Beyond the Finish Line: What to expect from the Federal Civilian Cyber-security Strategy

by Emerson Network Power on 9/23/15 9:14 AM

Rick Holloway September 23, 2015

cybersecurity_breach

The Federal Government’s 30-day Cybersecurity Sprint ended earlier this summer, but the real work continues. Government agencies and equipment manufacturers are awaiting the results of the ongoing cybersecurity review and the release of the Federal Civilian Cybersecurity Strategy – expected soon – but the preliminary principles of the strategy are intriguing on their own.

One thing that’s clear – and not at all surprising – is the government believes the approach to the increasing cybersecurity challenge is both behavioral and equipment-focused. There is no magic bullet piece of hardware or software that will provide adequate protection against all of today’s security threats, but a combination of threat awareness, adherence to best practices and deploying and properly using today’s hardened technologies can reduce risks.

There are eight key principles that will form the foundation of the Federal Civilian Cybersecurity Strategy. They are:

1. Protecting Data: Better protect data at rest and in transit.

2. Improving Situational Awareness: Improve indication and warning.

3. Increasing Cybersecurity Proficiency: Ensure a robust capacity to recruit and retain cybersecurity personnel.

4. Increase Awareness: Improve overall risk awareness by all users.

5. Standardizing and Automating Processes: Decrease time needed to manage configurations and patch vulnerabilities.

6. Controlling, Containing, and Recovering from Incidents: Contain malware proliferation, privilege escalation, and lateral movement. Quickly identify and resolve events and incidents.

7. Strengthening Systems Lifecycle Security: Increase inherent security of platforms by buying more secure systems and retiring legacy systems in a timely manner.

8. Reducing Attack Surfaces: Decrease complexity and number of things defenders need to protect.

I doubt anyone would disagree with those points. But what can we infer if we take a closer look?

It’s not called out specifically, but a consistent theme is access awareness and control. We live in a time when everything is connected—and needs to be, to ensure our data, our networks, our lives move at the speed the world demands. But every connection is an access point, and every access point is a potential vulnerability. Understanding where those access points are and securing them through both technology and best practices is a significant first step in securing a network. This can be as simple as proper credential and password controls.

The point about replacing less secure legacy systems with more secure, modern technologies is important. While there are limits to the effectiveness of software updates and patches, equipment replacement can be costly. Organizations that value security will put plans in place to upgrade equipment over time—and the sooner they start, the better.

One of the more interesting and encouraging points in the preliminary list is the bullet about recruiting and training cybersecurity personnel. This reflects a necessary awareness of the nature of these threats. They aren’t static; hackers are evolving and devising new attacks and tactics every day. It’s critical that our IT personnel maintain the same vigilance and dedication to security and threat education.

Of course, these are simply preliminary indications of the government’s thinking. We’ll know more when the Federal CIO releases the final Federal Civilian Cybersecurity Strategy, and we’ll take a closer look at that strategy and what it means at that time.

For More Blogs and News from Emerson Network Power Click Here

Read More

Topics: Data Center, Thermal Management, DCIM, monitoring, cybersecurity, security

Strategies for Ensuring Speed of Deployment and Resiliency in a Modern Data Center Power System

by Marissa Donatone on 9/11/15 1:28 PM

Date: Wednesday, September 30, 2015
Time: 12:00 Noon - 12:50 PM EDT


More and more, data center professionals are struggling to reconcile the demand for faster operational deployment, while delivering the high availability standards required of their customers.

Data center leader, Expedient, has nurtured a set of best practices to consider. Director of Facility Engineering, Ed Dzurko will share his thoughts and insight on how they utilize electrical configurations, technologies, and services to deliver a more standardized solution to meeting design and operational goals.

Join Ed and Network Power’s Brian Kennedy as they explore electrical power system designs, configurations and practices for powering critical data centers.

Register Today

Read More

Topics: Data Center, power, power system

Three Best Practices to Avoid Cyberattacks

by Emerson Network Power on 8/19/15 8:49 AM

Cyber_Security

From major retail cyberattacks to Hollywood studio hackers, cybersecurity is now, more than ever, on the mind of every CIO in the world — and rightfully so. According to our recent article in Data Center Journal, the most common cause of a data breach is malicious or criminal attacks, which could end up costing not only nights of sleep for CIOs, but also millions of dollars; in some cases upwards of $5.4 million.

While these attacks can be devastating, there are some best practices to help avoid cyber-disaster:

1. Don’t give hackers a back doorIn order to prevent data breaches, consider isolating your network to avoid allowing easy access to your information. Since access can be logged through network isolation, unwanted activity can be monitored and flagged. To isolate your network and limit threats without compromising necessary access or performance, consider utilizing isolated out-of-band management networks. These networks provide full, real-time access without giving hackers back door entry.

2. Enforce the three A’sAuthentication, authorization and auditing are all critical to securing your network. Ensure your cybersecurity by using fine-grain user authentication through a centralized and controlled process, while still allowing easy access for administrators.

3. Ensure trust and best practices with outside vendors: Servicing data center equipment typically requires allowing atypical access to sensitive information about your data center with people outside your organization. Even new technologies are now requiring software updates while sharing IP addresses and network ports to accommodate those updates. While you may feel confident in your organization’s security practices, it’s also important you trust the security measures practiced by those outside parties or contractors, as well.

Security is a complex, never-ending process, but the right partners can help cut through that complexity and ensure your network—and your business—do not become the next victim.

What other best practices do you use to ensure your network is secure?

For more Blogs by Emerson Network Power, Click Here!

Read More

Topics: Data Center, PUE, UPS, DCIM, monitoring, Trellis, the green grid, cybersecurity

How Prefabricated Data Centers are Changing the Edge of Network

by Emerson Network Power on 7/29/15 8:31 AM

prefabricated_DC_Blog

Some of our recent posts have highlighted the benefits of prefabricated data centers – here’s another one to add to the list: significant advancements in deployment, scalability and reduced life-cycle costs through the evolution of the edge of network. Where our networks were once divergent, assembly line-born systems of years past, we’re now starting to see a changing landscape with integrated, system-wide intelligence.

Prefabrication allows telco and IT providers to quickly deploy, add capacity, and locate computing closer to their end users without exceeding budget or compromising performance. For telco networks, prefabricated deployments at the edge of the network serve as aggregation centers for data that is regularly accessed. In other words, if files are stored in a prefabricated aggregation center somewhere closer to your home rather than the core site, it reduces latency and increases access speed. Or, more simply put, less buffering time or interruption while you binge watch the new season of Orange is the New Black on Netflix.

Corporations are also benefiting at the edge as prefabricated systems provide streamlined local computing for remote locations such as branch offices or small and medium businesses. By centralizing the applications these smaller offices frequently handle at their corporate data center, these compact, rapidly deployable systems will support local data storage and processing while providing secure remote monitoring and manageability. Thus, allowing small businesses to act more nimbly and give customers quicker responses and service.

At the end of the day, customized prefabricated facilities deploy 30 to 40 percent faster than traditional stick-builds, transforming the way IT and telco providers serve their networks at the edge. But while the benefits are abundant, prefabricated solutions may not be right for every facility. In a recent article, I shared three questions IT and telco providers should ask themselves when evaluating options for the edge of their network:

1. What is the value of rapid deployment?
2. How does site selection affect design?
3. What compromises must be made to achieve rapid deployment?

I still believe these questions stand true. Are there any others you think IT and telco providers should be asking when considering prefabricated solutions? If so, post them into the comments below.

 

Written By: Steve McKinney | July 29, 2015 

For More Blogs by Emerson Network Power, Click Here 

Read More

ASHRAE Journal Invitation to Attend a Supplier-Sponsored Webinar on Upgrading Cooling Systems July 30

by Marissa Donatone on 7/27/15 8:15 AM

ASHRAE Journal Invites You to Attend a FREE Sponsored Webinar Presented by Emerson Network Power

Emerging Technologies in Controls and Automation

Data-center cooling systems must be finely tuned for high efficiency and availability to be achieved. Most systems, however, lack the advanced controls needed to optimize thermal performance. Join us as Jason Gloeckner, Marketing Manager for Thermal Software Solutions for Emerson Network Power, explains how thermal controls are changing in response to data center trends and user preferences. Jason will discuss how new thermal-control strategies can help data center managers:

  • Select the right controls technologiesdc_webcast
  • Cut installation costs
  • Avoid and defend against adverse events and reduce system wear and tear
  • Reduce cooling system energy consumption
  • Gain insight into thermal-system performance and trends to optimize data center performance

Click HERE to register for this FREE presentation.

About the Presenter

Ralph_ConklinRalph Conklin, Product Manager, Aftermarket Solutions for Thermal Management Support, Emerson Network Power:
Ralph Conklin is Product Manager, Aftermarket Solutions for Thermal Management Support, at Emerson Network Power. In his current role, Ralph manages the aftermarket parts, retrofit kits, and energy efficiency upgrade products for Emerson's industry-leading thermal management equipment. In this webinar, he will describe new ways to deploy thermal management technologies for fast ROI while improving data center efficiency, protection and insight.


Ralph has more than a decade of experience in the data center market, including positions with Emerson in Thermal Management Engineering, New Product Development and Technical Support. He holds a Bachelor of Science in Mechanical Engineering from The Ohio State University and a Masters of Business Administration from Franklin University. 

Read More

Topics: Emerson Network Power, Data Center, Thermal Management, cooling, Power and Cooling, advanced controls, data center managers, optimized performance, ASHRAE

Subscribe to Our Blog

Recent Posts

Posts by Tag

see all