by community-syndication | Jan 21, 2014 | BizTalk Community Blogs via Syndication
Exciting news Version 1.7.0.0 of BizTalk Mapper Extensions UtilityPack for BizTalk Server 2013 is now available! But before talking about the change-log of this version there is another subject that I want to talk first This project as a new member that was responsible for all the new functionalities available in this version, my friend […]
Blog Post by: Sandro Pereira
by community-syndication | Jan 21, 2014 | BizTalk Community Blogs via Syndication
I’ve seen some problems during configuration of BizTalk 2013, specially when I’m running in on all new hardware. BizTalk 2013, and Windows Server 2012. One of the usual show stoppers is the missing MSCVCP100.dll. This file is a part of the Microsoft Visual C++ 2010 Redistributable Package. Basically this error message indicates that you are […]
Blog Post by: Tord Glad Nordahl
by community-syndication | Jan 20, 2014 | BizTalk Community Blogs via Syndication
If you follow my blog or already saw one of my presentations in BizTalk innovation Days events about BizTalk Mapper Patterns and Best Practices, you already notice that I avoid using Custom XSLT files for solving a mapping problem. I only recommend using custom XSLT files: If you are dealing with huge message and High […]
Blog Post by: Sandro Pereira
by community-syndication | Jan 19, 2014 | BizTalk Community Blogs via Syndication
The second white paper I initial wrote for a client who wished to try BizTalk360 tool, then I converted to this document that was reviewed by Saravana Kumar and its team. Installing and Configuring BizTalk360 on Windows Server 2012 / BizTalk Server 2013 (user guide) You can download the BizTalk360 installation package here: http://www.biztalk360.com/content/download. A […]
Blog Post by: Sandro Pereira
by community-syndication | Jan 16, 2014 | BizTalk Community Blogs via Syndication
Wade Wegner, a friend of the blog and an evangelist for Salesforce.com, just built a new .NET Toolkit for Salesforce developers. This Toolkit is open source and available on GitHub. Basically, it makes it much simpler to securely interact with the Salesforce.com REST API from .NET code. It takes care of “just working” on multiple […]
Blog Post by: Richard Seroter
by community-syndication | Jan 16, 2014 | BizTalk Community Blogs via Syndication
I couple of months ago I published two white papers through BizTalk360, an initiative came from an invitation of Saravana Kumar that I promptly accepted. However I had never mentioned my White Papers in my blog what a shame! Installing BizTalk Server 2013 in a Standalone Machine (complete user guide) This white paper explains in […]
Blog Post by: Sandro Pereira
by community-syndication | Jan 15, 2014 | BizTalk Community Blogs via Syndication
We are super excited to bring this new feature in version 7.1 of BizTalk360 called "BizTalk360 for managed services". One of the key users of BizTalk360 is consulting companies that specializes (experts) in BizTalk server implementation and support. Typically the consulting companies will manage multiple customer BizTalk environments across various locations. Currently they manage their […]
The post BizTalk360 for Managed Services appeared first on BizTalk360 Blog.
Blog Post by: Saravana Kumar
by community-syndication | Jan 14, 2014 | BizTalk Community Blogs via Syndication
My take and some answers on it – http://www.cloudsecurityalliance.org/topthreats/
Welcome back folks to a beautiful 2014 and I had an interesting one while going through
a Cloud Solution Design
I came across this document The Notorious Nine Cloud Computing Top Threats
in 2013 and I thought I’d talk through these concerns one by one.
-
Data Breaches – this issue can occur on many levels and I don’t
think it’s just limited to ’Cloud’ per se – it could be your insurance company down
the road,
the doctor, dentist etc. and we’ve all seen those TV shows where the ’hustlers’ go
through someone’s trash to pull out key gems of information to unlock the scam.
Interestingly in the paper, the university of North Carolina Chapel Hill came up with
a technique to steal data from a VM running as one of many within the same host, with
the ’unis VM’ able
to steal data being transmitted through the other VMs. This was performed through
a combination of monitoring various known factors of the host,
such as thread scheduling, L1 cache and power. The paper highlighted that currently
the virtualisation technologies need to do more about isolation.
-
Data Loss – Cloud and non-cloud users fall foul of this with Cloud
typically being a target for hackers. Geo-Replication, backups and Government policies
on data and it’s storage all help here.
Encryption could be something that you may want to employ to ensure some protection
over the copies of data now present.
-
Account Hijacking – gaining unlawful access to account details such
as user/pass combination. Amazon in 2010 was foul to a cross site scripting bug that
allowed 3rd parties to get access
to user/pass credentials. With the explosion on the Cloud keeping your credentials
safe becomes that much more important. Also changing passwords frequently would be
a good habit
to get into.
The other interesting point here to note is that if your account is indeed hijacked
then it maybe sometime until the hackers exploit this.
Gaining access to someone’s account doesn’t have to be a hi-tech solution either.
As in the movie Sneakers all that was required was a dinner conversation for the voice
password
”My voice is my passport”
-
Insecure APIs – Cloud based APIs form the under pinning of many software
and services available today. Essentially ensure these APIs are secure to the best
possible effort and
while they may not be compromised, are they able to stand DDOS attacks for e.g.
-
Denial of Service – With the advent of the Cloud and cloud services,
these attacks could for e.g. hit your Cloud based website causing it to be unresponsive,
but you’re still being
billed for the usage. Also within Microsoft Azure web site configurations we can now
add DDOS settings to indicate when the underlying load balancer should throttle the
requests coming
from a particular rogue client.
-
Malicious Insiders – the focus here is both internal, hosted and
Cloud based solutions. Policies and procedures are more important within the Cloud
space – what procedures does your
provider follow? Who can access the encryption keys? where are they stored? etc.
-
Abuse of Cloud Services – The Cloud possesses many servers, elastic
scale and dynamic compute power, making it the perfect platform
for a bot-net to spin up in and get to work. Azure limits default subscriptions to
20 cores, more are available upon request.
-
Insufficient Due Diligence – Don’t jump into the Cloud platform without
examining the offer. Many hosting providers have added the word ’Cloud’ to the front
of their names as in ’Cloud Hosting Providers’ with the underlying process and infrastructure
the same, with the same vulnerabilities.
In this space Azure has many ratified processes that get re-certified each year with
some of these processes available to military grade specification.
Cloud is big business for Microsoft and getting things like this wrong would be a
true achilles heel.
-
Shared Technology Issues – as Cloud providers share underlying technologies
from CPUs, Services, Storage and other services. If these are exposed then so is your
platform potentially.
Talk to you soon.
Mick.
Blog Post by: Mick Badran
by community-syndication | Jan 14, 2014 | BizTalk Community Blogs via Syndication
Getting a full Continuous Integration (CI) process working with BizTalk Server is hard! One of the big advantages in a working CI process is to always have tested and verified artifacts from the build server to deploy into test and production. Packaging these build resources into a deployable unit is however notorious hard in BizTalk […]
Blog Post by: Richard
by community-syndication | Jan 13, 2014 | BizTalk Community Blogs via Syndication
This article is to resolve access denied issue with the SSO Application in BizTalk. The back ground is, I am working on one of our client project, there is a need to encrypt the PGP messages before sending it to the SFTP server. We need to create a Pipeline Component, which does the encryption. For […]
Blog Post by: shadabanwer