Is Your Server Infrastructure Ready for the Zombie Apocalypse?

EMC logo


Has your server infrastructure been inoculated against a zombie-related doomsday attack? We’re not talking power-draining, idle zombie servers. Or VM zombies. Or even zombie computers. We’re talking putrefied, brain-eating, somnambulistic monsters. Yeah, that kind, the kind that inhabit Max Brook’s The Zombie Survival Guide.

train tracks lead into a tunnel overgrown with vegetation

We ask because the unconventional thinking needed to survive a zombie apocalypse might inspire how you prepare your server infrastructure for digital transformation. Zombies, it turns out, are an excellent metaphor for learning how to survive when disruption reigns, when old world rules no longer apply. “Be prepared or be zombie-food” conveys about the same message as “keep your business relevant so you can outpace your competition.”

First step in your preparation, learn what you are trying to survive. Just as the virus Brooks calls “Solanum” turns people into zombies, the three contagions described below can zombify your infrastructure – make it lifeless, apathetic and unresponsive. But don’t panic, we also provide several practical survival tips.

Infographic: Dell EMC PowerEdge Servers - Tested and Proven Battle-Ready

First contagion:  Inflexible infrastructure stack

Organizations understand business digitization brings huge opportunity. But most were not born “digital.”  They need to modernize and transform business processes, applications and the use of data in ways that were not originally envisioned when their server infrastructure was built. Two of the most commonly cited barriers slowing digital progress are “insufficient budget and resources” and “infrastructure that doesn’t work at speed of business.” Just like zombies “that don’t adapt and they don’t think[i],” legacy infrastructure can be rigid, slow and arduous.

Survival tip: Invest in scalable and adaptable technologies

To deal with and accelerate the pace for modernization, place more emphasis on your infrastructure’s scalability, flexibility and agility. Look for favorable economics to both remain competitive and fund innovation.

With the performance to drive today’s applications, Dell EMC 14th generation PowerEdge servers have scalability to grow seamlessly and to adapt quickly to address ever-evolving business and workload needs. The portfolio is enhanced to increase performance and response time, enable quick-and-easy deployment, and tailor the compute and storage configurations to your specific needs. And if you replace your 3+ year old servers[ii], the new servers will cost 59 percent less to operate over the next 3 years. Your IT infrastructure costs will be reduced by 61 percent. Making funding innovation possible.

Second contagion: Workforce, talent and skills shortage

IDC states that “by the end of 2019, 70 percent of companies engaged in data center transformation efforts will struggle to translate business needs into effective IT investments and operations plans.[iii]”  That is likely because they don’t have the right in-house skills needed to build and execute an effective transformation.[iv]  This is a challenge for many businesses but especially those with legacy server infrastructure. Teams responsible for IT infrastructure spend much more time on routine support and maintenance tasks, time that could be better used in innovation or supporting business expansion.

Survival tip:  Enhance operational efficiency and productivity

To reduce or even eliminate the time IT staff spend on routine support and maintenance tasks, streamline automation technologies, increase the use of scalable management and self-provisioning.

Intelligent management in PowerEdge servers puts you in control of IT lifecycle, ensures server availability, and frees IT staff from day-to-day upkeep.  (As stated in our touchstone The Zombie Survival Guide, “There may be times when it seems wasteful to send an entire team to do one person’s job.[v]”)   The technology embedded in PowerEdge servers along with Dell EMC OpenManage tools allows your servers to take care of themselves, automating deployment and on-going maintenance. The integrated Dell Remote Access Controller (iDRAC9) with Lifecycle Controller makes quick work of updates, monitoring and management with its integration with OpenManage Enterprise and other consoles like Microsoft System Center and VMware vCenter. ProSupport Plus and SupportAssist proactive predictive an automated support technology enables up to 90 percent faster resolution and reporting.

Third contagion: Security and cyber risks accelerating

Just as digital transformation is changing industries and creating opportunities it is also attracting a new class of malicious adversaries. For many IT professionals, security concerns – including cybercrime and espionage, and malware – are the top digital transformation challenges[vi]. The potential for system downtime, lost productivity, lost revenue, corrupted data and damaged corporate reputation are all reasons for the continuing and increasing concern. “Avoid ‘accidents’ waiting to happen.[vii]” Data center security is paramount to business success and the security of the underlying server infrastructure is critical.

Survival tip:  Build on a stable and secure server infrastructure

Secure through solutions that are built-in, not bolted on.  Shift from permission-based security to an intelligence-based risk management approach that makes securing more flexible and reduces the amount of risk.

For Dell EMC, security is the starting point, not an afterthought. The integrated cyber resilient architecture security features of PowerEdge servers are designed from the ground up in accordance with the Security Development Lifecycle (SDL), a robust methodology that is an integral part of our overall hardware and firmware design. The end-to-end security solution blocks malicious attacks through a hardware root of trust, immutable keys burned into silicon authenticates server boot and firmware. Other protections include system image lockdown, an industry-first feature that prevents configuration changes that create security vulnerabilities and expose sensitive data and secure default passwords. Reliable detection is critical to swift spotting of malicious activities. This includes configuration and firmware drift protection, persistent event logging and secure alerting if abnormal activity is detected. Further Dell EMC rapid recovery capabilities can, if necessary, restore critical operations back to a trusted base. These capabilities include automatic bios recovery and rapid OS recovery. In addition to prevent sensitive data from getting into malicious hands, Dell EMC secure system erase enables IT to securely and instantly wiped data using cryptographic techniques.

Don’t go it alone

We hope you use this survival guide to prevent the zombification of your server infrastructure. And as Brooks writes, “Working together, always together, has shown to be the only successful strategy for annihilating an undead army.[viii]” Dell EMC PowerEdge servers are here for you.


[i] Max Brooks, The Zombie Survival Guide, Complete Protection from the Living Dead (New York, NY, Broadway Books, 2003)

[ii] Matthew Marden and Ashish Nadkarni, “Accelerate Business Agility with Faster Server Refresh Cycles, #US42505917” (IDC, May 2017)

[iii] Cushing Anderson, “Digital Transformation:  The CIO’s Sills Imperative” (IDC Blog, February 2018)

[iv] Ibid

[v] Brooks, 130

[vi] HelpNetSecurity, “Security concerns remain a top challenge for digital transformation” (Retrieved from http://www.helpnetsecurity.com on 3/28/18)

[vii] Brooks, 86

[viii] Brooks, 125



ENCLOSURE:https://blog.dellemc.com/uploads/2018/04/antoine-beauvillain-760-unsplash.jpg

Update your feed preferences


   

   


   


   

submit to reddit
   

Related:

  • No Related Posts

A Growing Concern: Why the US Government is Worried About Botnets

If you’ve been paying attention to cybersecurity concerns, you might have an inkling as to why the United States Departments of Homeland Security and Commerce kicked off the year by issuing a draft report to President Trump on the importance of increasing resilience to botnets. If you haven’t been paying attention, you’re probably wondering why they even care.

The fact of the matter is that botnets and the DDoS attacks they’re behind have spent the last few years evolving from a threat to websites and businesses to a threat to entire nations. That draft report? Very necessary, and possibly even overdue.


The basics of a botnet

A botnet is a network of so-called zombie computers and other Internet-connected devices. These are devices that have been infected with malware that gives cybercriminals the ability to control them remotely. It used to be that botnets consisted largely of hijacked computers, but with the advent of the Internet of Things (IoT), it’s become infinitely easier to assemble botnets of previously unimaginable sizes. Some IoT botnets now consist of hundreds of thousands, even millions of compromised devices.

Distributed destruction

Botnets are most commonly used to launch distributed denial of service (DDoS) attacks. The basic DDoS meaning is an attack that uses a botnet to mobilize all those hijacked devices to propel a tremendous amount of malicious traffic at a target website or internet-connected service in the hopes of overwhelming the server or network to take that target offline, or at least render it unusable due to lag.

DDoS attacks have serious consequences, starting with hardware and software damage and escalating all the way to user frustration that can lead to an erosion of loyalty, and even data theft and other intrusions that can accompany these attacks. For bigger organizations, DDoS attacks can cost anywhere from $20,000 to $100,000 per hour.

Thanks to IoT botnets, distributed denial of service attacks are now bigger than ever, and when aimed at the right target, are capable of taking huge swaths of websites and services offline. The Mirai botnet attack on the Dyn DNS server was bad enough on its own, rendering Twitter, Netflix, Spotify, and other major services temporarily useless, but it’s even worse when taken as an indication of things to come.


Increasing capabilities

At the beginning of 2017, the dire DDoS warning issued was that there could very possibly be an internet-wide outage lasting at least 24 hours. That obviously did not come to pass, but it is still a threat and will remain a threat up until the moment it happens when it transcends threat status to become a reality. The chaos that would be caused by such an attack is hard to fathom. What it would do to financial markets alone would be devastating. An internet outage isn’t the only reason the United States government and other governments around the world need to start taking the botnet threat more seriously, however.

State-sponsored attacks have turned DDoS into a form of cyberwarfare, taking aim at critical infrastructure in enemy countries as well as health, financial and media services. This notably includes attacks on power grids in Ukraine as well as Latvia, Lithuania, and Estonia. It’s essential this point isn’t glossed over: distributed denial of service attacks have the ability to disrupt power grids, potentially cutting off electricity to significant portions of a country. On the east coast during a particularly brutal stretch of winter weather, for example, this could be deadly.

DDoS attacks have also been used to disrupt elections and other important votes, with both main candidates in the 2016 US election suffering DDoS attacks to their websites, and the Brexit voter registration website allegedly brought down prior to the referendum.


Creating a more secure internet

The next step after the draft report will be a two-day workshop at the end of February to discuss a way forward in this DDoS assault landscape. Following that, a final report will be issued to President Trump on May 11. How this administration proceeds will be up to the President and his advisors. Considering the seriousness of the botnet threat as well as the nation states known to dabble in cyberwarfare DDoS attacks (Russia, North Korea, and China, to name a few), it won’t come as a surprise if the United States begins building a cyber wall, of sorts, to protect federal networks and critical infrastructure.

More News to Read