HP Autonomy Brings Secure Cloud Sharing to the Workplace
September 21, 2013
HP Autonomy aims to bring stronger security to the cloud with Autonomy LinkSite, a solution that integrates WorkSite, the division’s on-site data management solution, with HP’s public cloud-based sharing and collaboration service Flo CM. Market Wired shares the details in, “HP Autonomy Delivers Proven and Secure Enterprise-Grade Alternative to Consumer File Sharing Services.”
It has not taken long for many of us to get used to today’s cloud-based, consumer file-sharing technology. We want to be able to share anything of any size with anyone from any device, synchronizing instantly. Such expectations brought into the workplace from our personal habits can mean real security headaches for businesses. At the same time, continuing to rely on the very limiting method of sharing files through email is becoming less and less tenable. The press release tells us:
“Autonomy LinkSite combines an enterprise-grade document and email management system with the ease of use and simplicity of a consumer solution. It provides the enterprise with a single, integrated, user-friendly tool for external file sharing and collaboration. Autonomy LinkSite enables a single file or an entire project folder to be shared in the cloud with internal and external collaborators, directly from the Autonomy WorkSite application. . . .
“‘For the first time, organizations no longer have to turn a blind eye to continued use of undocumented consumer file sharing services,’ said Neil Araujo, general manager, Enterprise Content Management, HP Autonomy. “Businesses now have a very attractive alternative that satisfies the needs of the users as well as the IT and compliance teams.'”
The write-up lists the following benefits of this new tool: collaboration across firewalls; the convenience of a single point of access for each user; synchronization across all employee devices; an ease of use that they say surpasses that of the consumer-grade file-sharing options; and, perhaps most importantly, the “seamless” extension of security, authorization, and audit properties from WorkSite into the cloud.
Tech giant HP purchased Autonomy in what was, let’s just say, a much-discussed deal back in 2011. Founded in 1996, Autonomy grew from research originally performed at Cambridge University. Their solutions help prominent organizations around the world manage large amounts of data.
Cynthia Murrell, September 21, 2013
Sponsored by ArnoldIT.com, developer of Augmentext
Bold Assertions about Big Data Security Threats
September 17, 2013
Big Data comes with its own slew of security problems, but could it actually be used to keep track of them? The idea of using big data to catch security threats is a novel idea and a big one to stand behind. PR Newswire lets is know that, “AnubisBetworks’s Big Data Intelligence Platform Analyses Millions Of Cyber Security Threat Events.” AnubisNetworks is a well-known name in the IT security risk management software and cloud solutions field and its newest product to combat cyber threats is StreamForce. StreamForce is a real-time intelligence platform that detects and analyzes millions of cyber security threats per second.
StreamForce de-duplicates events to help speed up big data storage burden, which is one of the biggest challenges big data security faces.
“Within the new “big-data” paradigm – the exponential growth, availability and use of information, both structured and unstructured – is presenting major challenges for organizations to understand both risks as well as seizing opportunities to optimize revenue. StreamForce goes to the core of dealing with the increasingly complex world of events, across a landscape of distinct and disperse networks, cloud based applications, social media, mobile devices and applications. StreamForce goes a step further than traditional “after-the event” analysis, offering real-time actionable intelligence for risk analysts and decision makers, enabling quick reaction, and even prediction of threats and opportunities.”
StreamForce is the ideal tool for banks, financial institutions, telecommunication companies, government intelligence and defense agencies. Fast and powerful is what big data users need, but does StreamForce really stand behind its claims? Security threats are hard to detect for even the most tested security software. Can a data feather duster really do the trick to make the difference?
Whitney Grace, September 17, 2013
Sponsored by ArnoldIT.com, developer of Beyond Search
IBM Has Security Flaws
September 8, 2013
IBM is a respected technology company and it appears that hardly anything can bad can be said about them. There comes a time when every company must admit they have a fault in their product and IBM must step up to the plate this time. The news comes to us from Secunia, a Web site that monitors technology security, in the warning, “Security Advisory SA54460-IBM Content Analytics With Enterprise Search Multiple Vulnerabilities.” The warning is labeled as moderately critical and should worry organizations that use the software to manage their data. The bug messes with cross site scripting, manipulates data, exposes sensitive information, and a DoS.
Here is the official description:
“IBM has acknowledged a weakness and multiple vulnerabilities in IBM Content Analytics with Enterprise Search, which can be exploited by malicious people to disclose certain sensitive information, conduct cross-site scripting attacks, manipulate certain data, and cause a DoS (Denial of Service).”
Ouch! IBM must not be happy about this, but at least they discovered the problem and Content Analytics users can expect a patch at some point. Hate to bring up Microsoft at this venture, but whenever a big company has a problem I can’t help but think about how Microsoft never has a product launch without some issues. IBM is reliable and hopefully they will not go down the same path as Windows 8.
Whitney Grace, September 08, 2013
Sponsored by ArnoldIT.com, developer of Beyond Search
Webinar to Show How Cogito Intelligence API Delivers Strategic Insights
August 20, 2013
Calling all software developers, analysts and systems integrators. The leading semantic intelligence developer, Expert System is hosting a webinar entitled, “What’s Hiding In Your Data? Test Drive Our Semantic API.” The webinar is scheduled for August 28 at 12 pm ET/9 am PT and registration is now open.
We recommend that professionals who are interested in transforming content and data streams into actionable and strategic information should sign up. A unique offering of this webinar is the live product test drive so that those interested can see how their flagship Cogito Intelligence API works.
The webinar description summarizes Cogito Intelligence API:
Cogito Intelligence API is a unique API that uses the power of semantic processing—Text Mining, Categorization, Tagging—and deep domain vertical knowledge for Intelligence to help analysts access and exploit some of their most strategic sources of information. As the only semantics based system, Cogito Intelligence API provides complete understanding of meaning and context in the processing of data and resolves ambiguities in data more effectively than solutions based on keywords or statistics.
Another unique offering from the Cogito API revolves around corporate security. Their solution is already embedded with corporate security measures, which enables businesses to operate all applications with the same confidence that Cogito offers.
Megan Feil, August 20, 2013
Sponsored by ArnoldIT.com, developer of Beyond Search
Approaching Infrastructure Challenges with Intelligence API
August 6, 2013
The rise of metadata is here, but will companies be able to harness its value? Concept Searching points to the answer that ROI has not been successful with this across the board. A recent article, “Solving the Inadequacies and Failures in Enterprise Search,” admonishes the laissez-faire approach that some companies have towards enterprise search. The author advocates, instead, towards a hands-on information governance approach.
What the author calls a “metadata infrastructure framework” should be created and should be comprised of automated intelligent metadata generation, auto-classification, and the use of goal and mission aligned taxonomies.
According to the article:
The need for organizations to access and fully exploit the use of their unstructured content won’t happen overnight. Organizations must incorporate an approach that addresses the lack of an intelligent metadata infrastructure, which is the fundamental problem. Intelligent search, a by-product of the infrastructure, must encourage, not hamper, the use and reuse of information and be rapidly extendable to address text mining, sentiment analysis, eDiscovery and litigation support. The additional components of auto-classification and taxonomies complete the core infrastructure to deploy intelligent metadata enabled solutions, including records management, data privacy, and migration.
We wholeheartedly agree that investing in infrastructure is a necessity — across many areas, not just search. However, when it comes to a search infrastructure, we would be remiss not to mention the importance of security. Fortunately there are solutions like Cogito Intelligence API that offer businesses focused on avoiding risks the confidence in using a solution already embedded with corporate security measures.
Megan Feil, August 6, 2013
Sponsored by ArnoldIT.com, developer of Beyond Search
Open Source to Help Secure Cloud Storage
August 5, 2013
As technology advances quickly, so do security concerns. It stands to reason that new technologies open up new vulnerabilities. But open source is working to combat those challenges in an agile and cost-effective way. Read the latest on the topic in IT World Canada in their story, “Open-Source Project Aims to Secure Cloud Storage.”
The article begins:
“The open source software project named Crypton is working on a solution that would enable developers to easily create encrypted cloud-based collaboration environments. There are very few cloud services that offer effective encryption protection for data storage, according to Crypton. Security has always been the top concern for many enterprise organizations when it comes to cloud services and applications.”
It is reasonable that enterprises are concerned about security when it comes to cloud services and storage. For that reason, many prefer on-site hosting and storage. However, some open source companies, like LucidWorks, build value-added solutions on top of open source software and guarantee security as well as support and training. And while LucidWorks offers on-site hosting as well, those who venture into the Cloud can have the best of both worlds with cost-effective open source software and the support of an industry leader.
Emily Rae Aldridge, August 5, 2013
Sponsored by ArnoldIT.com, developer of Beyond Search
Autonomy ArcSight Tackles Security
August 2, 2013
HP Autonomy is chasing the Oracle SES angle: security for search. We took a look at the company’s pages about HAVEn, Autonomy’s latest big data platform. Regarding the security feature, ArcSight Logger, the company promises:
“With HP ArcSight Logger you can improve everything from compliance and risk management to security intelligence to IT operations to efforts that prevent insider and advanced persistent threats. This universal log management solution collects machine data from any log-generating source and unifies the data for searching, indexing, reporting, analysis, and retention. And in the age of BYOD and mobility, it enables you to comprehensively manage an increasing volume of log data from an increasing number of sources.”
More information on HAVEn can be found in the YouTube video, “Brian Weiss Talks HAVEn: Inside Track with HP Autonomy.” At the 1:34 mark, Autonomy VP Weiss briefly describes how ArcSight analyzes the data itself, from not only inside but also outside an enterprise, for security clues. For example, a threatening post in social media might indicate a potential cyber-attack. It is an interesting approach. Can HP make this a high revenue angle?
Cynthia Murrell, August 02, 2013
Sponsored by ArnoldIT.com, developer of Augmentext
Cyber Threat Prediction from Recorded Future
August 1, 2013
Interesting. Caffeine Security lets us in on a development from a rising business intelligence firm in, “Recorded Future Announces Cyber Threat Intelligence Application.” The new product is named, reasonably enough, the Cyber Threat Intelligence Application. The brief write-up reports:
“The new app adds a set of real-time trend signals for attackers, TTPs, targets, and hacktivist operations. You can see what’s trending for each of the four categories, brush across entities to see cross-linkages, and drill down on interesting items to dig in and analyze.
“The application presents a real-time dashboard of cyber threats, and allows filtering based upon threat, target, operation, or any other criteria.
“One of the staff from Recorded Future was kind enough to demo the application for me today, and I am very impressed.”
For your chance to be impressed, see the company’s not-quite-two-minute YouTube video. The interface seems clear and intuitive.
Launched in 2009, Recorded Future is headquartered in Cambridge, Massachusetts, with offices in Arlington, Virginia, and Göteborg, Sweden. Both Google and In-Q-Tel have invested in this innovative company. As the name implies, Recorded Future emphasizes predictive analysis, helping clients anticipate risks and seize opportunities.
Cynthia Murrell, August 01, 2013
Sponsored by ArnoldIT.com, developer of Augmentext
PeopleSoft Offers Advice on Deploying Secure Enterprise Search
July 31, 2013
Oracle’s human resource management division, PeopleSoft, has wrapped the corporation’s Secure Enterprise Search into its PeopleTools platform. Now, their PeopleSoft Technology Blog offers “A Few Tips on Deploying Secure Enterprise Search with PeopleSoft.” The helpful write-up tells us:
“Oracle’s Secure Enterprise Search is part of PeopleSoft now. It is provided as part of the PeopleTools platform as an appliance, and is used with applications starting with release 9.2. Secure Enterprise Search is a rich and powerful search product that can enhance search and navigation in PeopleSoft applications. It also provides useful features like facets and filtering that are common in consumer search engines.
“Several questions have arisen about the deployment of SES and how to administer it and insure optimum performance. People have also asked about what versions are supported on various platforms. To address the most common of these questions, we are posting this list of tips.”
In what promises to be the first in a series of informative posts, writer Matthew Haavisto offers tips on platform support and architecture. The article says a comprehensive red paper on PeopleSoft/SES administration is on its way. In the meantime, check back with the blog for more tips as they emerge.
Launched in 1987, PeopleSoft offered human resource, financial, supply chain, and customer relationship management solutions and other software. The firm counted large corporations, governments, and other organizations among its clients when Oracle snapped it up in 2005.
Cynthia Murrell, July 31, 2013
Sponsored by ArnoldIT.com, developer of Augmentext
The Developer Side of the Efficiency and Security Conversation
July 25, 2013
The ongoing conversation about efficiency in the enterprise can trace roots to several departments. It is a ubiquitous issue that every department has a vested interest in. A recent article, “Enhancing Enterprise Efficiency with IT Operations and Analytics,” discusses addressing productivity and efficiency from the perspective of IT.
The article describes a recent independent review that explained how Tulsa’s Information Technology Department had numerous inefficiencies. These bottlenecks ultimately prevented their department from providing acceptable service.
The article referenced above expounds on the issues mentioned in the review on Tulsa’s IT department:
The department is tasked with overseeing all electronic and communication systems for the municipal government, as well as managing its computing, mobile software and networking needs. Officials discovered that the 141-member agency had been woefully underfunded, inhibiting employees’ ability to monitor important tasks and properly identify potential issues. According to the news outlet, some of the software systems being deployed by the government included a 30-year-old police and courts record management system.
It takes collaboration between the business side and IT and developers to select, implement and deploy the right solution for any particular organization. Developers have the insight into nuanced semantic features in analytics solutions currently on the market; that knowledge is necessary for knowing if the expected use cases will pan out as expected. One solution we have been keeping tabs on is Cogito API, which offers government, intelligence, and corporate security clients oversight by extracting intelligence from data.
Megan Feil, July 25, 2013
Sponsored by ArnoldIT.com, developer of Beyond Search