What is New in Microsoft Azure Web Application Firewall?

Microsoft recently made its new Web Application Firewall available for customers. Initially, they announced the centralized WAF service that protected the applications running in the Azure public cloud environment from attacks such as SQL injection and cross-site scripting attacks.

According to Yousef Khalidi, Microsoft corporate vice president for Azure Networking, it is difficult to prevent the 7-layer app-level attacks and requires maintenance, monitoring and patching through the application tiers. With the introduction of Web Application Firewalls, users will not have to make any application changes for protecting against web attacks and simplifying security management. Microsoft assures a better security against threats and intrusions with its application and compliance administrators.

Microsoft’s Azure Application Gateway can host multiple sites as this application delivery controller (ADC) includes SSL termination; URL path based routing, load distribution. The ADC also provides end-to-end SSL encryption and logging as well as SSL policy control. The WAF comes with Open Wen Application Security Project (OWASP) ModSecurity Core Rule Set (3.0 or 2.2.9) that is designed to protect against threats such as command injection, HTTP response splitting, HTTP request smuggling, HTTP protocol violation, crawlers, bots, and general scanners. Microsoft has attended to the issue of denial-of-service attacks that occur against multiple web pages.

Presently, the Azure Application Gateway can host up to 20 sites behind each gateway, all of which are capable of defending against such attacks. The Microsoft team confirmed that they intend to add the new WAF service through the Azure Security Service that recommends ways to re-mediate discovered issues after scanning the cloud based subscriptions for vulnerabilities. Their security service did not include protecting web pages that aren’t scanned by a WAF. However, it offers third party firewalls from a Barracuda Networks.

Net Activity, Inc. is a Microsoft certified partner and has actively been supporting businesses across Ohio for installation of Office 365 and Microsoft Azure. We operate since 2002 and ensure a secured cloud presence while enhancing business productivity cost-effectively. For more details, please visit http://www.netactivity.us/services/cloud-computing-services or get in touch with Harry Bhatia, President, Net Activity, Inc. at 888-545-5346.

Article Source: http://www.netactivity.us/blog/what-is-new-in-microsoft-azure-web-application-firewall/

Why Cyber Security Should Be Your No. 1 Business Priority for 2017?

A significant number of CEOs along with their executives and managers have reported that their technology budget will see a considerable increase in 2017 – a recent survey report from Mondo read. According to one of the Business Insider’s reports, it is estimated that nearly $655 billion will be spent on cyber-security initiatives for protecting mobile devices, PCs, and IoTs between 2015 & 2020.

Cyber security is at the top of all the IT spending priorities as companies are more concerned about their network and data due to increasing threats and hackers on the market. President Trump also said (cnet.com) in one of his pre-election speeches that the only way to keep America safe is to make cyber-security a major priority.

Cyber criminals are evolving at a very aggressive pace as they intelligently utilize the opportunity of being anonymous and spontaneous. They are developing new, innovative modes of attack every day. They study an individual’s or an organization’s cyber behavior and intervene instantly wherever they find a loose string. Companies must start being prepared for potential cyber-attack as otherwise they might face heavy data losses, disruption of operations, or loss of customers’ trust.

Despite the efforts put in by the cyber security experts and government agencies, cyber-crime is likely to increase in the coming years. Technical innovation and use of smart phones invite more online dangers. Moreover, the development of Internet of Things has made machines more vulnerable attack points for hackers.

Malware protection must be a key concern rather than just having policies for securing emails, web browsing data, and personal devices. Cyber security can be strengthened with the right measures and by collaborating with the right Managed Service Provider (MSP). We, the Net Activity, Inc. team have been consistently serving businesses across Ohio by securing their networks and data from any possible discrepancies since 2002. We are also Microsoft partners which strengthens our identity as a reliable Managed Service Provider in Ohio. If you wish to gather more details, please visit http://www.netactivity.us/services/it-managed-services or you can contact Harry Bhatia at 888–545–5346.

Why Businesses are Moving their Severs to the Cloud

Virtualization has impacted businesses a lot and cloud servers are changing the data storage aspects. With the emergence of cloud servers, there is no upgrading of hard drives, no external storage devices, and no emptying the recycle bin. Cloud servers have been a wise investment for start-ups as well as established corporations to manage and secure their data. In this process, an operating system is separated from the hardware without impacting either in any way. Cloud servers use virtualization to allow users to install their operating systems on a generic layer overlaying the hardware. They are software independent units and do not require centrally installed software.

  cloud server

When cloud technology was a novice concept, it took several days for commissioning a server and involved outsourcing the process to a third-party vendor by a server rental agreement or purchasing hardware. A cloud server eases the whole thing and uses ‘redundant hardware’ which is already installed and tested by the vendor. This reduces the provisioning time to merely a few minutes.

Let’s have a look at the benefits of cloud servers:

  • Cloud servers offer a more economical solution than the standard dedicated servers. For the same price, cloud provides more resources and flexibility.
  • Your data is safer in the cloud environment as a software problem is isolated to and from your cloud environment. Your resources are dedicated and thus stability is guaranteed.
  • They are safe, fast, and secure. Cloud servers provide the best stability/cost ratio performance and they do not suffer from the usual hardware problems.
  • Cloud provides scalability – easily and reliably. It is more affordable too.

The list is endless. However, one thing is for sure that the cloud server can benefit IT managers largely who need to administer and manage multiple locations and devices. Here, cloud helps them reduce the cost of ownership of their network and find an efficient way to manage the networks and devices/applications.

Net Activity, Inc. can help you get a secure, accessible, cost-effective cloud space allowing you enjoy unlimited data storage capacity on a pay-per-seat basis. To experience lot more benefits of the cloud technology, please feel free to contact Harry Bhatia at 888-545-5346 or visit: http://www.netactivity.us/contact-us for further details.

Source: http://www.netactivity.us/blog/why-businesses-are-moving-their-severs-to-the-cloud/

The Next Generation Ransomware Detector & Virus Cleaner: Sophos Intercept X

Sophos has always deployed intelligent security solutions to businesses and with the introduction of Sophos Intercept X users can be extra careful with the malicious attacks on their systems. The Intercept X uses big data analytics in addition to a deep understanding of attack vectors, threat patterns, and criminal motives much sooner without needing any updates or signatures. The Sophos Intercept X is a combination of several techniques for faster identification and response that does not require specialized security staff.  Sophos Intercept X.jpg

The Sophos Intercept X has already been in the headlines for detecting and protecting computer systems from ransomware attacks. Sophos ransomware protection and advanced anti-exploit has the capability to block zero-day threats. Unlike other threat management systems, Sophos Intercept X features root cause analysis and automated forensic reporting that pinpoints infection points and offers a detailed guidance for strengthening an organization’s security position. It observes the actual behavior of the process in a signature less manner and understands whether the process is malicious or not, rather than acting at a later time when the damage is done. Sophos Intercept X goes down to identify the source of attack and responses with a deep cleaning of all the harmful attackers. The product can be easily installed and managed through the Sophos Central cloud based management console. The Sophos virus removal tool closes many of the security gaps that existed for organizations all around the globe.

The Intercept X features the Anti-exploit technology as studies revealed that almost 90% of the breaches are due to exploits and most of the exploited vulnerabilities are already known. Sophos has diagnosed 24 different techniques used within the exploits rather than tackling the exploits directly. The Intercept X gives a meaningful response to the possible attacks while providing both cleanup and forensics. The Sophos Intercept X displays the what, where, when, how, and by whom of the virus attacks and also guides a novice user to the list of next steps. It can be installed as a standalone product or can be merged with the Sophos Central endpoint product for better results.

If you have any further queries about network security and virus cleaners, please visit http://www.netactivity.us/contact-us Harry Bhatia at 888-545-5346.

Source: http://www.netactivity.us/blog/the-next-generation-ransomware-detector-virus-cleaner-sophos-intercept-x/

IT Suffering from Bad Weather Conditions in Cleveland : What is the Solution

On Wednesday, the March 9th 2017, Cleveland was struck by heavy, strong winds and many businesses suffered huge downtime issues. The winds were harsh on the roads and in offices too as there was no internet connectivity. Many of the business owners faced serious network failures and had to stay off as a consequence. At some places, the power outage was so serious that it is said that there would be no power till Saturday. People are even not able to access their emails on the local exchange server. One of our clients faced an unexpected internet failure while they tried to fix somebody else’s cable.  it-managed-services-cleveland

Then and now, IT security has always been a crucial component and a key concern for every business. Business data is important and it has to be secured. However, natural calamities like the wind that hit Cleveland yesterday are things beyond control and enterprises must have a plan B. Nevertheless, businesses must have a backup solution to prevent unexpected data loss due to natural calamities.

Is Cloud the solution?

Yes. Cloud providers host your backups on their servers. It is as simple as connecting to the server via an internet connection and backing up the data. Interestingly, you don’t need to invest in infrastructure, IT resources or maintenance as everything is managed by the cloud providers. Moreover, the cloud backup solution is very scalable. It is very affordable and easily accessible. The cloud servers are scalable and can be easily set up in just a few hours.

How can Office365 help?

Microsoft Office 365 is an effective tool that protects sensitive information. The Office 365 features standard data loss prevention (DLP) policy which identifies, monitors, and protects your sensitive information. It prevents accidental sharing of your sensitive information and helps users to learn how to stay compliant without interrupting the workflow.

Net Activity, Inc. has been serving clients across the Ohio state since 2002. The team suggests using Cloud services and Office 365 to build a protected IT network management system that does not interrupt business workflows in spite of natural calamities or any threatening cyber-attack.

We are a Microsoft Cloud Partner and offer complete IT solution to businesses including unlimited remote and telephone support, monthly preventive maintenance, 24x7x365 server monitoring, and all what you expect from an IT Managed Provider. Our Cloud services in Cleveland are one of the most reliable and economical solutions to your data security. We can discuss further – visit or get in touch with Harry Bhatia at 888-545-5346 and we would be happy to get your business data protected. http://www.netactivity.us/contact-us

Source: http://www.netactivity.us/blog/it-suffering-from-bad-weather-conditions-in-cleveland-what-is-the-solution/

Are You Taking Data Recovery and Backup For Granted

It’s highly irritating if you experience a sudden shut down in the midst of important work on your computer system. Computers or laptops are our virtual world and has all your important data. Anyone would freak out if this happens. The situation of CEOs and CFOs who handle critical information and work on important confidential documents cannot be even imagined after losing such precious data.

       it-managed-services

Users understand the role of managed service providers who ensure that data is backed-up and the backup data is fully encrypted to protect it from disgruntled employees, added hackers, and snooping competitors. Apart from the various services they offer, data backup and recovery is a crucial task. A hosting company worth partnering makes all critical arrangements for saving your precious data. So, this decision is very critical and ignoring the services of a managed IT support service provider could prove disastrous to businesses.

Furthermore, as a business professional, you must be aware of the level of backup and what is the recovery mode used by the host. Below are some basic things you must know to ensure data backup and recovery:

A backup takes place when a snapshot is taken of the data of each tier in the EBS (elastic book system) of the cloud. This snapshot is stored while still being encrypted in a cloud section that makes it accessible in all availability zones. Besides this, the backup service makes encrypted copies of your website periodically and distributes them across all the available zones of the cloud. It is a daily process and the data is retained for as long as you want it to.

Here are 5 disaster recovery incidences that trigger an action when recovery issues arise within the cloud:

  • Failure of data volumes or application servers in a solution tier
  • Failure of a data volume or individual application server
  • Failure of the elastic load balancer (ELB)
  • Failure of entire cloud region
  • Failure of the complete availability zone

Your data is precious. Assure yourself that you are not compromising with the security of your systems. Trust only a reliable IT managed service provider for securing your data. The cloud is a complex environment and only experienced professionals can be responsible for a safe environment for your data. Net Activity has been in the business for long and has served a diverse clientele assuring data security.for more details about the managed services we offer or you can contact Harry Bhatia at 216-503-5150 X 206 to discuss them. http://www.netactivity.us/contact-us

Source: http://www.netactivity.us/blog/are-you-taking-data-recovery-and-backup-for-granted/

Are Big Data and Cloud Computing Related? How?

Big data and cloud computing are the most hyped phenomenon driving the IT stream of businesses all around the world. Experts say that the emergence of big data was a result of the rise of cloud computing and cloud data stores. Unexceptionally, both these terminologies hold high degrees of similarity in the IT industry. They are inter-dependent in the manner that cloud resources are required to support big data projects and storage while big data is a huge business case for moving the cloud.

   cloud-computingBig Data is more about extracting VALUE out of Variety, Velocity and Volume while Cloud has its focus on scalable, elastic, on-demand, and pay-per-use self-service models. Big Data needs a large on-demand compute power and distributed storage and Cloud seamlessly provides elastic on-demand computer required for the same. The workload nature of the Big Data computing infrastructure makes it a perfect case for the cloud.

There are many patterns which highlight the relationship better:

SIMPLICITY: To mention it simply, simplification is the key component of Cloud and Big Data, which is the prime reason for their mass adoption. The simplification provided by the combination of Big Data and Cloud Computing can increase the adoption of a seemingly complex problem of large scale distributed processing.

COST-EFFICIENCY: Both Cloud and Big Data deliver value to companies by lowering the cost of ownership. Their combination has been driving the cost down for enterprise and bringing value to enterprises.

SECURITY: Both the platforms offer data security and protect privacy concerns. System integrators have been building solutions within the enterprise to build Elastic Scalable Private Cloud Solution that brings in the value which enterprises can leverage to bring a Scalable Distributed Processing in action within the enterprise.

For more details on cloud computing, visit NetActivity or call Harry Bhatia at 216-503-5150 X 206. http://www.netactivity.us/contact-us

Source:http://www.netactivity.us/blog/are-big-data-and-cloud-computing-related-how/