Blog

Build, Buy, or Partner: A Manager’s Guide to meeting new requirements and delivering new capabilities in the SaaS world

This is a guest post by Senthil Venkatachalam, a Subject Matter Expert in product management, managed services, and cybersecurity solutions. The rapidly emerging and evolving cloud-solutions landscape is dramatically changing the Information Technology business. Shrink-wrapped software is no longer bundled into a CD or DVD and shipped to a customer for installation within the data centers. Software developers must now learn IT hosting, operations and cybersecurity engineering. As businesses try and make sense of these changes, Business and technical managers are often faced with a trilemma [1] when trying to satisfy changing customer demand and preferences: Should we develop the new services ourselves (build), integrate with an existing solution in the market (partner), or buy a company/department/group to get this capability (buy)? You can see where I am going with this; it is a classic product management decision that affects most technology products and solutions. It is also a strategic

Read More »

Magento releases urgent security patches for leading eCommerce package

Magento announced an urgent update to its Enterprise and Community Editions 2.0.4 to address urgent security issues. Users running Magento Enterprise Edition or Community Edition 2.0.3, are requested to replace it with the new version to ensure that all security enhancements are applied. Magento Enterprise Edition and Community Edition 2.0.4 can be downloaded in the following ways: Enterprise Edition Enterprise Edition 2.0.4 (New .zip file installations) My Account > Downloads > Magento Enterprise Edition 2.X > Magento Enterprise Edition 2.x Release > Version 2.0.4 Enterprise Edition 2.0.4 (New composer installations) http://devdocs.magento.com/guides/v2.0/install-gde/prereq/integrator_install.html Enterprise Edition 2.0.4 (Composer upgrades) http://devdocs.magento.com/guides/v2.0/comp-mgr/bk-compman-upgrade-guide.html Community Edition Community Edition 2.0.4 (New .zip file installations) Community Edition Download Page > Download Tab Community Edition 2.0.4 (New composer installations) http://devdocs.magento.com/guides/v2.0/install-gde/prereq/integrator_install.html Community Edition 2.0.4 (Composer upgrades) http://devdocs.magento.com/guides/v2.0/comp-mgr/bk-compman-upgrade-guide.html Community Edition 2.0.4 (Developers contributing to the CE code base) http://devdocs.magento.com/guides/v2.0/install-gde/install/cli/dev_options.html About stackArmor stackArmor provides fully hosted and managed Amazon Web Services (AWS) hosted Magento

Read More »

Healthcare Cybersecurity in Focus

The IT Security, and Healthcare sectors are all abuzz over the recent MedStar attack, especially in light of the earlier attacks on two other medical facilities in California and Kentucky, additionally the US Government Accountability Office (GAO) recently released a report on over 300 security incidents faced by the Healthcare.gov portal. But what do these attacks highlight? One’s immediate reaction might be simply “better security,” and most people think of access controls when they think of IT security, that confidentiality element of the security triad, but there is more to it than that. Technical security controls definitely need to be in place, but so do operational activities such as system backups and the procedures for restoring a system with as little downtime as possible. Organizations should regularly test the backup and recovery systems and procedures by conducting contingency exercises that actually require personnel to follow the procedures. Such exercises identify

Read More »

Cloud Security Best Practices and Common Errors – stackArmor White Paper

Migrating to a cloud platform is a business necessity mandated by the need to be agile and deliver digital services in a hyper-competitive environment. However, it is critical to ensure that security issues are given due consideration. Gartner estimates that by 2020, 95% of cloud breaches will not be caused by vulnerabilities at the cloud provider but by configuration problems, mismanagement of credentials or insider issues at the enterprise using the cloud. The onus is on YOU to ensure you stay secure in the Cloud. Have you made the move to the cloud or are you on the verge of doing so? If yes, you are probably asking yourself questions like: How to ensure that your data and your application is secure? Can you design a full-stack security architecture? Would real-life examples of others who have gone this route help you? Will a robust Compliance program be difficult to put

Read More »

Is your business ready for the coming Cybersecurity Tsunami?

  Cybersecurity related regulatory changes are quietly but surely building a tsunami that is going impact every business that conducts transactions online or hosts customer or sensitive data. As the number of data breaches have continued to soar and capture daily headlines, the regulators and lawmakers are forcing changes that will have a significant cost for large and small businesses that ignore the importance of incorporating cybersecurity best practices. This blog is designed to help business leadership with understanding: changes occurring in the regulatory landscape, impacts on businesses conducting transactions online and offers a prescriptive approach to attacking and solving the problem. Changing Regulatory and Legal Landscape The past few months have had a stream of non-stop news about high-profile data breaches that have drawn the spotlight on cybersecurity practices across large parts of the US economy. Regulators both at the state and federal level have taken note and have

Read More »

A Chat About SaaS Security and AWS Security Best Practices at AWS Boston MA Meetup

  This is a guest post by Gaurav “GP” Pal, CEO at stackArmor I recently had an opportunity to present at the Boston AWS Boston Meetup on a topic that’s been in my sights for a while now – “State of SaaS Security, Common mistakes and AWS Security Best Practices”. The entire presentation is up at the Slideshare link at the end of this post. Why should we care about SaaS security? More businesses are moving online than ever before. Statista reported that the annual revenue from the public cloud would go up from $80 billion last year, to $116 Billion in 2016. More businesses are rolling out SaaS-based offerings every day. So much so that IDC predicts as many as 27.8% of ALL enterprise applications will be SaaS-based by 2018. With so much business data moving to the cloud – what about security? Well, identity protection vendor CSID reported

Read More »

8 Habits of Secure Cloud Operators

  More and more businesses are migrating their applications to the cloud. A recent report pegs the market at $23 billion annually. As more businesses migrate to the cloud, it is important to ensure the security and protection of the data and applications.  However, Cloud Security still remains among the main concerns for business leaders when migrating to a cloud platform. According to a study conducted by SecureData, 78 percent of IT managers cited security concerns as the No. 1 obstacle to adopting cloud technologies. Cloud security is not automatic and requires a deep understanding of networking, boundary protection, enclave hardening and robust operational processes. Based on our collective experience of migrating large applications for Government, Financial Services, Healthcare and security conscious customers, here are 8 effective security practices that can help you secure your cloud environment. #1 SSL Certificates SSL is an encryption technology that encrypts the private information while

Read More »

TIC Connectivity and FedRAMP High – Is Cloud Nirvana near?

GSA’s FedRAMP PMO has been continually evolving the compliance framework for driving the wider adoption of commercial cloud services. Last year, they released for public comment the  TIC Overlay initiative as well as the FedRAMP High baseline. Both of these are critical to enhanced cloud adoption and helping Federal customers solve some of the critical connectivity and security related concerns. TIC Overlay – Secure CloudBahn is here? The FedRAMP PMO and DHS TIC Program provided a DRAFT overlay for comment and feedback in helping update TIC’s current reference architecture to allow for greater flexibility as agencies move to the cloud securely. The goal of the TIC overlay is to enable mobile users to directly connect to Federal cloud system without having to go through a TIC Access Provider (TICAP) or Managed Trusted IP Service (MTIPS). The TIC Overlay program is a key “on-ramp” that creates a “TIC-ready” cloud platform providing

Read More »

Magento on AWS for Scalable eCommerce

Magento ecommerce, the number one ecommerce CMS in the world helps its users grow their online business in a great way through its powerful features. Magento 1 has been the leading ecommerce CMS and Magento 2 is the future of the electronic commerce world. 26% of the top million ecommerce sites are powered by Magento. Some of the features which have made Magento the most powerful are: Open Source Community & Support Magento is open source and it gives complete control to the owner. 24*7 support by large community of developers from all across the world. This community of developers also ensures that the ecommerce platform is secure, fast and up to date. High Performance Architecture Magento Enterprise Edition is designed to support tens of thousands of transactions per hour so your customers have a seamless online shopping experience. It features advanced full-page caching and persistent bandwidth for fast loading

Read More »

AWS Price Drops for C4, M4 and R3 Instances

Amazon announced their 51st price drop of 5% for On-Demand and Reserved instance, and Dedicated host prices for C4 and M4 instances running Linux in the US East (Northern Virginia), US West (Northern California), US West (Oregon), Europe (Ireland), Europe (Frankfurt), Asia Pacific (Tokyo),Asia Pacific (Singapore), and Asia Pacific (Sydney) regions. The price drops include On-Demand, Reserved instance, and Dedicated host prices for R3 instances running Linux in the US East (Northern Virginia), US West (Northern California), US West (Oregon), Europe (Ireland), Europe (Frankfurt), Asia Pacific (Tokyo), Asia Pacific (Singapore), Asia Pacific (Sydney), and South America (Brazil) regions. R3 instances for both On-Demand and Reserved instances running Linux in the AWS GovCloud (US)region will also be cheaper. Smaller reductions apply to the same instance types that run Windows, SLES, and RHEL. Changes to the On-Demand and Dedicated host pricing are retroactive to the beginning of the month (January 1, 2016); the new

Read More »

Rapidly deploy and use SAP HANA on Amazon Web Services with StackBuilder

StackBuilder is an easy to use cloud app store front that allows users to quickly select and operate a AWS cloud hosted website, dev & test, data analytics or eCommerce service. The StackBuilder cloud app store allows users to quickly deploy and use SAP HANA and the SAP HANA Interactive Education (SHINE) application hosted on AWS. Figure 1 – SAP HANA Shine Application hosted on AWS using StackBuilder SAP HANA is an in-memory database management system that is certified for use the AWS cloud. SAP HANA on the AWS cloud provides: Fast onboarding and enablement using StackBuilder for SAP HANA project with the AWS on-demand infrastructure. Seamlessly integrate SAP HANA system running in Amazon Virtual Private Cloud (VPC) and rapidly evaluate and test the solution. Scale resources up or down as necessary. Pay only for the infrastructure resources that you need and use. Develop and deploy SAP HANA quickly and

Read More »

Introducing StackBuilder – the “Turbo Tax” like wizard for AWS

  Are you looking to evaluate the AWS cloud for running your application but are wondering how to begin? Do you want to quickly execute a test or pilot project without expensive or time consuming consulting assistance? Introducing StackBuilder If you are looking to jumpstart your AWS evaluation project to quickly provision, install and operate an application in the AWS cloud environment then StackBuilder is the right place to start! StackBuilder is a “Turbo Tax” like wizard for helping application owners quickly configure a fully functional AWS environment. The wizard walks the user through a series of simple questions through a 5 step process. Upon submission of the request, the user is presented with login credentials to a fully configured and operational environment ready to go! Step 1 – Select your workload Select and click an icon that best matches your cloud hosting need. Most common workloads hosted in a cloud

Read More »

The “AWS Logs” Blog

AWS provides extensive logging and monitoring capabilities to help ensure the integrity and security of workloads. AWS services like CloudWatch, CloudTrail, VPCFlow and AWS Config provide deep insights into the operational aspects of the system. The logs create a data avalanche that most organizations tend to ignore. This can be a costly mistake that may cause service interruptions, missed opportunities for detecting security breaches or inefficient resource utilization. However, for logging to be effective, it is essential to sort through the logs and to spot any outliers automatically, saving your IT team time and better protecting your workloads. Tools such as Splunk or Elasticsearch provide the ability to process and analyze logs at scale and provide rich dashboards for detecting and acting on patterns. The process of viewing and analyzing logs got event easier with AWS’s recent launch of Elasticsearch as a service. Once the service is created and configured, it is

Read More »

Intrusion Detection, Intrusion Prevention and Web Application Firewalls

As more and more businesses are hosted online and increasingly on cloud platforms such as AWS, it is critical to ensure robust cybersecurity defenses are in place. Typically, the security architecture for most web facing applications begins with boundary protection using a firewall. There are a number of security sub-systems such as Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS) and Web Application Firewalls (WAF) which are generally considered as basic requirements. This is especially true for online businesses offering services in the Healthcare, Financial, Government and Commercial payments market. As always there is a wide variety of choices and it is critical to understand the role of each one of the security systems to make an informed implementation decision. Let us begin by reviewing some of the basic definition on what these system do and the protections they provide. Intrusion Prevention System (IPS) – An IPS is an appliance

Read More »

Security is critical for SaaS CEO’s and SaaS Investors

  The Identity Theft Resource Center states that over 175 million records have been exposed in data breaches in 2015 through October. The incidents of breaches continue to increase and as more businesses are offering SaaS solutions to their customers, SaaS CEOs and Investors must take a careful look at their security practices to avoid business and financial risk. More and more businesses are offering SaaS solutions to their customers. However, many SaaS firms and their investors underestimate the importance of security as a critical component of their collective success. Many commercial SaaS operators have a “chink in their armor”. The lack of cybersecurity talent, low investment in security tools and generally weak management focus on security issues are contributory factors. This can be a costly mistake. Changing Regulatory Landscape around Cybersecurity US Regulators such as SEC and FTC amongst others are starting to aggressively enforce and in some cases expand

Read More »