Connect with us

News

A10 Networks Launches Harmony Controller As-a-Service Release 5.4

Published

on

A10 Networks has just announced the launch of Harmony Controller as-a-service, Release 5.4 with enhancements that ease multi-cloud operational complexity and strengthen security. Network admins for enterprises and service providers all know the pain of growth and change. Rapid or unexpected growth in users, subscribers, and traffic; migration from centralized data centers to edge deployments, cloud, multi-cloud, or hybrid cloud environments; and the pandemic-inspired shift to distributed and suburban/home-based applications means network administrators must continually scramble to ensure capacity is correctly and efficiently deployed to meet demand.

For the critical functions that A10 provides, including Thunder Application Delivery Controller (ADC), Thunder Convergent Firewall (CFW), and Thunder Carrier-grade Networking (CGN), customers are managing their Thunder appliances or virtual machines throughout this massive change using A10 Harmony Controller. The A10 Harmony Controller provides centralized management and analytics for A10 secure application services including A10 Thunder ADC, SSLi, CFW, and CGN in multi-cloud environments for application configuration and policy enforcement. It is available on self-managed (on-premises/cloud) and as-a-service.

Harmony Controller as-a-service has key advantages over self-managed systems, providing organizations a centralized management interface for installation, configuration, monitoring, and troubleshooting of physical and virtual devices wherever they are deployed. Adding or changing Thunder devices used to require manually intensive processes for installation, licensing, and registration of devices. Harmony Controller-as-a-service makes those processes simple and easy to use. The service is operated by A10 to ensure its security and availability. The service creates simpler elastic capacity with a management interface that automatically scales as the system grows, supporting millions of users and thousands of devices.

Harmony Controller as-a-service, Release 5.4, includes the following enhancements:

  1. Stronger Security with Multi-Factor-Authentication (MFA): Now, administrators can enable MFA for all the users in the account. MFA is available when the users are authenticated locally in Harmony Controller. Users need to install the Google Authenticator app on their mobile devices for a one-time setup of MFA. While users can postpone set-up, the administrator can set an enforcement deadline. The device communicator role is created for users who use Harmony Controller to register Thunder devices.
  2. Local Authorization after Remote Authentication: Now, users can authenticate on remote servers, such as LDAP, TACACS +, or RADIUS, and authorize locally in Harmony Controller. The user privileges and access information are stored in Harmony Controller.
  3. Flexible Device Configuration Backup: Now, users can schedule periodic device configuration backups with precise time-zone and frequency.

“With the Harmony Controller, organizations can efficiently automate deployment and operations of application services, increase operational efficiency and agility, enhance end-user experiences and reduce TCO, simplify the management of distributed application services to dramatically shorten troubleshooting times, receive alerts on performance or security anomalies, improve capacity planning and optimize IT infrastructure and cloud environments,” concludes Amr Alashaal, Regional Vice President – Middle East at A10 Networks.

Cyber Security

World’s Largest Cybersecurity Startup Hub GISEC North Star Debuts in 2025

Published

on

GISEC Global is thrilled to announce the launch of GISEC North Star, an expanded startup zone designed to connect cybersecurity innovators, investors, and industry leaders on an unprecedented global scale. In partnership with Expand North Star, the world-renowned startup and investor networking event, GISEC North Star aims to elevate the cybersecurity startup ecosystem by featuring 250 leading-edge cybersecurity startups and 150 investors. The 14th edition of GISEC Global anticipates over 25,000 visitors and participants from 160 countries.

The event will take place during GISEC GLOBAL 2025 at the Dubai World Trade Centre from 6-8 May 2025, introducing unparalleled opportunities for networking, collaboration, and investment. As cybersecurity threats escalate globally, GISEC North Star is designed to foster an ecosystem of innovation and resilience by connecting global minds in cybersecurity technology, venture capital, and enterprise solutions.

As an anchor of GISEC Global, GISEC North Star will serve as a premier platform where disruptive startups can showcase their innovations, connect with leading global investors, and engage with key industry leaders across various sectors. The event will feature cutting-edge showcases, live demos, and panel discussions with top minds in cybersecurity technology and business.

“We are thrilled to expand GISEC’s role in the global cybersecurity ecosystem through our partnership with Expand North Star. GISEC North Star is committed to bringing together the brightest minds in cybersecurity, empowering startups with unparalleled access to the resources, networks, and investments they need to thrive in today’s fast-evolving digital landscape,” said Nawaz Ali, Commercial Director at GISEC Global.

GISEC North Star’s expansive setup is designed to attract the best cybersecurity talent from across the globe, uniting startups, investors, and visitors to collaboratively tackle the sector’s most pressing challenges. With participants from over 160 countries, the event will foster diverse and impactful exchanges that shape the future of global cybersecurity.

Designed to promote collaboration and growth, GISEC North Star is set to showcase breakthrough innovations that address critical challenges in cybersecurity, ranging from AI-driven threat detection to secure data management solutions. Investors will have an unprecedented opportunity to connect with and support promising startups driving advancements that safeguard the future.

Continue Reading

Critical Communications

Hytera to Show Off 4G and 5G Body Cameras for Law Enforcement at GITEX GLOBAL 2024

Published

on

Hytera Communications will introduce its latest body camera innovations at GITEX Global 2024. Showcasing the advanced SC780 Smart 4G Body Camera and SC880 Smart 5G Body Camera, Hytera aims to revolutionize the capture, storage, and management of digital evidence for law enforcement and emergency services. These new-generation body cameras reflect the Gulf region’s growing commitment to tech-driven public safety solutions, especially in alignment with the UAE’s and Saudi Arabia’s national visions for enhanced security infrastructure. With their cutting-edge AI capabilities, real-time communication functions, and the power of 4G and 5G connectivity, these devices are designed to deliver unparalleled clarity, reliability, and situational awareness to on-the-ground teams.

Stanley Song, Vice President of Hytera, commented: “At Hytera, we are committed to supporting the Gulf region’s public safety goals by providing cutting-edge technology solutions. Our next-generation body cameras, powered by AI and 5G, reflect our dedication to delivering innovation and reliability. We are proud to align with the UAE’s and Saudi Arabia’s visions of leveraging smart technologies to enhance law enforcement capabilities and public safety. These solutions are tailored to the region’s unique needs, ensuring law enforcement agencies can operate with the highest level of efficiency and accountability.”

Hytera’s new-generation body cameras offer High-Quality Evidence Collection, ensuring optimal performance in diverse environments. With advanced image stabilization technology, they provide steady video even during high-motion activities, while the night vision capabilities guarantee clear footage in low-light scenarios. Equipped with a wide-angle lens, these body cameras capture a broader field of view, giving law enforcement greater coverage during operations.

In addition to their advanced recording capabilities, the body cameras provide Real-Time Communication functionalities. Not merely recording devices, they double as Push-to-Talk over Cellular (PoC) radios, ensuring constant connectivity in mission-critical situations. These cameras come with AI-powered noise cancellation for clear audio, long battery life for extended field operations, and an IP68 rating, making them fully dustproof and waterproof, ideal for the region’s harsh environments. The facial and license plate recognition features further enhance their ability to provide quick and accurate data to the command centre, ensuring fast and precise suspect identification.

Hytera’s body camera solutions are built with Advanced Network Capabilities in mind, capitalizing on the rapid deployment of 4G and 5G networks in the Middle East. Leveraging these technologies, particularly the SC880 model’s 5G technology, enables faster transmission speeds, enhancing the efficiency of both data recording and live communication. The SC880 captures 4K ultra-high-definition footage with an extended pre/post-recording feature that lasts up to 300 seconds and allows for 15 hours of uninterrupted recording without the need for recharging. Additionally, these cameras capture crystal-clear audio within a 10-meter range, ensuring the reliability and integrity of evidence gathered on the field.

Hytera’s Digital Evidence Management (DEM) system is designed to offer the highest level of protection and efficiency for digital evidence in line with the region’s strict focus on data security. The DEM system ensures a secure, closed chain of evidence, from the moment of capture through to courtroom presentation. It provides enhanced operational efficiency through redaction features and remote device management, making it a critical tool for law enforcement and public safety users who require the highest standards of data integrity and security throughout the entire lifecycle of digital evidence.

The Gulf region, particularly the UAE and Saudi Arabia, has seen a significant rise in the adoption of body camera technologies as part of a broader focus on public safety and transparency. Law enforcement agencies are increasingly relying on these devices to document interactions with the public and enhance accountability. The integration of AI-powered facial recognition technology has also become a game-changer, dramatically improving the efficiency of law enforcement operations, and enabling faster responses to real-time situations.

Hytera’s body camera solutions have already gained global recognition, with deployments in over 60 countries across diverse regions including Southeast Asia, Central Asia, the Middle East, Africa, Latin America, and Europe. This global success reinforces Hytera’s role as a trusted partner for law enforcement and public safety agencies worldwide.

Continue Reading

Expert Speak

Shadow IT – Is It Really a Problem?

Published

on

Personally, I love shadow IT—most employees do. But is it a problem? Let’s explore.

Wondering what shadow IT is? Shadow IT refers to the use of software and hardware tools or services by employees without the knowledge of the organization’s IT department.

The use of shadow IT tools has been a topic of discussion for years, with each company having its stance. Using these tools is often more about personal preference than anything else, and the same applies to how companies handle them. Most people lean toward shadow IT because official IT software tools often do not offer features that cater to individual preferences.

Some commonly used tools that fall under shadow IT include project management tools like Trello and Notion, messenger apps like WhatsApp, and file transfer apps like WeTransfer and Dropbox. The common factor? They’re all easy to access and use. However, with the rise of GenAI, everyone’s new shadow IT tool is ChatGPT.

The problems
I’m sure you already know the main issues that make companies dislike shadow IT tools: privacy and security.

Let’s look at ChatGPT. The use of ChatGPT isn’t regulated in most organizations, and many companies are still at a crossroads regarding GenAI tools. There’s a risk of employees unintentionally sharing sensitive information, leading to data leaks. This could include intellectual property, like code used to build applications, or personal information such as phone number, email address, house address, and more.

Whatever the sensitive information may be, it’s not safe to share it with tools like ChatGPT. Threat actors are constantly trying to breach systems, especially widely used tools like ChatGPT, where there’s much to gain. There’s still an obvious vulnerability here despite companies providing best practices to employees.

Another problem with shadow IT tools is that they restrict collaboration. If one team member uses a cool, new project management app to track progress and others use a different tool, it’s difficult to stay on the same page. For example, design and development teams often work together on the same project, such as designing web pages.

If the design team uses one project management tool and the development team another, how can they collaborate and work in sync to meet deadlines? It creates unnecessary friction. This is why organizations provide the same, approved project management tools for everyone. While using different tools might boost individual productivity, it can cause productivity issues within the project as a whole.

From a financial standpoint, companies pay for business tools that their employees use. If employees start using free online tools instead, the money spent on approved tools for a user who uses a shadow IT tool instead becomes a loss for the company.

Additionally, when organizations approve software solutions, those tools are vetted by a team of professionals and comply with the laws and regulations that the company must follow. However, we can’t be sure those tools are compliant when employees download apps on an ad-hoc basis, and employees usually don’t check for these things when they download or use shadow IT apps.

The good
Shadow IT tools are awesome. We all agree on that. The tools organizations give us, or approve, are often outdated. They’ve been around in the tech landscape for years (for good reasons, of course), but as technology advances, we don’t want to be tied to old tools that lack new features, which could make our work easier.

Restricting access to apps doesn’t feel great. We all work differently and have unique preferences. Using shadow IT tools that we like makes us feel more productive, and empowered, and allows for individuality in the workplace. When we use tools we love, we tend to be more efficient compared to when we’re stuck using approved, traditional tools that may lack the features we need.

The verdict
Shadow IT comes with many advantages, and dismissing it solely because of the risks isn’t wise. If we think about it, all tools carry some degree of risk. It’s up to us to be educated and understand how to use them securely and efficiently while benefiting the team and the company we work for. Shadow IT tools might benefit you individually, but what’s more important is to look at the bigger picture and ensure that your teamwork doesn’t get affected because of this.

Speaking of the financial loss that a company incurs while giving out tools that an employee may not need, what can be done instead is that organizations can avoid giving all the tools that an employee might need. Even if it’s a tool that employees may need regularly, us a request-based system so that employees reach out to get a paid tool by the company only if they need it and want to use it. This eliminates the unnecessary cost incurred by the company when an employee is provided with paid tools by default but chooses to use a shadow IT tool instead.

At first glance, shadow IT might seem like a problem, but with employee education and empowerment, it doesn’t have to be. Restricting shadow IT tools is easy, but educating employees is key.

ManageEngine is a company that believes in employee-driven innovation and encourages its employees to be aware of secure cybersecurity practices while allowing room for individuality. To learn more about ManageEngine and its offerings that allow you to have a secure and efficient IT infrastructure, click here.

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.