Virtualization Featured Article

Bracket Computing Strengthens Solution in Light of DNC Attack

February 10, 2017

This past U.S. political election focused heavily on technology and security. With compromised e-mail servers, hacking attacks on the Democratic National Committee (DNC), and suspicion over Russian interference, it’s no wonder that Internet security is top of mind for tech companies around the country. That’s why it comes as no surprise that Bracket Computing just announced two significant new capabilities for its Bracket Computing Cell.

Bracket Computing was founded with the goal of empowering enterprise IT with a single set of security controls to stop the spread of malware, malicious insiders and mistakes without impacting the speed and agility of the self-service cloud. To do this, the company introduced its Bracket Computing Cell, which is a Full Workload Isolation solution for the modern hybrid data center. It combines net-new compute, storage and network controls that can't be turned off, even with root access. 

Now, the Bracket Computing Cell has received two new features. The first is a set of controls that ensure runtime integrity of data center servers; they work by making sure that critical parts of the operating system that should never be modified or stopped cannot be tampered with. The second new feature is an advanced forensics capability that captures NetFlow along with the memory of a running server in response to an event or a behavior that suggests a server has been compromised.

As a whole, the Bracket Computing Cell now offers the encryption of data at rest and in motion; network micro-segmentation; server and data integrity; and security operations, including detailed audit logs, network flow visualization and event-based forensics.

Jason Lango, co-founder and CTO of Bracket, described how the solution works by saying, “Our forensics are similar to a traffic camera at a stoplight…It will snap a picture of an attacker at the precise moment of the offense, and provide detailed information about the source of the attack.”

These new features, combined with the capabilities that were already available in the Bracket Computing Cell, ensure that advanced persistent threats, like the attack on the DNC, can be automatically detected and prevented. 

Edited by Stefania Viscusi

Article comments powered by Disqus

Click here to share your opinion - My network today is
moving to ...

Featured Blog Entries

Day 3 at Interop ITX 2017, the final day!!

We had an eventful week exhibiting at Interop ITX! After lots of great conversations, a well-attended presentation by our CEO M.H. Raza about "Automating the Physical Layer," and a wealth of different answers to our survey questions, it's time to travel home to Connecticut. First, though, here's a roundup of day 3!

Day 2 at Interop ITX 2017, top of the stretch!

The middle and longest day was filled with:

Fiber Mountain sponsored an Interop ITX Theater presentation on Wednesday 5/17 delivered by M.H. Raza, Fiber Mountain CEO, entitled, "Automating the Physical Layer". The audience was standing room only and several attendees came to our booth immediately after the presentation and learned more about the Glass Core.

...and We're off, at Interop ITX 2017!

We are back in Las Vegas, this time at Interop ITX 2017, the rejuvenated version of Interop. As I have written in the past, Interop has a long history back to the mid-1980's and has reinvented itself many times. Interop ITX 2017 is the newest edition, with only paid attendees and no more free passes to the expo floor. UBM, the owner of Interop, intends to increase the quality of attendees, sessions and leads for exhibitors and sponsors.

Industry News