November 15, 2004
At the Computer Security Institute's 31st Annual Security Conference and Exhibition, leading vendors in the application security market announced they have joined forces to help define more consistent and reliable standards for customers. Jeff Pancottine, senior vice president and general manager of the Security Business Unit for F5 Networks; Shlomo Kramer, CEO of Imperva; Gene Banman, CEO of NetContinuum; and Bob Walters, CEO of Teros have invited Check Point Software Technologies, Cisco Systems, Juniper Networks, McAfee and Symantec to join them in submitting their products to an independent application security evaluation conducted by ICSA Labs, the global leader in information security product certification.
"With a wide array of security technologies to choose from and a lack of criteria for what constitutes adequate application protection, selecting appropriate solutions to protect the Web-enabled enterprise is daunting," said Mary Ann Davidson, chief security officer for Oracle Corp. "Objective, independent standards for evaluating Web application security solutions will make it easier for IT security executives to make better informed purchasing decisions."
According to a joint statement issued by the companies: "Each of our companies offers architecturally different solutions, and we compete with each other in the marketplace. At the same time, we are united regarding the minimum criteria that any security product must meet to provide acceptable protection for mission-critical Web applications. We believe these minimums are not being met by many vendors, despite marketing claims that strongly imply such protection. The result is a false sense of security that exposes consumers and corporations to a higher risk of identity theft and other similar data loss threats. Our goal is to pave the way for minimum standards that will ensure the safety of consumers as well as corporate and government environments on the Web."
"This kind of multi-vendor collaboration is a positive development for buyers of application security. Like the established test criteria for network firewalls, a standard set of baseline criteria for application firewalls can be helpful in reducing the effort in product selection. Maintaining vendor neutrality will be a critical success factor for this effort moving forward," said Greg Young, research director with Gartner Inc.
Application security is slated to become a $2 billion market over the next five years according to a recent industry survey by research firm Yankee Group ("Spending on Application Security Accelerates Security BPO," September 2004). However, the lack of established industry best practices, combined with inconsistent and confusing vendor claims, have made it difficult for IT decision makers to identify products that provide legitimate protection against Web application exploits. The result is a greater risk of identity theft and security breaches that expose confidential data and violate customer confidentiality.
"Web applications often link directly to sensitive business data, making them a prime target for hackers intent on stealing financial and identity data. Organizations that do not take this threat seriously expose themselves to significant risk and increased legal liabilities," said Jim Slaby, senior analyst at The Yankee Group. "Open initiatives by vendors to self-regulate their industry benefit customers by helping establish minimum baselines for comparing security products and sorting through sometimes confusing marketing messages."
Large-scale, worldwide scientific initiatives rely on some cloud-based system to both coordinate efforts and manage computational efforts at peak times that cannot be contained within the combined in-house HPC resources. Last week at Google I/O, Brookhaven National Lab’s Sergey Panitkin discussed the role of the Google Compute Engine in providing computational support to ATLAS, a detector of high-energy particles at the Large Hadron Collider (LHC).
Frank Ding, engineering analysis & technical computing manager at Simpson Strong-Tie, discussed the advantages of utilizing the cloud for occasional scientific computing, identified the obstacles to doing so, and proposed workarounds to some of those obstacles.
The private industry least likely to adopt public cloud services for data storage are financial institutions. Holding the most sensitive and heavily-regulated of data types, personal financial information, banks and similar institutions are mostly moving towards private cloud services – and doing so at great cost.
May 16, 2013 |
When it comes to cloud, long distances mean unacceptably high latencies. Researchers from the University of Bonn in Germany examined those latency issues of doing CFD modeling in the cloud by utilizing a common CFD and its utilization in HPC instance types including both CPU and GPU cores of Amazon EC2.
May 10, 2013 |
Australian visual effects company, Animal Logic, is considering a move to the public cloud.
May 10, 2013 |
Program provides cash awards up to $10,000 for the best open-source end-user applications deployed on 100G network.
May 08, 2013 |
For engineers looking to leverage high-performance computing, the accessibility of a cloud-based approach is a powerful draw, but there are costs that may not be readily apparent.
05/10/2013 | Cleversafe, Cray, DDN, NetApp, & Panasas | From Wall Street to Hollywood, drug discovery to homeland security, companies and organizations of all sizes and stripes are coming face to face with the challenges – and opportunities – afforded by Big Data. Before anyone can utilize these extraordinary data repositories, however, they must first harness and manage their data stores, and do so utilizing technologies that underscore affordability, security, and scalability.
04/02/2012 | AMD | Developers today are just beginning to explore the potential of heterogeneous computing, but the potential for this new paradigm is huge. This brief article reviews how the technology might impact a range of application development areas, including client experiences and cloud-based data management. As platforms like OpenCL continue to evolve, the benefits of heterogeneous computing will become even more accessible. Use this quick article to jump-start your own thinking on heterogeneous computing.