Professional Documents
Culture Documents
net
FORTNIGHTLY
MAGAZINE
Jan. 30 - Feb. 14
VOLUME 19
ISSUE 02 / 2018
NO. OF PAGES - 36
Information Security
Landscape in 2018 33... Curtain Raiser
The stage is all set for 14th
edition of Pragyan 2018
H.O.: DELHI / EDITORIAL OFFICE Retail selling price of News Paper Rs. 10.
ROY MEDIATIVE Annual subscription Rs. 240.
A-23, 1st Floor, Okhla Industrial Area,
Phase-I, New Delhi-110020 (INDIA) Editor : edit@ncnonline.net
Ph: 91-11-41602841, 65683896, 40536384-87 swapan@ncnonline.net
Mob: 09810380882, 09811346846 Marketing : tridip@ncnonline.net
marketing@ncnonline.net
REGD.OFF.: Info : info@ncnonline.net
38-B / 56 Block, C. R. Park, New Delhi-110019 (India). Subscribe : subscription@ncnonline.net
Swapan Roy
(visit us at www.ncnonline.net) royncn@gmail.com
www.zyxel.com
5x5 vision. Speaking on the occasion, performance microphone also enables, the new Avaya, which is more focused
Rajiv C Mody, Chairman, Managing ‘Two Way Conversation’. The Two-Way than ever on leading the industry’s
Director & CEO at Sasken, said, “Sasken Conversation is a system which comes digital transformation,” said Jim
has embarked on a new journey, as with a built-in Microphone, letting Chirico, president and chief executive
outlined in our 5x5 vision, to build a you converse with kids or families at officer of Avaya. “Building upon our
robust organization as well as achieve home from anywhere, anytime from history of innovation and expertise in
profitable growth and revenues of $250 your smartphone app. Speaking on the deploying globally scalable solutions,
million by 2021. We are confident of launch, Sandeep Parasrampuria (CEO Avaya sits today at the strategic nexus
catapulting ourselves to a leadership and Director – iBall) says, “This New of connectivity for the enterprise—
position in Product Engineering and Years, iBall focuses to bring high utility with more than 130,000 customers
Digital Transformation services. products for everyone. iBallGuard PT HD in 220,000 locations worldwide, 90%
Therefore, it is an ideal time to launch Camera with two way communication plus of the Fortune 100, and more
an identity that provides positivity, and 350 degree tilt and pan, allows you than 100 million users. ” Chirico
motivation, and inspiration to achieve to see your loved one from anywhere. added, “Avaya is also the largest pure
our goals. It is time to energize and Be it worrying for the Grandpa at home, play Unified Communications and
invigorate all our stakeholders to or baby under maid surveillance, iBall Contact Center provider in the cloud.
believe and invest in our 5x5 journey. Guard lets you watch every step.” We have unparalleled opportunities
ahead of us. For example, only about
iBall Guard presents Home Avaya to Ring Opening Bell, 10 percent of our contact center
Security PT HD Camera Begin Trading on the New York customers have migrated to the cloud.
iBall announced the newest safety Stock Exchange We are passionate about providing
partner to every family, ‘iBall Guard the flexibility, open architectures, and
Avaya Holdings Corp. will ring
PT HD Camera’. Introducing a space- deployment options that our customers
the Opening Bell® on January 17th to
age security camera which safeguards need to exceed expectations, move ahead
celebrate the company’s listing on the
your home and workplace, every single of the competition, and quickly take
New York Stock Exchange (NYSE). Avaya
microsecond even while you are away advantage of such new technologies as
embarks on a new journey following a
at work or on-the-go! artificial intelligence, blockchain and
successful balance
This New Year makes the Internet of Things.”
sheet restructuring
a resolution to bring that shed billions
Safety FIRST! Easy to
Hikvision Tops IHS Markit List
of dollars in debt,
configure, the iBall freeing up $300
of Enterprise Storage Providers
Guard PT HD Camera million in cash for the First Time
lets you connect flows for investment Hikvision announced that the
the devices such in technology company has been ranked as the world’s
as Android and iPhone smartphones innovation and growth. “On behalf of largest provider of branded SAN, NAS
with Wi-Fi Hotspot enabling Real our entire team, our customers and and external DAS storage used in video
Time Viewing. Its truly exceptional partners, it is an honor to mark this surveillance in 2016, with the largest
feature is the embedded best-in-class first day of trading on the NYSE for
9
NSSNews 30 January2018 NSS
Pvt. Ltd., “We are delighted of this It is equipped with the latest generation D-Link Expands Range of
accomplishment for the second time of Intel® Xeon® processors and offers
in a row owing to the continuing highly predictable performance across
Google Assistant-Compatible
challenging work and dedication of our millions of configuration options to meet Products
team. It demonstrates our adherence any use case. Gurpreet Singh, Managing D-Link announced that its
to the standards of best practices and Director at Arrow PC Network said, mydlinkDCS-8000LH HD Mini Wi-
processes for information security “Hyper convergence is and will play Fi Camera, DCS-8100LH HD Wi-
management.” Shweta Thakare, a crucial role in coming years. Today, Fi Camera, DSP-W115 Wi-Fi Smart
Senior AVP - Europe, APAC & SAARC, Hyper convergence Plug, and DSP-W245 mydlink Wi-Fi
MicroWorld Software Services Pvt. Ltd., infrastructure is Power Strip will work with the Google
said, “Priding ourselves on the highest a hot topic and Assistant by the end
standards of quality, together we have undoubtedly market is witnessing a of the month. Users
created a workplace that values and shift towards it. HCI helps in bringing can ask the Google Assistant to show
operates to benefit our clients moving together all the important trends that their camera’s live view on a television
ahead. ” enterprise IT struggles to handle.” “We or display when connected to a Google
are thrilled to take VxRail solution/ Chromecast device. The mydlink Wi-
Arrow PC Network is the appliance to the Indian market as it is Fi Smart Plug and Wi-Fi Power Strip
Platinum Partner for Dell EMC the only solution in the market, which can also be turned on and off with the
VxRail has been developed keeping the specific Google Assistant. “D-Link’s new product
needs of the companies in mind. It will integrations with the Google Assistant
Arrow PC Network has recently
definitely deliver the new standard provide users the ability to control their
added Dell EMC VxRail solution to their
in hyper-converged infrastructure mydlink Cameras and mydlink Smart
kitty. Powered by vSAN and offered with
transformation. It provides the Plugs with the power of their own voice,”
Dell EMC PowerEdge servers, VxRail is
flexibility and agility required to meet said President and CEO Anny Wei. “We
the only specifically developed and fully
current and future business needs plan to continue expanding the range of
optimized hyper-converged appliance. It
without ripping and replacing current Google Assistant-compatible products
is a joint effort of Dell EMC and VMware
infrastructure components, which to provide more home automation
for organizations looking to shift to HCI.
makes it exceptional,” he added further. possibilities for smart homes.”
11
NSSNews 30 January2018 NSS
home, and even on the location of the Chhattisgarh. CHiPS had selected protecting their identities with personal
power sockets to efficiently transmit Aurionpro, a recognized leader known monitoring, financial monitoring and
signal. In addition, cumbersome for its expertise and experience across recovery tools needed to keep identities
installation and configuration processes various leading government projects personal and secured. Additionally,
can create unnecessary complications and initiatives, through an open bidding through new partner innovations with
for most consumers. Huawei WiFi Q2 process, as its System Integrator. D-Link and Samsung, McAfee delivers
addresses those setbacks through a Aurionpro worked with Dassault in the key areas of the connected home,
mesh Wi-Fi with a unique G.hn gigabit Systemes to create a feature called mobile security and privacy. The rapid
PLC module, which can easily traverse e-MB based monitoring that is used evolution of today’s threat landscape
walls and break physical barriers. extensively in the Centralized Project extends security needs into all facets of
HUAWEI WiFi Q2 also features an Monitoring Unit. The e-MB feature consumer’s digital lives. Realizing this,
easily installation and configuration seamlessly uplinks to the highest level of McAfee understands that consumers
process, able to set up the main unit in dashboards and provides Real Time data need more than traditional antivirus
five steps and enjoying plug-and-play on all ongoing projects. This facilitates software and has expanded its offerings
connectivity for all sub-units. effective monitoring, informed decision to protect privacy on the go, connected
making and timely interventions to home devices, family safety and
Aurionpro wins Dr. Abdul ensure projects progress on time, as per identity from theft or misuse. McAfee
Kalam Award for CHiPS schedule and within budget. Identity Theft Protection, McAfee
Aurionpro Solutions announced that Secure Home Platform, McAfee Safe
their initiative along with CHiPS, nodal
McAfee Moves Beyond Family and McAfee Safe Connect help
Agency of State of Chhattisgarh has been Traditional Antivirus to Protect offer consumers peace of mind in an
accredited by the most prestigious 2nd Customers’ Identity, Connected ever-changing digital world fueled by
edition of Dr. Abdul Kalam Award for Homes and Wi-Fi Connections volume, speed and complexity. With
innovation in IT applications category. the addition of these products, McAfee
McAfee announced a new identity has realized growth in customers
Government of Chhattisgarh (GoCG)
theft solution that goes beyond along with global OEM, TEM, ISPs
has been investing significantly in the
traditional antivirus to empower and telecommunications companies
state to build physical Infrastructure -
consumers to stay protected in the wake partnering with McAfee to help keep
Highways, Bridges, Water & Electrical
of recent massive data breaches. With their customers safe.
distribution systems, etc. Chhattisgarh
Infotech Promotion Society (CHiPS) is
the nodal agency and prime mover for
Hitachi Systems Micro Clinic
propelling IT growth & implementation to Strengthen its Workforce by
of the IT & e-Governance projects in
McAfee Identity Theft Protection, the
20%
the state. CHiPS initiated a Central Hitachi Systems Micro Clinic Pvt.
company continues to deliver innovative
Project Management Unit (CPMU) Ltd. announced its plan to increase its
solutions that help make the digital
for monitoring and ensuring timely workforce by 20%. The company will
world a safer place to live, work and play.
execution of projects to support add campus hires and experienced
McAfee Identity Theft Protection allows
these state development projects in candidates in all functions to fuel
users to take a proactive approach to
growth and is making existing talent
compatible with the changes. The thrust
SUSE Names Infosys to Top Tier of Partner Program on hiring talent is driven by the rapid
disruption and inroads to automation,
13
Hot ‘n’ Happening 30 January2018 NSS
NETGEAR:
Nighthawk R7000P AC2300 Wireless
Router
T he R7000P is a unique
solution in that it fits itself
into a new class between AC1900
app for iOS and Android. NETGEAR
markets this solution to consumers
with very large homes with its dual
and AC2600. This new class band configurations. As mentioned
offers a 600 Mbps above, this router is equipped with
802.11n 2.4GHz Beamforming+ allowing for increased
band with 256QAM range. Five Gigabit Ethernet ports aid in
support and a 1625 both wired network connections and the
Mbps 5GHz band, WAN connection to your modem. Two
together making USB ports allow for high throughput
this an AC2300 class storage access to ReadyShare features
solution. NETGEAR such as Vault and ReadyShare Cloud.
has added in some On the hardware side, this platform
technologies to its houses a dual-core processor operating
Wave 2 Nighthawk at 1GHz. 256MB of DDR3 and 128MB
solution including MU-MIMO, of flash are paired with it. Dimensions
Beamforming+, and the come in at 11.2 x 7.2 x 1.9 Inches with
introduction of NETGEAR Up weight topping.
its part to stop malware in its tracks. Reaper, we predict that cybercriminals take on a new face by leveraging AI
Enterprises must continue to educate will replace botnets with intelligent to create sophisticated new code that
employees and end users on the social clusters of compromised devices called can learn to evade detection through
engineering tactics attackers use to hivenets to create more effective attack machine written routines. With the
trick them into downloading malware. vectors. Hivenets will leverage self- natural evolution of tools that already
They must also continue to keep track learning to effectively target vulnerable exist, adversaries will be able to develop
of vulnerabilities and patches that affect systems at an unprecedented scale. They the best possible exploit based on the
their systems. will be capable of talking to each other characteristics of each unique weakness.
and taking action based out of local Malware is already able to use learning
“Cybercriminal marketplace is adept intelligence that is shared. Additionally, models to evade security, and can
at adopting the latest advances in “zombies” will become smart, acting produce more than a million virus
areas” on commands without the botnet variations in a day. But so far, this is all
Mr. Jitendra Ghughal, Director Channels, India herder instructing them to do so. As just based on an algorithm, and there is
& SAARC, Fortinet a result, hivenets will be able to grow very little sophistication or control over
exponentially as swarms, widening their the output. FortiGuard Labs recorded
Individuals
ability to simultaneously attack multiple 62 million malware detections in one
have a growing
victims and significantly impede quarter in 2017. Out of the millions
expectation for
mitigation and response. Although of malware detections we recorded,
instant access
these attacks are not using swarm we saw 16,582 variants derived from
to highly
technology yet, because they have the 2,534 malware families. One in five
personalized
footprint in their code, adversaries organizations also reported malware
information
could convert it to act with more self- targeting mobile devices. The increased
and services
learning behavior. Adversaries will automation of malware will only make
through a
use swarms of compromised devices, this situation more urgent this year.
variety of
or swarmbots, to identify and target Critical Infrastructure to the Forefront:
interconnected devices. This demand
different attack vectors all at once Recently, critical infrastructure
is driving the digital transformation of
enabling enormous speed and scale. providers continue to be at the top of the
both business and society. Keeping pace
FortiGuard Labs recorded 2.9 billion list in terms of the highest concern due
requires things like machine learning
botnet communications attempts all to both strategic and economic threats.
and artificial intelligence in order to
in one quarter in 2017, adding some These organizations run high-value
accelerate the ability to see, predict, and
context to the severity of what hivenets networks that protect vital services
respond to market trends.
and swarmbots could cause. and information. However, most
There is also a growing criminal
Ransom of Commercial Services is Big critical infrastructure and operational
element looking to exploit these new
Business: The threat magnitude of technology networks are notoriously
technologies. The proliferation of
ransomware has already grown 35 times fragile as they were originally designed
online devices accessing personal and
over the last year with ransomworms to be air-gapped and isolated. The
financial information, and the growing
and other types of attacks, but there is expectation to respond at digital speeds
connection and interconnection of
more to come. The next big target for to employee and consumer demands
everything – from armies of IoT devices
ransomware is likely to be cloud service has begun to change the requirements
and critical infrastructure in cars,
providers and other commercial services of these networks, driving the need for
homes, and offices, to the rise of smart
with a goal of creating revenue streams. advanced security on networks that
cities – have created new disruptive
The complex, hyperconnected networks were originally designed to operate
opportunities for cybercriminals.
cloud providers have developed can in isolation. Given the importance
Over the next couple of years, we will produce a single point of failure for of these networks, and the potential
see the attack surface continue to expand hundreds of businesses, government for devastating results if they are
while broad visibility and control over entities, critical infrastructures, and compromised or knocked offline,
today’s infrastructures diminish. The healthcare organizations. We predict critical infrastructure providers are
proliferation of online devices accessing that cybercriminals will begin to now finding themselves in an arms
personal and financial information, and combine AI technologies with multi- race with nation-state, criminal, and
the growing connection of everything vector attack methods to scan for, detect, terrorist organizations. The boldness
– from armies of IoT devices and and exploit weaknesses in a cloud of adversaries and the convergence of
critical infrastructure in cars, homes, provider’s environment. The impact operational and information technology,
and offices, to the rise of smart cities of such attacks could create a massive makes critical infrastructure security a
– have created new opportunities for payday for a criminal organization and priority in 2018 and beyond.
cybercriminals and other threat actors. disrupt service for potentially hundreds The Dark Web and Cybercrime Economy
The cybercriminal marketplace is adept or thousands of businesses and tens of Offer New Services Using Automation: As
at adopting the latest advances in areas thousands or even millions of their the world of cybercrime evolves, so
such as artificial intelligence to create customers. does the dark web. We expect to see
more effective attacks. We anticipate this
Next-gen Morphic Malware: If not this new service offerings from the dark
trend to accelerate into 2018, enabling
year, soon we will begin to see malware web as Crime-as-a-Service organizations
the destructive trends mentioned below.
completely created by machines based use new automation technology for
The Rise of Self-learning Hivenets and on automated vulnerability detection their offerings. We are already seeing
Swarmbots: Building on sophisticated and complex data analysis. Polymorphic advanced services being offered on dark
attacks like Hajime and Devil’s Ivy or malware is not new, but it is about to web marketplaces that leverage machine
19
Special Story 30 January2018 NSS
overall reaction time to the market learning is practised, should be endorsed. Furthermore, productivity analytics
realities and helping them position Organisations need to encourage will also be required as AI gets heavily
themselves to quickly take advantage of adaption of digital technologies like integrated into business processes, thus,
opportunities coming their way. automation, internet-connected devices, helping users to make more informed
Given this, we, at Citrix feel that and online communication tools, to data driven decisions that impact value
the following trends will play a major reduce the technology awareness gap delivery.
role in shaping the coming year and across groups. In conclusion, we believe that 2018
thus will need serious consideration by Digital Upskilling will be the year enterprises will work
organisations who intend on revamping In an increasingly digital India, towards harnessing opportunities
their IT construct in tandem with the digital literacy has become imperative created by integration of new
evolving technology landscape - and almost every job today requires technologies. We see a huge surge in the
The future is cloudy employees to interface with a digital adoption and usage of digital workspace
medium. With technology drastically technologies, which will create ripples
Cloud and cloud enabled SaaS
changing older operational efficacies in the earlier established organisational
apps are here to stay. Cloud opens a
across the board, businesses are hard structures. Digital workspaces will help
completely new facet for technology
pressed to transform their business organizations across various facets of
adoption and operational efficiency.
processes and workflows to remain operation, ranging from talent retention
Capabilities around analytics, AI,
relevant in their operational space. in HR, productivity in operations, data
robotics that have been integrated into
Organizations will have to reskill their driven decisions in finance, improved
cloud based offerings are proving hard
staff and re-architect their IT strategy customer engagement in sales and so
to emulate using traditional on-premise
to stay relevant. Hiring trends will on.
deployments due to cost, complexity,
and skill considerations. Businesses, also see a shift the newer generations In the bargain, stakeholders will
therefore, will have to evaluate the joining the workforce are increasingly experience both the benefits and
capabilities of the cloud offerings mobile and technology savvy, it will the transitional side-effects of this
alongside on-premise offerings and be increasingly difficult to attract the wave of change. However, workspace
accordingly implement an environment best people in this talent pool without transformation is inevitable, and the
spread across cloud platforms that best extending capabilities like mobile benefits far outweigh the transitional
meets their capability and productivity digital workplaces and BYOD. As hurdles that might come up.
goals. Applied cloud strategy, evolving uncertainty continues to surround the
technology landscape, it has become
“Crypto industry is witnessing such
workload, need for business agility,
freedom of usage and usage based critical to create a system which focuses an extraordinary boom”
costs, will help businesses better on employee engagement and at the Mr. Shrenik Bhayani, General Manager,
understand the relevance of a multi- same time paves a transformative path. Kaspersky Lab (South Asia)
cloud approach, further accelerating the This fundamental adjustment is pivotal Businesses
pace of technology transformation we for businesses to ensure they keep up and individuals
are experiencing today. with the fast-changing needs of digital alike make use
transformation. of financial
Rise of multigenerational workforces
Invasion of Analytics services. And
Employees are a critical driving
Multiple analysts state that in the wherever there’s
force powering the expansion and
coming couple of years as much as money, there
growth of businesses. Today’s workplace
75% of the applications used by the will always be
represents a vibrant mix of employees
enterprises will have some form of criminals both
comprising 4 generations. Each one
embedded AI. There is consensus common and cyber. Our experts reckon
of these generations have a different
amongst technologists that analytical that in 2018, the financial services
degree of comfort when it comes to
tools will become obligatory as market should brace itself for a new
technology usage and adoption. As job
companies try to improve customer round of cyberthreat development. Here
profiles become increasingly skill-set
interactions and increase value delivery. are some of our predictions:
focused and age-agnostic, organizations
need to work on simplifying and Application of analytic tools will be Cryptocurrency — in vogue in the
normalizing their technology platforms sought to ensure that secure digital cybercriminal world: Crypto industry is
to minimise productivity gaps between workspace provide the end-user with witnessing such an extraordinary boom
the digital natives and the non-digital the best possible experience across the that many financial institutions are set
natives. As work paradigms and devices they use. In addition, security to introduce cryptocurrency support
technologies change, we will see an analytics is also expected to gain for their services. On the downside,
even wider gap between generations. traction, as organizations will have cybercriminals smell an opportunity.
With 50 % of employees being digital to actively address threats from an Therefore, the industry will have to learn
natives who prefer not to be restrained increasingly mobile workforce and an to ward off attacks on cryptocurrency
by a location, and the rest comprising application base that spans multiple wallets and marketplaces.
of traditional non-digital employees, clouds. This approach will require the Speed increases danger: Payments
organisations will have to invest in enterprise security to level up and processed by financial services are
creating systems that regulate this gap. explore alternate security paradigms, constantly growing in terms of speed
In order to optimally utilize the talent at by detecting, predicting, and averting and volume, as is the load on information
disposal, a collaborative system wherein threats through accumulation and systems, including security solutions. At
knowledge is shared, and peer-to-peer analysis of data from different sources. the same time, consumers have already
21
Special Story 30 January2018 NSS
grown used to payments being near is too high – both for organizations who security portfolio that can address many
instantaneous, and they are not prepared purchase the products and the device pieces of security infrastructure, but
to tolerate delays. Amidst all the haste, makers who manufacture them. Rather may lack the specific approach that a
fraudulent transactions often slip in than focusing on the devices themselves, niche player has developed. Given these
under the radar. Therefore, to speed up we will see an increase in businesses mutual needs, we are likely to see more
the verification of payments with no looking to secure the entire network of these innovative companies acquired
impairment of service, companies will instead of each individual endpoint, by larger organizations who embrace the
have to use solutions based on neural which can help minimize both the risk innovation and are able to incorporate
networks and machine learning. and cost involved with maintaining these solutions into a broader security
If the door is locked, try the window: security across IoT devices. ecosystem. Consolidation will be king
Financial institutions are making strides Doubling Down on Bug Bounties: Bug in 2018.
toward better transaction protection: bounties – programs set in place by “Emergence of crypto-currency as
Support for smart cards at points of enterprises to pay white hat hackers who
purchase, biometric authentication, and discover and disclose vulnerabilities
the volatile commodity”
tokenization of payments have made in their products – took on a renewed
life harder for cybercriminals. To keep prominence in 2017 as more and more
their fingers in other people’s pies, organizations introduced or expanded
intruders will turn more and more to their offers. With heightened focus on
hijacking legitimate accounts. And that not only organizations’ products, but
means financial institutions will have also their practices, we are likely to
to find more reliable ways to verify the see more enterprises use bug bounties
identities of their clients. to both ensure their offerings are safe eScan security research team has
Fraud as a service: Lots of businesses and demonstrate their commitment to identified some of the key trends that
engage the services of third-party ethical conduct. In 2018, we can expect will emerge stronger as well as the most
organizations for apps, databases, cloud to see increased rewards and more targeted segments for security breaches.
computing, and much more. Seeing incentive-based programs as companies Some of them are as below:
the benefits of software as a service, look to use bug bounties as a way to Crypto currency: 2017, saw the
cybercriminals have rolled out similar appear transparent and dedicated to emergence of crypto-currency as the
models: Ransomware Trojans can be safety for both themselves and the volatile commodity, moreover, the
franchised or leased, for example, and broader public. volatility hasn’t subdued the interests of
DDoS attacks are available for order. Security Spend to Soar Across the Network: the investors. The latter half of 2017 saw
Anyone with the cash and the desire can The rise in high-profile cyberattacks Ransomware attacks with Wannacry in
hire an army of bots, set up phishing in 2017 has led many organizations to the forefront and their dependence on
websites, and lots more. Almost reconsider how they are allocating their Bitcoin. Cyber criminals will continue
everything underpinning the financial security budget in 2018. While much of to demand ransoms in crypto currency
cybercrime industry can be bought. the IT department is feeling the need because of the unregulated anonymous
The Fraud-as-a-Service model will open to do more with less, the percentage currency market.
the door to the world of cybercrime of budget that is allotted to security is 2018 would be the year of crypto
to newbies who lack once-mandatory continuing to grow. A recent study from currencies, with numerous players vying
skills and experience — which means PwC and Juniper Networks shows that for the stability of their currency and the
that companies and organizations need security is the most important priority latter half of 2018 may lead to market
to prepare themselves for a hike in the for both CIOs and VPs of IT when it consolidation, with the emergence of top
number of attacks. comes to their network solutions. Rather crypto currencies. Due to the spiraling
than dedicating funds to standalone price of the Bitcoin, in 2018, criminals
“Innovation within the security security products, though, we’re likely would shift their focus to other crypto-
industry is at an all-time high” to see security spend across more currencies and this would be the game
parts of the infrastructure. As security changer in the popularity of the crypto-
is embedded into each component of currencies.
the network, we can expect that more
The hard forks of the Bitcoin
security dollars will be invested across
resulted in the creation of Bitcoin Gold
the network infrastructure, not just in
Network on the Hook to Secure and Bitcoin Cash furthermore there are
standalone security solutions.
Enterprise IoT: IoT devices have been plans to introduce Bitcoin Silver, Bitcoin
Acquisition of Point Products on the Platinum which would fuel the growth
a cause for concern for consumers for
Rise: Innovation within the security of Bitcoin. With so many forks, the
the past several years now; however,
industry is at an all-time high, with investors would have to exercise caution
we are just starting to see the impact
countless startups and smaller security as the very likelihood of fake crypto-
that insecure IoT could have on larger
organizations developing products currencies, scams and Ponzi schemes
targets, including enterprises. For
that can greatly benefit organizations’ may surface in 2018.
an already burdened security team,
security. However, the majority of these
the increase in insecure IoT network Ransomware: Ransomware will
products are point solutions that provide
connections adds another set of continue to be a major threat in the
security for a small piece of the overall
concerns to their growing ‘to do’ list. year 2018. It is one of the easiest ways
infrastructure. Conversely, larger
The cost of adding security to each IoT for a cyber-criminal to extract money
organizations often have a wide-ranging
device or network-connected application from the victim. In 2017, we witnessed
Wannacry and its usage of publicly government for flouting the norms laid no matter where it is located, is crucial.
available exploits viz. Eternal Blue for down for protection of their citizens’ Critical data continues to move to the
lateral movement within the network, data. With the enforcement of GDPR cloud, malware is constantly evolving,
2018 would highlight the importance of just a few months away, the latter half and despite growing investments in
patch-updates as a sure-way to mitigate of 2018 would witness a slew of privacy defensive technologies traditional
lateral movement by Ransomware. breaches by mobile app developers. security controls prove ineffective.
Furthermore, Ransomware creator may Furthermore, in 2017 users were “At the heart of our predictions
shift their loyalties from Bitcoin to other bombarded with fake apps and is a requirement to understand the
crypto-currencies, since the payment vulnerabilities discovered in Android intersection of people with critical
of the ransom has to be viable for the and iOS have forced companies like data and intellectual property,” said
victims and the surging price of the Google and Apple to innovate with Dr. Richard Ford, Chief Scientist at
bitcoin would be the contributing factor. their individual app stores and increase Forcepoint. “By placing cyber-behavior
2018, would also witness the custom vigilance of the apps. 2018 would be no and intent at the center of security,
pricing of the ransom based on the better and we may observe an increase the industry has a fighting chance of
country and the capability of the in incidents involving compromised keeping up with the massive rate of
targeted organization to pay up the devices. Although, a few of these change in the threat environment.”
ransom. Traditionally, spear-phishing incidents might be attributed to Jail-
was limited to Information Warfare; Breaks / Rooting using automation,
“Data technology will have an
however, we may find organizations but the primary focus of the malware immense impact on how companies
being actively targeted with specifically authors would be on fake apps. will be doing business in 2018”
tailored Ransomware so as to increase Cyber espionage between countries: Mr. Ashutosh Mehrotra, Business Head, APAC
the ROI for these criminals. Global Intelligence systems within Region at Toovio,
Improved Security of IoT Devices: Since many countries today have advanced Data analytics
the demand for smart devices and to an extent that they can effortlessly and business
other Internet of Things (IoT) devices extract data from across the world to intelligence will
are increasing every day, the need for frame strategies. The nation states have play crucial role
advanced security for these devices seen a new realm of spying in the form in the overall
has also increased. According to recent of cyber espionage. This new form business strategy
statistics, there will be almost 30 billion will affect the economic and political to make better
connected things in major industries relationships between nation states as and faster
and IoT will touch every role across the well as change modern warfare scenario. business decisions.
corporate. Simultaneously, the attacks Lastly, we can conclude that our users, Companies will continue to leverage
against these devices will also rise. readers and administrators should be the power of data analytics and look for
Besides, in 2017 IoT devices have on their toes to escape the deadly fangs “top line” to be specialized in the field
been targeted by various botnets of the cyber crooks. Implementation of data science. Undoubtedly, Machine
including the infamous Mirai botnet, of multi-factor authentication after Learning (ML) has come a long way in
which leveraged the vulnerabilities to understanding the exact requirement the past few years and has changed the
further attack the critical infrastructure. thoroughly will help the organization in way companies look the way they need
2018 would be a mixed bag and witness minimizing the chances of any kind of to do business. From voice-powered
the emergence of implementation of cyber-attacks. Use eScan and stay safe! personal assistants like Siri and Alexa,
security guidelines for the development to more underlying and fundamental
of IoT devices amongst the vendors.
“Predicts the Start of “The Privacy
technologies like behavioral algorithms,
Furthermore, 2018 would also be the Wars” suggestive searches, network
year of IoT Botnet attacks. optimization, pattern analysis, fraud
Increase in mobile hacking: 2017 was detection, customer identification,
the year which saw the emergence churn prediction, recommendation
of DDoS malware affecting Android engines, etc., these are a few examples
Devices, also witnessed the takedown of Adding to the constantly and applications of ML in use today.
WireX Botnet which had created havoc. shifting environment which security Finally
Information-stealing Mobile Malware professionals face is a perfect storm
Social engineering remains the
cannot be attributed to cyber criminals of drivers influencing debate around
greatest threat, and shows that security
alone, device manufactures have come privacy. This mega-trend will cause
is an ongoing process and not a problem
under fire for violating the privacy of tectonic shifts in the privacy landscape
to be solved. Companies, large and
its users and as a precautionary measure and influence the ways in which
small, need to understand that cyber
Indian Govt. had issued a diktat against organizations collect and manage data.
breaches can occur more than once and
a majority of device manufacturers, Forcepoint believes that the security are constantly threatening a business.
furthermore black-listed more industry has been focusing on the wrong Security has to be a combination of
than 40 apps developed by Chinese things. Traditional security perimeters perimeter defence, threat detection
organizations. are eroding or becoming obsolete, and training. Investing heavily in
Device manufacturers and App and so, rather than focus on building the necessary security measures will
developers would find 2018 to be very bigger walls, the industry needs better prevent businesses from falling victim
lucrative but would also come under visibility. Understanding how, when and to damaging cyber-crimes that will cost
the radar of privacy activists and why people interact with critical data, them dearly.
23
Trend 30 January2018 NSS
27
Special Report 30 January2018 NSS
The eighth edition of TechSummit was attended by security vendors, distributors and channel partners. The
summit’s theme was around financing and how partners can manage finance effectively. On the other hand
the Summit also discussed the future-ready networking, storage and security solutions.
29
Solution of Fortnight 30 January2018 NSS
Data Security In The Cloud By: Mr. Rahul Kumar, Country Manager, WinMagic
33
Product Review 30 January2018 NSS
Ethernet Switch
CISCO : SF95D-08-IN
C isco desktop switches are used to maintain a business
network for small companies. It features with
unmanaged switches that do not need any configuration,
making it easy to install. It provides a highly reliable
network connection to connect your computers, printers,
scanners, etc. Its complexity less feature makes it easy
to use; also it has the ability to expand its network that
helps to connect more computers. It weighs up to 458g
that can be portable anywhere. The salient features are
its Power Consumption DC 12V, 500mA; External Power
Supply 8 RJ-45 connectors for 10BASE-T/100BASE-TX ;
Ethernet Ports 8-Port; Capacity 1.6 Gbps and Wireless
Speed 10 / 100 .
TP-LINK : TL-SF1008D
T he TL-SF1008D 8-Port Fast Ethernet Desktop Switch can process
data at a rate of up to 100Mbps, making it an ideal choice
for expanding your high performance wired network. With 10K
Jumbo frame, the performance of large files transfers is improved
significantly. IEEE 802.3x flow control for Full Duplex mode and
backpressure for Half Duplex mode alleviate traffic congestion,
making the TL-SF1008D a reliable choice for data transfers. Have
the choice to go green when expanding your wired network. The
TL-SF1008D switch features the latest innovative energy-efficient
technologies that can greatly expand your network capacity with
much less power. It automatically adjusts power consumption
according to the link status and cable length to limit the carbon
footprint of your network, making it an ideal solution for your
home or office network.
D-LINK : DGS-1008A
T he D-Link DGS-1008A 8-Port Gigabit Switch creates
a blazing fast network for your office, as its Gigabit
Ethernet ports provide high-speed wired connections
for up to eight PCs or other devices. The DGS-1008A
also features QoS, which prioritizes network traffic so
that time-sensitive data is delivered efficiently, even
during bursts of high data traffic. It’s stylish, easy-to-use,
and comes IPv6-ready for a reliable network today and
tomorrow. Conserve Energy The 8-Port Gigabit Switch
helps you conserve energy automatically through several
methods. It automatically powers down ports that have no
link, allowing the switch to save a substantial amount of
power by cutting power usage for unused ports. It also
adjusts the amount of power supplied to a port according
to the length of the connected Ethernet cable.