veritas-article-backup-plan-1

4 Steps to Create Your Backup Plan

Most of us want to store and protect our data. This goes for our website, our pictures, our Word documents, the data on our phones, movies, videos, etc. Nobody wants to lose their data, but without a solid backup plan, and adhering to that plan, you could be left saying what happened to my data? So, what stands in the way of ensuring you a.) have a backup, and b.) you are backing up the data you want on the schedule you want? Mostly time and laziness. But with the right plan, you can create your own time-saving, accurate yet mindless backup system. Here are some tips.

Backup Plan Overview

As Christine Dorffi from Seagate said about backups, “a backup system should offer ease, security, and flexibility. If it’s not easy to set up and use, you’re not likely to do it. If it doesn’t offer file access and recovery security, it’s not really a backup. And it has to have the right options to work for your needs, such as to back up only files that have changed since the last backup.”

So right, we get that it needs to be easy. But we also need to make it simple to audit, and test restoration too. For example, here at AIT, we have a very complex, but well directed backup schedule for our customers who expect backups and who we have a responsibility to restore backups in the event of inoperability of their current services. While the backup itself is very complex, involving thousands of devices and multiple terabytes of data, it is easily displayed in a web interface for our team to review for errors, and updates that need to be run in order to meet our data retention policy. Now, that doesn’t mean you need to run out and build a web application to manage your backups. But what it does mean is that you have to have a plan, organize your data, and then ensure any new area is setup to use the backup system you’ve created.

Step 1: Organizing Your Files

If you haven’t already done so, invest some time to collect and organize your important files into well-named directories. You’ll want to jot all of the important areas that you need to run a backup on a piece of paper or Word document. Here are just a few to get the mind working.

  • Website HTML and images
  • Website Database
  • Applications on your website
  • Local PC
  • Test environment(s)
  • Videos
  • Music
  • Pictures
  • Movies

Once you have a list of everything you want to backup, and know where it is, ensure you have enough disk space to support 1, 2 or even 3 different backups of that data.

Step 2: Determine Backup Schedule

Next, determine how often you want to have backups for each data set. For example, if your website has a database that is updated, changed and added to frequently, then you will most likely want backups of this data set more frequently. But for other areas of your backups, such as your website HTML files, you may not need to back them up more frequently than once or twice a month because they may not change very often. Obviously, this completely depends upon your own needs.

After determining the frequency at which you need to backup each data set, consider how long you will keep that data. For example, if you have a MySQL database that is updated very frequently, and you backup this database daily, keeping backups older than a month or so will probably be a waste of disk space. Most backup solutions offer a series of retention schedules, such as keeping hourly and daily backups for a week, weekly backups for a month, and monthly backups for a few months or even years. Best practices include retaining certain backups, such as monthly or bi-annual, for as long as possible, if not forever. Putting these on media which can be archived in a safe deposit box isn’t a bad idea either. In addition, we highly recommend researching your industry’s data retention standards and requirements.

Step 3: Determine Backup Location

While some people like to use remote storage, or “cloud” storage, others like the good old fashion USB devices, or local NAS connected to their PC/Mac. Regardless, you need disk space that is easy to use, and access. AIT does offer OwnCloud (an open source free alternative to DropBox) as an option on our servers, which acts as a file storage location. You can tie many different systems, including your website, laptop, PC, phone, and other devices to the OwnCloud installation and backup your data here. Also remember backing up your data and storing it on the same disk as your original data is obviously not a good idea. Getting your data off of that device will remain viable even if your main server/workstation is compromised, allowing you to fully recover your data.

If you decide to use cloud services, be sure that you are getting the best possible price on storage. AIT also provides cloud and dedicated server storage for backups. We will also work with you and help achieve your backup plans as needed when you are backing up to our servers.

Step 4: Execute Your Backup Strategy

Prevent loss of your critical data by ensuring backups are taken frequently and on a regular schedule. Determining how often your data is updated can help you create a schedule of how frequently your backups need to be taken. Critical data that is updated constantly will need to be backed up more regularly – even hourly, whereas more static data may only need nightly or weekly backups.

Also remember that encrypting your backup files plays a key role in the back up plan. It is an important step in data security. Backup encryption during storage ensures that your data will be exactly what you expect in the event you need to recover it.

Once you’ve executed your backup, look for ways to stack or layer your backups where you can backup to two separate locations at different intervals. This adds one more layer of protection to your backup plan in the event of a major disaster.

autodesk-realistic-game

Making realistic game characters: rigging and body deformation

Designing compelling 3D characters for your video game is one thing; making sure they look and behave realistically is another. From leveraging motion capture data and retargeting animation with Maya, to choosing an A-pose over a T-pose during development, Santa Monica Studio went the extra mile to ensure that their characters look, feel, and act real. Here are a few best practices from a GDC 2019 presentation by the studio’s Lead Character Technical Artist, Axel Grossman, for making realistic game characters.

Producing animation with mocap

Use motion capture

Image courtesy of Santa Monica Studio

In getting your characters ready for battle, nothing beats motion capture instead of hand-keying movements. In the case of God of War, MotionBuilder was used for its speed and ability to use real-time camera work. A transfer-rig matching Maya’s coordinates was utilized, allowing for objects baked in MotionBuilder to be imported directly onto nodes in Maya, allowing for scenes to be built in MotionBuilder.

Make use of animation retargeting

Image courtesy of Santa Monica Studio

Animating character cycles one by one? Ain’t nobody got time for that! One tool you can take advantage of to speed up this process is an animation retargeter, which allows you to swap out characters and maintain the same animation cycle.

Striking a realistic pose

Using Pose Space Deformation (PSD) and Radial Basis Functions (RBF)

For your character to feel real, they need to act out the part in each of their movements. Simply choosing an A-pose over a T-pose can have an impact on how realistic your character’s movements are, with A-poses making for a more natural appearance and proper shoulder height. Pose Space Deformation (PSD nodes) uses Radial Basis Functions (RBF) to ensure that poses are properly blended from movement to movement.

Image courtesy of Santa Monica Studio

For the making of God of War at Santa Monica Studios, PSD was used primarily for muscle corrections for Kratos and Baldur, facial fixups and corrections. RBF, on the other hand, is about correcting poses, moving joints around. In the case of God of War, it was used for armor deformation on Kratos and other heavily armored characters, such as The Traveler, some props and environment rigging, and Freya’s hair.

Rigging and body deformation

Remember driver coverage

When it comes to making sure that props and objects in your environment act according to your character’s movements, you’ll want to keep driver coverage in mind. Drivers are basically our way of representing the field on which the poses play. Without proper driver coverage, you can fall out of your pose space and get pops and visual glitches. Using a ROM (range of movement), you can determine all the spaces where something can move.

Image courtesy of Santa Monica Studio

Without proper driver coverage, you risk running into problem areas on your characters.

Build dependencies for body deformation

You’ll want a system or hierarchy in place for body deformation so that all your world space matrices allow for your character to easily call up their poses. This might involve deforming by clavicle first, then humerus, then clavicle and humerus together.

Image courtesy of Santa Monica Studio

Traditional skeletal hierarchies combined with linear skinning lose volume. When it comes to body deformation, keeping your character in its pose space becomes an increasingly greater challenge. Linear skinning can cause things like a peck or deltoid popping out and becoming fat and round when it should be thinning out during a movement of the clavicle.

Image courtesy of Santa Monica Studio

Focus on areas most visible to the camera

When rigging your character, you’ll want to pay extra attention to areas that undergo a high degree of rotation, for example, twisting along bone axes such as the shoulder (where you can get the candy-wrapper effect) and other areas most visible to the camera, like the neck.

competitive_edge_advantage

Small and Midsize Companies Find Their Edge with Advanced Analytics

Small and midsize companies are constantly under pressure to differentiate themselves in a highly disruptive environment. Every rival—from one-man startups to large conglomerates—can rewrite the competition playbook forever with one new business model, one breakthrough offering, or one creative process. It doesn’t matter if the industry is mature; the company must create and exploit value immediately to squeeze out every last drop of value from operational efficiency, data-driven insights, and revenue growth.

Small and midsize companies are well-known for pivoting and changing direction with a speed and tenacity that’s difficult for even a multi-million-dollar enterprise with unlimited resources to duplicate. However, this quality leads to significant advantages only when coupled with outcome-oriented, real-time insights made possible by the latest analytics technology.

In the IDC Analyst Connection whitepaper “Analytics for SMBs: Sharpen Operations, Capitalize on Business Opportunities,” sponsored by SAP, Ray Boggs, vice president of small and medium business research at IDC, acknowledged that “business analytics and business intelligence can inform almost every aspect of a growing company’s operations.”

Prime Future Success with Data and Advanced Analytics

Whether its classic performance measurement and financial scrutiny; regular sales, costs, and profit reporting; or HR and workforce measurement, analytics can help identify areas for greater efficiency, untapped revenue generation, process improvement, and employee training. Essentially, businesses have no choice but to add advanced analytics to their digital repertoire. If we take a moment to think about the big brands that have disappeared in recent years, it is clear that their demise was the result of limited or delayed insight on the evolution of customer behavior and market dynamics.

Everything that a small and midsize company does is centered on the customer. For this reason, advanced analytics is a great fit when it comes to dissecting and truly understanding customer needs and shopping patterns with a swift, in-the-moment experience. More important, as most successful companies have shown, the business model must also leverage that information to add value to the customer experience through, for instance, micro-personalized recommendations, content, and campaigns.

A prime example is Snow Peak, an outdoor gear retailer that has grown from a single store in the mountains of Japan to a multinational enterprise with over 100 stores. The company attributes its growth to its commitment to understanding customers and offering products that closely meet their needs. However, Snow Peak realized that its use of Microsoft Excel, an outdated enterprise resource planning (ERP) system, and handwritten notes were not effective ways to share customer tastes, preferences, and buying histories with other salespeople and event planners. For example, staff may identify the right product for a customer—only to later find that the item is out of stock and miss an opportunity to achieve a sale and make a customer happy.

By adopting predictive analytics in the cloud, Snow Peak centralized, unified, and controlled fragmented information about customers, inventories, and all other aspects of the business and made this data available to executives, salespeople, and other business users in real time. Furthermore, it optimized inventories by coupling supply and demand data and keeping it up to date.

Snow Peak’s decision to scale its customer experience with advanced analytics in the cloud is one of a variety of use cases that can greatly improve the performance of a small and midsize business.

Additional applications that are just as impactful—if not, more—include:

  • Real-time collaboration: Employees, suppliers, partners, and customers can collaborate together with access to in-the-moment, accurate data, which is a critical component of keeping everyone in the value chain engaged and informed
  • Operational optimization: Companies can balance profitability, quality, and cost control with on-the-fly what-if analysis and insight acceleration through machine learning
  • Extended supply chain: Predictive analytics and the Internet of Things provide supply chain operations with the information needed to respond to ever-evolving market expectations while maintaining profitable sales and operations, demand fulfillment, response and supply planning, and inventory optimization
  • Core business processes: Emerging analytics technology—including machine learning, artificial intelligence, and blockchain—can help create a well-skilled, productive workforce; free employees from repetitive, low-value tasks; optimize supplier negotiations; and speed accurate decision making and planning

Even though small and midsize companies have fewer employees, less cash flow, smaller inventory, and less diverse product lines than their larger counterparts, the ability to know everything about themselves and their customers brings an opportunity to stay one step ahead of the competition. But the data is only as good as the business’ ability to capture, process, analyze, communicate, and act on it in a timely, efficient way. By using advanced analytics, small and midsize companies can acquire the skills and mindset needed to turn decision-making processes and strategies into transformational, leading-edge innovation.

autodesk-3ds-max-header

What’s New in 3ds Max

See how 3ds Max has evolved since 2016!

3ds Max has provided you many updates over the years, and we will continue to deliver to you top quality updates, for better performance and improved workflows.

Click on the image below to get a glimpse at what we have been up to.

Bringing your ideas to life

Autodesk is committed to responding quickly to 3ds Max user feedback. That’s why this release includes many of which were submitted by the 3ds Max user community at 3dsmaxfeedback.autodesk.com.

sap-summer

Summer Fun: Data-Driven Guide to Navigating Your Summer

Summer is here and in full summer mode. Whether you’re on vacation or covering for someone on vacation, sit back, relax, and take a moment to see what this summer’s trends are and how they might be impacting your business.

Hot, Hot, Hot Data

Have you found yourself sitting on your porch exclaiming that this is the hottest summer ever?! You would be correct. According to Climate Central the planet has been gradually increasing year after year. In fact, “16 of the 17 hottest years on record have occurred this century,” reports Climate Central.org.

Get up to speed on your investments in sun umbrellas, swim suits, and pool supplies— the heat is here to stay. It is having an impact on consumer and summer trends that have been changing over the past years.

I Scream for Ice Cream

This heat is warming up markets. We all know the best way to cool down on a hot day is ice cream. It’s not only store sales that are impacted but, the sales of packaged ice cream rose 6.5% in the last year according to dairyfoods.com .

Ice cream isn’t the only industry tied to the sun that is increasing; Sun Care products are also on the rise. According to The Global Industry Analysts, Inc. the Sun Care Products industry is projected to reach $11.1 billion by 2020. Currently the largest market worldwide is Europe. The biggest upcoming markets are Asia Pacific, United States, and Latin America. Latin America has a projected sales growth of 10.2% through 2020.

These are just two industry examples of growing markets. It’s not just about the right market at the right time though, it’s also about how consumers are finding and buying.

Website Traffic Summer Blues?

While road traffic is getting increasingly worse every year (in congested cities it is growing by 15 minutes on the daily commute every year) your website traffic may be slowing down these summer months. With recent retail trends like the Retail Meltdown of 2017, there are a lot of opportunities to act upon with online shopping. More importantly, companies need to make sure they are capitalizing on their approach to mobile shopping. It will have a large impact on purchasing trends moving forward.

Not only are consumers online and mobile driven but also they are more informed. Be ready for customers who do all their prep work before larger purchases online as well as competitive shopping. Gone are the days where poor customer service can be swept under the rug with online reviews. There is increasing importance on product experts to provide product comparisons laid out for consumers.

Summer Job Money

Not all industries have a summer rain cloud over them. Overall consumer product purchases may be down but restaurants and travel are booming.

Hotel occupancy is booming. Domestic airlines have flown more passengers each year since 2010, and last year U.S. airlines set a record, with 823 million passengers. The rise of restaurants is even more dramatic. Since 2005, sales at “food services and drinking places” have grown twice as fast as all other retail spending. In 2016, for the first time ever, Americans spent more money in restaurants and bars than at grocery stores. according to The Atlantic.

We’ll see dramatic shifts moving forward in all industries, for some companies it will be sink or swim.

Planes, Trains, and Automobiles

On the other side of traffic gridlock issues, there is currently a booming tourism industry, making it important to know this year travel trends. There are seven that TrekkSoft points out for a successful tourism business: Millennials, Active & Adventure Trips, Female Solo Travel, Food Tourism, Responsible Tourism, Mobile Photography, and Business and Leisure Travel (“bleisure”).

Millennials are “officially the largest generation in history, beating out Baby Boomers.” They also have disposable income and love to travel. Expect them to share their opinions on travel online, and to do their travel research online.

Also, expect travel to be driven by how ‘Instagram worthy’ it is. Whether a destination is notable for its natural beauty or hotel beauty, expect popularity to grow through mobile pictures.

Happy summer, safe travels, and stay cool!

3ds-Max-2020

3ds Max 2020.1 Feature Updates

Autodesk 3ds Max 2020.1 is focused on enhancing your workflow by delivering you modernized tools such as keyboard shortcut management and detachable viewports. Plus, building upon our 2020 release chamfer modifier feedback, we have polished and provided an additional update to bring you a more predictable tool.

Detachable Viewports

Enhance your workspace experience by extending your viewports across various monitors.

Watch as 3ds Max team member Ken Larue takes you through the details:

Highlights:

  • Leverage multi-monitor set-up and float up to three additional viewport panels across multiple monitors
  • Each viewport panel can be separately configured

Updated default keyboard shortcuts and improved hotkey management

Easily customize, merge, and visualize shortcuts keys with a new hotkey system and hotkey editor tool.

Watch as 3ds Max team member Brent Scannell takes you through the details:

Highlights:

  • New Hotkey Editor tool replaces the Keyboard tab in the Customize User Interface dialog
  • Search for action by keywords or by current hotkey assignments
  • Clear current assignments and conflicts with undo history
  • Filter actions by current customization status, and by groups
  • Migrate legacy keyboard shortcut files without missing out on updates to the defaults
  • User hotkey settings are saved separately from defaults in a dedicated and accessible User Settings folder
  • Configuration selector allows easy and quick switching between hotkey sets

Chamfer modifier improvement

Building upon our 2020 Update users’ feedback, receive even more efficient and predictable modeling options.

Watch as 3ds Max team member Martin Coven takes you through the details:

Highlights:

  • By Weight chamfer type provides absolute weight on an edge, altering the shape of the mitered corners
  • Scale spinner globally multiplies the Weight values in the scale amount
  • Crease Weight averages between connecting edges provide a varying width over a span of edges
  • Depth Weighting allows control on a per-edge basis
  • Depth Type combobox features Fixed and By Weight which hides the modifiers spinner and fetches per-edge depth values from the mesh channel.
  • Depth spinner has been added to Edit/able Poly in the Edit Edges Rollout under Crease and Ribbon in the Edge Panel.
  • Radius Bias will alter shape of the chamfer in areas where there are acute corners, making them more uniform.
  • Spinner blends the chamfer size to the radius amount to handle sharp corners.

Additional Improvements

New Double-click selection allows you to be efficient and faster while modeling.

– Support added for EditablePoly, EditPoly modifier, EditableSpline and EditSpline modifier.​​

– Works with Unwrap UVW in both UV Editor and 3d viewports.​

– Includes modifier hotkeys to add selection or subtract selection and works in Maya Interaction mode​

– Objects to select all contiguous faces, verts, segments, etc.

Command Panel Improvements allow you to switch between different Edit Poly modes 70% faster

– Autocomplete for MAXScript is on by default in the MAXScript editor and works out-of-the-box.

– The new generateAPIList <stringstream> MAXScript API makes it easier to enable
autocomplete for MAXScript in 3rd party editors.

analytic-trends-2019

Top 10 Analytics Trends for 2019

2019 is the year that analytics technology starts delivering what users have been dreaming about for over forty years — easy, natural access to reliable business information.

1. Machine learning everywhere. We’ve reached the third great wave of analytics, after semantic-layer business intelligence platforms in the 90s and data discovery in the 2000s. Augmented analytics platforms based on cloud technology and machine learning are breaking down the longest-standing barriers to analytics success. They bring insights to users rather than forcing users to unearth elusive trends, and provide more intuitive interfaces that make it easier to get the data people need to do their jobs.

2. Embedded analytics accelerates. The historical line between operational applications and analytics continues to blur. Thanks to advances in machine learning, prescriptive “intelligent applications” have become a reality. These data-driven, self-learning business processes improve automatically over time and as people use them.

3. Cloud analytics adoption skyrockets. Cloud brings agility and faster innovation to analytics. As business applications move to the cloud, and external data becomes more important, cloud analytics becomes a natural part of enterprise architectures.

The advantages are particularly important for smaller organizations: the cloud offers affordable, on-demand access to analytical and data processing power that was previously reserved for much larger organizations with dedicated analytics teams.

However, some data will never move to the cloud — a nuanced approach is required, leveraging existing analytics investments while moving to hybrid on-premise / cloud analytics architectures.

4. Better user experience drives greater adoption. Advances in speech and text recognition mean users can finally ask business questions using everyday language. AI-assisted data discovery can automatically mine data for insights and propose appropriate views of what’s new, exceptional, or different.

Chat bots and personal assistants provide seamless access to the basic numbers used to run the business. And using real-time systems as a foundation, managers finally get dashboards with all the information they need to run every aspect of the business, in real time, at their fingertips.

5. Compliance drives true data platform adoption, supported by more flexible data management. As it has been for the last forty years, data collection, preparation, and standardization remain the most challenging aspects of analytics. The rise of compliance and privacy concerns are driving the adoption of more standardized approaches — for example, reducing the attractiveness of data discovery architectures that extract and manipulate data separately from core systems.

Real-time processing, data catalogues and new “data orchestration” systems allow organizations to retain a coherent view of data across the organization without having to physically store it in a single place.

6. Data literacy will continue to be a big problem. The biggest barrier to analytics success has never been technology. Giving somebody the best pencil in the world will not make them Picasso.

Analytics culture, skills, and organization continue to be the biggest barriers to turning information into lower costs or increased profits. Organizations must invest as much time and money in analytic skills and incentives as they do in technology.

7. There will be an increasing number of AI fails. Like any powerful technology, AI brings new dangers. Algorithms are sociopaths: they have no knowledge of what they are doing. AI brings amazing opportunities for improved productivity and augmented human intelligence. But it magnifies any existing problems with data quality and data bias and poses unprecedented challenges to privacy and ethics.

Comprehensive governance and data transparency policies are essential. Sadly, things will probably get worse before they get better — organizations must implement ethics processes, councils and external advisors before high-profile disasters hit the headlines.

8. End-to-end decision-making platforms emerge. Analytics has traditionally only paid attention to a small part of the end-to-end “data journey.” Information and insight is useless unless something actually changes in the business.

More holistic, end-to-end approaches to analytics are emerging, not only because of the combination of operations with analytics, but also with more proactive and seamless approaches to converting user analysis into concrete actions. This depends fundamentally on human judgement, consensus, and creativity, but it must be supported by better integration between analytics, traditional business planning activities, and social collaboration platforms.

9. AI and machine learning makes analytics more human. More powerful augmented analytics will eliminate a lot of the work around collecting and processing data, and identifying areas for further investigation. But ultimately people are the most important “technology” required to turn data into business improvement.

In an era where basic decisions can be increasingly automated, more strategic choices rely on uniquely human skills such as creativity, understanding of context, and leadership.

10. New experience analytics. Understanding and optimizing the customer experience is the bedrock of successful digital transformation. Traditional analytics focused on structured data flowing from operational systems. Newer analytic platforms have blended more unstructured data such as text, images, and raw sensor readings into analytic workflows.

The next step is to expand analytics to both operational data and “experience data” — the unique, subjective experiences of individuals as they interact with products, brands, and internal business processes.

Looking forward to 2020 and beyond. With ever-more devices capturing more nuanced data, with technology capabilities accelerating, and powerful machine learning still in its infancy, analytics is poised for a new golden age.

mcafee cloud workload security

McAfee Cloud Workload Security

As corporate data centers evolve, more workloads are migrated to cloud environments every day. Most organizations have a hybrid environment with a mixture of on-premises and cloud workloads, including containers, which are constantly in flux. This introduces a security challenge as cloud environments (private and public) require new approaches and tools for protection. Organizations need central visibility of all cloud workloads with complete defense against the risk of misconfiguration, malware, and data breaches.

McAfee® Cloud Workload Security (McAfee® CWS) automates the discovery and defense of elastic workloads and containers to eliminate blind spots, deliver advanced threat defense, and simplify multicloud management. McAfee provides protection that makes it possible for a single, automated policy to effectively secure your workloads as they transition through your virtual private, public, and multicloud environments, enabling operational excellence for your cybersecurity teams.

Modern Workload Security: Use Cases

Automated discovery

Unmanaged workload instances and Docker containers create gaps in security management and can give attackers the foothold they need to infiltrate your organization. McAfee CWS discovers elastic workload instances and Docker containers across Amazon Web Services (AWS), Microsoft Azure, OpenStack, and VMware environments. It also continuously monitors for new instances. You gain a centralized and complete view across environments and eliminate operational and security blind spots that lead to risk exposure.

Gaining insights into network traffic

By utilizing native network traffic provided from the cloud workloads, McAfee CWS is able to augment and apply intelligence from McAfee® Global Threat Intelligence (McAfee® GTI) data feeds. The enriched information is able to display properties such as risk score, geo-location, and other important network information. This information can be used to create automated remediation actions to protect workloads.

Integration into deployment frameworks

McAfee CWS creates deployment scripts to allow the automatic deployment and management of the McAfee® agent to cloud workloads. These scripts allow integration into tools such as Chef, Puppet, and other DevOps frameworks for deployment of the McAfee agent to workloads running by cloud providers, such as AWS and Microsoft Azure.

Consolidate events

McAfee CWS allows organizations to use a single interface to manage numerous countermeasure technologies for both on-premises and cloud environments. This also includes integration into additional technologies, like AWS GuardDuty, McAfee® Policy Auditor, and McAfee® Network Security Platform.

  • Administrators can leverage the continuous monitoring and unauthorized behaviors identified by AWS GuardDuty, providing yet another level of threat visibility. This integration allows McAfee CWS customers to view GuardDuty events, which include network connections, port probes, and DNS requests for EC2 instances, directly within the McAfee CWS console.
  • McAfee Policy Auditor performs agent-based checks against known or user-defined configuration audits for compliance such as Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry Data Security Standard (PCI-DSS), Center for Internet Security Benchmark (CIS Benchmark), or other industry standards. McAfee CWS reports any failed audits for instant visibility into misconfiguration for workloads in the cloud.
  • McAfee Network Security Platform is another cloud security platform that performs network inspection for traffic in hybrid as well as AWS and Microsoft Azure environments. It performs deeper packet-level inspections against network traffic, and it reports any discrepancies or alerts through McAfee CWS. This provides single-pane visibility against multicloud environments for remediation.

Enforcement of network security group policies

McAfee CWS permits users and administrators to create baseline security group policies and audit the policies that are running on the workloads against these baselines. Any deviations or changes from the baseline can create an alert in the McAfee CWS console for remediation. Administrators also can manually configure native network security groups from McAfee CWS, which enables them to directly control cloud-native security group policies.

What Sets McAfee Cloud Workload Security Apart: Key Features
and Technologies

Cloud-native build support

Using McAfee CWS, customers can consolidate management of multiple public and private clouds in a single management console, including AWS EC2, Microsoft Azure Virtual Machines, OpenStack, and VMware Vcenter. McAfee CWS can import and allow customers to run in the cloud with new cloud-native build support for Amazon Elastic Container Service for Kubernetes (Amazon EKS) and Microsoft Azure Kubernetes Service (AKS).

Simple, centralized management

A single console provides consistent security policy and centralized management in multicloud environments across servers, virtual servers, and cloud workloads. Administrators can also create multiple role-based permissions in McAfee® ePolicy Orchestrator® (McAfee ePO™) software, enabling them to define user roles more specifically and appropriately.

Network visualization with microsegmentation

Cloud-native network visualization, prioritized risk alerting, and micro-segmentation capabilities deliver awareness and control to prevent lateral attack progression within virtualized environments and from external malicious sources. Single-click shutdown or quarantine capability help alleviate the potential for configuration errors and increases the efficiency of remediation.

Superior virtualization security

McAfee CWS suite protects your private cloud virtual machines from malware using McAfee® Management for Optimized Virtual Environments AntiVirus (McAfee® MOVE AntiVirus). And it does this without straining underlying resources or requiring additional operating costs. McAfee MOVE AntiVirus allows organizations to offload security to dedicated virtual machines for optimized scanning of their virtualized environment.

Users gain anti-malware protection via McAfee® Endpoint Security for Servers. This solution can intelligently schedule resource-intensive tasks, such as on-demand scanning, to avoid impact to critical business processes.

Tag and automate workload security

Assign the right policies to all workloads automatically with the ability to import AWS and Microsoft Azure tag information into McAfee ePO software and assign policies based on those tags. Existing AWS and Microsoft
Azure tags synchronize with McAfee ePO software tags so they’re automatically managed.

Auto-remediation

The user defines McAfee ePO software policies. If McAfee CWS finds a system that is not protected by the McAfee ePO software security policies, and it is found to contain a malware or virus, this system will automatically be quarantined.

Adaptive threat protection

McAfee CWS integrates comprehensive countermeasures, including machine learning, application containment, virtual machine-optimized anti-malware, whitelisting, file integrity monitoring, and micro-segmentation that protect your workloads from threats like ransomware and targeted attacks. McAfee® Advanced Threat Protection defeats sophisticated attacks that have never been encountered before
by applying machine learning techniques to convict malicious payloads based on their code attributes and behavior.

Application control

Application whitelisting prevents both known and unknown attacks by allowing only trusted applications to run while blocking any unauthorized payloads. McAfee® Application Control provides dynamic protection based on local and global threat intelligence, as well as the ability to keep systems up to date, without disabling security features.

File integrity monitoring (FIM)

McAfee® File Integrity Monitoring continuously monitors to ensure your system files and directories have not been compromised by malware, hackers, or malicious insiders. Comprehensive audit details provide information about how files on server workloads are changing and alert you to the presence of an active attack.

What Sets McAfee Cloud Workload Security Apart: Key Features
and Technologies

McAfee CWS ensures that you maintain the highest quality of security while taking advantage of the cloud. It covers multiple protection technologies, simplifies security management, and prevents cyberthreats from impacting your business—so you can focus on growing it. Below is a feature comparison of the available package options.

mcafee five ways to rethink your endpoint protection strategy

Five Ways to Rethink Your Endpoint Protection Strategy

Device security is no longer about traditional antivirus versus next-generation endpoint protection. The truth is you need a layered and integrated defense that protects your entire digital terrain and all types of devices—traditional and nontraditional. ESG Senior Principal Analyst Jon Oltsik frames it this way: “… endpoint security should no longer be defined as antivirus software. No disrespect to tried-and-true AV, but endpoint security now spans a continuum that includes advanced prevention technologies, endpoint security controls, and advanced detection/response tools.”

In today’s survival of the fitte st landscape , he re are five ways to not just survive , but thrive:

1. More tools do not make for a better defense.

Scrambling to adapt to the evolving landscape, many security teams have resorted to bolting on the latest “best-of-breed” point solutions. While each solution may bring a new capability to the table, it’s important to look at your overall ecosystem and how these different defenses work together.

There are serious shortfalls in deploying disparate, multivendor endpoint security technologies that don’t collaborate with each other. Because point solutions have limited visibility and see only what they can see, the burden of connecting the dots falls on you. Adversaries are quick to take advantage of the windows of opportunity these manual processes create, evading defenses or slipping through the cracks unnoticed.

2. It’s not about any one type of countermeasure.

As a never-ending array of “next-generation” solutions started to emerge and flood the marketplace, you were likely told more than once that antivirus isn’t enough and what you need to do is switch to next-gen. In reality, it’s not about achieving a next-generation approach or finding the best use for antivirus. It’s really about implementing a holistic device security strategy that connects and coordinates an array of defenses. This includes signature-based defense (which eliminates 50% of the attack noise—allowing algorithmic approaches to run more aggressively with less false alarms), plus exploit protection, reputations, machine learning, ongoing behavioral analytics, and roll-back remediation to reverse the effects of ransomware and other threats.

Each device type has its own security needs and capabilities. You need to be able to augment built-in device security with the right combination of advanced protection technologies. The key to being resilient is to deliver inclusive, intelligently layered countermeasures— and antivirus is a tool that has its place in with benefits and limitations just like all countermeasures do in this unified, layered approach to device security.

3. All devices are not created equal.

Today, “endpoint” has taken on a whole new meaning. The term now encompasses traditional servers, PCs, laptops mobile devices (both BYOD and corporate- issued), cloud environments, and IoT devices like printers, scanners, point-of-sale handhelds, and even wearables.

Adversaries don’t just target one type of device—they launch organized campaigns across your entire environment to establish a foothold and then move laterally. It’s important to harness the defenses built into modern devices while extending their overall posture with advanced capabilities. Some endpoints, like Internet of Things (IoT) devices, lack built-in protection and will need a full-stack defense. Ultimately, the goal is to not duplicate anything and not leave anything exposed.

4. All you need is a single management console.

If you’ve been deploying bolted-on endpoint security technologies or several new, next-generation solutions, you may be seeing that each solution typically comes with its own management console. Learning and juggling multiple consoles can overtax your already stretched- thin security team and make them less effective, as they are unable to see your entire environment and the security posture of all your devices in one place. But it doesn’t have to be this way. Practitioners can more quickly glean the insights they need to act when they can view all the policies, alerts, and raw data from a centralized, single-pane-of-glass console.

5. Mobile devices are among the most vulnerable.

Mobile devices are an easy target for attackers and provide a doorway to corporate networks. We’re seeing more app-based attacks, targeted network-based attacks, and direct device attacks that take advantage of low-level footholds. For this reason, it’s essential to include mobile devices in your security strategy and protect them as you would any other endpoint.

 

veeam-data-protection-for-sharepoint-2

Veeam Data Protection for Sharepoint

Microsoft Office 365 adoption is bigger than ever. When Veeam introduced Veeam Backup for Microsoft Office 365 in November 2016, it became an immense success and Veeam has continued building on top of that. When we released version 1.5 in 2017, we added automation and scalability improvements which became a tremendous success for service providers and larger deployments. Today, Veeam is announcing v2 which takes our solution to a completely new level by adding support for Microsoft SharePoint and Microsoft OneDrive for Business. Download it right now!

Data protection for SharePoint

By adding support for SharePoint, Veeam extends its granular restore capabilities known from the Veeam Explorer for Microsoft SharePoint into Office 365. This allows you to restore individual items – documents, calendars, libraries and lists – as well as a complete SharePoint site when needed. With the new release, Veeam can also help you back up your data if you are still in the migration process and are still using Microsoft SharePoint on premises or running in a hybrid scenario.

Data protection for OneDrive for Business

The most requested feature was support for OneDrive for Business as more and more companies are using it to share files, folders and OneNote books internally. With Veeam Explorer for Microsoft OneDrive for Business, you can granularly restore any item available in your OneDrive folder (including Microsoft OneNote notebooks). You have the option to perform an in-place restore, restore to another OneDrive user or another folder in OneDrive, export files as an original or zip file, and if you get hit by a ransomware attack and your complete OneDrive folder gets encrypted Veeam can perform a full restore as well.

Enhancements

Besides the introduction of new platform support, there are also several enhancements added.

Major ease-of-use and backup flexibility improvements with a newly redesigned job wizard for easier and more flexible selection of Exchange Online, OneDrive for Business and SharePoint Online objects. Making it easier than ever to set-up, search and maintain visibility into your Office 365 data. Granularly search, scale and perform management of backup jobs for tens-of-thousands of Office 365 users!

Restore data located in Microsoft Teams! You can protect Microsoft Teams when the underlying storage of the Teams data is within SharePoint Online, Exchange Online or OneDrive for Business. While data can be protected and restored, the Teams tabs and channels cannot. After restoring the item, it can however be reattached manually.

Compare items with Veeam Explorer for Microsoft Exchange. It is now possible to perform a comparison on items with your production mailbox to see which properties are missing and only restore those without restoring the full file.

As with the 1.5 release, everything is also available for automation by either leveraging PowerShell or the Restful API which now fully supports OneDrive for Business and SharePoint.

Another enhancement is the possibility to change the GUI color as you like. This option made its way into Veeam Backup for Microsoft Office 365 after being introduced in Veeam Backup & Replication.

Starting with version 2, Veeam Backup for Microsoft Office 365 is now able to automatically check for updates, so you can rest assured you are always up to date.

And finally, the log collection wizard has been updated as it now allows you to collect logs for support in case you run into an issue, as well as configure extended logging for all components.

Source: https://www.veeam.com/blog/onedrive-sharepoint-backup.html