability, boosting network availability and stability across the country
  • Adtran and the Luxembourg Internet eXchange (LU-CIX), today announced that Adtran has joined the LU-CIX community as a Gold Member. This addition expands and enhances LU-CIX’s supporting member ecosystem, which is key for the digital infrastructure of Luxembourg and beyond. Adtran joining the community cements a longstanding relationship with LU-CIX. Its FSP 3000 open optical transport solution was instrumental in expanding LU-CIX’s network capacity efficiently and sustainably, and the Adtran ALM fiber monitoring platform is helping boost the reliability of LU-CIX’s services.

    “We’re thrilled to have Adtran join us as a Gold Member. The dedication to openness and collaborative innovation that the Adtran team brings will help lift our collective efforts. Our history of success together sets a solid foundation for this partnership. Moreover, Adtran’s compact, energy-efficient technology perfectly aligns with our sustainability goals and enhances the performance and reliability of our network,” said Claude Demuth, chairman of LU-CIX. “This partnership underscores the importance of robust relationships in propelling our digital infrastructure forward and reinforcing Luxembourg’s status as a premier digital hub in Europe.”

    LU-CIX is a major European internet exchange, optimizing connectivity and internet speed by facilitating direct traffic routing among connected networks. Through its neutral and highly reliable platform, it supports the digital economy and boosts data transmission security across the country and beyond. The LU-CIX community, comprising internet service providers, telecommunication companies and content networks, collaborates to improve network efficiency and strengthen Luxembourg as a major digital hub. By welcoming Adtran, LU-CIX is broadening its technological capabilities. Adtran’s solutions enhance network performance, flexibility and reliability, delivering major benefits across Europe’s digital landscape. What’s more, Adva Network Security provides network security solutions approved by the Bundesamt für Sicherheit in der Informationstechnik (BSI) that comprehensively protect networks built on Adtran FSP 3000 transport technology, providing its customers with access to quantum-resistant communication and fortifying digital infrastructure against future threats.

    “We’re very pleased to be part of the LU-CIX community. The power of collaborative initiatives like this one cannot be overstated. The LU-CIX supporting member hub is key to driving technological advancements and shaping the future of digital infrastructure in this region and across Europe,” commented Stuart Broome, GM of EMEA sales at Adtran. “LU-CIX’s proactive approach to interworking and its leadership in the industry align perfectly with our commitment to open, multi-vendor networks. Our technologies are ideal for enhancing and supporting the scalability and security of major internet exchanges like LU-CIX, ensuring a more connected and resilient future.”

    Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

    The post Adtran joins LU-CIX community as a Gold Member first appeared on AI-Tech Park.

    ]]>
    LSP Protocol Best Solution for Building a Security Moat for PoS Networks https://ai-techpark.com/lsp-protocol-best-solution-for-building-a-security-moat-for-pos-networks/ Thu, 13 Jun 2024 07:30:00 +0000 https://ai-techpark.com/?p=169174 Staking is usually the main way to maintain the security of the PoS network. For a PoS network, the more and more dispersed assets in the network participate in the validator staking, the better the network’s security. Usually, starting from the PoS network itself, they provide incentives to validators, firstly...

    The post LSP Protocol Best Solution for Building a Security Moat for PoS Networks first appeared on AI-Tech Park.

    ]]>
    Staking is usually the main way to maintain the security of the PoS network. For a PoS network, the more and more dispersed assets in the network participate in the validator staking, the better the network’s security. Usually, starting from the PoS network itself, they provide incentives to validators, firstly to reward them as contributors, and secondly to encourage more validators to participate in network staking and verification.

    In fact, for any PoS network, it is unrealistic to allow token holders to independently participate in the network validator staking. One is the cost perspective. For example, the minimum threshold for Ethereum’s PoS validator is 32 ETH. Based on the price of ETH 3,800 US dollars, the cost threshold to directly become a validator is about 121,600 US dollars, but the APR is only 2.21%, and the capital utilization rate is extremely low. On the other hand, the staker needs to have the ability to run the client independently to avoid fines. Overall, it is unrealistic for non-professional token holders to directly participate in the staking of any network as a validator.

    Therefore, the emergence of the liquidity derivative pledge track, namely LSD, just solves the above pain points. On the one hand, token holders can entrust token pledges to the LSD protocol (no capital scale is required, usually assets worth tens or even tens of US dollars can participate), and the protocol will participate in the pledge of the PoS network on behalf of the pledger, and return part of the income to the pledger. At the same time, the LSD protocol will also return an LST token to the pledger, which is equivalent to the value of the pledged assets and can be used to obtain new income in LSTFi to improve the utilization rate of funds. This has a good driving effect on improving the pledge rate of the PoS network.

    Except for the Ethereum ecosystem, other ecosystems are not large in LSD

    However, from the current LSD track, except for the Ethereum ecosystem, the LSD scale of other networks is not large. On the one hand, in terms of scale, the current liquidity pledge scale of Ethereum is 13 million Ethereum, about 50.23 billion US dollars. According to the current 32 million Ethereum participating in the pledge in the Ethereum beacon chain, the liquidity pledge accounts for about 40.6%.

    In addition to Ethereum, other PoS ecosystems such as Cosmos and BNB Chain are relatively small in scale, and the ratio of liquidity staking sources is not high. For example, among the ATOM tokens staked by Cosmos, although its overall staking rate is as high as about 63%, only about 2% comes from liquidity equity.

    On the other hand, although LSD projects are rising, the leading LSD protocols represented by Lido, Rocket, Binance Staked, etc. have obvious monopoly effects in the field of ETH LSD staking, among which Lido alone accounts for 75% of the entire ETH LSD market share, and the market share of emerging LSD protocols is extremely low. In particular, the leading LSD protocols such as Lido are centralized models, which may have the risk of monopolizing most of the proportion, reducing the overall income of the LSD sector, and reducing the staking desire of the pledgers. In addition, excessive concentration of funds may cause security risks to the PoS ecosystem.

    In addition to LSD, the re-staking track centered on EigenLayer, namely the LRT track, is also centered around the Ethereum ecosystem. Some LRT protocols including Kyper DAO, Renzo, Ether.fi, EigenPie, YieldNest, Swell, etc. are all built around LST and ETH assets to provide staking services, and lack support for native tokens on other chains. Similarly, EigenLayer also has shortcomings in maintaining network security. For example, in a PoS network, if EigenLayer’s incentive mechanism conflicts with the existing PoS incentive mechanism, it may reduce the validator’s commitment to network security. EigenLayer may cause some validators to gain more rights and control, thereby increasing the centralization risk of the network. Centralized networks are more vulnerable to attacks and manipulation, weakening overall security.

    So overall, LSD and LRT may not be the best solutions for PoS ecosystem to obtain security:

    ● The LSD sector is severely monopolized and centralized. The scale of pledged income has decreased due to monopoly and it threatens the security of the PoS network, which deviates from the original intention of PoS.

    ● The multi-layer nesting model of LSD and LRT is risky, especially since some of the leading LSD protocols are too large in scale. Once a security problem occurs and a run occurs, it will be catastrophic for the Ethereum ecosystem. The Terra ecosystem is a lesson for this.

    ● The LSD and LRT tracks are mainly based on Ethereum. It is difficult for other PoS ecosystems to encourage more users to pledge through liquidity pledge and re-staking, and the problem of low capital utilization is difficult to solve.

    ● Except for the Ethereum ecosystem, there is a lack of infrastructure to support other PoS ecosystems to expand the scale of staking, and the trend of multi-chain development is hindered.

    Of course, there are more solutions to maintain PoS network security and improve capital utilization than just LSD and LRT. The recent market-oriented LSP protocol has brought a better solution. Based on the innovative Node Slicing and OmniVerify Chain solutions, it capitalizes the user’s asset rights and node income rights and gives them liquidity. Compared with existing solutions, the LSP protocol is expected to achieve better results in PoS network security and promote the balanced development of the PoS network system, and PoS will return to its original intention.

    LSP protocol “node slicing” solution

    The LSP protocol is a new PoS liquidity derivative pledge solution. One of its features is the use of the Node Slicing solution as a core processing method for nodes during the protocol execution. Similar to LSD, PoS asset holders can pledge directly through the LSP protocol. The LSP protocol verification network will pledge funds to different PoS networks through the OmniVerify Chain network, and after verifying and hosting the decentralized network, the pledge certificate will be sliced. The sliced assets will include the user’s asset rights and node income rights.

    Although the process of returning sliced assets seems similar to LSD, what is returned is not just an LST asset. Based on having all the capabilities of LST assets, it is also an asset that can represent asset rights and node income rights (LST assets do not have complete equity utility), that is, the process is a process in which users directly participate in the PoS network verification through the LSP protocol and obtain all the income rights obtained by the node. At the same time, the sliced assets can be freely exchanged and held in the LSP protocol trading platform, and can also be further traded in some LSTFi or even some LRT protocols.

    Improving the scale and decentralization of PoS staking

    In fact, from the perspective of the PoS network itself, it requires large-scale, decentralized users to participate in the verification of the network. From the perspective of scale, it is definitely difficult to meet the demand by simply attracting more retail traders to participate, so from this perspective, it is very necessary for some whale users, large node verifiers, and mining pools to participate.

    A considerable number of these users run their own clients instead of participating in staking through the LSD protocol (potential risks are too high), but this method greatly reduces the utilization rate of funds, so the LSP protocol can become a good starting point. Using the LSP protocol, the above can more lightly carry out the funds in and out of the mining pool shares, and will not be affected by the fluctuation of assets in the mining pool staking nodes, making the public chain network more secure and reliable.

    By utilizing the LSP protocol, nodes no longer need to go through complicated transaction confirmations and asset transfer pressures when exchanging asset ownership. Node holders can directly sell the node assets that need to be traded through the LSP trading platform, making it easier to exit, rather than requiring redemption to exit from the LSD and LRT platforms.

    Of course, the decentralization of POS network staking nodes is equally important. On the one hand, the sharding scheme of the LSP protocol eliminates the potential threat of large stakers to the security of the PoS network. On the other hand, it is also expected to attract more decentralized users to participate in staking.

    For users who need to participate in node staking, they do not need to participate in the construction of the network in a real sense. They can directly purchase node slices under the network ecosystem through the LSP protocol. This greatly reduces the threshold and deployment pressure for new users to participate in the public chain ecosystem, and also avoids various potential security threats in this process.

    Adaptability to multiple PoS networks

    Ethereum is currently the main market for LSD and LRT (centralized service providers dominate), and most emerging LSD and LRT protocols usually choose Ethereum ecosystem as their first choice in order to better capture users and funds. Therefore, it is unable to provide the original independent functionality of nodes to more ecosystems, including the data verification function of the network to which it belongs as an independent node. When it is unable to participate in verification, it also loses the core value of nodes as a guarantee of network data security, which is what we call a deviation from the original purpose of PoS.

    This has resulted in the scale of Ethereum’s liquidity derivatives growing larger and larger, while other PoS ecosystems have difficulty in scaling up, which in turn has caused many emerging PoS networks to face certain difficulties in maintaining security and capturing stakers.

    The LSP protocol is natively compatible with all PoS ecosystems, rather than being deployed at the bottom of one or several PoS networks like the LSD protocol. Therefore, the LSP protocol is not only aimed at Ethereum, but also other PoS ecosystems, which means that you can also pledge through the LSP protocol and get the return of slice equity assets.

    When a large number of nodes on the same public chain network participate in the LSP protocol, or when a public chain network user interacts with the LSP protocol for the first time, a node pledge pool dedicated to the network ecosystem will be opened to ensure that these sliced certificate assets come from the same public chain network. After the node pledge pool is established, the node network that joins later will enter this pledge pool by default and conduct the required asset transactions or holding activities with other pledged certificates.

    The above process is achieved through the verification network OmniVerify Chain, which can ensure that the node assets held by users can obtain the original node income and data verification functional value of the network to which they belong while running as an independent node.

    Focusing on OmniVerify Chain itself, it is an important underlying infrastructure for the operation of the LSP protocol. The LSP protocol is built on OmniVerify Chain, which includes a Rollup layer and a data availability service DA layer, which provides absolute security and data consistency guarantees for the underlying assets and completes data verification and equity ownership through cloud nodes. In the actual operation of OmniVerify Chain, users actually only need to perform a few simple steps such as delegated verification, purchase/sale of node slices, and other proof certificates.

    Since the security and functionality of the user-delegated nodes are guaranteed by OmniVerify Chain, strictly speaking, as long as the distributed network security management of OmniVerify Chain is friendly enough, its asset security is much better than storing it in the user’s hot wallet.

    Composability and Programmability

    The LSD protocol is composable and programmable.

    Composability is reflected in the ability of PoS verification. In fact, in some PoS networks, if we want to make a cross-chain bridge, a game application, a derivatives protocol featuring a synthetic asset protocol, or even some protocols or layers attached to Layer1 and Layer2 (such as Layer3), etc., we need to build a set of verification groups with different schemes by ourselves, and these verification groups need to have certain PoS capabilities. Building a set of verification groups requires sufficient pledges and nodes to ensure decentralization, but this need is based on a lot of economic costs and also lacks certain security. Although EigenLayer can provide certain support, the protocol must be built on the Ethereum system and also faces some centralized risks such as the centralized risks we mentioned above.

    The LSD protocol can solve the above problems through composability in this direction. While the LSD protocol itself provides verification capabilities for the PoS network, this verification capability is also extended to its underlying Dapps. For example, the LSD protocol integrates the Solana network and supports users to participate in staking on Solana. Then these SOL-based verification capabilities can also provide support for Dapps on Solana. These Dapps do not need to build their verification groups but can be directly developed and adapted through the OmniVerify Chain of the LSD protocol. The data verification revenue generated by the development of this product will be captured by most of these node slices, which will further expand the profitability of these node slices in the LSP protocol.

    In addition, in terms of programmability, the node assets are shared through the LSP protocol, allowing more complex protocols to expand the ecosystem of assets in a composable manner, ensuring the composability of assets. Since the OmniVerify Chain network meets the EVM execution standards, its assets are also programmable. Any developer is allowed to use node-slicing proof certificates to perform any type of asset combination.

    Backed by the huge PoS system, the LSP protocol has broad development prospects

    Whether it is the LSD or LRT track, in theory, it has benefits for building a security moat for the PoS ecosystem, but in reality, there are still many limitations and security issues. The LSP protocol is of great significance to the development of the PoS ecosystem in terms of wide adaptability, programmability, composability, and many other aspects. It can not only further promote the expansion of the scale of the Ethereum pledge system to disperse, but also accelerate the balance of the scale of the PoS network pledge.

    With the LSD protocol, users who participate in PoS staking can participate extensively in different ecosystems, and this more direct way of participation does not have the “nesting doll” attribute and thus does not have the risk of a death spiral.

    From a market perspective, the LSP protocol has huge market potential in a broad sense. Some potential directions include:

    ● Data availability layer, such as AI-based data availability networks such as TAO and RNDR.
    ● Oracle networks, such as LINK, API3, etc., require nodes to participate in data verification value networks.
    ● Cross-chain bridges, such as LayerZero, Wormhole, and other networks that require nodes to participate in data consistency verification.
    ● Other consensus protocols, and consensus verification networks similar to POS mechanisms.
    ● Rollup-based L2 networks, such as BTC L2, ETH L2, and L2 of more public chain networks in the future.
    ● Depin networks of cloud computing services, such as Aleo, IO.net, Aethir, etc., use cloud computing to provide computing resources.

    These networks cover almost all the non-POW public chain networks in the market. We believe that the overall market valuation of these networks will exceed one trillion US dollars in the next five years. On the other hand, the market-oriented consensus systems are all moving towards PoS, and even some infrastructure in the BTCFi field are following the PoS consensus mechanism. This trend is providing impetus for the development of the LSP protocol. If the LSP protocol can capture most of the nodes in a small part of the main public chain network ecosystem, then the node assets that the LSP protocol can manage and operate will also exceed tens of billions of US dollars, which also indirectly confirms the broad development prospects of the LSP protocol in the future.

    Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

    The post LSP Protocol Best Solution for Building a Security Moat for PoS Networks first appeared on AI-Tech Park.

    ]]>
    Arctic Wolf Wins Best SME Security Solution at 2024 SC Awards Europe https://ai-techpark.com/arctic-wolf-wins-best-sme-security-solution-at-2024-sc-awards-europe/ Tue, 11 Jun 2024 12:45:00 +0000 https://ai-techpark.com/?p=169000 Recognition reflects how Arctic Wolf’s native platform and European investments are delivering world-class security outcomes for organizations of almost any size Arctic Wolf®, a global leader in security operations, today announced that Arctic Wolf Managed Detection and Response was named Best SME Security Solution at the 2024 SC Awards Europe....

    The post Arctic Wolf Wins Best SME Security Solution at 2024 SC Awards Europe first appeared on AI-Tech Park.

    ]]>
    Recognition reflects how Arctic Wolf’s native platform and European investments are delivering world-class security outcomes for organizations of almost any size

    Arctic Wolf®, a global leader in security operations, today announced that Arctic Wolf Managed Detection and Response was named Best SME Security Solution at the 2024 SC Awards Europe. This recognition from UK and Europe’s longest-running and most respected annual cybersecurity competition serves as further validation of how the company’s single, open platform delivers effective, comprehensive, and reliable security outcomes for customers around the globe.

    Arctic Wolf Managed Detection and Response is the cornerstone of the Arctic Wolf Security Operations Cloud which provides thousands of organizations worldwide with the ability to quickly detect, respond to, and recover from advanced cyber threats. Built on an open XDR architecture and leveraging advanced AI-algorithms against the more than 5.5 trillion security events it ingests each week, the Arctic Wolf Platform unifies organizational data and delivers game changing noise reduction by turning thousands of daily alerts into an average of a single actionable ticket each day.

    Small and medium-sized enterprises (SMEs) are often resource constrained, lacking not only the financial resources to staff a security team 24×7, but also the operational expertise needed to defend against modern cyber threats. Arctic Wolf Managed Detection and Responses helps MSEs tackle these challenges head on by providing broad visibility, 24×7 monitoring, and advanced threat detection all delivered as an outsourced and fully-managed solution. With its unique Concierge Delivery Model and Security Journey benefits, Arctic Wolf Managed Detection helps midsize organizations defend against a sophisticated threat landscape and improve insurability, all for less than the typical annual cost of a single dedicated security analyst.

    “The ability for Arctic Wolf Managed Detection and Response to deliver superior security outcomes and an exceptional customer experience is a direct result of the speed, scale, and efficiency of the Arctic Wolf Platform,” said Dan Schiappa, chief product and services officer, Arctic Wolf. “Over the last three years, Arctic Wolf has gone all in on growing our security operations and go-to-market teams across Europe, and winning this SC Awards Europe is a tremendous honor that demonstrates how those investments have made Arctic Wolf Managed Detection and Response the ideal solution for European organizations looking for holistic protection that defends at the speed of data.”

    Arctic Wolf Managed Detection and Response continues to be globally recognized for its ability to enable companies of any size to establish world-class security operations in a rapid, cost-efficient, and scalable way. Additional recognition for Arctic Wolf Managed Detection and Response over the last twelve months include:

    • Named Leader in the 2024 IDC MarketScape for Worldwide Managed Detection and Response Services
    • Named Leader in Frost & Sullivan’s 2024 Frost Radar™ MDR report
    • Named Customers’ Choice for the North America region in the Gartner Peer Insights™ Voice of the Customer for Managed Detection and Response

    Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

    The post Arctic Wolf Wins Best SME Security Solution at 2024 SC Awards Europe first appeared on AI-Tech Park.

    ]]>
    Nokia unveils advanced DDoS countermeasures for improved protection https://ai-techpark.com/nokia-unveils-advanced-ddos-countermeasures-for-improved-protection/ Tue, 11 Jun 2024 09:00:00 +0000 https://ai-techpark.com/?p=168966 Nokia unveils advanced DDoS countermeasures for improved protection against botnet and application-level DDoS attacks Distributed Denial of Service (DDoS) attacks have become more frequent, sophisticated, and potent over last two years with some CSPs registering over 100 attacks daily. Nokia introducing advanced DDoS countermeasures, setting new standards for DDoS security...

    The post Nokia unveils advanced DDoS countermeasures for improved protection first appeared on AI-Tech Park.

    ]]>
    Nokia unveils advanced DDoS countermeasures for improved protection against botnet and application-level DDoS attacks

    • Distributed Denial of Service (DDoS) attacks have become more frequent, sophisticated, and potent over last two years with some CSPs registering over 100 attacks daily.
    • Nokia introducing advanced DDoS countermeasures, setting new standards for DDoS security with unmatched detection accuracy and speed and unparalleled mitigation agility and precision.
    • Countermeasures allow Nokia to meet growing demands of communications service providers (CSPs) and large digital enterprises to fight the latest generations of DDoS attacks.

    Espoo, Finland – Nokia today revealed an expanded set of Distributed Denial of Service (DDoS) mitigation capabilities of its Defender Mitigation System (7750 DMS-1) through advanced DDoS countermeasures. These countermeasures allow the DMS to meet the growing demands of communications service providers (CSPs) and large digital enterprises to fight the latest generations of DDoS attacks with improved efficiency and cost efficiency.

    Over the last two years, DDoS attacks have become more frequent, sophisticated, and potent with many CSPs and enterprises registering over 100 attacks daily. In 2023, more than 60% of all DDoS attacks were botnet-based, posing great challenges for legacy DDoS solutions and systems to detect and mitigate them. In 2024, DDoS threats come in a variety of new disguises, including free web browsing proxies that can be used to orchestrate botnet DDoS attacks without the knowledge of end-users. The ever-changing DDoS threat landscape is driving the need to neutralize new generations of DDoS attacks with improved speed, efficiency, and precision.

    A better approach to DDoS security is required to protect services and customers against a new scale of DDoS attacks (tens to hundreds of Gbps, occurring regularly), new levels of attack complexity (from many more sources to many more destinations and involving tens to hundreds of thousands of endpoints in case of botnet DDoS), and at a whole new level of concurrency (e.g., hundreds of simultaneous attacks).

    The new release of 7750 DMS-1 delivers Advanced Countermeasures Engine (ACE) functionality with L4-L7 stateful inspection of IP packets, allowing 7750 DMS-1 to combat all types of DDoS attacks – from volumetric to botnet and application-layer attacks – with a new level of agility and cost efficiency. The ACE functionality on 7750 DMS-1 is a testament to Nokia’s commitment to innovation, further enhancing Nokia’s unique combination of AI-driven big data analytics in Deepfield Defender and advanced IP networking technology, including the Nokia state-of-the-art routers powered by FP5 silicon.

    At the heart of the Nokia DDoS security solution is Deepfield Defender – an “all-seeing, all-knowing” AI-driven big data processing platform that analyzes network telemetry information obtained from the network and correlates it with the “security map of the internet,” the Deepfield Secure Genome® data feed. Using advanced AI/ML learning and algorithms, Defender makes real-time decisions about how to neutralize DDoS threats and attacks by activating mitigation on the network edge or a dedicated, next-generation mitigation platform, Defender Mitigation System (7750 DMS-1).

    The Nokia 7750 DMS-1 boosts DDoS mitigation efficiency with an array of new features, such as a full global map of DDoS botnets, improved DNS server protection, packet validation, and selective geo-IP blocking. 7750 DMS-1 has been designed to address stringent network security requirements driven by both networking and security teams.

    Grant Lenahan, Partner and Principal Analyst at Appledore Research, said: “Appledore has been convinced of the virtues of both Deepfield’s threat identification technology and the architectural benefits of the Nokia FP5-based solutions – both when used as appliances and as embedded functionality in routers. With advanced DDoS countermeasures on its 7750 Defender Mitigation System, Nokia further advanced its solution for dedicated DDoS mitigation with the addition of application-layer attack resolution parity to complement its FP5-based volumetric leadership. The solution’s expanded deployment footprint attests to this market success.”

    Jeff Smith, Vice President and Head of the Deepfield Business Unit at Nokia, said: “The occurrences of DDoS attacks have increased exponentially, and they’ve become more complex and powerful. We now commonly see attacks peaking in hundreds of Gbps in our customers’ networks – they are no longer a rare occurrence. This is the new DDoS reality the world is facing. The 7750 DMS-1 with new advanced DDoS countermeasures that Nokia has announced today set new standards for accuracy, speed and mitigation for DDoS security. Our unique solution and product architecture will facilitate the integration of the Nokia DDoS security solution into multiple networking and security environments, and will help service providers and enterprises protect their infrastructure, services and customers with a new level of network security required in the era of 5G, IoT and cloud connectivity.”

    The solution will be featured and demonstrated at the Nokia SReXperts EMEA conference in Palma, Spain, June 4-6, 2024.

    Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

    The post Nokia unveils advanced DDoS countermeasures for improved protection first appeared on AI-Tech Park.

    ]]>
    Corero Network Security Secures Major Renewal with DigitalOcean https://ai-techpark.com/corero-network-security-secures-major-renewal-with-digitalocean/ Thu, 06 Jun 2024 14:30:00 +0000 https://ai-techpark.com/?p=168628 Today, Corero Network Security (AIM: CNS) (OTCQB: DDOSF), the distributed denial of service (DDoS) protection specialists, announced the renewal of a significant contract with DigitalOcean, a leading cloud computing provider. This $1M+ agreement extends the partnership for an additional three years, highlighting Corero’s trusted role in safeguarding DigitalOcean’s extensive network infrastructure. DigitalOcean, renowned for...

    The post Corero Network Security Secures Major Renewal with DigitalOcean first appeared on AI-Tech Park.

    ]]>
    Today, Corero Network Security (AIM: CNS) (OTCQB: DDOSF), the distributed denial of service (DDoS) protection specialists, announced the renewal of a significant contract with DigitalOcean, a leading cloud computing provider. This $1M+ agreement extends the partnership for an additional three years, highlighting Corero’s trusted role in safeguarding DigitalOcean’s extensive network infrastructure.

    DigitalOcean, renowned for offering simple and affordable cloud computing solutions, has been a pioneering force in enabling developers, startups, and SMBs to bring their innovations to life. With a global network spanning over 17 data centers, DigitalOcean has turned to Corero’s advanced DDoS protection solutions to ensure seamless operations and robust defense against cyber threats.

    Under the renewed contract, Corero will provide DigitalOcean with its comprehensive SecureWatch Managed Services. This fully managed solution encompasses configuration optimization, proactive monitoring, and swift mitigation response to any DDoS incident. Delivered by Corero’s Security Operations Center (SOC), this service is designed to meet the specific security policies and business goals of DigitalOcean.

    Carl Herberger, CEO at Corero Network Security, commented:

    “We are thrilled to continue our partnership with DigitalOcean. This renewal underscores the confidence they have in our ability to protect their critical infrastructure. Our SecureWatch Managed Services will allow DigitalOcean to focus on their core business activities, knowing that their network is in safe hands.”

    Corero’s solution replaces a competitive solution with Corero SmartWall ONE, providing rapid and accurate DDoS attack detection at the network edge. Additionally, a dedicated Technical Account Manager will ensure ongoing professional services and continuous enhancements to DigitalOcean’s deployment.

    During an initial eight-month ramp-up and trial period, Corero demonstrated significant value through seamless transitions and continuous optimization, ultimately leading to this extended commitment from DigitalOcean.

    Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

    The post Corero Network Security Secures Major Renewal with DigitalOcean first appeared on AI-Tech Park.

    ]]>
    NVIDIA Supercharges Ethernet Networking for Generative AI https://ai-techpark.com/nvidia-supercharges-ethernet-networking-for-generative-ai/ Mon, 03 Jun 2024 15:45:00 +0000 https://ai-techpark.com/?p=168237 Spectrum-X Adopted by Cloud Service Providers, GPU Cloud Providers and Enterprises; Broad System-Maker Support Extends NVIDIA Networking’s Reach to Every Market COMPUTEX — NVIDIA today announced widespread adoption of the NVIDIA Spectrum™-X Ethernet networking platform as well as an accelerated product release schedule. CoreWeave, GMO Internet Group, Lambda, Scaleway, STPX Global and Yotta are...

    The post NVIDIA Supercharges Ethernet Networking for Generative AI first appeared on AI-Tech Park.

    ]]>
    Spectrum-X Adopted by Cloud Service Providers, GPU Cloud Providers and Enterprises; Broad System-Maker Support Extends NVIDIA Networking’s Reach to Every Market

    COMPUTEX — NVIDIA today announced widespread adoption of the NVIDIA Spectrum™-X Ethernet networking platform as well as an accelerated product release schedule.

    CoreWeave, GMO Internet Group, Lambda, Scaleway, STPX Global and Yotta are among the first AI cloud service providers embracing NVIDIA Spectrum-X to bring extreme networking performance to their AI infrastructures. Additionally, several NVIDIA partners have announced Spectrum-based products, including ASRock Rack, ASUS, GIGABYTE, Ingrasys, Inventec, Pegatron, QCT, Wistron and Wiwynn, which join Dell Technologies, Hewlett Packard Enterprise, Lenovo and Supermicro in incorporating the platform into their offerings.

    “Rapid advancements in groundbreaking technologies like generative AI underscore the necessity for every business to prioritize networking innovation to gain a competitive edge,” said Gilad Shainer, senior vice president of networking at NVIDIA. “NVIDIA Spectrum-X revolutionizes Ethernet networking to let businesses fully harness the power of their AI infrastructures to transform their operations and their industries.”

    Annual Release Cadence
    Spectrum-X is the world’s first Ethernet fabric built for AI, accelerating generative AI network performance by 1.6x over traditional Ethernet fabrics.

    To meet the industry’s strong demand for the performance Spectrum provides, NVIDIA founder and CEO Jensen Huang today announced during his COMPUTEX keynote in Taiwan that NVIDIA plans to launch new Spectrum-X products every year, delivering increased bandwidth and ports and enhanced software feature sets and programmability to drive leading AI Ethernet networking performance.

    Featuring the NVIDIA Spectrum SN5600 Ethernet switch and the NVIDIA BlueField® -3 SuperNIC, Spectrum-X is an end-to-end platform built with the performance and features required by generative AI clouds. Leveraging adaptive routing and congestion control for maximum bandwidth and noise isolation, it offers the highest-performance Ethernet networking for AI, providing predictable outcomes for thousands of simultaneous AI jobs at every scale.

    Combined with NVIDIA BlueField-3 DPUs, the platform enables advanced cloud multi-tenancy, GPU compute elasticity and zero-trust security. With it, cloud service providers can accelerate the development and deployment of AI solutions while improving their return on investment.

    Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

    The post NVIDIA Supercharges Ethernet Networking for Generative AI first appeared on AI-Tech Park.

    ]]>
    Lantronix to Showcase AI-Driven Out-Of-Band Management Solutions https://ai-techpark.com/lantronix-to-showcase-ai-driven-out-of-band-management-solutions/ Mon, 03 Jun 2024 13:45:00 +0000 https://ai-techpark.com/?p=168203 Utilizes rules-based AI to automatically recover and mitigate network infrastructure automatically, even during an outage Lantronix Inc. (NASDAQ: LTRX), a global leader in compute and connectivity IoT solutions, today announced that it will do live demos of its AI-driven out-of-band management solutions at booth 4875 at Cisco Live held June 2–6,...

    The post Lantronix to Showcase AI-Driven Out-Of-Band Management Solutions first appeared on AI-Tech Park.

    ]]>
    Utilizes rules-based AI to automatically recover and mitigate network infrastructure automatically, even during an outage

    Lantronix Inc. (NASDAQ: LTRX), a global leader in compute and connectivity IoT solutions, today announced that it will do live demos of its AI-driven out-of-band management solutions at booth 4875 at Cisco Live held June 2–6, 2024, in Las Vegas. Its innovative solutions for out-of-band environments utilize rules-based AI to recover and mitigate network infrastructure automatically, including reliable and secure access to remote gear during an outage. The solution automates many routine tasks that can unnecessarily consume a network admin’s day.

    “At Cisco Live, we’re excited to showcase our innovative solutions that empower our customers to utilize AI-driven decision-making to make their networks more secure and reliable while automating routine tasks, enabling network admins to focus on other responsibilities,” said Mathi Gurusamy, chief strategy officer at Lantronix. “At Lantronix, we are devoted to bringing innovative solutions that help our customers be more efficient, secure and bottom-line focused.”

    Lantronix is the go-to source for out-of-band innovations, providing a suite of reliable, secure and easy-to-deploy solutions, all supported by its exceptional service team. Being shown at Cisco Live are:

    AI-Driven Out-of-Band

    • LM83X, delivering AI-driven out-of-band management of 8–104 devices over serial console in a scalable and robust console server with dual power inputs. 
    • LM80, providing a fixed 8-port serial AI-driven out-of-band management solution that can automate a majority of routine IT maintenance and recovery tasks quickly and error-free.
    • Control Center, a single pane of glass for managing all LM-series devices for secure remote access, AAA controls and creating power monitoring and action rules without scripting, centrally archiving both monitored device operating system and configuration files and compliance reporting.

    Reliable Hardware, Trusted Performance

    • SLC 8000: Advanced Console Manager, the industry’s first advanced modular console manager that provides secure access to IT equipment with RS-232 and USB console.
    • EMG 7500, a complete edge solution for branch offices, remote locations and retail stores for which small port count and integrated cellular connectivity are ideal.
    • G520 Series, Lantronix’s next-generation IoT cellular LTE CAT 4G and 5G gateways that are designed for industrial applications with pre-enabled Percepxion Edge Solution Platform and cellular Connectivity Services to increase operational efficiency and prevent cyber-attacks

    Expert Technical Support

    • LEVEL Technical Services, providing dedicated technical support experts to assist with implementing out-of-band deployments and limited lifetime equipment warranties. 

    Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

    The post Lantronix to Showcase AI-Driven Out-Of-Band Management Solutions first appeared on AI-Tech Park.

    ]]>
    Carahsoft Makes Juniper’s AI-Native Networking Solutions https://ai-techpark.com/carahsoft-makes-junipers-ai-native-networking-solutions/ Mon, 03 Jun 2024 07:30:00 +0000 https://ai-techpark.com/?p=168144 New Designation Makes Juniper’s Secure Networking Portfolio Available to Federal, State and Local Government Agencies Carahsoft Technology Corp., the Trusted Government IT Solutions Provider®, today announced that it has added Juniper Networks’ network security offerings to its GSA (General Services Administration) Schedule, making Juniper’s zero trust solutions available to the Public Sector...

    The post Carahsoft Makes Juniper’s AI-Native Networking Solutions first appeared on AI-Tech Park.

    ]]>
    New Designation Makes Juniper’s Secure Networking Portfolio Available to Federal, State and Local Government Agencies

    Carahsoft Technology Corp., the Trusted Government IT Solutions Provider®, today announced that it has added Juniper Networks’ network security offerings to its GSA (General Services Administration) Schedule, making Juniper’s zero trust solutions available to the Public Sector through Carahsoft and its reseller partners. This will enable Federal, State and Local Government agencies to more easily leverage Juniper’s AI for IT Operations (AIOps) offerings to simplify network operations and drive customer experience and engagement.

    “Carahsoft is committed to helping our Government customers protect their data and digital connections from cyber-attacks through the deployment of cutting-edge network security solutions,” said Eric Goycochea, Sales Director who leads the Juniper Team at Carahsoft. “We are pleased to add Juniper to our GSA Schedule, and we look forward to working with our reseller partners to increase the availability of these innovative zero trust solutions in the Public Sector market.”

    Juniper’s AI-Native Networking Platform, which includes Marvis®, the only AI-Native VNA in the industry and driven by Mist AI™, delivers the best end-to-end operator and end-user experiences and drives Juniper’s zero trust network security capabilities. The unique cloud-enabled platform enhances customer experience and engagement with a simplified networking process. This approach enables Public Sector organizations to focus resources on fulfilling critical mandates, instead of logistics concerns.

    “We are pleased to expand our partnership with Carahsoft through the inclusion on Carahsoft’s GSA Schedule,” said Gordon Mackintosh, Group Vice President, Partner Organization at Juniper Networks. “This milestone further expands our presence in the Public Sector market, reaffirming our commitment to offering Government agencies simplified access to zero trust secured networking software and platforms. These solutions enhance connectivity, boosting Government efficiency and fostering innovation.”

    Juniper’s offerings are available through Carahsoft’s GSA Schedule No. 47QSWA18D008F, SEWP V contracts NNG15SC03B and NNG15SC27B, NASPO ValuePoint Master Agreement #AR2472, OMNIA Partners Contract #R191902 and The Quilt Master Service Agreement Number MSA05012019-F. For more information, contact the Carahsoft team at (703) 581-6600 or Juniper@carahsoft.com; or view this on-demand webinar, “Enabling the Modern Government,” featuring Juniper.

    Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

    The post Carahsoft Makes Juniper’s AI-Native Networking Solutions first appeared on AI-Tech Park.

    ]]>
    NEXCOM, CTOne, and Vertex Join Forces to Enhance Private Network Security https://ai-techpark.com/nexcom-ctone-and-vertex-join-forces-to-enhance-private-network-security/ Tue, 28 May 2024 08:00:00 +0000 https://ai-techpark.com/?p=167660 NEXCOM, a leading supplier of network solutions, CTOne, a global cybersecurity leader in communication technology, and Vertex, a professional system integrator of 5G private network, join forces for groundbreaking POC targeted to advance 5G private network security within semiconductor manufacturing site framework. Designed to address the specific cybersecurity challenges common...

    The post NEXCOM, CTOne, and Vertex Join Forces to Enhance Private Network Security first appeared on AI-Tech Park.

    ]]>
    NEXCOM, a leading supplier of network solutions, CTOne, a global cybersecurity leader in communication technology, and Vertex, a professional system integrator of 5G private network, join forces for groundbreaking POC targeted to advance 5G private network security within semiconductor manufacturing site framework. Designed to address the specific cybersecurity challenges common in OT networks, collaborative solution offers unparalleled protection, and seamless integration into existing network architectures with minimal disruption to operations during deployment.

    Improved Network Security

    NEXCOM’s 1U Edge server, the TCA 5170, delivers scalable performance and advanced cybersecurity features, empowering manufacturers with robust OT network protection. Leveraging cutting-edge technologies, the TCA 5170 accelerate encryption and decryption processes, ensures authentication and real-time threat detection, safeguarding private networks against evolving cyber threats. Its scalability makes it ideal for deployments of all sizes, from smaller production lines to semiconductor giants, providing comprehensive security solutions for diverse industrial needs.

    More Visibility, Easier Management

    The integrated solution simplifies the management of complex OT networks, enabling IT teams to efficiently monitor and manage network security while optimizing resource utilization. CTOne’s virtualized private 5G security software, installed on TCA 5170 and deployed at strategic points at the semiconductor manufacturing site, integrates seamlessly across IT and CT networks to deliver full visibility with real-time monitoring of data traffic. Combined with CTOne’s built-in 5G protection capabilities, the solution enable immediate interception and isolation of threats while supporting a Zero Trust strategy.

    “This collaboration has been pivotal in delivering a comprehensive cybersecurity solution for semiconductor manufacturing sites,” said Ming-Yang, Yi, senior manager of AMEA business development group of CTOne. “By integrating our advanced 5G visibility and security capabilities with NEXCOM’s TCA 5170, we’ve created a robust solution that enhances data protection and optimizes operational efficiency of private 5G networks.”

    “Working alongside NEXCOM and CTOne has allowed us to deliver a truly comprehensive cybersecurity solution for private 5G network,” said Willis Fu, Technical Director at Vertex. “Bringing together NEXCOM’s TCA 5170 and CTOne’s Mobile Network Security solution ensures seamless protection of the private 5G network, providing our end customer with peace of mind and confidence in their operations.”

    “The TCA 5170 is a compact 1U server that offers different configurations and scalable performance, allowing our ecosystem partners to easily adapt and run their applications for deployments of all scales,” said Jennifer Lan, Sales & Marketing Director of Network & Communication Solutions at NEXCOM. “Our successful collaboration with CTOne and Vertex underscores our commitment to providing top-tier security and operational efficiency for our clients.”

    Read full Case Study: Security-Solution-to-Protect-Private-Networks-at-Semiconductor-Facilities.pdf (nexcom.com)

    This joint solution can be experienced firsthand at upcoming exhibitions:

    • May 29 – May 31, 2024, CommunicAsia 2024, Singapore, Singapore EXPO, Hall 4, booth 4E3-14
    • June 26  – June 28, 2024, COMNEXT, Japan, Tokyo, Tokyo Big Sight, South Hall, Booth 9-14

    Explore AITechPark for the latest advancements in AI, IOT, Cybersecurity, AITech News, and insightful updates from industry experts!

    The post NEXCOM, CTOne, and Vertex Join Forces to Enhance Private Network Security first appeared on AI-Tech Park.

    ]]>