Skip to main content

AWS has a new way to secure remote working

Web Hosting & Remote IT Support

Amazon’s cloud division has announced the general availability of AWS Verified Access.

Verified Access was designed to tackle security issues related to working from home or locations outside of the fixed workplace, without having to install a VPN, and it’s a solution that promises to be much more customizable than the business VPN many of us may have used at some point to access our work’s servers.

The tool allows for granular control over access to different apps and services, and a number of third-party integrations have already been confirmed including Okta.

AWS Verified Access

AWS has also added a pair of new features which indicate its commitment to making Verified Access better over time.

Integration with AWS Web Application Firewall (WAF) means that customers can protect web applications by filtering out common exploits like SQL injection and cross-site scripting while continuing to maintain granular control over access.

Furthermore, the tool will allow you to pass signed identity context to your application endpoints, such as emails, usernames, and other attributes. The announcement explains the benefits:

“This enables you to personalize your application using this context, eliminating the need to re-authenticate the user for personalization. The signed context allows the application to verify cryptographically that Verified Access has authenticated the request.”

Having helped customers migrate during the preview stage, the company has given two common use cases that could apply to companies looking to transition. They include AWS Site-to-Site VPN and an Internet-facing corporate application.

The post also touches on a handful of key areas for consideration before migrating applications to AWS Verified Access, highlighting the fact that the transition might not be as black and white as some may hope.



via Hosting & Support

Comments

Popular posts from this blog

This new malware campaign can hijack your Gmail or Outlook email account

Web Hosting & Remote IT Support Cybersecurity researchers from Cisco Talos have spotted a new hacking campaign they claim is targeting victims’ sensitive data, login credentials, and email inboxes. Horabot is described as a botnet that has been active for almost two and a half years now (first spotted in November 2020). During that time, it’s mostly been tasked with distributing a banking trojan and spam malware .  Its operators seem to be located in Brazil, while its victims are Spanish-speaking users located mostly in Mexico, Uruguay, Venezuela Brazil, Panama, Argentina, and Guatemala. Horabot botnet The victims are found in different industries, from investment firms to wholesale distribution, from construction to engineering, and accounting. The attack starts with an email message carrying a malicious HTML attachment. Ultimately, the victim is urged to download a .RAR archive, which holds the banking trojan.  The malware is capable of doing plenty of things: stealing l

Want to store 1PB of data in the cloud? This startup can do it for you for as little as $10,000 a month — Qumulo says it can scale to Exabytes off premise and wants to eradicate tapes once and for all

Web Hosting & Remote IT Support Qumulo has launched Azure Native Qumulo Cold (ANQ Cold), which it claims is the first truly cloud-native, fully managed SaaS solution for storing and retrieving infrequently accessed “cold” file data. Fully POSIX-compliant and positioned as an on-premises alternative to tape storage, ANQ Cold can be used as a standalone file service, a backup target for any file store, including on-premises legacy scale-out NAS, and it can be integrated into a hybrid storage infrastructure, enabling access to remote data as if it were local. It can also scale to an exabyte-level file system in a single namespace. “ANQ Cold is an industry game changer for economically storing and retrieving cold file data,” said Ryan Farris, VP of Product at Qumulo. “To put this in perspective with a common use case, hospital IT administrators in charge of PACS archival data can use ANQ Cold for the long-term retention of DICOM images at a fraction of their current on-premises leg

No light without dark : making the most of ‘shadow IT’

Web Hosting & Remote IT Support In the last few decades, technology has created a modern digital workforce that is technically skilled and adept at finding innovative solutions that would help them succeed at work. However, with 95% of employees struggling with digital friction in the workplace - including a lack of access to the right tools - ambitious employees who are hungry for results have often needed to explore fixes outside the scope of existing systems provided by their employers. On top of that, the popularity of cloud-based apps has resulted in business processes often ending up fragmented across various systems, requiring workers to devote time to manual maintenance. This has accelerated the spread of (the unnecessarily ominous sounding) ‘shadow IT’, or applications that savvy workers use without official authorization to help them bypass limitations and get work done. In a perfect world, a balance can be struck between giving these technically skilled workers freed