Virtualization Technology News and Information
White Papers
RSS
White Papers Search Results
Showing 1 - 5 of 5 white papers, page 1 of 1.
The Forrester Wave: Intelligent Application and Service Monitoring, Q2 2019
Thirteen of the most significant IASM providers identified, researched, analyzed and scored in criteria in the three categories of current offering, market presence, and strategy by Forrester Research. Leaders, strong performers and contenders emerge — and you may be surprised where each provider lands in this Forrester Wave.

In The Forrester Wave: Intelligent Application and Service Monitoring, Q2 2019, Forrester identified the 13 most significant IASM providers in the market today, with Zenoss ranked amongst them as a Leader.

“As complexity grows, I&O teams struggle to obtain full visibility into their environments and do troubleshooting. To meet rising customer expectations, operations leaders need new monitoring technologies that can provide a unified view of all components of a service, from application code to infrastructure.”

Who Should Read This

Enterprise organizations looking for a solution to provide:

  • Strong root-cause analysis and remediation
  • Digital customer experience measurement capabilities
  • Ease of deployment across the customer’s whole environment, positioning themselves to successfully deliver intelligent application and service monitoring

Our Takeaways

Trends impacting the infrastructure and operations (I&O) team include:

  • Operations leaders favor a unified view
  • AI/machine learning adoption reaches 72% within the next 12 months
  • Intelligent root-cause analysis soon to become table stakes
  • Monitoring the digital customer experience becomes a priority
  • Ease and speed of deployment are differentiators

The SysAdmin Guide to Azure Infrastructure as a Service
If you're used to on-premises infrastructures, cloud platforms can seem daunting. But it doesn't need to be. This eBook written by the veteran IT consultant and trainer Paul Schnackenburg, covers all aspects of setting up and maintaining a high-performing Azure IaaS environment, including: • VM sizing and deployment • Migration • Storage and networking • Security and identity • Infrastructure as code and more!

The cloud computing era is well and truly upon us, and knowing how to take advantage of the benefits of this computing paradigm while maintaining security, manageability, and cost control are vital skills for any IT professional in 2020 and beyond. And its importance is only getting greater.

In this eBook, we’re going to focus on Infrastructure as a Service (IaaS) on Microsoft’s Azure platform - learning how to create VMs, size them correctly, manage storage, networking, and security, along with backup best practices. You’ll also learn how to operate groups of VMs, deploy resources based on templates, managing security and automate your infrastructure. If you currently have VMs in your own datacenter and are looking to migrate to Azure, we’ll also teach you that.

If you’re new to the cloud (or have experience with AWS/GCP but not Azure), this book will cover the basics as well as more advanced skills. Given how fast things change in the cloud, we’ll cover the why (as well as the how) so that as features and interfaces are updated, you’ll have the theoretical knowledge to effectively adapt and know how to proceed.

You’ll benefit most from this book if you actively follow along with the tutorials. We will be going through terms and definitions as we go – learning by doing has always been my preferred way of education. If you don’t have access to an Azure subscription, you can sign up for a free trial with Microsoft. This will give you 30 days 6 to use $200 USD worth of Azure resources, along with 12 months of free resources. Note that most of these “12 months” services aren’t related to IaaS VMs (apart from a few SSD based virtual disks and a small VM that you can run for 750 hours a month) so be sure to get everything covered on the IaaS side before your trial expires. There are also another 25 services that have free tiers “forever”.

Now you know what’s in store, let’s get started!

iOS App Security: Is it really better than Android?
With its tightly controlled iOS ecosystem, Apple insists that its platform is more secure than Android’s. Is this really the case? This infographic explores the myths and misconceptions surrounding iOS security, and how they can affect your mobile app. From ‘fleeceware’ apps to sideloading, each security myth is evaluated and solutions are provided to help iOS apps improve their overall security posture.

Apple paints a rosy picture of of the iOS ecosystem’s security. However, the “walled garden,” or closed platform isn’t as secure as it appears. This myth often leads to developers neglecting security measures when creating apps for the iOS ecosystem, as they believe that Apple’s security is superior to Android’s.

In this infographic, Guardsquare provides an overview of Apple’s security features, like the closed system and code signing. Each is examined for both strengths and weakness. The infographic also looks at some of the system’s largest security concerns, including jailbreaking and sideloading.

Guardsquare’s analysis of the iOS system includes an analysis of over 200 tweaks, or scripts used to modify the behavior of iOS apps. The results yielded surprising insights:

  • 93% of the scripts provide free access within the targeted apps to premium content or features
  • Revenue losses for targeted apps could potentially cost the publisher millions of dollars annually
  • Scam apps found in the Apple Store generate approx. $48M in revenue

As demonstrated in this infographic, it is essential for iOS app developers to strengthen their mobile app’s security in the Apple ecosystem. Guardsquare offers strategic security recommendations to keep your organization’s apps secure, regardless of platform.

The OWASP Mobile Top 10 List and Why it Matters for App Developers
It can be challenging to find reliable information on the web. The Open Web Application Security Project (OWASP) is dedicated to publishing reliable content in the web application space. OWASP’s Mobile Security Project provides resources like the “Mobile Top 10” and Mobile Application Security Verification Standard (MASVS). This report covers these resources in depth to help developers access a reliable framework for identifying, and solving mobile application vulnerabilities.

Mobile applications are a rapidly growing attack surface. With a variety of tools and techniques available to threat actors, mobile application developers need to build a reliable security framework to address the most common security vulnerabilities. In this report, Guardsquare analyzed OWASP’s “Top 10” mobile security risks and mapped them to RASP and code hardening best practices.

The report also examines the Mobile Application Security Verification Standard (MASVS), also produced by OWASP, which details additional risks and resilience guidelines that complement the “Top 10.”

Key insights:
●    A developer-centric overview of OWASP’s “Top 10” & MASVS
●    How resilience layer controls can prevent reverse engineering and tampering
●    Security technique that protect against the OWASP’s “Top 10” mobile vulnerabilities
●    How to build a layered security approach

Download the full report to learn how you can leverage RASP and code hardening to defend your Android and iOS apps against the most common mobile app security threats.

!hooked a technical magazine_
It’s often difficult for developers to get hands-on knowledge and experience in code hardening techniques To help bridge the gap, Guardsquare’s engineers have created a set of fun, practical labs around four code hardening techniques. This technical magazine is the perfect way to improve your security knowledge, regardless of the mobile platform you use. Developers will walk away with a greater understanding of compiler and security concepts.

Application hardening is an important part of mobile app security, and yet, it can feel like a difficult concept to grasp.

Developers often struggle to get hand-on knowledge and experience working with hardening techniques. In this technical magazine, Guardquare’s engineers have created a set of four fun, practical labs to help your organization familiarize itself with application hardening techniques and the security vulnerabilities that each technique thwarts. These four labs include:

•    Code Checksumming
•    Control Flow (non-) Integrity in Android Applications
•    Native Library Encryption
•    Encrypting Objective-C Selectors

Developers will walk away from these labs with a greater understanding of the theory behind each technique, as well illustrations and guided examples to help them implement them in their own application security strategy.

Download the technical manual here and begin building a stronger security posture through application hardening.