Edgewise Networks, a security startup that's taking on industry giants VMware and Cisco with its microsegmentation technology, has a simple plan to win market share. "As far as the microsegmentation space is concerned, it has been viewed as very complex," said CEO Peter Smith. "Really, the drive behind our pursuit of these patents is bringing extreme simplicity, extreme automation to the problem of microsegmentation and zero trust." Microsegmentation enables fine-grained security policies to be assigned to cloud and data center applications. The approach improves network security by integrating it directly into a virtualized workload without requiring a hardware-based firewall.
The technology world has spent so much of the past two decades focused on innovation that security has often been an afterthought. Learn how and why it is finally changing. A few years ago, the concepts of microsegmentation and microperimeters for Zero Trust were championed by former Forrester analyst John Kindervag. He showed us how those concepts and their technologies could enable a more secure enterprise. Once those concepts and their associated best practices hit the street, organizations from VMware to Cisco Systems to Palo Alto Networks quickly jumped on board the train of using powerful networking technology -- next-generation firewalls (NGFWs) and microsegmentation technology -- to push the envelope and align with the benefits of Zero Trust.
Traditional cybersecurity measures focus on protecting data center infrastructure. But with changing application architectures, and the growth of the cloud, cybersecurity must increasingly shift focus to protecting applications and data, rather than just the infrastructure they run on. "Organizations traditionally focus most data center security controls and policies on servers and networks, but the priority should be to focus and align those controls on their critical applications and sensitive data rather than the infrastructure they run on," said Tom Corn, senior vice president of security product at VMware. As apps become the new focal point for security, new questions arise. Security teams must adjust to meet the new challenges they're likely to face, and organizations must revisit the prior choices they've made about technology and policies to ensure a strong defense.
We talk way too often about what a technology enables people to do. Its objective is to spread a very fast signal through the airwaves, using transmitters whose power curve is just under the threshold of requiring artificial cooling. It needs to be faster than what we have now, for enough customers and enough providers to invest in it, so that it may achieve that main objective. Assuming 5G deployment proceeds as planned, and the various vast political conspiracies, small and large, fail to derail the telecommunications providers' plans, it will reach the peak of its goals once it has achieved the virtualization of its packet core (which was begun with 4G LTE), its radio access networks (RAN), and the customer-facing functions of its data centers. But it's from atop the highest peak, as any Everest climber or any great John Denver song might tell you, that one obtains the best view of oneself, and one's own place in the world. The common presumption, when the topic of network functions virtualization (NFV) is brought up with respect to 5G, is that all this virtualization will take place on a single platform. Not only is this critical issue undecided, but there would appear to be a dispute over the decided or undecided nature of the issue itself.
Airiau, Stéphane (ILLC, University of Amsterdam) | Endriss, Ulle (ILLC, University of Amsterdam) | Grandi, Umberto (ILLC, University of Amsterdam) | Porello, Daniele (ILLC, University of Amsterdam) | Uckelman, Joel (ILLC, University of Amsterdam)
Many collective decision making problems have a combinatorial structure: the agents involved must decide on multiple issues and their preferences over one issue may depend on the choices adopted for some of the others. Voting is an attractive method for making collective decisions, but conducting a multi-issue election is challenging. On the one hand, requiring agents to vote by expressing their preferences over all combinations of issues is computationally infeasible; on the other, decomposing the problem into several elections on smaller sets of issues can lead to paradoxical outcomes. Any pragmatic method for running a multi-issue election will have to balance these two concerns. We identify and analyse the problem of generating an agenda for a given election, specifying which issues to vote on together in local elections and in which order to schedule those local elections.