Changing Your Data Security Tactics for the Internet of Things

August 29, 2017
By Jessica Weber

Chain-Link Fence

The concept of the Internet of Things (IoT) has introduced new complexities into the web of network security, and the approach to security has to change to accommodate that. In previous posts we've talked about predictive analytics and changing security policies for the digital revolution of IoT, but what exactly is going to change in the realm of data security? Well, according to most technology sources, almost everything.

The Game Changer

The biggest problem with security in the IoT is that hackers are coming up with new ways to commandeer and take down IoT devices everyday. This "guerrilla warfare" method is not traditional because it can come from almost any angle (within the corporate data system, attacks on the actual device, etc), so a pattern of attack is hard to establish and then look for within the system. Commercialized products for general public consumption are especially vulnerable because as the products are developed they are often pushed to market before their security features have been fully tested. The agile method of releasing and then reiterating is good for making progress and getting user feedback, but can leave devices vulnerable to attack. There are, however, several ways to combat these security vulnerabilities.

Move from

...

Read on...

Transform Your Security Policy for the IoT

August 17, 2017
By Jessica Weber

big data lock

In a previous blog we mentioned the Internet of Things (IoT) and how it is changing the approach towards cybersecurity. Predictive analytics is increasingly becoming an integral part of the security game, as companies invested in IoT use analytics to identify attacks before they happen, an important step in the evolution of security. As IoT continues to increase its share of the IT market and also changes the way we use technology in everyday life, we must adjust our cybersecurity policies to take into account this fundamental shift in security needs.

IoT is also a big driver in the digital transformation of company infrastructure, as organizations respond to the changing needs and demands of their customers for more technology integration. In fact, research findings published by Inmarsat say that IoT has become the leading reason for digital transformation and is the number one priority for 92% of organizations.

As companies go through digital transformation and incorporate IoT, they need to keep security top-of-mind. Gartner states that "by 2020, 60 percent of digital businesses will suffer major service failures due to the inability of IT security teams to manage digital risk". Organizations cannot afford to have long periods of downtime due to cyberattacks...

Read on...

ThreatConnect Partners with CenturyLink

August 15, 2017
By Jonathan Townsend

cybersecurity

CenturyLink's end-to-end security managed services are built to detect, protect, and respond to security threats and malicious activity anywhere customers do business. Bolstering these features, CenturyLink’s Managed Security Services will now leverage ThreatConnect, a threat intelligence-based security platform that taps into SAP HANA. The partnership allows CenturyLink to utilize its Managed Services offering, composed of a data-driven set of tools to improve detection, protection, and remediation services for customers.

CenturyLink’s security service is built to help Security Operations Center (SOC) specialists and customers identify, block, and mitigate security threats through Security Log Monitoring(SLM), incident management, and response support services. ThreatConnect will integrate with the CenturyLink platform to provide an offering and solution that fits with its customers’ new or existing threat management and security operations functions.

Regarding ThreatConnect’s impact working with organizations, CEO Adam Vincent said, "the MSSP program is a force multiplier that organizations like CenturyLink can leverage to offer threat detection and response, customized processes or any of a number of premium services to clients."

Adam Vincent’s vision is centered on automating as much of a SOC as possible and while continuing to build a community around threat intelligence. In years past, the barriers were technology-based as the resources and process...

Read on...

Managing a Cloud Migration

August 3, 2017
By Jonathan Townsend

cloud-integration

Managing a Cloud Migration with CenturyLink

Migration to the cloud doesn't have to be complicated. At CenturyLink® , we understand the importance of easing the complexity involved with migrating platforms. Read up on simplifying your cloud migration and get in-touch with one of our cloud specialists allows customers learn more about migration to receive information and details on migrating to the CenturyLink Platform with free onboarding support.

The following guide is here to help tick the boxes on the important steps and criteria for a successful migration to the cloud.

Assess your existing situation

It's important to take stock of existing infrastructure, licensing, staffing, and hardware capabilities and limitations. When it comes to migration, this step goes beyond assessing the state of the physical equipment – it means getting a holistic perspective of your existing situation and needs in their entirety.

  • Where are you regarding end-of-life status on existing hardware, leases, warranty, or support agreements? Taking snapshots of each of these elements is crucial to taking the next (and necessary steps) towards a migration.

  • Is it time to renew software enterprise agreements? Can you take advantage of more flexible subscription or service provider licensing models? Oftentimes, it makes more business and operational sense to take

...

Read on...

CenturyLink Named a Leader - 2017 Gartner Magic Quadrant: Managed Hybrid Cloud Hosting, Europe

August 2, 2017
By Daniel Morton

EU Flag

CenturyLink is proud to announce that for the fifth consecutive year Gartner’s 2017 Magic Quadrant for Managed Hybrid Cloud Hosting, Europe has again positioned CenturyLink as a "Leader" in their Magic Quadrant. We have been recognized by Gartner® in Europe for our "ability to execute" and "completeness of vision." The designation validates how CenturyLink is helping businesses of all sizes to achieve their Digital Transformation goals, across public, private, hybrid and multi-cloud environments.

Market Leader Criteria Specifications

According to Gartner, leaders in their Magic Quadrant meet the following criteria:

  • Proven staying power in the market
  • Frequently innovate on existing products
  • Reliable enterprise-class needs
  • Proven technical competence
  • Ability to deliver services to a wide range of customers
  • Address multiple use cases with stand-alone or integrated solutions
  • Have a presence in multiple European locations
  • Offer solutions around data sovereignty requirements

Matthew Johns, Product Marketing Manager, EMEA describes our Managed Hybrid Cloud Hosting in Europe: Here at CenturyLink, we believe our experience in designing and delivering solutions across multiple technology platforms is particularly key in this day and age where there is so much complexity in the cloud market. With an enormous variety of services available across multiple providers, and such a huge skills gap in the market, many organizations find it difficult to...

Read on...

Predictive Analytics and Virus Research Have More in Common Than We Think

July 20, 2017
By Jessica Weber

analytics graphic lightbulb

The Internet of Things (IoT) encompasses many avenues and aspects of modern technology and life. Our devices have enabled us to become a more connected society because they have been designed specifically to connect to one another. But with this connection comes many challenges. As data is shared between the ever-expanding network of "smart" devices, we have to look at how we can protect that data in ways we haven't previously had to.

What is IoT?

The Internet of Things is basically a network of connected devices. Or as one Forbes writer excellently described it: "...the concept of basically connecting any device with an on and off switch to the Internet (and/or to each other). This includes everything from cellphones, coffee makers, washing machines, headphones, lamps, wearable devices and almost anything else you can think of. This also applies to components of machines, for example a jet engine of an airplane or the drill of an oil rig.". When we talk about IoT, we're talking about the revolution of technology-driven smart devices that have changed the way we live, work, and play. As more and more devices are developed and connected, there are just as many questions and issues that come into...

Read on...

Alert Logic: A Better Approach to Security

July 6, 2017
By Alert Logic Evangelism Team

alert logic logo

Periodically, we turn over control of the CenturyLink Cloud blog to members of our certified technology Ecosystem to share how their technology on the CenturyLink Marketplace provides customers with low-friction solutions to solve complex business challenges. This edition's guest provider from the Marketplace Provider Program is Alert Logic.

Businesses' top priorities are to provide a service that meets the needs of its customer base, grow in their respective markets, generate revenue, and protect their investments. Ensuring that your company has an adaptive and comprehensive security model is one of the best ways to protect the company’s investments, data, customers, and reputation.

Security threats are nothing new and only continue to evolve, getting harder to detect and eliminate. To ensure that a business is continuously secure takes time, effort, resources, and expertise. This can be a challenge for companies who are trying to manage their security posture while still supporting the day-to-day business operations. IT infrastructure is more dynamic than ever, with on-premises data centers, cloud and hybrid environments, and an ever-changing threat landscape. Without a clear line of sight into your entire infrastructure environment, how can you protect your data and applications from compromise?

A Better Approach to Security

Alert Logic's Security-as-a-Service offering...

Read on...

Demystifying Digital Transformation

June 29, 2017
By Jonathan Townsend

digital transformation

What does a Digital Transformation look like?

Organizations everywhere are embarking on Digital Transformations — going beyond simple automation and cost savings to reach into new areas, revolutionizing their business models and discovering new growth opportunities by taking advantage of leading-edge technologies to conduct business differently. In doing so, they’re enhancing their processes, their value propositions, and their relationships with both internal stakeholders and external customers.

Innovative enterprises continue to lead the way by pursuing new solutions for digital innovation. For example, large retail companies used to rely on physical stores to showcase, house, and ultimately sell their product a decade ago. However, that industry underwent a complete Digital Transformation, ushering an e-commerce boom that demanded new platforms, processes, and standards were developed to take full advantage of digital technologies that are easy to use, deploy, patch, and maintain.

Leading companies invest heavily in developing a sound Digital Transformation strategy, and the quality of that strategic approach is paramount to the overall success of transforming a business.

Even as the IT industry is rapidly evolving, it's important to keep in mind that Digital Transformation is less of a sprint and more of a marathon. To maximize the efficiency of their digital strategy, companies must...

Read on...

Announcing the Launch of the CenturyLink Cloud Node: DE3

June 22, 2017
By Matt Schwabenbauer

CenturyLink is excited to announce the launch of our newest European public cloud node: DE3. This announcement increases our global footprint to 16 locations, including four in Europe and two in Germany.

DE3, which is physically located in Frankfurt, Germany, is an example of how CenturyLink Cloud is increasing its worldwide infrastructure presence. CenturyLink global customers now have more options when planning their IT strategy, including the ability to optimize the distance between their cloud workloads and end users.

Customers hosting workloads in our existing German site (DE1) now have the ability to strengthen their Business Continuity and Disaster Recovery strategies in DE3, while adhering to German data sovereignty policies.

A core focus at CenturyLink is to help our customers through their digital transformation. Visit our location page to see how our services can help plan your business around the world.

de3.png

CenturyLink Cloud enables customers with an easy-to-use interface, compelling value-for-performance and integrated managed services. This provides our customers with the business agility they want from a cloud provider, while delivering the security and scalability they need to host mission-critical enterprise applications.

While not available at launch, our Bare Metal Servers and next generation Object Storage products will also be offered in our DE3 location...

Read on...

Security Made Easy with FlexSecure

June 8, 2017
By Sid Prasanna

flexsecurelogo

Periodically, we turn over control of the CenturyLink Cloud blog to members of our certified technology Ecosystem to share how their technology on the CenturyLink Marketplace provides customers with low-friction solutions to solve complex business challenges. This edition's guest author from the Cloud Marketplace Provider Program is Sid Prasanna, CEO, at FlexSecure.

Passwordless Authentication Made Easy

FlexSecure solves a unifying problem -- the need to dynamically secure access to resources and data, based on the user and their level of authorized access. Many solutions exist for granting access in a static way, but no easy-to-use solution exists that can adjust the security authentication requirements in real-time, based on dynamic factors in the security equation.

By adding FlexSecure to their existing authentication or access control systems, organizations can adopt multi-layered authentication options. Multi-layered authentication enable organizations to add significant levels of security to protect their data from hackers and prevent unauthorized access.

FlexSecure is a flexible user authentication platform, providing Passwordless and Pin-based authentication, without the need to install an application. This platform enables organizations of all sizes to mix and match appropriate user authentication methods to protect applications on their Cloud, Mobile, and IT infrastructure. The FlexSecure platform is easy and secure and offers...

Read on...

WannaCrypt Ransomware Malware Announcement from CenturyLink Cloud

May 25, 2017
By Christine Sala

On May 12, 2017, Microsoft issued a statement confirming a number of their customers had been affected by the malicious WannaCrypt ransomware malware. CenturyLink has taken steps to ensure our Cloud environment has the latest patches and is monitoring for any additional related vulnerabilities.

If you believe your organization is impacted we recommend all CenturyLink Cloud customers take the below steps to further secure your environment:

  • Install Microsoft Security Update MS17-010 to address the vulnerabilities by correcting how SMBv1 handles specially crafted requests. Details here: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx
  • Confirm that anti-malware is deployed and updated and work with your provider to confirm you are protected.
  • Ensure the following IP ports (TCP 139, TCP 445, UDP 137 and UDP 138) are blocked at the firewall unless essential to your operations.
  • If you have any questions or concerns, please contact cloudhelp@ctl.io

    ...

    Read on...


    Connect

      Follow us on


    Start Your Free Trial

    High performance, fast deployment times and intuitive management capabilities that will push your business forward

    *We will send a SMS message to verify your account, standard rates apply.