Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 7 of 7 white papers, page 1 of 1.
2022 US Password Practices Report
To raise awareness about the scale of the problem of weak passwords, Keeper Security, the leading provider of zero-trust and zero-knowledge cybersecurity software, is sharing findings about Americans’ password habits and practices. By raising awareness of the personal finances and data put at risk every day by weak, duplicate, and shared passwords, we hope to reduce the risk of cybercrime and promote better password practices among Americans.

Online passwords are used for many critical aspects of our lives. They are needed when we communicate, work, transact and travel. We use them to access our most sensitive data, from banking to health records. Digital passwords are the keys to our lives. Yet we are surprisingly negligent about password protection, from our choice of passwords to the means we use to remember them, and troublingly, our willingness to share sensitive passwords with others.
Keeper Security’s survey of 4,000+ respondents in the US and UK unearthed negligent attitudes toward password protection, in which passwords are being shared with spouses, written down on bits of paper, changed too often, and forgotten over 50 times per year! The result: nearly half of our 2,000 US survey respondents had been hacked at least once, with an average of $378 stolen per cyberattack. The consequences of poor password protection can be disastrous in an era of growing online crime and identity theft. A hacked password can result in ransacked bank accounts, obliterated credit ratings, damaged personal lives and severed business relationships.

Our findings show a troubling disconnect between the value people attach to their passwords and the means they use to protect them. In the US, people would rather see a dentist than lose their passwords, yet safe selection, storage, and management of passwords were found to be severely lacking in this study.

It is of great concern to see passwords being shared and duplicated across multiple platforms. It’s equally concerning to see the use of overly simple passwords, relying on publicly-available data, such as names and birthdays. This will remain an acute challenge as we continue to use a range of devices and platforms to access the internet. The impact of poor password protection was evidenced by the number of people in the survey reporting they’ve personally fallen victim to a cyberattack, resulting in financial loss and compromised social media profiles.

Password Management Report: Unifying Perception with Reality
We surveyed over 8,000 people globally about what they say they do to ensure their cybersecurity and what they actually do. The study found people are grossly overconfident with a clear disconnect between actions and perception.

There is no getting away from the fact that passwords are still the cornerstone of modern cybersecurity practices. Despite decades of advice to users to always pick strong and unique passwords for each of their online accounts, Keeper Security found that only one-quarter of survey respondents actually do this. Many use repeat variations of the same password (34%) or still admit to using simple passwords to secure their online accounts (30%). Perhaps more worryingly, almost half (44%) of those who claimed all their passwords were well-managed also said they used repeated variations of them. One in five also admitted to knowing they’ve had at least one password involved in a data breach or available on the dark web.

At first glance, these results may come as a shock, especially to those in the cybersecurity industry who have been touting these simple best practices for years. However, when considering more than one in three people (35%) globally admit to feeling overwhelmed when it comes to taking action to improve their cybersecurity, and one in ten admit to neglecting password management altogether, the results are much less of a surprise.

Cybersecurity is a priority and cybersecurity solutions must also be. The threat landscape continues to expand as our lives shift from in-person banks, stores, and coffee shops to online banking, internet shopping, social networking, and everything in between. We have never been more dependent on our phones, computers, and connected devices, yet we are overconfident in our ability to protect them and willfully ignoring the actions we must take to do so. Perhaps we need more people to admit they’re as careless as a bull in a china shop, burying their heads in the sand like an ostrich or simply paralyzed with fear. Facing reality and coming to recognize what’s at stake, they can more confidently charge forward and take the necessary steps to protect their information, identities and online accounts.

Immutability out-of-the-box solved for Mirazon and their customers
The desire to be resilient is becoming more prevalent across all corporations. Ransomware attacks have been rising over the past years, reaching a point where an attack occurs every 11 seconds. Because of this vulnerability, Mirazon, like many, needed to find an immutable solution that is also simple to operate and affordable for their customers.

This case study will cover the story of how Ootbi by Object First helped Mirazon cope with its business challenges. 

Ransomware attacks have been rising over the past years, reaching a point where an attack occurs every 11 seconds. This staggering statistic has proven that it is not a case of if but when, causing many corporations to seek resiliency. Furthermore, backups are now the primary target for ransomware. To address this vulnerability, Mirazon needed to properly secure not only their primary data, but also their backup data as well.

Zero Trust and Enterprise Data Backup
Cyberattacks and ransomware target backup data in 93% of incidents, while existing Zero Trust frameworks often overlook backup and recovery security. Zero Trust Data Resilience (ZTDR), developed by Numberline Security and Veeam, extends Zero Trust principles to data backup. The ZTDR framework includes segmentation, multiple data resilience zones, and immutable backup storage. This white paper offers practical steps for implementing ZTDR, which improves data protection, reduces security risk

Cyberattacks and ransomware target backup data in 93% of incidents. Despite being primary targets for ransomware and data exfiltration, existing Zero Trust frameworks often overlook the security of data backup and recovery systems.
 
Zero Trust Data Resilience (ZTDR) is an innovative model that extends Zero Trust principles to data backup and recovery. Developed through a collaboration between Numberline Security and Veeam, ZTDR builds on the Cybersecurity and Infrastructure Security Agency's (CISA) Zero Trust Maturity Model (ZTMM).  
 
This framework provides a practical guide for IT and security teams to improve data protection, reduce security risk, and enhance an organization's cyber resilience.
 
The primary principles of ZTDR include:

  • Segmentation — Separation of Backup Software and Backup Storage to enforce least-privilege access, as well as to minimize the attack surface and blast radius.
  • Multiple data resilience zones or security domains to comply with the 3-2-1 Backup Rule and to ensure multi-layered security.
  • Immutable Backup Storage to protect backup data from modifications and deletions. Zero Access to Root and OS, protecting against external attackers and compromised administrators, is a must-have as part of true immutability. 

The white paper "Zero Trust and Enterprise Data Backup" details these principles and offers practical steps for implementation. 
 
What You'll Learn:

  • Security Enhancement: Core Zero Trust principles applied to data backup.
  • Implementation: Best practices for infrastructure segmentation and resilience zones.
  • Applications: Case studies on mitigating ransomware and cyber threats. 

Download the white paper and start your journey towards Zero Trust Data Resilience.

Case Study: With IGEL OS, Heidenreich gains a solution that provides Ease of Management
Norwegian pipe wholesaler Heidenreich needed an endpoint management solution to extend the lifespan of older devices and streamline management systems. IGEL was chosen due to its excellent functionality, ease of integration, and cost savings achieved by not replacing three hundred thin clients, laptops, and PCs.

Heidenreich had challenges with their Citrix platform due to a combination of old and new DELL and Wyse hardware, laptops, and thin clients. When the company was expected to upgrade its Citrix platform to a new generation, the firm expressed concerns about the perceived high cost. Heidenreich started to look for an alternative solution, and their IT consultancy provider, Wedel IT, came up with the idea to implement IGEL OS. This case study focuses on IGEL’s ease of management, flexibility on the client side (new/old hardware), future-focused solutions, and security.

Coretek Teams with IGEL to Transform VDI Deployment for a Defense Contractor
IGEL’s industry leadership has made it an integral part of Coretek’s on-premises VDI offering. This offering uses Nutanix in combination with Citrix VDI to deliver secure end-user access to virtual applications and desktops.

A defense contractor with whom Coretek has had a long-standing relationship spanning nearly two decades had attempted to migrate to a virtual desktop infrastructure (VDI) environment twice with another technology services provider without success. Impressed by Coretek’s success with VDI implementations in healthcare and other industries, the defense contractor turned to the solution provider for help.

Coretek's VDI offering has evolved significantly over the years to better support today's power users. Due to its industry leadership, IGEL OS is currently the standard for new customer VDI rollouts at Coretek. One of the things that the Coretek team appreciates most about IGEL OS is its high level of configurability, as well as IGEL’s commitment to staying current with trends in the EUC space by aligning IGEL OS with a broad ecosystem of leading vendors, including those providing unified communications and collaboration (UCC) applications and tools. In this particular case, IGEL OS, in combination with new Dell endpoint hardware, enabled Coretek to restore performance following a significant shift in the customer’s usage of its UCC tools.

The customer is currently utilizing high-performance VDI desktops, leveraging IGEL OS at the endpoint, to design defense equipment and support connectivity and collaboration through video conferencing. IGEL’s Preventative Security Model™ supports Zero Trust security approaches and partners with leading Secure Access Service Edge (SASE) vendors to complement and reinforce these solutions from a security standpoint.

Four Forces Accelerating Infrastructure Modernization
Are you facing urgent decisions around your IT infrastructure? You're not alone. The landscape of infrastructure modernization has fundamentally shifted due to four critical pressures: VMware disruption: Navigating uncertainty post-Broadcom acquisition. Public cloud limitations: Escalating costs and control challenges. AI infrastructure demands: Rapidly deploying secure, performant AI environments. Skills shortages and operational complexity: Doing more with smaller teams.

In this white paper, you'll discover:

  • Data-driven insights from ESG’s new study of 380 midmarket and enterprise IT professionals.
  • Practical strategies for addressing these four pressures quickly and effectively.
  • How VergeOS, a unified data center operating system, uniquely simplifies infrastructure.
Don't let infrastructure challenges limit your organization's potential. Fill out the form to download your free copy now and start building a more resilient and future-ready IT strategy.