facebookpixel

The State of Software Distribution 2018

CMMA Blog

Over the last five years, we have seen cyberattacks hit some of the world’s largest organizations. From data breaches at Verifone, TalkTalk and Docusign, to ransomware attacks on FedEx, Honda and the UK’s National Health Service; it’s becoming increasingly clear that businesses at the top of chain are just as vulnerable to cyberattacks as those at the bottom.

But are these attacks the result of poor security systems, or do they stem from something far more fundamental to an organization’s core IT infrastructure? In the case of last year’s WannaCry attack, the devastating breaches were not the result of a lack of security software, but rather a lack of patches, updates and distribution infrastructure. In some cases, the companies affected were found to still be running Windows XP – a 17-year-old operating system that stopped receiving support in April 2014.

But while it’s easy to blame businesses for failing to update, the reality is that – for enterprises with thousands, or even tens of thousands, of machines – staying up to date is easier said than done.

Faced with ever larger and increasingly remote workforces, the ability to distribute updates and ensure the latest software, operating systems and patches are installed is proving especially challenging. Without the bandwidth or infrastructure to effectively distribute these updates, such organizations are left at serious risk – and many of them don’t even know it.

So just how have today’s enterprises ended up so out of date? And what are their IT teams doing to rectify this issue and to provide the necessarily security updates quickly and at scale?

These are the questions that we at Kollective set out to answer when developing our State of Software report for 2018. Calling upon research with over 260 IT professionals across the UK and US, the State of Software Delivery offers comprehensive insights into the impact that network bandwidth, update infrastructure and software delivery practices are having on the modern enterprise.

FOLLOW KOLLECTIVE TECHNOLOGY

SUBSCRIBE TO

KOLLECTIVE INSIGHTS


Enter your email address to receive monthly product and industry updates from Kollective Technology

MktoForms2.loadForm(“//app-sj20.marketo.com”, “028-TSG-826”, 1324);

.mktoButton {
background: #d75c45 !important;
border: none !important;
border-radius: 1px !important;
text-transform: uppercase;
font-size: 15px !important;
padding: 10px 25px !important;
}
.mktoButtonRow {
width: 100% !important;
text-align: center!important;
display:inline !important;
}
.mktoHtmlText.mktoHasWidth {
color: #ffffff !important;
}
.mktoForm a {
color: #d75c45 !important;
}
form#mktoForm_1324 {
margin-left: auto !important;
margin-right: auto !important;
text-align: center;
margin-top: -15px;
width:100% !important;
}
.mktoFormRow {
display: inline-block;
}
span.mktoButtonWrap.mktoRound {
margin-left: 0px !important;
}
.et_pb_row.et_pb_row_1 {
width: 100% !important;
}
.et_pb_column_1_4 .et_pb_promo {
padding:15px !important;
}
#Email, #FirstName, #LastName {
width: 100% !important;
}

THE STATE OF SOFTWARE DISTRIBUTION 2018

How Enterprises Update and Secure Their Networks

Key among its findings are:

%

of businesses are unable to automatically update their systems

%

of large enterprises struggle to distribute content across their networks

%

of businesses delay updating due to network scaling issues

%

of businesses must wait a month before installing vital updates

microsoft PNG10

Kollective for Microsoft 365

Kollective scales and secures your network  for the modern workplace. 

stream mockup v4

msft logos 1

Related Blog Posts

Adapting To An Age Of High Frequency Change

There is a rolling argument between futurists and historians about the very nature of change.   The futurists say that we are living in an age of accelerated change. The reason our heads are spinning – a sensation reported to me by most people I speak to – is that…

read more

The post The State of Software Distribution 2018 appeared first on Kollective Technology .

To view our Partner blog, click here

Microsoft Inspire Wrap Up: Welcome to the Modern Desktop

CMMA Blog

Last week our team traveled to Las Vegas to attend Inspire 2018, Microsoft’s annual conference for its partner community. The event lived up to its name, providing inspiration to thousands of our fellow Microsoft partners as company leaders and product managers discussed upcoming initiatives and how partners like Kollective can play a role. Here are a few of our top takeaways.

All in on the Intelligent Edge

Judson Althoff spoke about Microsoft’s progress in powering the Intelligent Edge. Using the intelligent cloud, Microsoft technologies are poised to deliver a seamless experience wherever a user lives, no matter how far on the edge they may be.

Video comes to the office

As we already mentioned , Microsoft is making a large push into live video and VOD by incorporating intelligent event capabilities into Microsoft 365. With the power and ubiquity of Microsoft, this promises to put live, large-scale video capabilities in reach of every enterprise and further establish video as a critical business tool.

Security is a priority

A lot of time was spent discussing Microsoft’s plans for making Windows 10 the most secure operating system possible. By closing the vulnerability gap between threat detection and patch deployment, Windows 10 has the potential to significantly reduce the massive financial damage and business chaos cyberattacks have recently caused.  

The race is on

Speaking of Windows 10, the new OS was the obvious star of the show. A major focus was on helping partners understand what will be involved in delivering migration strategies to Microsoft customers. Microsoft senior product manager Jon Mounder also spoke about the importance of having a peer-to-peer solution to help deliver Windows 10’s monthly updates. Watch Jon’s presentation about Windows 10 deployment and management here .

The future is now

As one of only three ECDN providers that Microsoft partners with, Kollective can help you make the most out Microsoft’s push into network-intensive capabilities like live video and Windows as a Service. Learn more about our Microsoft solutions .

SUBSCRIBE TO

KOLLECTIVE INSIGHTS


Enter your email address to receive monthly product and industry updates from Kollective Technology

MktoForms2.loadForm(“//app-sj20.marketo.com”, “028-TSG-826”, 1324);

.mktoButton {
background: #d75c45 !important;
border: none !important;
border-radius: 1px !important;
text-transform: uppercase;
font-size: 15px !important;
padding: 10px 25px !important;
}
.mktoButtonRow {
width: 100% !important;
text-align: center!important;
display:inline !important;
}
.mktoHtmlText.mktoHasWidth {
color: #ffffff !important;
}
.mktoForm a {
color: #d75c45 !important;
}
form#mktoForm_1324 {
margin-left: auto !important;
margin-right: auto !important;
text-align: center;
margin-top: -15px;
width:100% !important;
}
.mktoFormRow {
display: inline-block;
}
span.mktoButtonWrap.mktoRound {
margin-left: 0px !important;
}
.et_pb_row.et_pb_row_1 {
width: 100% !important;
}
.et_pb_column_1_4 .et_pb_promo {
padding:15px !important;
}
#Email, #FirstName, #LastName {
width: 100% !important;
}

FOLLOW KOLLECTIVE TECHNOLOGY

microsoft PNG10

Kollective for Microsoft 365

Kollective scales and secures your network  for the modern workplace. 

stream mockup v4

msft logos 1

Related Blog Posts

Page 1 of 1412 3 4 5 10 Last »

The post Microsoft Inspire Wrap Up: Welcome to the Modern Desktop appeared first on Kollective Technology .

To view our Partner blog, click here

Ask The Experts: Scaling Corporate Networks to Accommodate Growing Use of Video

CMMA Blog

For decades, enterprises have shown great interest in the promise of business video. The various benefits of face-to-face communication over audio-only are undeniable. The power of video offers stronger client relations, more effective sales meetings, greater team productivity, a more flexible work/life balance, and a host of other improvements to productivity.

Unfortunately, while the world has been ready for video, the technology was not ready for the world. It was too expensive, low quality, too unreliable, and far too complicated for everyday use. However, in recent years this has dramatically changed. A new generation of videoconferencing technology has delivered the usability, quality, and affordability that is essential for true viral adoption of video communication in the workplace.

In addition to video technology being ready for prime time, we are now culturally ready for massive adoption of video. If you look at consumer use of video on YouTube and social media platforms, it is clear that video is no longer a tool exclusively for performers and entertainers. Video is simply a more effective way of communicating a message, whether it be an instructional YouTube video, or a presentation in the boardroom.

Kollective recently put out a report which included stats showing that 65% of workers are visual learners, and 77% of US employees believe video calls are more effective than audio calls. The study also showed higher levels of trust when communicating over video and a feeling of disconnection with team members and managers when they do not have enough face-to-face contact. Much of this is influenced by the growing consumer use of video, as the report shows that up to 82% of younger workers are using YouTube to get information in their personal lives.

The consumer use of video is a big part of what is driving adoption of business video. As we find ourselves using video more and more in our everyday lives, we are becoming more and more aware of its effectiveness. It is only natural that we want to take advantage of video’s power at work as well. In fact, the report referenced above shows that 25% of UK workers are already using YouTube at work to get information. As workers find themselves saying, “Wouldn’t this be better over video?” more and more often, the pressure to deploy business video increases.

The cultural readiness to adopt video, coinciding with the technology finally being ready for mass adoption, seems like an incredible win/win situation for businesses. However, there is one major concern that must be addressed when adopting video in your business, and that is the effect on your local corporate network. Simply put, video uses a lot of data and bandwidth. To display a typical 720p image you need information about the location and color of almost a million pixels. For moving video, you need to share this information 30 times every second. That is a massive amount of data going through your network.

A fearful network administrator might seek to limit the use of video to protect the network. However, this approach simply denies your organization the full benefits of adopting a video culture. It is preferable to encourage, not discourage, the use of video and to find other ways to protect your network. It is not an easy task. In addition to ensuring your network can handle the traffic when multiple workers use video, you must also find a way to store an exponentially increasing library of recorded videos.

One way to protect your network would be to “beef it up” to the point where you are essentially acting as a content service provider for your organization. This would require massive expenditures to bring carrier level video infrastructure into your environment. It would do the trick, but is it the right role for your IT/AV department? Do you really want to internalize and support a full-blown content delivery network?  Seems like it could be a distraction from your company’s true core goals. Fortunately, there are other options.

Many companies are solving this problem by bringing in the help of enterprise content delivery network solutions like Kollective. This technology can actually help optimize your internal network. It has the ability to create a peer-to-peer architecture to distribute the delivery of traffic through your network. Without this optimization, if your entire company tuned in at the same time to a live video it would all be streamed from one server, using more bandwidth than the connection can provide and choke the video. With peer-to-peer optimization, the burden of a massive live feed is distributed evenly throughout the network within your bandwidth limitations.

We are in the era of business video. You can embrace it or be left behind. While we want to encourage the use of video among our working teams, we don’t want to do so at the risk of overburdening our current networks. The one downside to video adoption is that video uses massive amounts of bandwidth. Your choices are to discourage video (not smart), to beef up your network to support video (not affordable), or to find an enterprise content delivery network like Kollective. Video is coming, now is the time to prepare your network. I strongly suggest learning more about your content delivery options before your network is impacted.

David Maldow

David Maldow

Contributor | Journalist

David Maldow is the Founder & CEO of Let’s Do Video, and one of the visual collaboration industry’s most prolific writers of public content. During his time as primary content creator (and eventually managing partner) at Telepresence Options he wrote well over 150 pieces of public content.

SUBSCRIBE TO

KOLLECTIVE INSIGHTS


Enter your email address to receive monthly product and industry updates from Kollective Technology

MktoForms2.loadForm(“//app-sj20.marketo.com”, “028-TSG-826”, 1324);

.mktoButton {
background: #d75c45 !important;
border: none !important;
border-radius: 1px !important;
text-transform: uppercase;
font-size: 15px !important;
padding: 10px 25px !important;
}
.mktoButtonRow {
width: 100% !important;
text-align: center!important;
display:inline !important;
}
.mktoHtmlText.mktoHasWidth {
color: #ffffff !important;
}
.mktoForm a {
color: #d75c45 !important;
}
form#mktoForm_1324 {
margin-left: auto !important;
margin-right: auto !important;
text-align: center;
margin-top: -15px;
width:100% !important;
}
.mktoFormRow {
display: inline-block;
}
span.mktoButtonWrap.mktoRound {
margin-left: 0px !important;
}
.et_pb_row.et_pb_row_1 {
width: 100% !important;
}
.et_pb_column_1_4 .et_pb_promo {
padding:15px !important;
}
#Email, #FirstName, #LastName {
width: 100% !important;
}

FOLLOW KOLLECTIVE TECHNOLOGY

Looking to live stream video to more than 10k end points?

Learn more about Kollective’s Enterprise Video Solutions Now

Related Blog Posts

Adapting To An Age Of High Frequency Change

There is a rolling argument between futurists and historians about the very nature of change.   The futurists say that we are living in an age of accelerated change. The reason our heads are spinning – a sensation reported to me by most people I speak to – is that…

read more

The post Ask The Experts: Scaling Corporate Networks to Accommodate Growing Use of Video appeared first on Kollective Technology .

To view our Partner blog, click here

Why Your Business Is Like A Loaf Of Bread

CMMA Blog

It’s an easy enough analogy to draw. A business is like a loaf of bread because it has several component parts that all need to come together into one cohesive mix, all according to the right recipe, otherwise the final product is unpalatable.

But the analogy runs deeper than batter and baking.

In the new age of data-driven business (that we are so fond of calling ‘digital transformation ’) on the road to cloud-based services-centric computing, it is insight into the specific detail of what’s happening inside any given operations base that is now required.

It’s not just a question of flour, yeast and water anymore; creating the modern business loaf is only possible if we can get granular (pun deliberately intended) and look at what’s really happening on the inside.

We need to know the size and quality of the grains we make our flour mix with. We need to know the strength and provenance of the yeast being used. We need to know how thick the slices are going to be, who is going to consume them and how much topping or filling they might have to support.

It’s no longer just a loaf of bread or a basis for business; it’s now a dynamically optimised and orchestrated foundation for content — and that content can be peanut butter or enterprise applications, it’s your choice.


Behavioural analytics

Bakery analogies aside then, what this proposition means in business technology terms still comes down to delivery i.e. we need to know who needs what, when and where they need it… and if we know why, then that helps too.

We can look for routes that will help us examine user requirements if we take a this more granular approach.

If we plug user machine data log files and application workload demands into our total analysis of systems orchestration then we can arguably form an even more accurate view of the way we need to plan IT management responsibilities for the future. This kind of behavioural analytics can help us create a higher bar for total systems management on the road to digital transformation.

Staying granular (and wholegrain organic if you wish), if we are prepared to look inside application and data delivery requirements, then we can start to build networks that are capable of handling potentially massive content delivery challenges.


Business lifeblood

Sustaining the lifeblood of business today depends upon an enterprise’s ability to serve thousands of end points around the world. Contemporary enterprise Service Level Agreements (SLAs) today typically require a network substrate that can delivery functional, up-to-date and securely patched software across a complex distribution network.

If you want to go back to loaves of bread… then think about a consumer base that needs fresh, wholesome and appealing products in multiple locations, all streamed in exactly when they need it.

Think of it like a 4th of July picnic (or insert the holiday of your choice) but instead of burger buns and ketchup, the enterprise needs operating system updates, live video streaming, security provisioning execution controls and the ability to fulfill all manner of special user requests at any moment in time.

A topology for success

The bread maker shares a common headache with the enterprise IT architect ; they both want a network infrastructure to deliver their end product faster, more reliably and all within less bandwidth to make the whole process more efficient and profitable.

Creating this mix for digital business success in any industry vertical is never easy. Enterprises will need to look small picture as they examine granular needs at a device-specific user-specific level. Equally, they will need to look big picture and understand how operational requirements implications impact the total network topology.

Perfecting this new mix for business (or indeed bread, cakes and pastries) is a big ask, so let’s take this one bite at a time.

Adrian Bridgwater

Adrian Bridgwater

Contributor | Journalist

Adrian Bridgwater is a technology journalist with over two decades of press experience. He primarily works as a news analysis writer dedicated to a software application development ‘beat’. With his broad editorial purview, Adrian has spent much of the last ten years focusing on open source, data analytics and intelligence, cloud computing, mobile devices, data management, telecoms, unified collaboration and forward-looking opinions on offices and workers of the future.

Looking to live stream video to more than 10k end points?

Learn more about Kollective’s Enterprise Video Solutions Now

Related Blog Posts

Page 1 of 1312 3 4 5 10 Last »

The post Why Your Business Is Like A Loaf Of Bread appeared first on Kollective Technology .

To view our Partner blog, click here

How To Prevent The Next Big Data Breach With Software Patching

CMMA Blog

No matter which way you measure it, 2017 will be remembered as the Year of the Data Breach. Record highs were hit for almost every type of data breach statistic available:

While it’s easy to chalk up this Breachpocalypse to the evolving sophistication of cyber criminals, the power of new hacking tools and the difficulty of fighting against an international menace, that doesn’t tell the full story. The real shock behind the numbers is exactly how many breaches could have been prevented with an effective software patching process.

According to the Online Trust Alliance’s Cyber Incident & Breach Trends Report , a stunning 93% of reported breaches were completely avoidable. Regular patching, along with paying close attention to vulnerability reports and training employees to avoid malicious emails, could have saved international businesses and their customers billions of dollars in damage.

Despite the fact that patches are freely available, businesses of all sizes continue to struggle to patch devices across their network not only in the days after a patch is release, but quite often years after. Looking back a few years, the Verizon Data Breach Report 2016 showed that most exploits in 2015 came from vulnerabilities discovered in 2007, while vulnerabilities from as far back as 1999 still accounted for a significant amount of exploits.

Looking at 2017, two of the most notable hacks could have been prevented with an effective patching process:

  • The WannaCry ransomware campaign wreaked worldwide chaos, causing more than $8 billion in losses across more than 100 countries. The patch for the vulnerability exploited by WannaCry was available 59 days before the attack.
  • Equifax exposed the data of 143 million people, resulting in an estimated $600 million loss of shareholder value, lost business, remediation costs, and fines, not to mention immeasurable brand value and customer trust. In mid-May Equifax confirmed that attackers gained access to its system through a Apache Struts web-application vulnerability that had a patch available in March.

What keeps a company from promptly patching? Often it’s a combination of prioritization coupled with the difficulty effectively distributing patches across the enterprise. But make no mistake; patching is often the only thing keeping your company secure. The more you can keep your patches up to date, the more likely you’ll be protected against the next WannaCry and less likely you’ll become the next Equifax.

READY TO ACCELERATE PATCH DEPLOYMENTS?

Keep up with Windows as a Service without sacrificing your network.

Related Blog Posts

The State of Software Distribution 2018

  Over the last five years, we have seen cyberattacks hit some of the world’s largest organizations. From data breaches at Verifone, TalkTalk and Docusign, to ransomware attacks on FedEx, Honda and the UK’s National Health Service; it’s becoming increasingly clear…

read more

Page 1 of 1512 3 4 5 10 Last »

The post How To Prevent The Next Big Data Breach With Software Patching appeared first on Kollective Technology .

To view our Partner blog, click here

Are Your Software Patches Keeping Up With Your SLAs?

CMMA Blog

If you’ve seen the headlines in the last year, then you know that unpatched software is responsible for some of the most damaging cyberattacks companies face.

In fact, according to a recent study by ServiceNow , nearly 60% of organizations that suffered a data breach in the last two years were attacked via a vulnerability for which they hadn’t deployed a patch for yet.

It gets worse: 34% also said they knew their systems were vulnerable prior to the attack. That’s the equivalent of receiving a police bulletin that known burglars were spotted in your neighborhood, yet leaving your front door unlocked anyway.

This reflects a major misconception when it comes to patching. The popular view is that a vulnerability is discovered, and then there’s a race between hackers to weaponize it and software companies to patch it. Once it’s patched, the race is over.

However, in reality that’s when the race truly begins. A patch only works when it’s installed, not just available. In a report by Flexera , they found that 86% of all vulnerabilities in 2017 had a patch available on the day of disclosure. While deploying a patch the same day it’s available seems like it should be the standard operating procedure, in reality it can take weeks, months or sometimes even years to deploy a patch.

What’s the hold up?

A manual patch deployment process plays a large role. According to the ServiceNow study, 12 days are lost just in coordinating across teams for every vulnerability they patch. Reasons for this include:

1. Having no common view of assets and applications across security and IT (73%)

2. Things slipping through the cracks because emails and spreadsheets are used to manage the patching process (57%)

3. No easy way to track if vulnerabilities are being patched in a timely manner (62%)

 

Given these statistics, it’s hard to believe that some or even many companies are meeting their security level agreements (SLA). An SLA is commonly used to get in writing the security requirements and expectations for either an outsourced vendor or internal resource like the IT department. This includes scanning for vulnerabilities, code quality control and patching.

When it comes to patching, an SLA usually covers patching standards for things like:

Velocity

Partners expect patches quickly so data doesn’t get compromised when it could have been easily prevented.

R

Totality

Just one device can lose massive amounts of data. An SLA will often state that 100% of devices must be patched within a certain period after patch release.

Reporting

It’s not enough to patch everything quickly. It must be verified with agreed-upon reporting standards.

Given the prominence preventable data breaches have been given in the news thanks to the Equifax breach and the WannaCry attack , SLAs are being more strongly enforced or rewritten to make patching a priority. That means a data breach won’t only mean a loss of data; it will also mean a breach of contract and all the fines, penalties and litigation that can go along with it.

There’s no standard for SLA targets; depending on the severity of the vulnerability it can range from hours to sometimes months or even years. However, we can be sure these policies will be given a close look to determine if they’re timely enough.

If they’re not, or even if they are, do you or your vendors have the tools in place to achieve them? The answer might determine if it’s your company’s name that makes it in the next headline.

READY TO ACCELERATE PATCH DEPLOYMENTS?

Keep up with Windows as a Service without sacrificing your network.

Related Blog Posts

The State of Software Distribution 2018

  Over the last five years, we have seen cyberattacks hit some of the world’s largest organizations. From data breaches at Verifone, TalkTalk and Docusign, to ransomware attacks on FedEx, Honda and the UK’s National Health Service; it’s becoming increasingly clear…

read more

Page 1 of 1512 3 4 5 10 Last »

The post Are Your Software Patches Keeping Up With Your SLAs? appeared first on Kollective Technology .

To view our Partner blog, click here