Tag Archive for MSFT

Dropbox Adds AD for SSO

Dropbox Adds AD for SSO

When people talk about the consumerization of IT, Dropbox is invariably part of the discussion. Dropbox, like Box, Google DriveMicrosoft SkyDrive, and others is a cloud-based storage system that enables users to sync and share files. This can and often is done without IT intervention, potentially putting sensitive data at risk or organizations out of compliance according to Debra Donston-Miller at InformationWeek.

Dropbox logoHoping to land some street cred with corporate IT, the consumer cloud file storage leader Dropbox, rolled out Dropbox for Teams, with security tweaks designed to give companies more control over what their users do with Dropbox, (which I covered here).

Now Dropbox has announced a rebranding, from “Dropbox for Teams” service to “Dropbox for Business” with an eye toward business and its IPO. So it is taking notice of existing enterprise authentication infrastructure to grow its customer base into authorized corporate use.

existing Active Directory infrastructures, and leverage things like secure sign-on.The InfofWeek article says Dropbox will now add single sign-on (SSO) capabilities to its Active Directory integration and is working with several partners to ease that integration. “Active Directory is really core to IT architectures, security and compliance strategies,Kevin Egan, Dropbox VP of sales, told InformationWeek. “It lies at the heart of security, so we’re going to make it a lot easier for customers to plug into their existing Active Directory infrastructures, and leverage things like secure sign-on.

Thomas “Tido” Carreiro, growth engineering lead for Dropbox, explained in an interview that the integration with Microsoft’s Active Directory will let companies use the work they have already done in setting security and authentication policy. This helps end-users and admins alike, he said. “It’s good for the end-user not to have another password to remember — they can just use what they’re familiar with”

set up two-factor authenticationMr. Carriero also claims the new Dropbox for Business will be good for IT Pros. “Admins can set up security policies depending on the nature of the data being stored, and they can do things like set password requirements, reset passwords as often as they’d like, set up two-factor authentication, set up other kinds of authentication — whatever they have decided on for their business.”

According to Dropbox’s Egan and Carriero, the firm will provide SSO out of the box. Dropbox SSO uses the industry-standard Security Assertion Markup Language (SAML), so it will also integrate with any large identity provider companies are using or with companies’ own SAML-based federated authentication systems. DropBox SSO partners include Ping Identity, Okta, OneLogin, Centrify, and Symplified.

The author notes that Dropbox has some pretty stiff competition in the cloud-based storage space, including no less than Google (GOOG) Drive, SugarSyncApple’s (AAPL) iCloud, Box,net, and Microsoft’s (MSFT) SkyDrive. But the SSO integration with Active Directory is an important step forward in making Dropbox a corporate tool, and not just a tool for consumers.

rb-

The producers of these consumer-targeted technologies need to recognize that for deals in tens of thousands of seats, firms like Dropbox, Box, and Evernote need to offer those of us charged with protecting the firm’s assets assurances about security, privacy, and integration with Microsoft Active Directory.

Despite that, Box Enterprise GM Whitney Bouck also told CITEworld, “The premise of Box is to make it super-easy to share, communicate, and collaborate … At its most open, there should be as few controls as possible.”

attackers to penetrate accounts used by DropboxAnd then there are the security breaches. In 2011, Dropbox accidentally pushed a code update that introduced a bug into the company’s authentication mechanism, allowing third parties to log in to user accounts and access files. Last year, hacks at other Web sites allowed attackers to penetrate accounts used by Dropbox employees, including a document from which they may have been able to harvest email addresses. In August, those email addresses were apparently used to send Dropbox users spam.

Related articles
  • Get 7GB of Free Cloud Storage from Microsoft (savings.com)

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Top Five IT Trends for 2013

Top five IT trends for 2013Ian Kilpatrick, who has the longest job title I have ever seen, chairman of international value added distributor, specialists in market development for secure IP infrastructure solutions and convergence at Wick Hill Group shares his vision of the top five IT trends for 2013. In the article, Top five IT trends for 2013 at ITnewslink he shares his predictions.

BYOD Man1. BYOD – He says the first IT Trend for 2013 is BYOD. BYOD is now an unstoppable, user-driven wave that will continue to make a major impact on the IT world in 2013 and beyond.  2013 will see companies trying to integrate BYOD into their networks.

He also speculates that we can expect to see the growth of Microsoft (MSFT) Windows to Go secure USB sticks based on Windows 8, which provide remote users with the supported version of the corporate desktop. These are available from a limited number of suppliers authorized by Microsoft and include Imation’s IronKey Workspace for Windows to Go.

Mobile Device Management2. Mobile Device Management – The next IT trend for 2013 is that Mobile Device Management solutions growth will accelerate in 2013. The growth is due to the rapid growth of mobile devices such as smartphones, tablets, and laptops, but particularly smartphones.

Growth will be strongest for MDM solutions that offer features such as ensuring mobile device usage complies with company security policies, allocating access rights, managing configuration, updating policies, dealing with data leakage issues, and dealing with lost or stolen devices.

A crucial component for the continued growth of MDM solutions will be the clear separation between the management of business and personal data on devices. There are over 100 suppliers in mobile device management many of them are good but niche solutions. The Gartner (IT) Magic Quadrant identifies the strategic leaders, which includes Zenprise.

High density wireless3. High density wireless – Wireless requirements have been significantly incrementing over the last year making it the third IT trend for 2013. The firm says BYOD has changed both the data transfer and performance expectations of users. However, these expectations have not been met, with many networks still inadequate in their coverage and performance.

The new 802.11ac standard, with 1 gigabit per second throughput rates, will be a key driver in organizations moving to high-density wireless in 2013. High density wireless will provide companies with high coverage and high performance, supporting business-critical applications and delivering complete site coverage There will continue to be a shift from niche solutions towards more strategic solutions. The Gartner Magic Quadrant identifies Xirrus, which will continue to experience stratospheric growth.

Data back-up and recovery4. Data back-up and recovery – 2013’s fourth IT trend for 2013 deals with data back-up and recovery. Organizations have been under immense pressure from ever-increasing data volumes, archiving, and compliance requirements.

At the top end, new data replication technologies will have a major impact on data centers in 2013. For smaller organizations, the shift from tape will continue apace. For conservative organizations, the move to disc (and, in particular, RDX technologies that combine the best of tape and disk) will accelerate. Hybrid back-up to RDX and then the cloud will increase. In volume terms, the lowest move (but in market-hype the biggest) will be significant growth in direct back-up to the cloud. RDX, hybrid, and cloud data backup solutions are available from vendors such as Imation and Barracuda Networks.

Data leakage protection5. Data leakage protection – The last Wick Hill Group IT trend for 2013 says that with the growing volumes of data and regulatory bodies’ willingness to levy fines for non-compliance, data leakage protection will continue to be a major cause for concern during 2013. Companies will be looking closely at how to secure and manage their data as their network boundaries spread even wider, with increased use of social networking and BYOD, increased remote access, the rapid growth of wireless, increased virtualization, and the move towards convergence.

Increasingly, organizations will couple DLP products with SIEM (Security Information and Event Management) solutions. DLP concerns will also continue the growth curve for authentication (much of it hosted in the cloud) and encryption, to protect data, both in motion and at rest. Some companies will look to hosted security services and the cloud to cope with an increasingly complex security situation. SIEM and authentication solutions are available from companies such as LogLogic, Check Point VASCO, and SafeNet.

rb-

So these are not really earth-shattering predictions for 2013, BYOD, MDM, and Wi-Fi are already part of my world. We are doubling our backup capabilities and will be updating from our current McAfee to some sort of DLP

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

MSFT Powers Data Center with Sewers

MSFT Powers Data Center with SewersThe prize for the most unlikely clean power source may be going to Microsoft (MSFT). Greenbz.com reports that the boys from Redmond are working on powering data centers with sewage. Microsoft plans to power a demo data center with sewage, yeah poo.

Microsoft logoFuelCell Energy (FCEL) recently revealed to the blog, it is working with MSFT on a $5.5 million trial. The trial will use biogas from a wastewater treatment facility to power a fuel cell. The fuel cell at Dry Creek Water Reclamation Facility in Cheyenne, WY will provide “ultra-clean and carbon-neutral electricity” to a Microsoft data center.

InfoWeek says that biogas consists mostly of methane and carbon dioxide. It may also contain small amounts of other gasses, including hydrogen sulfide and nitrogen. The power is produced by anaerobic digestion. Anaerobic digestion is a process in which bacteria that live only in places without air break down organic, biodegradable matter.  Biodegradable matter is better known as sewage, animal manure, municipal waste, and plant material.

Fuel cell diagramThe initial trial will use one of FuelCell Energy’s sub-megawatt Direct FuelCell (DFC) power plant systems. The DFC will generate 200 kW of power for a Microsoft IT pre-assembled component (ITPAC) modular data center. The ITPAC is set up to resemble a standard data center environment. Any electricity not used by the data center will help power the water treatment plant. The system will also provide usable heat for the facility.

Direct FuelCell power plant systems

Power Engineering explains that stationary DFC power plants convert a fuel source into electricity and usable high-temperature heat suitable for making steam. DFC plants are fuel flexible, capable of operating on natural gas, renewable biogas, directed biogas, and other fuels including propane. The fuel cell generates electricity and heat electrochemically.

Gregg McKnight, general manager for data center advanced development at Microsoft, told Greenbiz.com that with the company has recently committed to becoming “carbon neutral” by 2013 it was committed to exploring the viability of a number of renewable energy sources. He is quoted in the article, “… Microsoft is researching new methods to help our operations become more efficient and environmentally sustainable,” he said.  “This project will study methods to provide an economical and reliable power supply for data centers that is also scalable and economical for use by other industries.”

rb-

OK let the snarky comments rip about MSFT software powered from the sewer or as one commenter noted, leave it to Microsoft to power its cloud services with a very different kind of cloud — a smellier, gaseous one.

I covered HP’s (HPQ) plans to power its data centers with cow manure here. It looks like Microsoft aims to build more data plants near other sources of renewable energy like landfills, wastewater treatment plants, and even dairy farms.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Info

ComputerWorld defines post-PC devices like a tablet with four characteristics;
1. It’s an appliance.
2. It’s got a multi-touch UI,
3. It doesn’t have file management,
4. Apps function on the app-store model.

Big Drop in Tablet Average Selling Price

Big Drop In The Average Selling Price Of TabletsThe Business Insider has documented the average selling price (ASP) of tablets keeps falling. The ASP fell 17 percent from 2010—when it was pretty much just the Apple (AAPL) iPad—to 2011. Through the first six months of this year alone, the ASP has fallen another 17 percent.

The drop is driven partly by the introduction of $200 mini tablets like the Amazon (AMZN) Kindle Fire, but also a fall in the price of the dominant large-screen devices.

rb- No wonder Apple is suing everybody in sight to prevent competition. They need to protect their profit margins. Way to go USPTO.

Tablet Average Selling Price

Are We in the Post PC Era

Are We in the Post PC EraKevin C. Tofel at GigaOM recently wrote that by looking at the numbers, it’s difficult to argue that the Apple (AAPL) iPad is anything less than a success. The company sold more iPads — 15.4 million — than any traditional computer maker sold PCs in the last quarter of 2011. Mr. Tofel argues what is debatable, however, is whether the iPad will take us to the “post-PC” era, as Apple calls it. Former Apple director Michael Mace suggests that the PC isn’t going away, agreeing with Apple’s CEO, Tim Cook, who recently saidI don’t predict the demise of the PC industry, I don’t subscribe to that.

Michael Mace observed on his personal blog that. “I think the ‘PC era’ meme from Apple is self-serving hype. Of course, they want to convince you that the world is shifting away from a market where Apple has less than 10% worldwide share to a market where Apple has well over 50% share.

“... My thought is that PCs aren’t going to suddenly disappear, but people will continue to opt for capable tablets or hybrid devices in the place of future, new PC purchases. The mobile market is shifting traditional tasks away from PCs of old, and for people who need a PC occasionally, they will likely be able to access one remotely.

Apple is simply calling out the post-PC era because it has successfully transformed its business lines ahead of the curve and before its peers.

Mr. Tofel points out that when all is said and done, Mace makes one last salient point worth noting: How will Microsoft (MSFT) respond to the iPad? We know the answer is Windows 8, but there’s still an open question about how well the platform will do on tablets. Perhaps, Mace notes, we’re not exactly on the cusp of a post-PC age, but instead, a post-Microsoft era.

Related articles:

  • Amazing Stats from Apple Q3 Earnings Prove Yet Again We’re In A Post-PC Era

Magic Cable Trio All-in-One USB Simplicity

Magic Cable Trio All-in-One USB SimplicityTested.com points out the handy Innergie Magic Cable Trio which solves an age-old problem. You never have the right USB connector when you need it. The Magic Cable Trio combines mini USB, micro USB, and 40-pin dock tips into a single cable. The handy-dandy cable will play ball with your tablet, or just about any USB device you can get your hands on according to Tested. It won’t work with printers, but the Magic Cable Trio is meant for plug-and-play accessibility, not languishing behind a desk collecting dust.

The tips are all attached and fold out-of-the-way when not in use. Tested says the extra tips could be a bit of a nuisance, but you’ll never have to worry about losing the adapters in the bottom of a backpack. The Magic Cable Trio costs $20 at Innergie’s store.Innergie Magic Cable Trio

Related articles

Polycom on iPad

Polycom logoAnalysts are forecasting that the tablet market will grow five-fold by 2015 to 320 million units sold annually. The cumulative number of tablets in use by that point will be about 900 million. Many are predicting that the tablet will continue to gain in functionality and take over the laptop in the coming years.

Polycom is pioneering high-definition video collaboration for tablets called Polycom® RealPresence™ Mobile. Polycom RealPresence Mobile is the first enterprise tablet software that lets mobile users enjoy HD video collaboration from anywhere. It is available now on the Apple (AAPL) iPad 2, MotorolaXOOM, and Samsung (005930) Galaxy Tab 10.1—with more mobile devices to follow.

RealPresence Mobile extends Polycom’s HD video collaboration technology beyond the office and conference room. Iy bringing a high-quality, secure, reliable experience to tablets that is comparable to desktop and room systems.

RealPresence Mobile delivers enterprise video collaboration for the business tablet market and delivers provisioning, management, system interoperability, firewall traversal, and scalability that CIOs need, and the reliability, security, rich features, and lifelike quality that users demand.

RealPresence Mobile scales, supporting up to 75,000 devices and 25,000 concurrent calls.

You can find download a free end-user application from the Apple Store, Android Market, and Samsung Apps.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

A History of Mac Malware: Part 2

A History of Mac Malware: Part 2Graham Cluley at Sophos recently wrote an excellent history of Apple Macintosh malware. He points out that Mac malware is a subject that raises strong emotions. There are some who believe that the problem is over-hyped and others who believe that the malware problem on Macs is underestimated by the Apple-loving community. The author writes that hopefully, this short history will go some way to present the facts and encourage sensible debate. (rb- We have just taken on a new customer which is 85% Mac and 15% PC. I have had this very conversation with my Apple certified tech who does the field support.)

Click here to read part 1 of the History of Mac Malware. Click here to read my recent series commemorating the 25th anniversary of the computer virus.

Sophos logoBig changes to the Mac malware scene arrived with the release of Mac OS X – a whole new version of the operating system which would mean that much of the old malware would no longer run. All future, Mac-specific malware would have to be written with a new OS in mind.

2004 – The Renepo script worm (also known as “Opener”) attempted to disable Mac OS X security including the Mac OS X firewall. The author reports that the Renepo worm would download and install hacker tools for password-sniffing and cracking, make key system directories world-writable, and create an admin-level user for hackers to later abuse.

Renepo script wormIn 2004, hackers also wrote a proof-of-concept program called Amphimix which demonstrated how executable code could be disguised as an MP3 music file on an Apple (AAPL) Mac. Amphimix appeared to been written as a proof-of-concept highlighting a vulnerability in Apple’s software.

2006 – The first virus for Mac OS X was discovered in 2006. OSX/Leap-A was designed to use the Apple iChat instant messaging system to spread itself to other users. As such, it was comparable to an email or instant messaging worm on the Windows platform.

iChatThe author concludes that it was correct to call OSX/Leap-A a virus or a worm. It was not correct to call OSX/Leap-A a Trojan horse. Not that that stopped many in the Mac community claiming it wasn’t a real virus.

2007 – Sophos discovered an OpenOffice multi-platform macro worm capable of running on Windows, Linux, and Mac computers. The BadBunny worm dropped Ruby script viruses on Mac OS X systems and displayed an indecent JPEG image of a man wearing a rabbit costume.

BadBunny wormThe first financial malware for Mac appeared in 2007. The OSX/RSPlug-A Trojan horse was first detected by researchers at Intego. Mac users infected themselves by downloading and running a fake codec that claimed to help users view pornographic videos. Once on a victim’s Mac, RSPlug changed that machine’s DNS settings so that, while browsing the web, users would redirect to phishing sites or sites containing advertisements for other pornographic sites.

According to Kasperskey’s Threat Post, RSPlug’s various incarnations are all forms of the DNSChanger malware. DNSChanger featured prominently as the target of the FBI’s 2011 take-down of the malware network, dubbed Operation Ghost Click.

2008 – Apple malware became more sophisticated in 2008. Cybercriminals targeted Mac and PC users in equal measure, by planting poisoned ads on TV-related websites. If accessed via an Apple Mac, surfers would be attacked by a piece of Macintosh scareware called MacSweeper. Close relatives of MacSweeper including Imunizator, claimed to find privacy issues on the user’s computer.

The author details the growing sophistication of Mac malware in 2008.

  • Mac scarewareThe OSX/Hovdy-A Trojan horse would steal passwords from Mac OS X users, open the firewall to give access to hackers, and disable security settings.
  • Troj/RKOSX-A a Trojan horse is a Mac OS X tool to assist hackers to create backdoor Trojans, which can give them access and control over your Apple Mac computer.
  • The Jahlav Trojan was similar to other malware campaigns, cybercriminals created a bogus webpage claiming to contain a video. Visiting the site produces a message saying that you don’t have the correct codec installed to watch the video whereupon the site offers you a DMG file for Apple Macs.

Ironically Apple issued a support advisory in 2008 urging customers to run anti-virus software – but after media interest, rapidly deleted the page from their website.

OSX/iWorkS-A Trojan horse2009 – ThreatPost reports that in 2009 Symantec found the OSX/iWorkS-A Trojan horse. The malware was added to a version of Apple’s iWork ’09 software suite that popped up on BitTorrent file sharing sites. The incident was noteworthy because the trojan was packaged with the actual iWork application, so the Mac users, many of which do not use an antivirus solution, would have no reason to suspect that their machines were infected because of the download. The trojan itself communicated with a remote server and was intended to scan machines for data and track Internet history and keystrokes. A new variant of the Trojan was distributed in a pirated version of Adobe (ADBE) Photoshop CS4.

Online video was a major conduit for Mac malware in 2009.

  • Sophos reported on how hackers were planting versions of the RSPlug Trojan horse on websites, posing as an HDTV program called MacCinema.
  • Hackers planted a version of the Jahlav Mac Trojan horse on a website posing as a portal for hardcore porn videos.
  • The Twitter account of celebrity blogger Guy Kawasaki had a malicious link posted onto it, claiming to point to a sex video of Gossip Girl actress Leighton Meester. In reality, however, the link leads unsuspecting users to malware that could infect Mac users.

Leighton MeeterIn 2009 Apple finally began to build some rudimentary anti-malware protection into Mac OS X. Although it wasn’t really equal to a true anti-virus product (it only protected against a handful of Mac malware, doesn’t defend you if you try to copy an infected file from a USB stick for instance, and doesn’t offer clean-up facilities), it was still encouraging to see some attempt to offer more protection for Mac users.

2010 – Throughout 2010 Mac malware was distributed disguised as a legitimate application.

  • The OSX/Pinhead Trojan (aka HellRTS) was disguised as iPhoto, the photo application which ships on modern Macs. The backdoor Trojan horse can allow hackers to gain remote control over your iMac or MacBook.
  • Boonana cross-platform wormA Java applet distributed via Facebook (FB) was used to target not just Windows computers but Mac OS X and Linux too. The Boonana cross-platform worm appeared, disguised as a video and runs in the background, and reports system information to servers on the Internet, which can be a big breach of personal information. The Trojan also attempts to spread itself by sending messages from the user account to other people through spam.
  • A piece of Mac spyware called Spynion (also known as OpinionSpy or PremierOpinion) came to light, attached to screen savers and other add-ons for users’ Macs. it’s a variant of Windows spyware that has existed since 2008. Spynion would take advantage of users not properly reading End User License Agreements (EULAs), allowing it to spy on browsing habits and search behavior.

In late 2010, Sophos issued a free anti-virus for Mac home users. Early reports indicated that there are plenty of Mac users with malware on their computers – some of it Windows malware, some Mac OS X, and some cross-platform. The author states that there’s no doubt that the Windows malware problem is much larger than the Mac threat, but that doesn’t mean that the danger of malware infection on Mac OS X is non-existent.

The events of 2011 would make it clearer to Mac users than ever before that the malware threat was real..

Related articles

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.