.banner-thumbnail-wrapper { display:none; }

How containers are the new basic currency for pay as you go hybrid IT

How containers are the new basic currency for pay as you go hybrid IT

Learn about innovative container use cases and the escalating benefits that come from broad container use.

HPE strategist Mark Linesch on the surging role of containers in advancing the hybrid IT estate

HPE strategist Mark Linesch on the surging role of containers in advancing the hybrid IT estate

A discussion on containers innovation and next developments in automated and extensible IT infrastructure container solutions for hybrid IT and multicloud.

Pushing the Edge in Security: Achieving the Common Criteria Certification

cohesity_blog_Securitycertification-1175x375.jpg
Srini Sekaran   Product Marketing

Srini Sekaran
Product Marketing

Cohesity is committed to the digital transformation of the public sector. Over the last few years, organizations within the Department of Defense, space agencies, as well as intelligence and civilian organizations have come to rely on Cohesity to protect, manage, and leverage their data. As part of the Federal Data Strategy, a comprehensive plan that guides how agencies should manage and use federal data, the top priorities are further securing enterprise data governance, increasing data access and use, and encouraging the use of data to improve decision-making and accountability. It makes sense: data is not just a business catalyst, it’s also transforming the way the public sector operates.

Cohesity continues to push the edge in supporting this transformation, particularly with security and compliance. From announcing native integrations with the leading certified government clouds to supporting TAA compliance rules, Cohesity continues to address evolving requirements and adhere to the most stringent security measures. Today, Cohesity announces that its products have been Common Criteria EAL2+ certified.

Common Criteria is an international set of guidelines and specifications developed for evaluating information security products, specifically to ensure they meet a universal security standard for government deployments. Mandated by numerous government bodies, Common Criteria is the de facto universal security certification, accepted by the governments of 30+ countries around the globe.

Achieving the Common Criteria Evaluation Assurance Level 2 certification for Cohesity DataPlatform and Cohesity DataProtect is a milestone, underpinning our commitment to security and serving the public sector — but it’s just one part of a broader story. Security is deeply ingrained into all our products, with always-on encryption and a scale-out data management platform that adheres to the most rigorous compliance protocols.

Public sector organizations are in good company. A gamut of federal organizations rely on Cohesity to modernize their IT initiatives; security is one of the cardinal aspects of why they trust Cohesity. Now with EAL2+ certification, federal customers can experience a comprehensive set of capabilities that push the edge in security:

  • Common Criteria Evaluation Assurance Level 2 (EAL2+) certified

  • Native integration with leading FedRAMP certified government clouds—AWS GovCloud, Microsoft Azure GovCloud, and Google Cloud Platform

  • FIPS 140-2 validated

  • Always-on encryption, based on AES-256

  • TAA compliant

  • Federal Information Security Management Act (FISMA) Compliance | Authorities to Operate (ATOs) on DoD networks

  • WORM Compliant – SEC 17a-4f certification

  • Strong multi-factor, certificate-based (PIV/CAC) authentication and integrations with the leading identity providers

  • Internal key management service (KMS) support and integration with external KMS for key management, including SafeNet integration

Federal agencies are working to transform the way they operate. Cohesity helps them on the journey to digital transformation, with security as the foundation. As a result, the public sector can rest easy, knowing that change can be done securely, and reap the benefits of thwarting mass data fragmentation. To learn more, take a look at how Cohesity manages federal data — securely.

New App Uses Backup Data to Combat Cyber Threats

CyberSecure_social_1175x375.png
Raj Dutt  co-founder/ceo at Grafana Labs

Raj Dutt
co-founder/ceo at Grafana Labs

Identifying and addressing cyber exposures and vulnerabilities has become a major challenge for enterprises today. According to a recent survey, the majority of organizations that suffered a data breach in the past two years say it was caused by a known vulnerability that had not been patched. The survey also found that 37 percent of organizations say they don’t even scan for vulnerabilities.

To address this challenge, organizations need a solution that leverages backup data to discover cyber exposures and vulnerabilities within their IT production environment and assess the risk posture of their IT environment. Cyber exposures often lead to cyberattacks — such as ransomware attacks or data breaches — and discovering these cyber exposures is the first step in defending against online criminals.

The new Cohesity CyberScan application makes it easy to scan for cyber exposures. Available now on the Cohesity MarketPlace, the application works by scanning backup copies on Cohesity (instead of the live production copy) to identify any cyber exposures across an organization’s production IT environment. This includes the operating system, computer, network devices, and configurations. The application gives a global view of all vulnerabilities through an easy-to-read security dashboard along with actionable recommendations on how to address exposures before hackers exploit them.

security-dashboard.jpg

This is done through Cohesity’s unique architecture that boots the snapshot within the Cohesity run-time environment and runs a scan to locate vulnerabilities against regularly published entries within the public CVE database. This process does not impact production performance or require that scans run during a maintenance window.

Additionally, the application helps IT professionals perform backup verification, ensuring that a given backup snapshot is recoverable. It also eliminates the risk of re-injecting known, or previously addressed, vulnerabilities back into the production environment when performing a recovery job or while leveraging backup copy for dev/test.

The application also gives organizations the ability to run scans on backup data on a frequent basis, instead of waiting for weeks or months to schedule scans in the production environment. This further reduces opportunities for data breaches.

Cohesity CyberScan:

  • Addresses the need from IT to have an environment that runs 24-7.

  • Provides predictable recovery by ensuring backup copy is recoverable and does not re-infect known vulnerabilities during the recovery process

  • Identifies vulnerabilities and misconfigurations without putting any additional burden on their mission-critical operations.

Using Backup Data to Protect Across Multiple Fronts:

The Cohesity CyberScan application builds on existing Cohesity security capabilities to protect across multiple fronts, including a comprehensive anti-ransomware solution and antivirus applications.

  • Comprehensive Defense Against Ransomware: Cohesity uniquely empowers organizations to prevent backup data from becoming a target while detecting and responding to ransomware attacks using its immutable file system, anomaly detection, and instant mass restores. Customers can access Cohesity’s anti-ransomware capabilities from the same security dashboard that houses the vulnerability scan, giving customers visibility and insights into “blind spots” within their IT environment.

  • Antivirus Applications Without Parallel Infrastructure: Cohesity customers can defend their file infrastructure against attacks by running the ClamAV open-source application directly on file data stored on the Cohesity DataPlatform, instead of copying the data onto parallel infrastructure for analysis. SentinelOne, which is also available in the Cohesity MarketPlace, provides up-to-date virus libraries based on machine-learning algorithms directly on the Cohesity DataPlatform.

Learn More About CyberScan:

  • Read more about Cohesity’s vulnerability and recoverability solution.

  • Watch a video demonstration of the Cohesity CyberScan application.

The venerable history of IT systems management meets the new era of AIOps-fueled automation over hybrid and multicloud complexity

The venerable history of IT systems management meets the new era of AIOps-fueled automation over hybrid and multicloud complexity

A discussion on how IT management technologies and methods have evolved to optimize and automate workloads to exacting performances and cost requirements.

How the Catalyst UK program seeds the next generations of HPC, AI, and supercomputing

How the Catalyst UK program seeds the next generations of HPC, AI, and supercomputing

A discussion on how the Catalyst UK program seeds the advancement of the ARM CPU architecture for HPC as well as a vibrant software ecosystem.

Introducing verified HPE Peak Performance Badges

HPE Education Services has recently updated its Peak Performance digital badging program to enable verification and sharing of digital credentials through Acclaim. Digital credentials such as "fast start" badges are now available to be verified by Hewlett Packard Enterprise without the need of a paid certification assessment.

Comparing certifications and digital credentials

hpe_peak_performance_badging.png

A digital badge is a graphical representation of a meaningful training achievement and is not limited to certifications. Digital Credentials displayed as badges have proven to have a positive influence on learning results. All official Digital badge images from HPE contain links which allows a viewer to confirm authenticity of the badge and an earners entitlement.  Think of a badge as a digital version of a certificate or diploma.  Digital Credentials issued through the HPE Peak Performance program signify that earners have completed all required training and passed a skills assessment.  To protect privacy, the digital badge may only be viewed and shared based on the badge earner’s choice. 

How digital badges stimulate learning

To graduate from college, there are steps you must go through before you earn your final degree. Earning  digital credential stimulates  learners to complete programs by celebrating and sharing their milestones and achievements throughout the learning journey . Badges shared on a “leader board” keeps learners motivated as they progress and allows a company or employer validate those achievements. A good example is the Fast Start badge for HPE Composable Infrastructure which is a foundational level credential  that provides a first look to  IT Professionals, Generalists, Presales, Technical Influencers, or Partners.  

Digital Credentials and continuous learning

HPE Digital badges are an excellent way to ensure that learners aren’t relying on their original training.  Peak Performance badges from HPE assist learners to maintain their skills  by  keeping them current.  A good example is the HPE Storage Certification which is good for three years.   A Digital badge (such as the fast start badge for Nimble Storage on Acclaim) could be used to ensure certified earners have the latest information.  

Sharing and verification of digital badges

HPE has partnered with Acclaim to provide an open badging platform for verification of its Digital Credentials. Acclaim verifies that badges represent are officially issued by HPE.  The badge verification process  prevents imposters from creating or copying a digital image and claiming an achievement falsely. The image of the verification screen on the Acclaim site shows how this is accomplished. Clicking on the image will take you to the Acclaim page to verify this badge as being officially earned :

hpe_peak_performance_acclaim_verification (1).png



Getting Started

The following Fast Start badges are available in the HPE Peak Performance badge collection

  • HPE ProLiant Gen10

  • HPE Composable Infrastructure (includes Synergy)

  • HPE Nimble Storage

  • HPE ProLiant for Microsoft Azure Stack

Start earning and sharing your Peak Performance digital badges today.  Explore the HPE Peak Performance badging page at hpe.com/ww/learnbadging.

If you’ve already earned HPE badges, be sure to share with coworkers and the rest of the HPE Community,  or on LinkedIn (either as a post or within your profile),  don't forget to add the hashtag #HPEPeak and be sure to copy me @savvyedu




HPE and PTC join forces to deliver best manufacturing outcomes from the OT-IT productivity revolution

HPE and PTC join forces to deliver best manufacturing outcomes from the OT-IT productivity revolution

Learn how the latest data analysis platforms bring unprecedented benefits to the edge for real-time insights for manufacturers.

IT and HR: Not such an odd couple

IT and HR: Not such an odd couple

A discussion on how those writing the next chapters of human resources and information technology interactions are finding common ground to significantly improve the modern employee experience.

How rapid machine learning at the racing edge accelerates Venturi Formula E Team to top-efficiency wins

How rapid machine learning at the racing edge accelerates Venturi Formula E Team to top-efficiency wins

A discussion on how data-driven technology and innovation are making electric racing cars an example for all endeavors where limits are tested and bested

The budding storage relationship between HPE and Cohesity brings the best of startup innovation to global enterprise reach

The budding storage relationship between HPE and Cohesity brings the best of startup innovation to global enterprise reach

A discussion on how edge-centric data and compute require a management lifecycle capability at the edge and how a tag team of startup and global vendor are building such a solution.

HPE’s Erik Vogel on what's driving success in hybrid cloud adoption and optimization

HPE’s Erik Vogel on what's driving success in hybrid cloud adoption and optimization

A discussion on innovation around maturing hybrid cloud models and how proper common management of hybrid cloud operations makes or breaks the expected benefits.

How total deployment intelligence overcomes the growing complexity of multicloud management

How total deployment intelligence overcomes the growing complexity of multicloud management

A discussion on how new tools, processes, and methods bring insights and actionable analysis to help regain control over hybrid cloud and multicloud sprawl.

How an agile focus for Enterprise Architects builds competitive advantage for digital transformation

How an agile focus for Enterprise Architects builds competitive advantage for digital transformation

A discussion on how Enterprise Architects should embrace agile approaches to build more competitive advantage for their companies.

Qlik’s top researcher describes new ways for human cognition to join forces with augmented intelligence

Qlik’s top researcher describes new ways for human cognition to join forces with augmented intelligence

A discussion on how the latest research and products bring the power of people and machine intelligence closer together to make analytics consumable across more business processes.

Using AI to solve data and IT complexity -- and thereby better enable AI

Using AI to solve data and IT complexity -- and thereby better enable AI

Learn how AI will help conquer complexity to allow for higher abstractions of benefits from across all sorts of data for better analysis.

How IT can fix the broken employee experience

How IT can fix the broken employee experience

A discussion on how a European IT consultancy is leveraging the latest digital technologies from Citrix to transform how its 11,000 employees work.

Architectural firm attains security and performance confidence across virtualized and distributed desktops environment

Architectural firm attains security and performance confidence across virtualized and distributed desktops environment

Learn how BLDD Architects developed IT security that supports all of its servers and mix of clients in a way that’s invisible to its end users.

Qlik’s CTO on why the cloud data diaspora forces businesses to rethink their analytics strategies

Qlik’s CTO on why the cloud data diaspora forces businesses to rethink their analytics strategies

A discussion on why new ways of thinking are demanded if comprehensive analysis of relevant data can become practical across a multi- and hybrid-cloud deployments world.

Happy employees equal happy customers -- and fans. Can IT deliver for them all?

Happy employees equal happy customers -- and fans. Can IT deliver for them all?

A discussion on how new breeds of intelligent digital workspace technologies can deliver a superior employee -- and ultimately customer -- experience that boosts engagement, productivity, and business results.