Gen-V

Blog, Cetus Solutions, IT Solutions, News, Security, Technology, Uncategorized

When 2019 Comes


No Comments

It was the mid-nineties, ‘IT’ was the new ‘data processing’, and we’d started using a new gadget called a ‘modem’ to connect our business to the outside world. They were exciting times; technology was changing how we communicated; and we could access technical information at any time. So … I decided that it was time to enlighten my team with a broad-thinking; almost visionary statement: “this Internet thing is really cool … but it’s just for techies”.

In hindsight; it ‘might’ be argued that my statement was, perhaps, a little bit short of ‘visionary’. In fairness; my comment was based on the, then, limited capabilities of CompuServe; which was nothing more than a chat group and download site for technical documents.

And so, with my ability to predict the future firmly and clearly established; it’s time for me to get to the topic of this blog: Top Predictions for 2019. As we, Cetus, look forward to the year ahead; we’re keenly aware that a number of technological drivers will affect the nature of our business. Here’s a few of the key drivers that we are gearing up for 2019:

1. The Internet. I’d better address this one – the Internet will continue to be quite popular in 2019. There, that’s that one put to bed.

2. Windows Desktops. Once the direct target of our VDI marketing efforts (due to its total cost of ownership and unpredictable user experience); the ability of Windows 10, in particular, to deliver a well-managed user environment has put Windows 10 back on the ascendancy.

3. Hybrid-Cloud. It’s been around for quite some time now, and many solutions providers are saying that it’s the future apparently. We beg to differ. Hybrid-Cloud is the ‘now’. You need look no further than Office 365 and SalesForce to see that we have been hybridising our clouds for quite some time now. 2019, however, will see the adoption of IaaS and PaaS, from the likes of Microsoft Azure and AWS, increasingly be the first choice of organisations across all sectors, public and private. 2019 will continue to favour solution providers who recognise that the resulting complexity is a feature not a failure of hybrid cloud; and who provide solutions that embrace and mitigate the complexity, rather than amplify it.

4. SD-WAN. Strongly related to the increasing adoption of the hybrid-cloud model; Software Defined WANs will see significant growth due to their ability to provide: increased resilience, lower price point and better performance over traditional WAN deployment methodologies.

5. Gen-V Security. Also referred to as Next Generation Security – the ability to deploy advanced threat protection that integrates boundary protection, endpoint protection and community threat intelligence is becoming a business necessity, rather than a nicety. Throw in Analytics and Micro-segmentation and you’ll soon realise that technology is providing a robust response to today’s multi-threat cyber security environment.

6. Virtual Workspaces. You might think that this is just the latest marketing term for VDI. We see it rather differently. Virtual Workspaces encompass more than just the desktop; we deliver a workspace that sees the desktop as merely a means to an end; namely a way of accessing applications and data. A Virtual Workspace now, more than ever, must be mindful of the desire of organisations and users to access their workspace using any device; from any location and at any time.

7. Automation. Our principle partners; Citrix, Microsoft and VMware all recognise that the increasing complexity of today’s IT environments require a more open approach to integration. This manifests itself as an increasing focus on cross IT element automation; relieving the IT function of large swathes of BAU activities, allowing them to focus on business innovation.

The above are all encapsulated by our 2019 Solutions Portfolio. By working closely with our primary vendor partners; we are able to draw down their strategic visions, and to combine these with over 17 years of delivering Secure Application and Data Delivery Platform solutions. The result is that we now have hundreds of customers who count on us to help guide them through turbulent times; who see us an extension of their IT teams; and with whom we have the genuine pleasure of travelling into 2019 as partners.

To hear more about how we can help your organisation get ready for the challenges of 2019; why not keep an eye out on our events page to hear all about our upcoming Citrix events?

Speak to an expert

Blog, Cetus Solutions, Check Point, Cloud, IT Solutions, Security, Technology, Uncategorized

Cyber Criminals are at Gen-V; Are You?


No Comments

Since the dawn of the internet, we’ve learned that keeping our sensitive information under lock and key is important. Even more so nowadays, with the explosion of ecommerce asking for everything short of your National Insurance number. And nine times out of ten you can choose to save your card details for the next time you’re feeling too lazy to get out of bed to grab your wallet. If you really think about it, that’s probably not the best thing to do. But while putting our bank accounts at risk, you’d expect big corporations who have entire qualified, skilled and experienced IT teams to have a handle on their security, right?

Oh boy, could you be any more wrong. In a recent CheckPoint survey, 97% of the organisations that were assessed were not prepared for a Gen-V cyber attack. The thing is, cyber-attacks and security protections have evolved significantly in the last 30 years, but not at equal levels. Currently, organisations are at Gen-III. We fell into Gen-III in the early 2000s, when attackers learned to leverage vulnerabilities in the components of an IT infrastructure. This includes operating systems, hardware and applications. A fantastic example was the SQLSlammer worm. Since then, Gen-IV has emerged in 2010 as cyber criminals became more sophisticated, targeting the world of finance, where sandboxing and anti-bot were the main protections.

Back in 2017, the dreaded Gen-V cyber attack made a roaring entrance with the world-shattering WannaCry ransomware attack. We’re looking at large-scale, multi-vector attacks, using uber-sophisticated attack tools. It’s safe to say that we’re not in Kansas anymore. These attacks are major, generally using ‘state-sponsored’ technologies that can target networks across countries, companies and even continents. Cyber criminals are getting their hands on these technologies from simple leaks or as a result of reverse engineering, and cause major reputational damage for the organisations affected.

So what can be done? The risk of a security threat is omnipresent. No matter what you do, your organisation will be exposed in one way or another (unless you favour the slate-and-chalk method of working).

Check Point’s Infinity is one of the best ways to handle the stress of cyber security. Focusing on prevention instead of detection, it’s a hyper-aware platform that provides consolidated security across networks, cloud and mobile. Combining a single security platform, pre-emptive threat protection capabilities and a unified system for management. With the release of R80.10, it features plenty of clever capabilities and enhancements which include unique policy layers, security multi-zones and boosted performance, to ensure security management. With the move to cloud earmarked for most organisations, the integrated Check Point vSEC Cloud Security’s comprehensive portfolio integrates with both private and public cloud platforms, so you’re covered regardless of your cloud preferences.

Infinity also boasts an impressive threat prevention in the form of anti-ransomware technology that enables businesses to remain protected against even the most sophisticated ransomware and cyber extortion. If your organisation is big into mobile (whose isn’t?), SandBlast mobile has the intelligence to detect both known and unknown malware, effectively blocking it before it becomes a problem. You’ll never have to worry about poisoned wi-fi networks, ‘man-in-the-middle’ attacks or SMS phishing. There are so many nifty features of Infinity that make it a clever investment for an organisation, no matter its size. Centre stage, it has centralised management and role-based administration that allows it to apply to all organisation use cases.

Gen-V will certainly not be the last upgrade in cyber security. As technology improves, expanding and intruding into more and more of our lives, the sophistication of cyber criminals will progress just as fast. It won’t be long until I’m writing about a major Gen-VI cyber-attack and its implications affecting another group of international organisations. So now is the time to start getting ahead of the hackers. We work hand-in-hand with Check Point to ensure that your infrastructure is at the highest level of cyber security so you don’t need to worry about that.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.