BizTech Magazine - Technology Solutions That Drive Business https://biztechmagazine.com/rss.xml en Access Control Models: How to Navigate Changing Security Frontiers https://biztechmagazine.com/article/2019/08/access-control-models-how-navigate-changing-security-frontiers-perfcon <span>Access Control Models: How to Navigate Changing Security Frontiers</span> <span><span lang="" about="/dashboard/bobkeaveneyu64t" typeof="schema:Person" property="schema:name" datatype="">Bob.Keaveney_u64t</span></span> <span>Fri, 08/16/2019 - 11:52</span> <div><p>As businesses undertake digital transformation projects frontiers expand in both physical and digital spaces, access control has become about more than just keycards and security kiosks. <strong>The need for more robust security across organizations has led IT leaders to explore various access control systems</strong>, including examining how different access control models and management structures could work together to benefit business. </p> <p>But before an access control management structure or model can be implemented, let’s take a look at access control in the interconnected age.  </p> <p><a href="https://biztechmagazine.com/article/2019/01/5-tips-updating-cybersecurity-incident-response-plan" target="_blank" title="5 Tips for Updating a Cybersecurity Plan"><b><i>MORE FROM BIZTECH</i></b><i>: Update your cybersecurity response plan before an attack occurs.</i></a></p> <h2>What Is Access Control and How Does It Work with IoT?</h2> <p><strong>Access control is a security technique that regulates who or what can view or use resources in any environment.</strong> There are two main types: physical and logical. Both forms of access control are concerned with entry to restricted areas but vary on how to define those areas.  </p> <p><strong>Logical access control</strong> addresses who or what can attain virtual access to data, digital resources and computer networks (think password-protected documents or two-factor authentication). Meanwhile, <strong>physical access control</strong> impedes bodily access to buildings, rooms or other tangible assets (think metered gates or doors that lock automatically). </p> <p><strong>The rise of the Internet of Things has transformed access control. </strong>Security cameras, card readers, locks and more can now connect via a single wireless network, allowing security managers to control them from various software-based platforms. Whether it’s using a smartphone to open a door or monitoring security footage via a tablet from a remote location, IoT has increased the mobility and scope of access control in a way never before seen on previous systems.  </p> <p>But even as the IoT revolution changes access control, it can create added vulnerability for hackers looking to exploit these interconnected networks. <strong>That’s where access control models and management become key. </strong></p> <p><a data-entity-type="" data-entity-uuid="" data-widget="image" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" id="" rel="" target="_blank" title=""><img alt="Cybersecurity_IR_howstrong_700x220.jpg" data-entity-type="" data-entity-uuid="" src="https://fedtechmagazine.com/sites/fedtechmagazine.com/files/Cybersecurity_IR_howstrong_700x220.jpg" /></a></p> <h2>Understanding Access Control Models and Management</h2> <p>There are three primary models of access control:</p> <p><strong>Web-based access control systems</strong> are entirely cloud-based and store permissions on the web rather than on a physical device. This model allows security managers greater access and visibility into the areas they’re monitoring and makes it easier to update or change security permissions in real time from any location. </p> <p><strong>Mobile-based access control models </strong>function in much the same way. Using a smartphone, security teams can remotely access every aspect of a business's security system — from the password-protected server to a locked door — to update and change permissions via codes sent over Wi-Fi or cellular signal.</p> <p>For businesses looking for even greater mobility, connecting all access control software and hardware via one network allows security managers to update these devices all at once in real time. This <strong>IoT-based access control model</strong> keeps systems up to date with the latest security patches.</p> <p>However, these models can create their own security risks. Anything cloud- or web-based, or which links several devices to one source, can easily fall prey to hackers.<strong> Access control management systems can reduce this increased cybersecurity risk by clearly identifying who can access secured information. </strong></p> <h2>What Are the Types of Access Control?</h2> <p><strong>Mandatory Access Control</strong> (MAC) management is the strictest management option and cedes total control of an entire operating system — doors, cloud-based services, elevators, smartphones — to a system administrator. Without this administrator's permission, no one and nothing can gain access. </p> <p><strong>Discretionary Access Control </strong>(DAC) management is one step down from MAC and allows businesses to decide who has access to which areas. Think of this as a bit like the official guest list for a party: The people on the list have access to the party, but they can’t bring a friend and might not have access to every room at the event. Unlike with MAC systems, there is no single entity that grants permissions. </p> <p>Similar to DAC, <strong>Role-Based Access Control </strong>(RAC) grants permissions based on certain criteria. Here, a user might have access to his or her personal email, but not to a business’s private files on the same server. This allows businesses to create layers of security and grant access based on unique needs. </p> <p>Last, <strong>Rule-Based Access Control</strong> (RBAC) is a mixture of DAC and RAC. Here, an individual or list of individuals have access to certain areas based on unique needs but must abide by certain rules (think of elevators that lock out employees after hours, regardless of whether they have keycards). </p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/digital-transformation-trends.html" target="_blank"><img alt="Digital%20Transformation_IR_1.jpg" data-entity-type="" data-entity-uuid="" src="/sites/healthtechmagazine.net/files/Digital%20Transformation_IR_1.jpg" /></a></p> <h2>How to Choose an Access Control Model and Management System</h2> <p>No one type of access control is foolproof, and no one model or management structure is better than another. What’s important is that a business identifies its end goal before implementing any type of access control structure. </p> <p><a href="https://rsdoor.com/choose-best-access-control-system/" target="_blank">R&amp;S Erection of Concord</a>, a California-based vendor of garage doors, commercial gates and loading dock equipment, recommends following four steps when selecting access control:</p> <ol><li><strong>Consider access control policies, models and mechanisms. </strong>As outlined above, the model and management structure selected is critical to the success of access control. Choosing the model and structure helps identify the hardware and software requirements.</li> <li><strong>Know the hardware and security requirements. </strong>Hardware will vary based on what level of security is needed and what kind of authentication process is required. For instance, fingerprinting will require different hardware and offer a different level of security than, say, keycard readers or facial recognition requirements.</li> <li><strong>Assess connectivity and costs. </strong>Not all access control systems work with all types of operating systems. Some offer web-based connectivity solutions that may require network upgrades. Consider network capacity and the cost of additions or extensions before selecting certain access control models.</li> <li><strong>Plan for the future.</strong> While many access control system vendors will offer upgrades, make sure to examine such policies before purchasing. Also consider future business developments before committing to one type of access control model or management structure.  </li> </ol><p> </p> </div> <div> <div class="field-author"><a href="/author/biztech-staff" hreflang="en">BizTech Staff</a></div> </div> Fri, 16 Aug 2019 15:52:55 +0000 Bob.Keaveney_u64t 44486 at https://biztechmagazine.com Review: Cisco Meraki MV12 Camera Provides Much More Than Security https://biztechmagazine.com/article/2019/08/review-cisco-meraki-mv12-camera-provides-much-more-security <span>Review: Cisco Meraki MV12 Camera Provides Much More Than Security</span> <span><span lang="" about="/dashboard/bobkeaveneyu64t" typeof="schema:Person" property="schema:name" datatype="">Bob.Keaveney_u64t</span></span> <span>Fri, 08/16/2019 - 09:25</span> <div><p>Almost every business, and certainly every retail store, deploys some form of video surveillance. But most of the time, cameras don’t provide much value beyond theft prevention.</p> <p>Cisco has found a way to change that with the new <a href="https://www.cdw.com/product/cisco-meraki-wide-angle-MV12W-mini-dome-hd-camera-network-surveillance-cam/5007151" target="_blank">Cisco Meraki MV12W</a> minidome camera. Armed with <strong>onboard analytics, it can analyze customer foot traffic</strong>, figure out demographic information or even alert staffers that someone might need assistance.</p> <p>It also <strong>functions extremely well as a security camera</strong> at the same time, especially with its night vision capabilities, which operate in total darkness.</p> <p>Although tiny and unobtrusive, <strong>every MV12W is like a miniature surveillance system</strong>. It has 256 gigabytes of internal storage and connects to the rest of the network through a CAT 5 cable, which also allows for cloud backup and supports Power over Ethernet.</p> <p>Setup of one or 100 MV12Ws is extremely easy using the <strong>Cisco Meraki dashboard, which can also manage other Cisco equipment</strong>. It’s easy to configure video walls to watch over different sections of a facility, and no special equipment is required to watch live or recorded feeds. Any user with access can tap into the system using a browser or smartphone.</p> </div> <div> <div class="field-author"><a href="/author/john-breeden-ii" hreflang="en">John Breeden II</a></div> </div> Fri, 16 Aug 2019 13:25:49 +0000 Bob.Keaveney_u64t 44481 at https://biztechmagazine.com CDW Protect SummIT https://biztechmagazine.com/cdw-protect-summit-philadelphia <span>CDW Protect SummIT</span> <span><span lang="" about="/dashboard/andrewstegerachh" typeof="schema:Person" property="schema:name" datatype="">Andrew.Steger_acHH</span></span> <span>Wed, 08/14/2019 - 15:44</span> <div><p>As businesses expand their digital-first platforms, they’re creating wider potential exposure to threats and privacy breaches. And while the CIO is becoming more strategic to new products, services and digital revenue opportunities, the CISO must maintain corresponding security standards and protect against reputational risk. The stakes and risks have never been so high or more swift: for being disrupted and outsmarted by innovative competitors in the race for relevance -- and to protect new digital pathways in today’s furiously-paced business climate.</p> <p>How are organizations protecting their businesses for an era teeming with technologies across digital business, artificial intelligence and machine learning? What new and evolving approaches show promise to protect the organization against emerging threats? And where are other organizations finding success in their risk and security efforts?</p> <p>The CDW Protect SummIT will bring together experts who can answer these questions, address your most pressing security challenges and help you stay ahead of new and emerging threats.</p> <p>Join <em>BizTech</em> as we cover CDW's Protect SummIT from Aug. 19-20 in Philadelphia.</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" target="_blank" title="CDW Cybersecurity Insight Report"><img alt="Cybersecurity-report_EasyTarget.jpg" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/uploads/Cybersecurity-report_EasyTarget.jpg" /></a></p> </div> <div> <div>Event Image Toggle</div> <div>Off</div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/cdw-protect-summit-philadelphia" data-title="CDW Protect SummIT" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Aug</span> <span>14</span> <span>2019</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> <!-- Pinterest button is in EdTechk12 theme's vertical template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://biztechmagazine.com/cdw-protect-summit-philadelphia" data-title="CDW Protect SummIT" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fdestination%3D%2Fnode%2F43521%2Fedit%26_exception_statuscode%3D403" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> <!-- Pinterest button is in EdTechk12 theme's horizontal template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/cdw-protect-summit-philadelphia" data-title="CDW Protect SummIT" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> Wed, 14 Aug 2019 19:44:48 +0000 Andrew.Steger_acHH 44476 at https://biztechmagazine.com Q&A: Cisco's Brian Roddy Notes Many Businesses Are Already in the Cloud and Don't Even Know It https://biztechmagazine.com/article/2019/08/qa-ciscos-brian-roddy-notes-many-businesses-are-already-cloud-and-dont-even-know-it <span>Q&amp;A: Cisco&#039;s Brian Roddy Notes Many Businesses Are Already in the Cloud and Don&#039;t Even Know It</span> <span><span lang="" about="/dashboard/rickyribeiro" typeof="schema:Person" property="schema:name" datatype="">ricky.ribeiro</span></span> <span>Tue, 08/13/2019 - 16:18</span> <div><p>Here’s a scary thought: Businesses are using hundreds of cloud applications that their IT teams don’t even know about. Each one of those applications is a potential security risk, <strong>yet it’s difficult to secure a network against unseen threats</strong>, notes Brian Roddy, vice ­president and general manager of cloud s­ecurity for <a href="https://www.cdw.com/content/cdw/en/brand/cisco.html" target="_blank" title="Cisco Systems">Cisco Systems</a>.</p> <p>In a conversation with <em>BizTech</em> Managing Editor Bob Keaveney, Roddy says good cloud security starts with better visibility.</p> <h2><span style="color: #c74037;">BIZTECH:</span> What are your threat intelligence sources telling you that small and midsize businesses should know right now when it comes to cloud security?</h2> <p>What we’ve seen is a dramatic increase in malware and ransomware exposure targeting the midmarket and below. Larger companies have very high-end security postures now, which means most attacks on them are targeted. But downmarket, hackers are seeing a whole lot of opportunities to attack things.</p> <p>We’ve also seen a huge increase in <a href="https://biztechmagazine.com/media/video/cryptojacking-what-it-and-why-should-your-business-be-concerned" target="_blank" title="Cryptojacking">cryptojacking</a>, where people are using malware to basically hijack your computer power. That doesn’t feel bad, but it can add up and it can slow network performance and cause trouble.</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" target="_blank" title="CDW Cybersecurity Insight Report"><img alt="CDW Cybersecurity Insight Report" data-entity-type="" data-entity-uuid="" src="/sites/biztechmagazine.com/files/Cybersecurity_IR_stayprotected_700x220_3.jpg" /></a></p> <p>One of the simplest and most effective things to do is Domain Name System-based security. And the reason we highlight that is because it’s easy to deploy — you can usually do it in about a half hour — and customers that deploy it tell us they see <strong>a 90 percent decrease in malware</strong>. So, that’s a pretty good bang for your buck.</p> <h2><span style="color: #c74037;">BIZTECH:</span> When it comes to cloud applications, what do businesses need to think about when it comes to security generally?</h2> <p>The first thing you have to think about is, “How does my security model change as a result of my use of this application?” It used to be that all the applications lived in the data center. And the good thing was that, as the IT manager, I had complete control over those applications. I could look at the data they’re storing, I could keep a perimeter around them and keep them safe. The challenge was, if my data center does get breached, I lose all the application data at once. It’s an all-or-nothing situation.</p> <p>When I deploy cloud applications, <strong>I diversify my security issues</strong>. Now I have to worry about applications like Salesforce and <a href="https://www.cdw.com/content/cdw/en/brand/microsoft/office365.html" target="_blank" title="Office 365">Office 365</a> and all my other cloud applications. The good news is those companies have typically spent a lot more than you can as a small business on security, so they’re keeping those applications safe. And if they do get breached, you only lose the data from that one system.</p> </div> <div> <div class="field-author"><a href="/author/bob-keaveney" hreflang="en">Bob Keaveney</a></div> </div> Tue, 13 Aug 2019 20:18:53 +0000 ricky.ribeiro 44471 at https://biztechmagazine.com What Keeps IT Leaders Up at Night? https://biztechmagazine.com/media/video/what-keeps-it-leaders-night <span>What Keeps IT Leaders Up at Night?</span> <div><p>The stakes of business technology have never been higher as organizations become increasingly reliant upon technology to operate and grow. Traditionally, the most common words to induce heart palpitations have been "The network is down." To get a better sense of what IT leaders grapple with in the modern era, we asked several CISOs and IT leaders to share their worst cold-sweat scenarios.</p> </div> <span><span lang="" about="/dashboard/rickyribeiro" typeof="schema:Person" property="schema:name" datatype="">ricky.ribeiro</span></span> <span>Tue, 08/13/2019 - 11:11</span> <div> <div>Tweet text</div> <div>In an ever-shifting #cybersecurity landscape, so many things can go wrong in the blink of an eye. In our INSIDER EXCLUSIVE, we asked #CISOs to share what actually keeps them up at night:</div> </div> <div> <div>Video ID</div> <div><p>1969778668</p> </div> </div> <div> <div>video type</div> <div><a href="/conference" hreflang="en">Conference</a></div> </div> <div> <div>CDW Activity ID</div> <div><p>MKT34058</p> </div> </div> <div> <div>CDW VV2 Strategy</div> <div>Security</div> </div> <div> <div>CDW Segment</div> <div>Med/Lar</div> </div> <div> <div>Customer Focused</div> <div>True</div> </div> <div> <div>Buying Cycle</div> <div><a href="/awareness" hreflang="en">Awareness</a></div> </div> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/media/video/what-keeps-it-leaders-night" data-title="In an ever-shifting #cybersecurity landscape, so many things can go wrong in the blink of an eye. In our INSIDER EXCLUSIVE, we asked #CISOs to share what actually keeps them up at night:" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Aug</span> <span>13</span> <span>2019</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> <!-- Pinterest button is in EdTechk12 theme's vertical template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/media/video/what-keeps-it-leaders-night" data-title="In an ever-shifting #cybersecurity landscape, so many things can go wrong in the blink of an eye. In our INSIDER EXCLUSIVE, we asked #CISOs to share what actually keeps them up at night:" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://biztechmagazine.com/media/video/what-keeps-it-leaders-night" data-title="In an ever-shifting #cybersecurity landscape, so many things can go wrong in the blink of an eye. In our INSIDER EXCLUSIVE, we asked #CISOs to share what actually keeps them up at night:" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Ftaxonomy%2Fterm%2F1444%2Ffeed" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> <!-- Pinterest button is in EdTechk12 theme's horizontal template --> </div> <div> <div>Pull Quote</div> <div> <p class="quote"><a href="/media/video/what-keeps-it-leaders-night"> We do breach exercises where we simulate a breach and then get the team together to respond as a whole group.&quot; </a></p> <img src="/sites/biztechmagazine.com/files/styles/photo_quote_thumb/public/2019-08/mike-kelley-pullquote.jpg?itok=t53DhuQn" width="60" height="60" alt="Mike Kelley EW Scripps" typeof="foaf:Image" /> <p class='speaker'> <span>Mike Kelley</span> CISO, EW Scripps </p> </div> </div> Tue, 13 Aug 2019 15:11:54 +0000 ricky.ribeiro 44466 at https://biztechmagazine.com 4 Ways to Set Up a VM Using Automatic Virtual Machine Activation https://biztechmagazine.com/article/2019/08/4-ways-set-vm-using-automatic-virtual-machine-activation <span>4 Ways to Set Up a VM Using Automatic Virtual Machine Activation</span> <span><span lang="" about="/dashboard/andrewstegerachh" typeof="schema:Person" property="schema:name" datatype="">Andrew.Steger_acHH</span></span> <span>Tue, 08/13/2019 - 09:33</span> <div><p>Activating <a href="https://www.cdw.com/content/cdw/en/brand/microsoft/windows-10.html" target="_blank">Microsoft Windows</a> virtual machines can be challenging. But by using automatic virtual machine activation with the built-in Software Licensing Manager, <strong>administrators can quickly and easily license one or many VMs at once</strong>.</p> <p>Let’s see what it takes to activate VMs using AVMA, both from the ­command line and remotely via PowerShell.</p> <h2 id="toc_0">1. Check License Status of an Invalid KMS Key</h2> <p>To check the license status of a VM that has an invalid KMS key, <strong>an admin will execute a VBScript called slmgr.vbs on the VM console</strong>. Open up a command prompt by running cmd.exe and type “slmgr /dli.” If the VM is using an invalid KMS key, the script will bring up a dialog box that indicates as much.</p> <h2 id="toc_1">2. Check License Status of an Unlicensed VM</h2> <p>Administrators can also use the slmgr script to check the license status of an unlicensed VM, but <strong>the dialog box will look different</strong>. Running “slmgr /dli” on a VM that does not have a license will return a notification displaying the message “Error: product key not found.”</p> <p><a href="https://biztechmagazine.com/article/2018/11/containers-vs-virtual-machines-whats-best-your-business-perfcon" target="_blank"><em><strong>MORE FROM BIZTECH:</strong> What makes more sense for a business: virtual machines or containerization?</em></a></p> <h2 id="toc_2">3. Activate a VM License via Command Prompt</h2> <p>If an administrator has an available product key, he or she can use the slmgr script via cmd.exe (command prompt). This time, however, <strong>instead of using the /dli argument, the administrator would use the /ipk argument</strong>, followed by the product key, which is a 25-digit alphanumeric code. It might look like this: “slmgr /ipk DBGBW-NPF86-BJVTX-K3WKJ-MTB6V.” </p> <h2 id="toc_3">4. Activate a VM License via PowerShell</h2> <p>Using the command line is fine for a couple of VMs, but an admin can also leverage PowerShell to activate VMs in bulk. If an admin has PowerShell Remoting enabled, <strong>he or she can invoke “slmgr.vbs /ipk &lt;LicenseKey&gt;” remotely on VMs using the Invoke-Command</strong>: “Invoke-Command -ComputerName AVMA1 -ScriptBlock { cscript C:\Windows\System32\slmgr.vbs /ipk &lt;ProductKey&gt;}.”</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/digital-transformation-trends.html" target="_blank"><img alt="Digital%20Transformation_IR_1.jpg" data-entity-type="" data-entity-uuid="" src="/sites/healthtechmagazine.net/files/Digital%20Transformation_IR_1.jpg" /></a></p> </div> <div> <div class="field-author"><a href="/author/adam-bertram" hreflang="en">Adam Bertram</a></div> </div> Tue, 13 Aug 2019 13:33:45 +0000 Andrew.Steger_acHH 44461 at https://biztechmagazine.com Financial Services Firms Favor Value Over Cost When Considering Cloud https://biztechmagazine.com/article/2019/08/financial-services-firms-favor-value-over-cost-when-considering-cloud <span>Financial Services Firms Favor Value Over Cost When Considering Cloud</span> <span><span lang="" about="/dashboard/mickeymccartermt7e" typeof="schema:Person" property="schema:name" datatype="">Mickey.McCarter_mT7E</span></span> <span>Mon, 08/12/2019 - 12:59</span> <div><p>When it comes to IT investments, there’s cost, and then <strong>there’s value</strong>. </p> <p>In the <strong>early days of the public cloud</strong>, there was great fanfare about potential cost savings from the model. However, as the cloud has matured and more financial firms have migrated resources out of their corporate data centers, many IT leaders have realized that the public cloud isn’t always less expensive than on-premises resources. In fact, <a href="https://blogs.vmware.com/management/2017/07/private-vs-public-cloud-costs-surprising-451-research-results.html" target="_blank">451 Research found</a> that 41 percent of IT decision-makers feel that their private clouds are cheaper than a comparable public cloud environment. </p> <p>However, even in finance, money isn’t everything. Many <strong>financial firms opt for public cloud resources</strong> — even in instances where they will cost more than on-premises investments — to unlock cloud benefits such as speed and agility. Here are some of the benefits and business objectives that are causing firms to prize value above cost when making decisions about the cloud.</p> <h2>Cloud Efficiently Manages High-Volume Transactions</h2> <p>The public cloud helps financial firms to <strong>manage high-volume transactions</strong> while also running other critical services. The Financial Industry Regulatory Authority, for example, <a href="https://siliconangle.com/2019/07/12/financial-services-orgs-value-agility-cost-cloud-says-aws-awssummit/" target="_blank">uses cloud infrastructure</a> to help the organization process 155 billion market events every night while at the same time running all of its surveillance routines. </p> <p><a href="https://www.cdw.com/content/cdw/en/orchestration/hybrid-cloud-infrastructure-report.html" target="_blank"><img alt="IT%20Infrastructure_IR_2.jpg" src="https://biztechmagazine.com/sites/biztechmagazine.com/files/IT%20Infrastructure_IR_2.jpg" /></a></p> <h2>Cloud Providers Offer Easy Regulatory Compliance </h2> <p>Regulatory compliance is a necessary headache: It’s not the reason anybody goes into the financial sector, but ignoring it can cause substantial problems for financial firms. A number of financial institutions are attracted to cloud services that <strong>help to automate compliance controls</strong>, freeing up staff time for tasks that are more challenging, more interesting and more centered on the mission of the organization. </p> <p>In June 2019, <a href="https://siliconangle.com/2019/06/25/new-aws-services-position-cloud-as-safer-port-in-dangerous-cybersecurity-sea-reinforce/" target="_blank">Amazon Web Services announced</a> the general availability of AWS Control Tower and AWS Security Hub, after a seven-month preview period. The services provide organizations with <strong>a dashboard view of security tools</strong> and automate the process of setting up secure and compliant environments. </p> <p><a href="https://biztechmagazine.com/article/2019/06/top-5-retail-banking-technology-trends-2019-so-far-perfcon" target="_blank"><em><strong>MORE FROM BIZTECH: </strong>Revisit the Top 5 trends in retail banking in 2019 so far.</em></a></p> <h2>Cloud Tech Simplifies Auditing and Testing</h2> <p>Using cloud technology, <a href="https://www.bankingciooutlook.com/news/finance-sectors-shifting-toward-cloud-with-innovative-strategies-nwid-871.html%22%20%5Ct%20%22_blank" target="_blank">notes Banking CIO Outlook</a>, financial firms are able to embrace a culture in which “everyone’s a programmer,” generating purpose-built tools that are <strong>easier to audit and test than alternatives</strong>. It offers the example of a global asset management company that leveraged Google Cloud’s public cloud environment to create new apps for fund allocation and marketing. The approach provides the financial firm immediate access to development instruments for company customers, and also allows it to take a user-driven approach to software delivery. </p> <h2>Institutions Become Early Adopters of Emerging Technology</h2> <p>What’s more, the public cloud can be an effective method for delivering <strong>innovative applications such as machine learning</strong>, <a href="https://www.bankingciooutlook.com/news/finance-sectors-shifting-toward-cloud-with-innovative-strategies-nwid-871.html%22%20%5Ct%20%22_blank" target="_blank">according to Banking CIO Outlook</a>. For instance, the publication reports, some financial services firms are adopting cloud-based machine learning systems that incorporate tools to help with collecting and verifying data, analyzing and managing processes, configuring and monitoring infrastructure and other tasks. Firms are also implementing cloud-based tools with features such as model monitoring, diagnostics and reporting. </p> <p>“In global digital disruption,” Banking CIO Outlook states, “cloud innovation is rapidly becoming <strong>a fundamental driver</strong> and is gaining more prominence and cohesion with banks.”</p> </div> <div> <div class="field-author"><a href="/author/calvin-hennick" hreflang="en">Calvin Hennick</a></div> </div> Mon, 12 Aug 2019 16:59:57 +0000 Mickey.McCarter_mT7E 44456 at https://biztechmagazine.com Digital Transformation Insight Report https://biztechmagazine.com/ad/digital-transformation-insight-report <span>Digital Transformation Insight Report</span> <span><span lang="" about="/dashboard/hanorahsrihari" typeof="schema:Person" property="schema:name" datatype="">hanorah.srihari</span></span> <span>Thu, 08/08/2019 - 20:26</span> <div class="pw-widget pw-size-medium pw-layout-vertical" data-layout="vertical" data-url="https://biztechmagazine.com/ad/digital-transformation-insight-report" data-title="Digital Transformation Insight Report" data-via="BizTechMagazine" data-button-background="none"> <span> <span>Aug</span> <span>08</span> <span>2019</span> </span> <a class="pw-button-twitter cdw-taboola-social"></a> <a class="pw-button-facebook cdw-taboola-social"></a> <a class="pw-button-linkedin cdw-taboola-social"></a> <a class="pw-button-reddit cdw-taboola-social"></a> <a class="pw-button-flipboard cdw-taboola-social"></a> <a class="pw-button-email cdw-taboola-social"></a> <!-- Pinterest button is in EdTechk12 theme's vertical template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-counter="true" data-url="https://biztechmagazine.com/ad/digital-transformation-insight-report" data-title="Digital Transformation Insight Report" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter cdw-taboola-social"></a> <a href="https://twitter.com/search?f=realtime&amp;q=https%3A%2F%2Fbiztechmagazine.com%2Frss.xml%3Fitem_id%3D181%26c%3D66%26n%3Dcorporate%2520%2526amp%253B%2520legal" target="_blank"><span class="pw-box-counter cdw-taboola" data-channel="twitter"></span></a> </div> <div> <a class="pw-button-facebook cdw-taboola-social"></a> </div> <div> <a class="pw-button-linkedin cdw-taboola-social"></a> </div> <div> <a class="pw-button-reddit cdw-taboola-social"></a> </div> <div> <a class="pw-button-flipboard cdw-taboola-social"></a> </div> <div> <a class="pw-button-email cdw-taboola-social"></a> </div> <!-- Pinterest button is in EdTechk12 theme's horizontal template --> </div> <div class="pw-widget pw-size-medium pw-layout-horizontal" data-url="https://biztechmagazine.com/ad/digital-transformation-insight-report" data-title="Digital Transformation Insight Report" data-via="BizTechMagazine" data-button-background="none"> <div> <a class="pw-button-twitter"></a> <span class="pw-box-counter" pw:channel="twitter"></span> </div> <div> <a class="pw-button-facebook"></a> <span class="pw-box-counter" pw:channel="facebook"></span> </div> </div> Fri, 09 Aug 2019 00:26:08 +0000 hanorah.srihari 44451 at https://biztechmagazine.com Gesture Technology Is Moving Toward a ‘Universal Remote Control’ https://biztechmagazine.com/article/2019/08/gesture-technology-moving-toward-universal-remote-control <span>Gesture Technology Is Moving Toward a ‘Universal Remote Control’</span> <span><span lang="" about="/dashboard/rickyribeiro" typeof="schema:Person" property="schema:name" datatype="">ricky.ribeiro</span></span> <span>Thu, 08/08/2019 - 17:29</span> <div><p>In movies, the fastest way to convey a futuristic world is by giving characters the power to <strong>control their environment with a simple wave of the hand</strong>.</p> <p>Gesture control isn’t ubiquitous yet, but the technology is progressing. In January, the Federal Communications Commission approved <a href="https://atap.google.com/soli/" target="_blank" title="Project Soli">Google’s Project Soli</a>, a sensing technology that uses miniature radar to detect touchless gestures.</p> <p>“With the FCC approvals, Google can develop the gesture technology at a faster pace,” says Thadhani Jagdish, senior research analyst in the information and communications technology practice at Grand View Research, to eventually “transform an individual’s hand into a universal remote control.”</p> <h2>Gesture Applications Impact Retail and TV Consumption</h2> <p>Gesture technology is already being put into use in diverse applications, Jagdish notes. In South Africa’s O.R. Tambo International Airport, a coffee company <strong>installed a machine that analyzes travelers’ facial gestures and dispenses a cup of coffee if it detects someone yawning</strong>.</p> <p>Samsung launched a TV that supports motion control for changing channels, playing games or using the internet. Leap Motion, which develops hand-tracking software, has an input device that helps a user control a computer or laptop with hand movements. Inside businesses, <strong>motion-sensing devices can be useful in spaces such as conference rooms that rely on shared screens and collaboration platforms</strong>.</p> <p>“This kind of technology enables the control of your pointers and your cursors on large displays where it would otherwise be very cumbersome to use your own mouse and keyboard,” says Rich Radke, a professor of electrical, computer and systems engineering at the Rensselaer Polytechnic Institute. He says staff there use Microsoft Kinect, which lets them point at a screen to change the content.</p> <p><a href="https://biztechmagazine.com/article/2019/02/are-augmented-and-virtual-reality-future-corporate-training" target="_blank"><em><strong>MORE FROM BIZTECH:</strong> Learn how virtual reality is influencing the future of corporate training.</em></a></p> </div> <div> <div class="field-author"><a href="/author/jen-miller" hreflang="en">Jen A. Miller</a></div> </div> Thu, 08 Aug 2019 21:29:06 +0000 ricky.ribeiro 44446 at https://biztechmagazine.com 5 Questions to Ask About Buying AI-Enabled Security Software https://biztechmagazine.com/article/2019/08/5-questions-ask-about-buying-ai-enabled-security-software <span>5 Questions to Ask About Buying AI-Enabled Security Software</span> <span><span lang="" about="/dashboard/rickyribeiro" typeof="schema:Person" property="schema:name" datatype="">ricky.ribeiro</span></span> <span>Thu, 08/08/2019 - 16:37</span> <div><p>Security products incorporating artificial intelligence techniques may reduce the workload for human analysts, taking over the time-consuming job of correlating information sources and mining voluminous logs to uncover suspicious patterns of activity. Vendors, seeing the hype around AI, are quick to slap the label on almost any technology for a cutting-edge veneer.</p> <p>Here are five questions to ask before purchasing an AI-enabled security system:</p> <h2>1. What Data Was Used to Train the AI?</h2> <p>AI and machine learning techniques detect patterns in data and use those patterns to make predictions about the future. But those models are only as good as the data used to train them. Make sure it’s clear how the security system’s models were created. Does the product create a model customized for your organization, or does it use the same model across all types of environments?</p> <h2>2. Does the Technology Truly Use Machine Learning or AI?</h2> <p>Some vendors assume that if their product is making recommendations, it’s using artificial intelligence. In reality, some of those products are simply using the same pattern-matching rules that they’ve always used, rather than relying upon more sophisticated data models. Make sure the vendor is clear about the nature of the AI that its product is supposedly using.</p> <h2>3. How Does the AI Learn and Improve Its Abilities Over Time?</h2> <p>As networks, systems and user behavior change, models must adapt to reflect those changes. How is the model updated? Is it continuously retrained on your new data as it is collected, or does it require product updates from the vendor to improve its abilities? How are those updates delivered?</p> <p><a href="https://biztechmagazine.com/article/2019/07/cryptojacking-silent-insidious-security-threat" target="_blank"><em><strong>MORE FROM BIZTECH:</strong> Get hip to the cryptojacking threat that might be siphoning resources and data from your computer without your knowledge.</em></a></p> <h2>4. Who Owns the Resulting Models?</h2> <p>If the product is using the business’s data to either develop or contribute to broader models, who owns those models? Is the vendor permitted to use that model with other customers? Is the business able to access details of the model and use them in other security applications? Read the contract’s fine print to make sure it’s clear how the vendor will use the data and what rights the organization retains.</p> <h2>5. Will the AI Save Time or Improve the Organization’s Security Posture?</h2> <p>You should invest in AI technology only if you truly believe that it will either reduce the amount of time currently spent by security analysts on your team or provide you with insight that you don’t receive from your existing products. As with any business investment, make sure that the expected ROI justifies the cost.</p> <p><a data-entity-type="" data-entity-uuid="" href="https://www.cdw.com/content/cdw/en/orchestration/cyber-security-report.html" target="_blank"><img alt="CDW Cybersecurity Insight Report " data-entity-type="" data-entity-uuid="" src="https://biztechmagazine.com/sites/statetechmagazine.com/files/Cybersecurity_IR_stayprotected_700x220%20(2).jpg" /></a></p> </div> <div> <div class="field-author"><a href="/author/mike-chapple" hreflang="en">Mike Chapple</a></div> </div> Thu, 08 Aug 2019 20:37:30 +0000 ricky.ribeiro 44441 at https://biztechmagazine.com