Nation State Attacks
Back in 2007 Estonia faced what is considered to be the first ever state sponsored cyberattack and our technology (KSI) was based on many of the lessons learned from that experience, in particular the need for ‘native forensics’ or the ability to have independent proof of what happened when integrated natively into infrastructure. Independent here means proof without relying on trusted administrators or the security of key stores.
Modern security solutions such as firewalls and sandboxing search for vulnerabilities but they can’t guarantee their absence. – and when it only takes one vulnerability to succeed the odds will always be overwhelmingly in favor of the attacker. KSI allows for different assumptions – by real time monitoring of the integrity of you network you can assume compromise. When malware infects a crucial network or system component, the changed state of the asset provides a real-time alert, which can then be investigated, audited, and/or behavior stopped, putting the odds back in favor of defense. With this real-time awareness, real-time incident response, real-time data-loss prevention, it is possible to detect and react to any misconfiguration, network and/or component/application failure.
Which brings us to today’s announcement about Ericsson and Apcera
"The beauty of the cloud is that it is much more efficient to develop, roll-out and operate applications. To realize the full potential, cloud environments need security and governance, which our partnership with Guardtime and our acquisition of a majority stake in Apcera provides. With these technologies in place, enterprises and individuals can trust the integrity and the confidentiality of their infrastructure."
In the digital world, just as in the physical world you can’t govern unless you can have a basis for proof, and for cloud, governance starts with PAAS. Apcera’s PAAS, Continuum, is a policy-driven platform for Dev, DevOps, Ops, and IT Managers to deploy diverse workloads, orchestrate them as systems, and govern them on premise and in the cloud.
Combine that with native forensics and you have a truly disruptive offering for Enterprise CIOs that want to move workloads to the cloud – but in manner they can know with certainty (and legal recourse) what happened to their data when it was outsourced to a service provider.
No Enterprise CIO would seriously consider cloud without it.