Posts

PLEASE_READ_ME: The Opportunistic Ransomware Devastating MySQL Servers

Guardicore Labs uncovers a sophisticated, multifunctional P2P botnet written in Golang and targeting SSH servers.

Migrating to the Cloud Fast and Securely

There are numerous different ways to make your move to the cloud. According to Gartner, the five most common techniques are rehosting, refactoring, revising, rebuilding, or replacing. Yet every one of those options has a few commonalities: you will always need to understand what assets will be involved, how they communicate, and the ways they interact with your broader IT environment.

After helping organizations of all sizes and complexity levels simplify and accelerate their cloud migration projects, Guardicore has identified five simple steps that can streamline those common points. Following these steps helps assure a fast migration while also enabling you to ensure that security and compliance policies extend to the new infrastructure

5 simple steps to a fast and secure cloud migration

Ready for a sneak preview? Check out this short video for the quick overview before diving into the detailed instructions for how to achieve a fast and secure cloud migration.

1. Map application workloads

Typically, 73% of cloud migrations take more than a year to complete1. Even migrating a single application can take as long as four months2. However, with Guardicore, you can drastically speed up the timeline of your project from step one.

Once installed, Guardicore Centra automatically generates a detailed map of activity across all your environments. Process-level activity is correlated with network events, giving you a visual view of all workloads.
You can then drill down for more detail, including granular information on specific assets and processes. This helps you determine what elements you need to consider during your migration, so you can accurately scope your project.

2. Identify service dependencies

Many applications have service dependencies that they rely on to operate, such as DNS, active directory, or update services. These need to be documented and correctly configured as a part of the migration process.

For instance, you may not want your newly migrated cloud application to have access to the on-premises active directory for security or compliance reasons. Therefore, rehosting it or setting up another instance may be a better option for your business.

Guardicore can help you determine what dependencies exist today. Once those dependencies are identified, you can make a proactive and informed decision on how you would like to set up these services before you migrate. In this way you can avoid unplanned delays.


Guardicore provides detailed insights into service and business dependencies

3. Identify business dependences

In addition to ensuring service dependencies are taken care of, other elements in your environment likely require access to the newly migrated asset to keep your business running as usual. One common use case for financial services organizations, for instance, is the need for billing, accounting, and SWIFT applications to communicate with a banking application migrated to the cloud.

In order to ensure that everything continues operating as expected post-migration, Guardicore provides you with the granular visibility you need to understand communication between each relevant element. This includes insights into connections between protocols, ports, and processes.

This visibility lets you plan how to configure for today’s dependencies. It also helps you decide whether or not to make a change moving forward (like creating a cloud instance of an accounting application in order to avoid an on-premises-to-cloud dependency). Moreover, it allows you avoid potential outages that can occur when you decommission on-premises versions of applications after a migration.

4. Migrate your assets to the cloud

Once you’ve gone through the process of mapping assets and thoroughly understanding dependencies, you can confidently begin your cloud migration. During this time, you can also define any segmentation policies needed to further reduce risk and ensure compliance.

Guardicore Risk Reduction Analysis Report

See how micro-segmentation can shrink attack surface up to 99%

Learn about our free, no-touch, zero-impact, personalized report that quantifies risk reduction from using software-based segmentation in your own environment

MEASURE RISK REDUCTION RESULTS

 

Because Guardicore presents real-time and historical network data in a centralized platform, it’s easy to spot communication flows that might increase risk or result in non-compliance. You can then limit exchanges between assets as needed.

There is an additional bonus to defining policies before undergoing a cloud migration. Since Guardicore operates independently of the underlying infrastructure, policies follow the workloads. Thus, existing security controls carry over to the cloud. There, they can be fine-tuned for an asset’s new environment, saving even more time.

“The entire segmenting of the Somos infrastructure, applications, and data had been completed when we entered the new environment.”

Alex Amorim – Information Security Manager

5. Check and validate your cloud migration

After you’ve completed your cloud migration, it’s important to do one last thorough check. Now is the time to validate that you have accounted for all dependencies and that the correct security policies are in place.

Once you’ve confirmed everything is as it should be, you can securely shut down any on-premises assets you want to decommission. All that’s left is to toast to a successful migration!

Congratulations on completing your fast and secure cloud migration!

Going through these five steps with Guardicore Centra can drastically simplify and speed up your migration to the cloud. Ready to see that kind of success in action for yourself? Check out this five-minute walkthrough of moving an e-commerce application to the cloud:

Can you reduce your attack surface to zero?


As network changes take place faster and faster, attack surfaces grow at a corresponding pace, increasing business vulnerability.

It’s critical to:

  • Articulate the risks brought on by a large attack surface.
  • Visualize how radically software-based segmentation can reduce your attack surface.
  • Quantify the risk reduction so others across the business can understand the value of taking action.

But can you reduce your attack surface to zero? And what exactly are we talking about here when we reference the attack surface?

What is an application attack surface?

Application attack surfaces are the communications not restricted between endpoints in the network and an open port on one of the servers of the application in review. The bigger the attack surface, the more vulnerable your environment is. For example, a successful ransomware attack starts from an attacker leveraging the ability to (a): penetrate the network by leveraging non-monitored communication paths1 and (b): move laterally, targeting critical data or high privileged services and propagating ransomware across entire networks, before encrypting all they can (including your backups).

Reducing the attack surface by exposing only needed services/ports to the smallest group of clients is essential to stopping this type of attack from penetrating your network. A well micro-segmented network will prevent the attackers from moving laterally within the network, gaining growing control over more assets. Unfortunately, this is just one possible attack vector – there are others.

So, can you reduce your attack surface to zero?

Given all the issues that can be brought on by having a broad attack surface, it seems like the answer would be to shut the attack surface down.

Unfortunately, you can’t really reduce your attack surface to zero – unless you can:

  • Disconnect all communication paths between the internet and all of the servers in your network (including IoT devices).
  • Prevent anyone with access to your organization’s IT infrastructure (including network systems, laptops, virtual environments, databases, business applications, etc.) from uploading, downloading, opening emails, clicking on links, connecting their own devices, or making any changes to set configurations.
  • Hire only people who make zero mistakes, 100% of the time.

Assuming connectivity with the outside world is required and human errors are here to stay, how can you realistically protect your critical applications to ensure business continuity and growth? The answer is to reduce the attack surface to a minimum using software-based segmentation. Make sure the only open communication paths between an application’s servers/processes and other applications, users, or internet sources are allowed and monitored by your set policy.

Software-based segmentation brings instant visibility for attack surface reduction

Learn how Guardicore can help

How do I prove the value of attack surface reduction to management?

Even if you know the benefits of using software-based segmentation to reduce your attack surface, demonstrating the risk reduction value of segmentation to management can be a challenge. That’s where Guardicore’s Risk Reduction Assessment Report comes in.

The report enables security teams to visualize and understand their applications’ attack surface by seeing which other assets can communicate with the application’s servers. The report then provides a view of what the attack surface looks like once unnecessary communication paths are closed and the attack surface has been minimized.

The personalized report is based on a zero-impact process that enables Guardicore to analyze your own applications. There is no required software installation and we are at no point connected to your environment. The report is based on netstat type data we receive from the organization we work with on the report. The business requesting the report chooses which application and servers to collect data from.

There are a few ways to collect us the data:

  • Open-source data collector script
  • A Netflow file
  • A PCAP file containing packet network data
  • Guardicore agents (as part of a PoC process)

The result is a document that visually demonstrates:

  • The way software-based segmentation reduces the risks of a flat network.
  • The quantified value of segmentation in your own business environment.
  • The logic behind the generation of the graphs and numbers in the report.

How do I get a personalized report analyzing my business applications’ risk reduction potential?

Ready to try the Risk Reduction Assessment Report out for yourself? Sign up today to find out how much you can reduce your attack surface using Guardicore’s software-based segmentation solution.

Get Your Attack Surface Reduction Report

MEASURE RISK REDUCTION RESULTS

How does Guardicore Centra help reduce the accessibility of the attack surface?

Guardicore Centra’s software-based segmentation enables enterprises to reap the benefits of risk reduction while supporting agile DevOps and rapid application deployment. The solution delivers optimal security at a faster speed with greater security efficacy.

Guardicore’s micro-segmentation is performed at the workload level rather than at the infrastructure level. Therefore, it can be implemented consistently throughout a hybrid cloud infrastructure and it adapts seamlessly as environments change or workloads relocate.

Micro-segmentation lets security teams create granular policies that segment applications from one another and/or segment tiers within an application. As a result, companies can accomplish such goals as:

  • Slow or block attackers’ efforts to move laterally.
  • Create a security boundary around assets with compliance or regulatory requirements.
  • Enforce corporate security policies and best practices throughout the infrastructure.
  • Apply Zero Trust principles throughout the infrastructure, even as the business extends from the data center to one or more cloud platforms.

This focus on preventing lateral movement through in-depth governance of applications and flows reduces the available attack surface even as IT infrastructure grows and diversifies.

What can I do to kickstart my program?

Now that you understand the importance of reducing the accessibility of the attack surface, here are a few things you can do get started:

  1. Read more about attack surface reduction: Download the paper about how to demonstrate the importance of minimizing the attack surface.
  2. Get the attack surface reduction report: Sign up for your personalized report today.
  3. Receive a Guardicore demo: See how Guardicore’s software-based segmentation solution, Guardicore Centra, can help you today.

1 For example by using weak points such as internet-facing servers and remote-desktop logins or people unintentionally downloading malicious payloads

WarezTheRemote: Turning Remotes into Listening Devices

Guardicore Labs uncovers a sophisticated, multifunctional P2P botnet written in Golang and targeting SSH servers.

Guardicore Supports The New Data Center Architecture with NVIDIA BlueField-2 DPUs

We saw the early signs about two years ago: while everyone was talking about cloud migration and moving faster to the cloud, there were enterprises that increased their investments in the on-premises data center, and they continue to do so even in this current era.

Over the past months since the COVID-19 pandemic first entered our lives and work from home transitioned from being a tentative reality to a necessity, organizations are moving faster to the cloud, but there are still a lot of applications and workloads that must remain on premises. We write a lot about critical applications that still run on legacy Unix, old Windows operating systems, ancient Linux and other veteran OS that cannot be migrated to the cloud but while many may have assumed that soon enough enterprises will manage to migrate all workloads to the cloud, that is not the case.

As enterprises are embracing new technologies and cloud computing microservices architectures, there’s a shift inside the data center. Not every application can be migrated, and some applications explicitly should not be moved to the cloud. Some of the reasons are clear: there’s more need for speed, higher throughput, and lower latency. Some aspects are less visible: like how containers and container operating systems are installed and deployed, and overall cost of running highly complicated applications in the cloud. As an example, there are a growing number of instances of Kubernetes being deployed on bare-metal servers due to better performance and lower latency and reliance on hardware accelerators.

Coupled with more requirements for using AI and other machine learning algorithms, these developments are leading to faster adaptation of new hardware and software infrastructure like NVIDIA GPU accelerated computing at the edge, faster connectivity, bigger pipes and overall, faster, simplified and more agile computing.

The modern application runs inside the data center and within the edge. It has extensions to the cloud and must operate as a well-defined single unit under new architecture.

While networking architects were busy redesigning the data center, the security architects realized that the firewall as we know it is no longer adequate to protect the modern data center, and new technologies are necessary to enable the required level of security and risk mitigation. There are many limitations that prevent traditional firewalls and even newer firewall-as-a-service solutions from addressing their needs.

First and most obvious, firewalls can protect only the traffic that they can inspect. This means mostly North-South traffic. Now, imagine that you have hundreds or more servers running at 10, 40, 100 and even 200 Gbps. How can your firewall support that amount of traffic? TOR architecture to steer and redirect traffic is not relevant for this new design and can’t be used. Moreover, the existing policy management paradigms built for static designs are not suitable for this new architecture that supports a dynamic and fast-changing application environment.

There are many other limitations, each of which frankly deserves a blog of its own. But in the interim, we all should accept the fact that some aspects of the firewall market and some of its current deployment scenarios are about to change dramatically. The winds of change have begun to blow.

In contrast, software-defined segmentation allows companies to apply workload and process-level security controls to data center and cloud assets that have an explicit business purpose for communicating with each other. It is extremely effective at detecting and blocking lateral movement in data center, cloud, and hybrid-cloud environments.

And then DPUs and SmartNICs were invented.

Data processing units (or DPUs) are changing how and where data center security is performed. DPU-based SmartNICs fuel the new architectural redesign. It started with hyperscalers, large service providers and tier-1 cloud service providers (CSPs) that discovered the benefits of having a managed device that can free up expensive CPU cycles. They all like how SmartNICs are providing added-value services beyond core networking functionality. As a reminder here are some of its capabilities:

  • Offloading network functions
  • Providing security-related processing
  • Tcp offloading to dedicated engines that free up CPU cores
  • Improving networking performance
  • Providing cryptography capabilities like faster encryption

And there are even more security services like workload isolation, secure boot and protecting customers workloads from other tenants.

Partnering with NVIDIA, Guardicore pioneered the concept of using SmartNICs for micro-segmentation to enable the best of both worlds: accelerating performance and functionality while providing secure segmentation capabilities for the new data center.

Using Guardicore with NVIDIA BlueField-2 DPU will allow enterprise customers to embrace the new and cover the old with software-defined segmentation for hardware, providing a faster, more granular way for enterprises to protect their critical assets. Projects that in the past may have spanned many years can now be done in a matter of a few weeks with this new approach, quickly reducing risk and validating compliance.

Guardicore is working with NVIDIA to provide a solution that, just like your DevOps practices, is decoupled from any particular infrastructure, and is both automatable and auto-scalable. On top of this, it provides equal visibility and control across the board in a granular way, so that speed and innovation can thrive, with security an equal partner in the triangle of success.

We are also working with NVIDIA on new BlueField-2 DPU integrations to support the new data center architecture. Doing so with this integration we enable enterprise customers to accelerate their application, innovate faster and deliver competitive solutions to the market.

NSPM and Simplified Security and Governance for Hybrid Clouds – What does the Guardicore and AlgoSec Integration Mean for You?

Getting the most out of your network firewalls has never been a simple task for enterprise environments. As organizations increasingly move to the cloud and operations become more dynamic and complex, the requirements, and the stakes, are rising.

Over the years, I’ve seen improper management of firewalls open organizations up to various types of risk as a result of employee error and oversight. This can have varying consequences, from large-scale data breaches, to fines and penalties due to non-compliance. What do Network Security Policy Management (NSPM) vendors do to help, and is this technology enough on its own?

Learn more about how micro-segmentation helps you reduce risk.

Why do Companies Need Network Security Policy Management (NSPM)?

Inconsistent or inaccurate firewall policies impact the functionality of business applications, cause compliance gaps, and make an organization vulnerable to cyber attacks.

In response to these fears, Network Security Policy Management companies such as AlgoSec, one of the early pioneers of this category, were born. I have had many chances to work with AlgoSec and their team over the last 15 years and it is amazing to see how the product, and actually the market that they have created, is adapting as the IT landscape changes. More recently however, the rise in internal traffic moving East-West inside the data center has created a need for something more. Let’s look at what this means in practice.

Amplifying Firewall Complexity in the Hybrid Cloud, Data Center and Edge

When implemented well, NSPM provides visibility over complex traffic and communication, adds sophisticated automation capabilities for network firewall policies that are spread over multiple devices or locations, and eases compliance with various regulatory requirements for specific industry needs. Tight governance over your perimeter firewall works to keep North-South attacks that move in and out of the data center at bay. But when it comes to a hybrid data center, traditional perimeter firewalls do nothing to address this risk.

In a hybrid cloud data center, visibility and control become more of a struggle than ever. Some of the reasons why, include:

  • Different environments to consider, from on-premises to public or private clouds, each with evolving requirements.
  • The majority of traffic moving East-West, because of third-party vendors, employee devices, and increased exposure via the public cloud.
  • DevOps teams pushing for faster innovation and the deployment of new features via rapid application development.

The more complexity, the more risk, so the hybrid cloud ecosystem needs to be secure from the earliest possible stages.

Dedicated micro-segmentation solutions like Guardicore have risen to this challenge. With a smart segmentation solution, your organization can create access policies inside hybrid enterprise environments that leverage a zero-trust model. Enterprises tend to start with projects that bring quick time to value, such as ring fencing critical applications that hold the most sensitive data or systems.

As a smart, software-based segmentation vendor, we provide new and essential firewall capabilities, dynamic and flexible enough to meet any use case or scale. Of course, the perimeter firewall is still necessary, and needs concurrent and tight governance and control. Therefore, the best segmentation solutions that address hybrid cloud complexity will integrate seamlessly with best-of-breed NSPM solutions.

Simplifying Complexity with a Two-step Integration

According to Gartner, “Despite there being multiple network security vendors with centralized managers, network security teams are struggling to manage these multiple and multi-vendor policies and to have complete visibility across different environments. Maintaining continuous compliance is becoming a bigger challenge.”

A challenge that, here at Guardicore, we’re happy to meet. Guardicore Centra integrates easily with AlgoSec to make it simpler to manage governance and firewall rulesets across a hybrid enterprise environment. Guardicore customers can continue to use their existing perimeter firewalls for North-South traffic alongside Centra’s precise labeling and segmentation policies for managing and controlling all communications that move East-West.

The AlgoSec Policy Exporter integration with Guardicore can be used to export all labels and files from Guardicore Centra, converting them into two easy to manage CSV files, one for endpoint machines and another for rules. The security team now has these policies and labeling rules to forward to any other managed devices within the data center, consolidating existing policies and governance. This integration also provides your enterprise with full visibility of dynamic policies across the data center, even in hybrid environments.

No Firewall Left Behind: Adding Visibility and Control Across a Hybrid Ecosystem

Internal firewall management and control are essential in today’s hybrid cloud data centers, but they don’t negate the need for existing traditional perimeter firewalls. Managing this complex arrangement are NSPM industry leaders such as AlgoSec that can seamlessly visualize, automate and organize policies from multiple firewall vendors across the data center.

By using AlgoSec with Guardicore Centra, our customers have access to the simplest and strongest segmentation choice when managing East-West traffic without adding complexity to firewall management overall.

Want to learn more about segmenting East-West traffic for your hybrid cloud data center?

Download the White Paper here

How to Prove the Savings of Software-Based Segmentation vs Legacy Firewalls

Many companies have discovered to their dismay that using firewalls to segment their networks is a complex, ineffective, and expensive process – especially when it comes to a hybrid cloud environment. In addition to the burdensome upfront cost of firewalls and hardware, there are the heavy downstream costs of project management, labor, maintenance, and prolonged asset exposure due to lengthy implementation times.

Guardicore Centra’s software-based segmentation enables enterprises to avoid those issues. Instead, organizations can reap the benefits of agile DevOps, rapid application deployment, and the cloud, delivering optimal security at a far lower total cost of ownership than traditional methods. Yet how can you prove the savings of software-based segmentation – before you make the switch?

Evaluating the full cost of technology and people is essential when making important, effective decisions. This is particularly true with impactful projects like segmentation, which have long-lasting impact. That’s why we developed the Guardicore Firewall Cost Savings Calculator. The calculator lets you compare legacy firewall segmentation with software-based segmentation and gain a comprehensive understanding of where the time and cost savings come from, using data that’s relevant to your own environment.

Why is segmentation so hard with legacy firewalls?

Let’s take a moment to understand why segmentation is difficult and pricey with traditional firewalls. Among the reasons for the high costs and challenges are the facts that:

  • There is little visibility with traditional firewalls. As a result, segment boundary identification can take many months.
  • Segmentation with legacy firewall appliances requires network changes (VLANs) and application changes that involves tremendous effort and costly downtime.
  • Applications are dynamic and change fast, and traditional firewalls simply do not have the flexibility to accommodate those kinds of agile changes.

Luckily, software-based segmentation provides a significantly more cost-effective and efficient alternative.

HoneyBaked Ham simplifies segmentation and controls access to critical applications

With Guardicore Centra, the HoneyBaked Ham company:
– Reduced upfront costs by 50%
– Secured 45 applications in six weeks
– Reduced total project cost by 85%

Guardicore makes segmentation more efficient

Guardicore’s software-based segmentation solution is independent of the underlying infrastructure. It allows simple policy management with a single pane of glass, without relying on cumbersome network appliances.

Guardicore empowers customers to accelerate segmentation projects with:

  • Full visibility for fast segment identification
  • One solution across hybrid environments
  • No networking or application changes required
  • No application downtime required
  • Smooth integration into DevOps lifecycle with REST API

Wondering how that translates into hard data? That’s where the Firewall Cost Savings Calculator comes into play.

The Guardicore Firewall Cost Savings Calculator

The Guardicore Firewall Cost Savings Calculator was developed to quickly and easily demonstrate the extent of the savings businesses can get from using Guardicore’s software-based segmentation compared with a legacy firewall solution.

To use it, all you need to do is answer four simple questions:

  • How many unique segments are required in your environment?
  • On average, how many physical servers or virtual machines will be included in each segment?
  • To how many different locations do you expect to deploy your application?
  • Who is your firewall vendor?

Once the fields for these questions have been filled out, the calculator will automatically display the resulting savings. For a detailed breakdown of how the results were calculated, you can also read the white paper or, for a more personalized breakdown of savings you can gain in your business’ unique environment, request an individual analysis.

As one customer discovered:

“With Guardicore, we were not only able to secure 45 applications without interruption in just six weeks, we also got a more agile, cost-effective, and secure solution than our legacy firewall provider.”

~ David E. Stennett, Sr. Infrastructure Engineer, the HoneyBaked Ham Company

With Guardicore Centra, segmentation takes a mere 16 days, as opposed to 14-22 days with legacy firewalls.
With Guardicore Centra, segmentation takes a mere 16 days, as opposed to 14-22 weeks with legacy firewalls.

See the savings from software-based segmentation

Ready to be amazed? Try the Guardicore Firewall Cost Savings Calculator for yourself and discover the time and cost savings your company could be getting by switching from traditional firewalls to software-based segmentation.

Guardicore is AWS Outposts Service-ready, Supporting our Customers that are Moving Closer to The Edge with Hybrid Cloud Environments

Several months ago we announced our plans to support AWS Outposts. Guardicore’s VP Business Development Sharon Besser wrote, “I am excited to share the news that we will support AWS outposts just like any other part of the hybrid cloud. Together with AWS and their hardware partners we are looking forward to expanding the Guardicore ecosystem to additional areas of the ever-expanding cloud, securing customers wherever they might be.”

Learn More about Guardicore’s Solution for AWS Customers

Well, we always keep our promises, and I’m excited to be able to update you about our progress on a whole new frontier and beyond- the edge. Guardicore was among the first vendors to achieve the AWS Outposts service ready partner status, following the tests and certification process performed by the AWS Outposts team. We are now fully enabled and ready to secure our customers’ journey to the new hybrid cloud, including even more environments.

Great! What Can I Use AWS Outposts for?

AWS Outposts is a fully managed service that extends AWS infrastructure, services, APIs, and tools to customer premises. By providing local access to AWS managed infrastructure, AWS Outposts enables customers to build and run applications effectively as an on-premise data center using the same programming interfaces as in AWS Regions, while using local compute and storage resources. This supports applications that require lower latency and have local data processing needs.
The result? Near real-time responses to end-user applications, and the ability to communicate with other on-premises systems, such as controlling on-site equipment. Enterprises can also now securely manage data on-premises in places without an AWS region, and process data locally where utilizing the cloud would be inefficient or use unnecessary resources. AWS Outposts is another environment some of the most sophisticated customers are adopting, raising a need for increased coverage from a solution that addresses hybrid cloud security.

Here are 4 Industries that can Benefit from AWS Outposts

Healthcare: Hospitals are often in places where connectivity is at a premium. With AWS outposts, workloads that handle real-time patient diagnosis or medical imaging can be run on-premises, offering the quickest possible response time.
Manufacturing: Automated operations on factory floors can be managed on-premises via Outpost environments, helping manufacturers to streamline processes, improve productivity and benefit from innovation such as IIoT and data analytics to power real-time decision making.
Media: The incredibly fast response time that organizations can achieve when using AWS Outposts makes it perfect for media streaming and processing companies, where users expect perfect performance without buffering or delay.
Telecommunications: Moving storage and compute resources closer to the end user and their devices at the edge is what will power software-defined networking and network virtualization for mobile networks. In turn, this will allow them to take advantage of the new 5G economy, and the world of IoT.

What Changes for Enterprise Security?

In the AWS Outposts model, a full appliance comprising both hardware and software is delivered to the customer. AWS takes responsibility for supporting and maintaining the hardware and software and the customer provides the physical facility in which the system is hosted. Otherwise, AWS effectively runs the appliance as an extension of its central cloud service. This set up may cause security challenges for some customers by its very design.

Just like AWS Regions, the AWS “Shared Security Responsibility Model” applies to Outposts as well. Even though they are deployed on-premises, AWS is responsible for the hardware, and the customer is responsible for applications, data and operational security. Despite the servers being on-premises, only AWS have access, including any scheduling decisions for patching, updates, and version upgrades.

One important element to consider is compliance. Security certifications like SOC2 will not automatically apply on-premises as they would in the cloud. Customers must work with AWS and, potentially, with other auditors to certify their deployments.

Securing AWS Outposts involves using the same levels of visibility and control that we bring to any existing hybrid cloud ecosystem, expanded to cover this new environment. “We know the importance of helping customers and organizations more easily identify potential security risks in order to take action,” said Joshua Burgin, General Manager, AWS Outposts, Amazon Web Services, Inc. “With Guardicore Centra Security Platform available to customers on AWS Outposts, we are able to provide a comprehensive view of (a customer’s) security posture on their infrastructure, on AWS Outposts, and in AWS Regions both on-premises and in the cloud for a truly consistent hybrid experience.”

Read more about our partnership in our press release here.

Securing the New Hybrid Cloud

The fact that Guardicore has a certified solution and is a service ready provider for Outposts is no small announcement for us. We can already see how AWS Outposts is the beginning of a new type of hybrid cloud, one which leverages on-premises systems to take customers closer to the edge, providing faster speeds and better performance and security for end-users. Think about new service models from AWS like Wavelength or Local Zones, that are already building on the Outposts technology.
By ensuring that we are first out of the gate with the service-ready certification and prepared to help secure the variety of modern hybrid cloud environments that include AWS Outposts, we are sending a message to our customers. We’re secure across your entire hybrid ecosystem, and we’re ready for whatever is coming next.

Looking to learn more about protecting your workloads across a hybrid enterprise environment? Check out our white paper.

Read now

Securing VDI with Micro-segmentation for the Education Sector: A Classroom in the Cloud

I have 4 kids, and 3 are still school age. Like everyone else, they are now spending most of their time online, including their school time. Naturally, the following topic is close to my heart.

Schools and educational institutions offer an ‘X marks the spot’ for hackers looking to leverage sensitive and personally identifiable information (PII). For extended periods of time during a student’s progress from K-12, schools will store and manage varied information for both minors and their guardians, that includes addresses, healthcare records, aptitude assessments, payment information, and social security numbers.

A number of issues make security even more complex for stakeholders in school districts. They work across multiple campuses, have large and complex IT networks, often depend on legacy systems to store and manage critical data, and experience regular turnover of both students and staff.

In 2013, Lahiri, M. & Moseley, J.L. published a research paper, called “Migrating educational data and services to cloud computing”. Inside, they listed the different challenges for educational institutions that were migrating to the cloud. Out of the five challenges (control, performance, security, privacy and reliability), the security challenge is yet to be solved effectively by either the cloud providers or the educational systems.

Whether school districts are moving to the cloud to modernize their environments, or to address the current online learning challenges, a hybrid environment increases their exposure and risk. It’s not surprising that cybersecurity incidents against public K-12 schools tripled in 2019.

Getting on the Syllabus: Where Does Virtual Desktop Infrastructure Fit into Remote Classrooms?

The benefits of VDI in education are clear. Firstly, the technology provides a simple way for students to learn remotely and gain the access they need to course materials and lessons. Devices such as Chromebooks are a low-cost way for schools to level the technology playing field and offer their student body a streamlined learning experience.

In addition, for teachers, VDI is a flexible way to create learning spaces and computer-based assessments that can be accessed in any location, for any student with an internet connection regardless of the age or type of machine. This is an essential part of democratizing learning, and making shared spaces that are accessible to anyone, from any background or of any means.

In fact, VDI in the classroom is nothing new, and has even supported schools in addressing some important security issues, such as lessening the reliance on legacy systems or end of life machines. Of course, it needs to be implemented with its own security controls at the start, such as segmentation over user access and smart protection of critical applications. School districts like Madison City in Atlanta for example have been using virtual machines for almost a decade as part of a program to securely save on high hardware costs and upgrades.

According to Katrina Bowling, Technology Coordinator in Madison City for 9,000+ students and 1,000+ staff,

“VDI lets us replace old machines as they die a natural death, as opposed to being forced to do it because they are inadequate. It takes us out of the endless process of refreshing PCs. Before we deployed VDI, we were four years behind on our refresh schedule, and 3,500 PCs — more than 75 percent of our inventory — were more than five years old and incapable of being upgraded to run anything beyond Windows XP”.

However, this year, as students head back to school during COVID-19, VDI adoption is being rolled out faster than ever before, which may lead to school districts skipping vital security steps.

Citrix has highlighted “the urgency with which higher education institutions need to transition quickly from a traditional campus-based model to a remote-ready model and put in place a long-term digital learning strategy”. Whether students are heading back to the classroom this semester, continuing to study from home, or somewhere in between, VDI can support schools in being ready for anything. However, when schools are being trusted with the confidential data of minors, this should only be considered when districts have the right segmentation controls in place.

The Required Reading: Understanding the Security Risk of Learning from Home with VDI

Being ready to make the leap to VDI in response to COVID-19 means understanding the heightened need for segmentation and access control when using virtual machines, as opposed to when relying on traditional data centers.

When using VDI, your critical applications and sensitive data are sharing the same server as your end users. In the case of education, those end users are any students that are studying remotely, diverse in age and experience, as well as teachers that may be utilizing this kind of technology for the first time in their careers. You’re opening an environment that is designed to be shared by many users, unencumbered by a perimeter firewall, and in which the traffic is likely to be encrypted using SSL or TLS.

As your VDI is largely open, it only takes a single infected machine for an attacker to launch a threat against an entire network, making lateral moves to other machines, accessing administrative controls or critical and sensitive information.

VDI has great security capabilities, but it is missing the ability to restrict lateral movements and reduce the risk of using the shared server environment.

A Quick Study: Handling this Threat with Micro-segmentation

The cheat sheet for securely seeing the benefits of VDI for your school environment is centered around access control. It goes without saying that students shouldn’t have the same ability to move freely through a network as is given to the IT team, or that school administrators or bursars who handle financial or aptitude data should have different permissions than are provided to the math department or the gym teacher.

Here’s how an intelligent micro-segmentation choice makes it happen:

  1. Application segmentation: Enhance governance across your school district by ring fencing critical data or systems at the VM, application, or even process level. Visualize applications by role, or interaction.
  2. User identity access policies: Tightly manage data access by creating process level policies for specific users or groups, based on information pulled automatically from the Active Directory.
  3. Baked-in compliance controls: Show that you’re taking FERPA compliance seriously, and in case of a data breach, protect financial or medical information held under your institutional roof.
  4. Strong visualization: Being able to see across a hybrid environment is essential when you have a large distributed network. Rather than segmenting based on trial and error, gain visibility from day one.
  5. Integration with breach detection: Gain immediate insight when suspicious activity is detected, alongside information-rich alerts that show exactly where and how the incident occured.

Do the Math: Citrix +Guardicore = Secure VDI Environments for your District

Virtual Desktop Infrastructure through industry leading solutions such as Citrix Virtual Apps and Desktop is an intelligent route to a safe school year for K-12 around the world. It sets up students with virtual spaces to learn from anywhere, and provides teachers with the technology they need to support remote learning, touchless lessons, or a mix of home and school study.

However, safe also needs to include secure.

The FBI has announced its own fears that malicious actors will use VDI to launch attacks against educational facilities, and without an A+ segmentation strategy for using VDI, your school district and the schools within are left unprotected.

Guardicore Centra is certified as Citrix-ready, and successfully validated with the latest versions of Citrix Virtual Apps and Desktops. It can run on your environment on premises, in the cloud as well as for a hybrid model. As technology partners, the combination offers extremely quick time to value for school districts that need a fast turnaround on providing a new technology to their staff and students.

If you need support in shoring up your defenses ahead of time with a micro-segmentation solution that leaves nothing to chance, find us in the Citrix-ready Marketplace, and get in touch to discuss your specific requirements.

Want to know more about securing VDI with micro-segmentation?

Read our recent white paper

Or find out how one school district improved their PCI-DSS compliance posture with Guardicore in our case study.

FritzFrog: A New Generation of
Peer-to-Peer Botnets

Guardicore Labs uncovers a sophisticated, multifunctional P2P botnet written in Golang and targeting SSH servers.