Ixia Redefines Network Bypass Switch Market

Ixia, a leading provider of network testing, visibility, and security solutions, today announced iBypass VHD, a modular, high-density, inline bypass switch that sets a new standard for network bypass switches available today. iBypass VHD, the highest density bypass switch on the market today, combines reliable Ixia technology with next-generation intelligence and flexibility to help ensure that security tools have continuous visibility into network traffic. The newest addition to the company’s expanding portfolio of bypass switches, iBypass VHD can improve security infrastructure uptime and overall reliability with consistent network visibility and monitoring. Today’s organizations face many network concerns, including an increasing volume of multiprotocol traffic at higher data rates and mounting security threats. Deploying inline tools to inspect and control network traffic can help block incoming threats, but inline tools can also complicate network operations while creating numerous potential points of failure which can significantly compromise network uptime and disrupt business continuity. Ixia’s bypass switches deliver fail-safe, inline protection that helps safeguard a network with automated failover, which prevents temporary tool outages from escalating into costly network outages. Ixia’s iBypass VHD is the first bypass switch to support both active-standby and active-active network/security architectures. Active-standby offers improved security resilience with a primary and secondary tool that helps ensure ongoing network monitoring. Active–active enables a diverse deployment of security tools to maximize existing and new IT investments. Ixia’s iBypass VHD offers at least 1.5 times the density of all other bypass switches available, and provides a powerful, yet easy-to-use, interface. Its drag-and-drop functionality significantly reduces setup time and ongoing support costs. It is the only bypass switch offering preset, integrated security tool heartbeats built into the user interface. Preconfigured to automatically integrate with security tools via a single click, iBypass VHD is designed for rapid set up and delivers immediate time to value, while limiting potential errors during deployment. Ixia iBypass VHD offers centralized and simplified management, leveraging Indigo Pro. Indigo Pro is a central management tool for bypass switches that simplifies and speeds configuration and management of tens to hundreds of devices, which is ideal for any large-scale, dispersed deployments. This enables organizations to quickly implement a resilient security architecture across their entire network infrastructure. iBypass VHD supports up to twelve 10G bypass switches in one unit, three times more than previous versions, to maximize valuable data center real estate and give Ixia channel partners a compelling new tool to add to their end-to-end network visibility offerings. (NetEvents)

Ixia, a leading provider of network testing, visibility, and security solutions, today announced iBypass VHD, a modular, high-density, inline bypass switch that sets a new standard for network bypass switches available today. iBypass VHD, the highest density bypass switch on the market today, combines reliable Ixia technology with next-generation intelligence and flexibility to help ensure that security tools have continuous visibility into network traffic. The newest addition to the company’s expanding portfolio of bypass switches, iBypass VHD can improve security infrastructure uptime and overall reliability with consistent network visibility and monitoring. Today’s organizations face many network concerns, including an increasing volume of multiprotocol traffic at higher data rates and mounting security threats. Deploying inline tools to inspect and control network traffic can help block incoming threats, but inline tools can also complicate network operations while creating numerous potential points of failure which can significantly compromise network uptime and disrupt business continuity. Ixia’s bypass switches deliver fail-safe, inline protection that helps safeguard a network with automated failover, which prevents temporary tool outages from escalating into costly network outages. Ixia’s iBypass VHD is the first bypass switch to support both active-standby and active-active network/security architectures. Active-standby offers improved security resilience with a primary and secondary tool that helps ensure ongoing network monitoring. Active–active enables a diverse deployment of security tools to maximize existing and new IT investments. Ixia’s iBypass VHD offers at least 1.5 times the density of all other bypass switches available, and provides a powerful, yet easy-to-use, interface. Its drag-and-drop functionality significantly reduces setup time and ongoing support costs. It is the only bypass switch offering preset, integrated security tool heartbeats built into the user interface. Preconfigured to automatically integrate with security tools via a single click, iBypass VHD is designed for rapid set up and delivers immediate time to value, while limiting potential errors during deployment. Ixia iBypass VHD offers centralized and simplified management, leveraging Indigo Pro. Indigo Pro is a central management tool for bypass switches that simplifies and speeds configuration and management of tens to hundreds of devices, which is ideal for any large-scale, dispersed deployments. This enables organizations to quickly implement a resilient security architecture across their entire network infrastructure. iBypass VHD supports up to twelve 10G bypass switches in one unit, three times more than previous versions, to maximize valuable data center real estate and give Ixia channel partners a compelling new tool to add to their end-to-end network visibility offerings. (NetEvents)

[via India Telecom News]

Historic Dell and EMC Merger Complete

Dell Technologies has announced completion of the acquisition of EMC Corporation, creating a unique family of businesses that provides the essential infrastructure for organizations to build their digital future, transform IT and protect their most important asset, information. This combination creates a $74 billion market leader with an expansive technology portfolio that solves complex problems for customers in the industry’s fast-growing areas of hybrid cloud, software-defined data center, converged infrastructure, platform-as-a-service, data analytics, mobility and cybersecurity. Dell Technologies serves 98 percent of the Fortune 500 and comprises several market leading businesses. The two largest, and most well-known, are the Dell client solutions business and the Dell EMC infrastructure solutions business – both of which are supported by Dell EMC Services. In addition, Dell Technologies contains Boomi, Pivotal, RSA, SecureWorks, Virtustream and VMware. This unique structure combines the focus and innovation of a startup with the global scale and service of a large enterprise. Dell Technologies’ scale will enable it to deliver more innovation and investment in R&D, sales and marketing, services and support and deliver more efficient and cost-effective solutions for customers. Furthermore, while the company will publically report its financial results, it is privately controlled, enabling it to better focus investments on its customer and partner ecosystem over the long term. Michael Dell, chairman and CEO of Dell Technologies, said, “We are at the dawn of the next industrial revolution. Our world is becoming more intelligent and more connected by the minute, and ultimately will become intertwined with a vast Internet of Things, paving the way for our customers to do incredible things. This is why we created Dell Technologies. We have the products, services, talent and global scale to be a catalyst for change and guide customers, large and small, on their digital journey.” Dell Technologies blends Dell’s go-to-market strength with small business and mid-market customers and EMC’s strength with large enterprises and stands as a market leader in many of the most important and high-growth areas of the $2 trillion information technology market, including positions as a “Leader” in 20 Gartner Magic Quadrants and a portfolio of more than 20,000 patents and applications. Jamie Dimon, Chairman and CEO, JPMorgan Chase, commented, “Financial services is one of the first-movers in embracing technology to better serve our customers, and the next wave of digitalization continues a trend that’s been occurring my whole lifetime.” He added: “As one of the world’s biggest users of Dell and EMC, we spend approximately $9 billion a year on technology, including infrastructure as well as cloud computing, big data analytics and cybersecurity. We make sure we spend wisely and select our partners very carefully. I’ve known Michael Dell for 30 years. He’s top notch, ethical, and deeply cares about everyone he works with – both internally at his company and across the industry. I’m thrilled for Michael and the new company, and we are eager to see everything they create in the future.” Marc Benioff, Chairman and CEO, Salesforce, added, “Salesforce’s partnership with Dell and EMC has been instrumental in pushing innovation across the industry. Michael is an incredible visionary and one of the most important leaders in our industry. He has been an amazing partner contributing to our success. Now with Dell Technologies, he is once again reshaping the technology industry.” Tim McGrath, President and CEO of PC Connection, Inc., commented, “Our relationship with Dell has grown tremendously in the past six-plus years. Along with being recognized as a Dell Partner of the Year in both 2014 and 2015, the business has grown significantly. As partners of Dell, EMC, VMware and RSA, we are able to provide customers with innovative, value driven, and secure end-to-end IT solutions.” Tim said: “With the combination of the Dell Technologies family of businesses, PC Connection, Inc. is expanding its capabilities offering an ever broadening comprehensive portfolio to our customers. We look forward to strengthening our partnership with Dell Technologies to ensure that our customers have the technical support, guidance, and product selection needed to help solve their business challenges with IT.” (NetEvents)

Dell Technologies has announced completion of the acquisition of EMC Corporation, creating a unique family of businesses that provides the essential infrastructure for organizations to build their digital future, transform IT and protect their most important asset, information. This combination creates a $74 billion market leader with an expansive technology portfolio that solves complex problems for customers in the industry’s fast-growing areas of hybrid cloud, software-defined data center, converged infrastructure, platform-as-a-service, data analytics, mobility and cybersecurity. Dell Technologies serves 98 percent of the Fortune 500 and comprises several market leading businesses. The two largest, and most well-known, are the Dell client solutions business and the Dell EMC infrastructure solutions business – both of which are supported by Dell EMC Services. In addition, Dell Technologies contains Boomi, Pivotal, RSA, SecureWorks, Virtustream and VMware. This unique structure combines the focus and innovation of a startup with the global scale and service of a large enterprise. Dell Technologies’ scale will enable it to deliver more innovation and investment in R&D, sales and marketing, services and support and deliver more efficient and cost-effective solutions for customers. Furthermore, while the company will publically report its financial results, it is privately controlled, enabling it to better focus investments on its customer and partner ecosystem over the long term. Michael Dell, chairman and CEO of Dell Technologies, said, “We are at the dawn of the next industrial revolution. Our world is becoming more intelligent and more connected by the minute, and ultimately will become intertwined with a vast Internet of Things, paving the way for our customers to do incredible things. This is why we created Dell Technologies. We have the products, services, talent and global scale to be a catalyst for change and guide customers, large and small, on their digital journey.” Dell Technologies blends Dell’s go-to-market strength with small business and mid-market customers and EMC’s strength with large enterprises and stands as a market leader in many of the most important and high-growth areas of the $2 trillion information technology market, including positions as a “Leader” in 20 Gartner Magic Quadrants and a portfolio of more than 20,000 patents and applications. Jamie Dimon, Chairman and CEO, JPMorgan Chase, commented, “Financial services is one of the first-movers in embracing technology to better serve our customers, and the next wave of digitalization continues a trend that’s been occurring my whole lifetime.” He added: “As one of the world’s biggest users of Dell and EMC, we spend approximately $9 billion a year on technology, including infrastructure as well as cloud computing, big data analytics and cybersecurity. We make sure we spend wisely and select our partners very carefully. I’ve known Michael Dell for 30 years. He’s top notch, ethical, and deeply cares about everyone he works with – both internally at his company and across the industry. I’m thrilled for Michael and the new company, and we are eager to see everything they create in the future.” Marc Benioff, Chairman and CEO, Salesforce, added, “Salesforce’s partnership with Dell and EMC has been instrumental in pushing innovation across the industry. Michael is an incredible visionary and one of the most important leaders in our industry. He has been an amazing partner contributing to our success. Now with Dell Technologies, he is once again reshaping the technology industry.” Tim McGrath, President and CEO of PC Connection, Inc., commented, “Our relationship with Dell has grown tremendously in the past six-plus years. Along with being recognized as a Dell Partner of the Year in both 2014 and 2015, the business has grown significantly. As partners of Dell, EMC, VMware and RSA, we are able to provide customers with innovative, value driven, and secure end-to-end IT solutions.” Tim said: “With the combination of the Dell Technologies family of businesses, PC Connection, Inc. is expanding its capabilities offering an ever broadening comprehensive portfolio to our customers. We look forward to strengthening our partnership with Dell Technologies to ensure that our customers have the technical support, guidance, and product selection needed to help solve their business challenges with IT.” (NetEvents)

[via India Telecom News]

Windstream expands Minneapolis fiber network

Windstream (WIN), a leading provider of advanced network communications, today announced a major expansion of its advanced metro fiber network in Minneapolis. Windstream’s expansion will provide the area’s growing business community with world-class fiber and fixed-wireless infrastructure that connects even more local data centers and commercial buildings with Windstream’s high-speed, highly available nationwide fiber network. “The investment that Windstream is making in the greater Minneapolis area is a direct reflection of how important the area’s business community is to our company,” said Chris Nein, regional president for Windstream. “This ambitious project will result in a new level of connectivity and network stability for all businesses in Minneapolis and will allow us to offer our customers an expanded product suite and higher levels of service. We have already started to connect some of our customers directly to the Windstream metro-Minneapolis network and are ready to grow this rapidly,” he added. Windstream’s expansion of its local metro fiber network and the addition of fixed wireless service will connect the company’s national fiber network to major data center complexes and commercial buildings in the Minneapolis area. This expansion will connect companies directly to other major and mid-size markets across the country, and it also will enable business customers to utilize the enterprise-class data, voice, network and cloud services that Windstream customers in other major markets use as the foundation of their technology strategy. One company that will benefit directly from Windstream expansion is Berger Transfer & Storage, which is headquartered in St. Paul and has 17 service locations located across the country. Berger has been one of the most trusted names in transportation and storage logistics for more than 100 years, and today it has a fleet of more than 600 vehicles and moves more than 24,000 customers each year. “Having a reliable and cost-effective IT network is critical to serving our customers, and we applaud Windstream for investing in and expanding its fiber network in the Twin Cities,” said Kevin Johnson, CIO of Berger Transfer & Storage. “The improvements will give the network better reliability and reach, and will allow Windstream to offer additional services such as fixed wireless that will benefit all businesses in our area.” The Windstream expansion increases both the footprint of the company’s network and the services that are available to local customers – including fixed wireless service, unified communications, managed services, network security, business continuity, network solutions and cloud services, all of which are provided with the support of a truly local team. Windstream is expanding local metro fiber networks across the country as part of an initiative that will support customers in the banking, financial services, legal services, education, healthcare, government, hospitality and retail industries, among others. In addition to Minneapolis, Windstream is expanding its metro fiber networks in a number of cities including Charlotte, Nashville, Richmond, Atlanta, Chicago, Philadelphia and Cleveland. Photo: Mike Kozlowski, VP of product management at Windstream (NetEvents)

Windstream (WIN), a leading provider of advanced network communications, today announced a major expansion of its advanced metro fiber network in Minneapolis. Windstream’s expansion will provide the area’s growing business community with world-class fiber and fixed-wireless infrastructure that connects even more local data centers and commercial buildings with Windstream’s high-speed, highly available nationwide fiber network. “The investment that Windstream is making in the greater Minneapolis area is a direct reflection of how important the area’s business community is to our company,” said Chris Nein, regional president for Windstream. “This ambitious project will result in a new level of connectivity and network stability for all businesses in Minneapolis and will allow us to offer our customers an expanded product suite and higher levels of service. We have already started to connect some of our customers directly to the Windstream metro-Minneapolis network and are ready to grow this rapidly,” he added. Windstream’s expansion of its local metro fiber network and the addition of fixed wireless service will connect the company’s national fiber network to major data center complexes and commercial buildings in the Minneapolis area. This expansion will connect companies directly to other major and mid-size markets across the country, and it also will enable business customers to utilize the enterprise-class data, voice, network and cloud services that Windstream customers in other major markets use as the foundation of their technology strategy. One company that will benefit directly from Windstream expansion is Berger Transfer & Storage, which is headquartered in St. Paul and has 17 service locations located across the country. Berger has been one of the most trusted names in transportation and storage logistics for more than 100 years, and today it has a fleet of more than 600 vehicles and moves more than 24,000 customers each year. “Having a reliable and cost-effective IT network is critical to serving our customers, and we applaud Windstream for investing in and expanding its fiber network in the Twin Cities,” said Kevin Johnson, CIO of Berger Transfer & Storage. “The improvements will give the network better reliability and reach, and will allow Windstream to offer additional services such as fixed wireless that will benefit all businesses in our area.” The Windstream expansion increases both the footprint of the company’s network and the services that are available to local customers – including fixed wireless service, unified communications, managed services, network security, business continuity, network solutions and cloud services, all of which are provided with the support of a truly local team. Windstream is expanding local metro fiber networks across the country as part of an initiative that will support customers in the banking, financial services, legal services, education, healthcare, government, hospitality and retail industries, among others. In addition to Minneapolis, Windstream is expanding its metro fiber networks in a number of cities including Charlotte, Nashville, Richmond, Atlanta, Chicago, Philadelphia and Cleveland. Photo: Mike Kozlowski, VP of product management at Windstream (NetEvents)

[via India Telecom News]

Hot Start-Up: H3 Dynamics

Tom Raymore, H3 Dynamics talks about who and what is H3 Dynamics, a Singaporean tech company involved in both robotics systems and sub-systems hardware, as well as field communications and real-time analytics. In addition to designing and developing an autonomous drone, DRONEBOX, we are working to connect self sustainable field robots to the cloud to develop domain expertise. So fundamentally, DRONEBOX is a mobile sensor for the Internet of Things, so you’ve got your data gathering, power independence, data communication, mobility, all under the field of – all under the umbrella of telerobotics, very similar to the Mars Rover which is another platform for telerobotics which everyone in this room, I’m sure, is familiar with. How did we come up with DRONEBOX? So you take the example of cell phone tower inspection. Historical example is technician shows up, puts the safety harness on, climbs up the cell phone tower, does the inspection, comes back down, safety gear off, back in the truck and gone. That evolved into commercial UAV operator shows up in a truck or van, launches a UAV, conducts a similar inspection. But now DRONEBOX is out there 24 hours a day, seven days a week, scheduled flights, unscheduled flights, doing analysis, whatever you need it to do but it’s on-site 24/7. As an IoT device DRONEBOX is going to change the face of the commercial UAV industry. Two main value propositions of DRONEBOX and H3 Dynamics. The first is automation of drone inspection for services. Now, we’re going to talk about that a little bit more in just a moment. I see some inquisitive eyes here. The second is 24/7 availability, as I mentioned. So most drone service companies specialise in a single vertical. For example, commercial UAV operator shows up to a farm, goes out to the field, scans the field, provides the data analysis to the farmer and leaves. However, through DRONEBOX, H3 Dynamics wants to develop domain expertise. So what does that look like, domain expertise? We started to categorise this into oil and gas, inspection, agriculture, so on and so forth. I won’t read all those. What we want to do is, through our SDK platform allow people to upload their domain expertise. For example, inspection. A commercial UAV operator in Spain does solar panel farm inspection. That person can upload their domain expertise into our app environment and a similar commercial UAV operator in Arizona can access that, download that expertise and perform the same solar farm inspection in Arizona. Every time that happens, if you look up here in the upper right, that original owner of that expertise is actually paid a royalty fee, and the person downloading it and using it and subscribing to that domain expertise in Arizona, in this particular example, only pays a small monthly subscription. Looking to the future, again we want to remove the hardware piece as a barrier to entry. So the hardware eventually, as we see it, be free, and the revenue model will come from subscriptions and analytics as a service from domain expertise. Our go to market plan, rather – there’s more opportunities than time and resources, people and money, so therefore our go to market plan is focus on a few opportunities now, become very strong experts at those, and over time grow that expertise again, rather than be average at a whole bunch. A glimpse into the future. Not only will we have DRONBOX as an IoT sensor, but like I mentioned in the last – in the panel, ground robots, human robots, marine robots, fixed-wing aerial robots too. This kind of ties to the first speech that we had, or first informational lecture that we had. Artificial Intelligence. DRONEBOX will scan the field, look for overwatering, under-watering, overfertilization, look for disease, tell another drone where the specific area of mitigation is. That drone will launch, apply the fertiliser, apply the water, whatever’s necessary, but it’s all conducted by drones. Recently our customers have asked us for how drones go from box, to box, to box. Powerline inspection, pipeline inspection, positive train control. It’s a bit of a pony express for DRONEBOX, going from one box to the next to recharge and back, so this is a business concept that we have for the future. A quick glimpse into some of our IoT go to market partners, customers and pending customers too. We are H3 Dynamics, we are working to connect selfsustainable field robots to the cloud to develop domain expertise. Photo: Tom Ramer, H3 Dynamics (NetEvents)

Tom Raymore, H3 Dynamics talks about who and what is H3 Dynamics, a Singaporean tech company involved in both robotics systems and sub-systems hardware, as well as field communications and real-time analytics. In addition to designing and developing an autonomous drone, DRONEBOX, we are working to connect self sustainable field robots to the cloud to develop domain expertise. So fundamentally, DRONEBOX is a mobile sensor for the Internet of Things, so you’ve got your data gathering, power independence, data communication, mobility, all under the field of – all under the umbrella of telerobotics, very similar to the Mars Rover which is another platform for telerobotics which everyone in this room, I’m sure, is familiar with. How did we come up with DRONEBOX? So you take the example of cell phone tower inspection. Historical example is technician shows up, puts the safety harness on, climbs up the cell phone tower, does the inspection, comes back down, safety gear off, back in the truck and gone. That evolved into commercial UAV operator shows up in a truck or van, launches a UAV, conducts a similar inspection. But now DRONEBOX is out there 24 hours a day, seven days a week, scheduled flights, unscheduled flights, doing analysis, whatever you need it to do but it’s on-site 24/7. As an IoT device DRONEBOX is going to change the face of the commercial UAV industry. Two main value propositions of DRONEBOX and H3 Dynamics. The first is automation of drone inspection for services. Now, we’re going to talk about that a little bit more in just a moment. I see some inquisitive eyes here. The second is 24/7 availability, as I mentioned. So most drone service companies specialise in a single vertical. For example, commercial UAV operator shows up to a farm, goes out to the field, scans the field, provides the data analysis to the farmer and leaves. However, through DRONEBOX, H3 Dynamics wants to develop domain expertise. So what does that look like, domain expertise? We started to categorise this into oil and gas, inspection, agriculture, so on and so forth. I won’t read all those. What we want to do is, through our SDK platform allow people to upload their domain expertise. For example, inspection. A commercial UAV operator in Spain does solar panel farm inspection. That person can upload their domain expertise into our app environment and a similar commercial UAV operator in Arizona can access that, download that expertise and perform the same solar farm inspection in Arizona. Every time that happens, if you look up here in the upper right, that original owner of that expertise is actually paid a royalty fee, and the person downloading it and using it and subscribing to that domain expertise in Arizona, in this particular example, only pays a small monthly subscription. Looking to the future, again we want to remove the hardware piece as a barrier to entry. So the hardware eventually, as we see it, be free, and the revenue model will come from subscriptions and analytics as a service from domain expertise. Our go to market plan, rather – there’s more opportunities than time and resources, people and money, so therefore our go to market plan is focus on a few opportunities now, become very strong experts at those, and over time grow that expertise again, rather than be average at a whole bunch. A glimpse into the future. Not only will we have DRONBOX as an IoT sensor, but like I mentioned in the last – in the panel, ground robots, human robots, marine robots, fixed-wing aerial robots too. This kind of ties to the first speech that we had, or first informational lecture that we had. Artificial Intelligence. DRONEBOX will scan the field, look for overwatering, under-watering, overfertilization, look for disease, tell another drone where the specific area of mitigation is. That drone will launch, apply the fertiliser, apply the water, whatever’s necessary, but it’s all conducted by drones. Recently our customers have asked us for how drones go from box, to box, to box. Powerline inspection, pipeline inspection, positive train control. It’s a bit of a pony express for DRONEBOX, going from one box to the next to recharge and back, so this is a business concept that we have for the future. A quick glimpse into some of our IoT go to market partners, customers and pending customers too. We are H3 Dynamics, we are working to connect selfsustainable field robots to the cloud to develop domain expertise. Photo: Tom Ramer, H3 Dynamics (NetEvents)

[via India Telecom News]

The Real Costs of Web Malware Protection

By Kowsik Guruswamy, Chief Technology Officer, Menlo Security in reference to The Hidden Cost of Web Security Business Whitepaper. A ransomware attack is terrible for consumers, employees and businesses – and you can put a price tag on recovery. According to the U.S. Federal Bureau of Investigation’s report in April 2016, “Cyber-criminals collected $209 million in the first three months of 2016 by extorting businesses and institutions to unlock computer servers,” reported CNN. A typical ransomware might demand a payment of $10,000 or more; Hollywood Presbyterian Medical Center forked over $17,000 in February. Websites are one of the most common malware vectors (along with malicious emails) that can provide the entry point to many other types of hack attacks. Block access to the web, and you’ve made a dent in overall cybersecurity risks.   There are more than 550 million malware variants, reports AV-TEST, with more than 390,000 new malicious programs being identified every day. There are multiple ways malware gets into an end-user’s computer – and from there, the malware might have unfettered access to everything on that computer and other resources on the business network. In many cases the end user did absolutely nothing wrong… but became infected anyway. Blocking access to these uncategorized sites reduces the chances of malware infection, but introduces a number of problems and hidden costs, such as more help-desk tickets. The costs of recovering from a ransomware or other cyberattack are fairly well understood… but how much should an organization spend to prevent one in the first place?  This article will explore the smarter options for investing in cyber-protection – ways to spend smarter, getting a better security posture while also reducing expenditures. (NetEvents)

By Kowsik Guruswamy, Chief Technology Officer, Menlo Security in reference to The Hidden Cost of Web Security Business Whitepaper. A ransomware attack is terrible for consumers, employees and businesses – and you can put a price tag on recovery. According to the U.S. Federal Bureau of Investigation’s report in April 2016, “Cyber-criminals collected $209 million in the first three months of 2016 by extorting businesses and institutions to unlock computer servers,” reported CNN. A typical ransomware might demand a payment of $10,000 or more; Hollywood Presbyterian Medical Center forked over $17,000 in February. Websites are one of the most common malware vectors (along with malicious emails) that can provide the entry point to many other types of hack attacks. Block access to the web, and you’ve made a dent in overall cybersecurity risks.   There are more than 550 million malware variants, reports AV-TEST, with more than 390,000 new malicious programs being identified every day. There are multiple ways malware gets into an end-user’s computer – and from there, the malware might have unfettered access to everything on that computer and other resources on the business network. In many cases the end user did absolutely nothing wrong… but became infected anyway. Blocking access to these uncategorized sites reduces the chances of malware infection, but introduces a number of problems and hidden costs, such as more help-desk tickets. The costs of recovering from a ransomware or other cyberattack are fairly well understood… but how much should an organization spend to prevent one in the first place?  This article will explore the smarter options for investing in cyber-protection – ways to spend smarter, getting a better security posture while also reducing expenditures. (NetEvents)

[via India Telecom News]

Javelin Networks Redefines Detection and Prevention of Active Cyberattacks

Emerging from stealth mode, Silicon Valley start-up uses Artificial Intelligence to prevent any malicious movement inside an organization. Javelin Networks, the only company able to effortlessly prevent an attacker from stealing credentials and moving laterally, announced its emergence from stealth mode to unveil its breakthrough cyber defense software solution. Javelin ZeroMove uses artificial intelligence to autonomously randomize the internal topology of organizations and expose cyber attacker movements, preventing them from further penetrating an organization. The Javelin solution is generally available to customers worldwide. “IT staff are constantly and manually searching for attackers on computers and networks. It’s impossible to do this adequately and accurately with the technology and processes used today”, said Roi Abutbul, founder and CEO of Javelin Networks. “We saw a pressing need for a proactive, autonomous and seamless, post-breach attack detection and prevention solution that automates attacker detection and stops their subsequent movement,” Roi added. Nine out of ten companies have been compromised, whether by stolen remote access credentials, third party network connections, web and API vulnerability exploits or malware according to HBS studies. In order for the attacks to progress, attackers need knowledge of the organization’s internal topology: the critical servers, identities, applications and endpoints. Once they’re on a computer, they begin internal reconnaissance, collecting information and planning their next move based on what they’ve discovered. Javelin Networks unique approach makes what the attacker learns – useless. To thwart attackers, Javelin is applying a radically new approach to masking the attacker’s view of the internal topology. When attackers move within the masked topology they are detected immediately. Simultaneously all forensics evidence is collected before the attacker can delete it and the mitigation process is initiated, preventing the attacker from further movement. Photo: Greg Fitzgerald, COO of Javelin Networks (NetEvents)

Emerging from stealth mode, Silicon Valley start-up uses Artificial Intelligence to prevent any malicious movement inside an organization. Javelin Networks, the only company able to effortlessly prevent an attacker from stealing credentials and moving laterally, announced its emergence from stealth mode to unveil its breakthrough cyber defense software solution. Javelin ZeroMove uses artificial intelligence to autonomously randomize the internal topology of organizations and expose cyber attacker movements, preventing them from further penetrating an organization. The Javelin solution is generally available to customers worldwide. “IT staff are constantly and manually searching for attackers on computers and networks. It’s impossible to do this adequately and accurately with the technology and processes used today”, said Roi Abutbul, founder and CEO of Javelin Networks. “We saw a pressing need for a proactive, autonomous and seamless, post-breach attack detection and prevention solution that automates attacker detection and stops their subsequent movement,” Roi added. Nine out of ten companies have been compromised, whether by stolen remote access credentials, third party network connections, web and API vulnerability exploits or malware according to HBS studies. In order for the attacks to progress, attackers need knowledge of the organization’s internal topology: the critical servers, identities, applications and endpoints. Once they’re on a computer, they begin internal reconnaissance, collecting information and planning their next move based on what they’ve discovered. Javelin Networks unique approach makes what the attacker learns – useless. To thwart attackers, Javelin is applying a radically new approach to masking the attacker’s view of the internal topology. When attackers move within the masked topology they are detected immediately. Simultaneously all forensics evidence is collected before the attacker can delete it and the mitigation process is initiated, preventing the attacker from further movement. Photo: Greg Fitzgerald, COO of Javelin Networks (NetEvents)

[via India Telecom News]

NetScout launches InfiniStreamNG platform

NetScout launches real-time information platform for service assurance, cybersecurity and big data enabling businesses to improve their digital transformations. The InfiniStreamNG platform mines IP traffic intelligence in real-time to deliver accurate information to business intelligence applications on a single platform. The company claims the real-time metadata technology is a first for the industry and both enterprise and service provider customers can leverage InfiniStreamNG in data centre, cloud, and hybrid infrastructures. The InfiniStreamNG delivers unprecedented scalability and flexibility in multiple form factors and deployment options: virtual, software and hardware appliances. Both enterprise and service provider customers can leverage InfiniStreamNG in data center, cloud, and hybrid infrastructures, providing seamless, end-to-end visibility, which can dramatically accelerate their digital transformation initiatives. The new platform enables NETSCOUT to elevate its value proposition and expand its total addressable market (TAM). With the InfiniStreamNG, customers can leverage their investment in NETSCOUT solutions, traditionally made by network operations teams, to encompass all aspects of IT and security operations across the enterprise, public sector, and service provider markets. The InfiniStreamNG was designed with a revolutionary new architecture that “mines” IP traffic intelligence in real time, to deliver timely, accurate and actionable information to service assurance, cybersecurity, and business intelligence applications on a single platform for the first time in the industry. This new, open architecture leverages an advanced and extended version of NETSCOUT’s patented Adaptive Service Intelligence (ASI) technology, now termed ASI Plus, to seamlessly incorporate technologies from the Danaher Communications acquisition, and facilitate support for a wider range of new analytic software from NETSCOUT, from strategic partners and from other third parties. As a result, the InfiniStreamNG is positioned to serve as the industry’s most versatile real-time metadata technology. “Today’s most successful and innovative companies, both in the enterprise and the carrier sector, realize that the flawless delivery of digital services, agile deployment, and cost-effective operations require real-time, actionable intelligence,” said Anil Singhal, co-founder, president and chief executive officer, NETSCOUT. “Three years ago, we saw the opportunity to leverage IP convergence to provide scalable, real-time access to the mission-critical data needed to drive our customer’s digital initiatives. Since then, we have made significant investments in both organic innovation and strategic acquisitions to capitalize on this massive opportunity,” he added. Singhal noted, “Our InfiniStreamNG is a powerful ‘anyware’ platform that elegantly and seamlessly integrates NETSCOUT’s core ASI technology with the key technologies we obtained through our acquisition of Danaher’s Communications business. In just one year since completing this acquisition, we have delivered a modern, platform-agnostic, and highly cost-effective solution that doesn’t require costly middleware due to our smart data approach for processing, storing and accelerating the collection and analysis of wire data. This real-time analytics platform, harnessing the full power of IP intelligence, will accelerate our customers’ digital transformation initiatives, placing NETSCOUT at the heart of the success of their rapidly changing digital business.” “A long-time pioneer in the use of real-time network traffic intelligence, NETSCOUT has made this most accurate representation of system activity available to support an entire new generation of carrier, web, and enterprise applications,” said Zeus Kerravala, founder and principal analyst, ZK Research. “This high-quality data, which started out serving mostly network performance management uses, now feeds multiple analytics stacks including service assurance, application performance management, business intelligence and cybersecurity, at cloud scale. With this new level of deeper visibility and greater control, businesses can have the necessary confidence that they will achieve their intended business outcomes as they transform their information architectures,” he said. (NetEvents)

NetScout launches real-time information platform for service assurance, cybersecurity and big data enabling businesses to improve their digital transformations. The InfiniStreamNG platform mines IP traffic intelligence in real-time to deliver accurate information to business intelligence applications on a single platform. The company claims the real-time metadata technology is a first for the industry and both enterprise and service provider customers can leverage InfiniStreamNG in data centre, cloud, and hybrid infrastructures. The InfiniStreamNG delivers unprecedented scalability and flexibility in multiple form factors and deployment options: virtual, software and hardware appliances. Both enterprise and service provider customers can leverage InfiniStreamNG in data center, cloud, and hybrid infrastructures, providing seamless, end-to-end visibility, which can dramatically accelerate their digital transformation initiatives. The new platform enables NETSCOUT to elevate its value proposition and expand its total addressable market (TAM). With the InfiniStreamNG, customers can leverage their investment in NETSCOUT solutions, traditionally made by network operations teams, to encompass all aspects of IT and security operations across the enterprise, public sector, and service provider markets. The InfiniStreamNG was designed with a revolutionary new architecture that “mines” IP traffic intelligence in real time, to deliver timely, accurate and actionable information to service assurance, cybersecurity, and business intelligence applications on a single platform for the first time in the industry. This new, open architecture leverages an advanced and extended version of NETSCOUT’s patented Adaptive Service Intelligence (ASI) technology, now termed ASI Plus, to seamlessly incorporate technologies from the Danaher Communications acquisition, and facilitate support for a wider range of new analytic software from NETSCOUT, from strategic partners and from other third parties. As a result, the InfiniStreamNG is positioned to serve as the industry’s most versatile real-time metadata technology. “Today’s most successful and innovative companies, both in the enterprise and the carrier sector, realize that the flawless delivery of digital services, agile deployment, and cost-effective operations require real-time, actionable intelligence,” said Anil Singhal, co-founder, president and chief executive officer, NETSCOUT. “Three years ago, we saw the opportunity to leverage IP convergence to provide scalable, real-time access to the mission-critical data needed to drive our customer’s digital initiatives. Since then, we have made significant investments in both organic innovation and strategic acquisitions to capitalize on this massive opportunity,” he added. Singhal noted, “Our InfiniStreamNG is a powerful ‘anyware’ platform that elegantly and seamlessly integrates NETSCOUT’s core ASI technology with the key technologies we obtained through our acquisition of Danaher’s Communications business. In just one year since completing this acquisition, we have delivered a modern, platform-agnostic, and highly cost-effective solution that doesn’t require costly middleware due to our smart data approach for processing, storing and accelerating the collection and analysis of wire data. This real-time analytics platform, harnessing the full power of IP intelligence, will accelerate our customers’ digital transformation initiatives, placing NETSCOUT at the heart of the success of their rapidly changing digital business.” “A long-time pioneer in the use of real-time network traffic intelligence, NETSCOUT has made this most accurate representation of system activity available to support an entire new generation of carrier, web, and enterprise applications,” said Zeus Kerravala, founder and principal analyst, ZK Research. “This high-quality data, which started out serving mostly network performance management uses, now feeds multiple analytics stacks including service assurance, application performance management, business intelligence and cybersecurity, at cloud scale. With this new level of deeper visibility and greater control, businesses can have the necessary confidence that they will achieve their intended business outcomes as they transform their information architectures,” he said. (NetEvents)

[via India Telecom News]

DDoS Attacks Are Coming Back to School

It is that time of year, where kids of all ages are heading back to school, with fresh, unwrapped school supplies in their backpacks with their smartphones, tablets, and laptops. Teacher and school administrators are busy preparing for their new incoming class of students, entering in student data, setting up distribution lists, updating their syllabuses, and setting up their grading systems among the many things our teachers do for our children. Hard at work behind the scenes are the computers, networks, servers, applications, and cloud infrastructure that supports all of the applications that our teachers, administrators, and students depend upon throughout the school year. While all of these various technologies have enabled a modern teaching and learning experience and provided efficiencies to our school systems, their availability is under appreciated. As we have come to rely on these technologies more, their availability has grown in importance as well. Traditionally we think of the availability of our school in terms of the building(s) being open or closed, such as closed for a snow day, or worse for a natural disaster. But what happens when one piece of IT infrastructure that is used every day in our schools does not work? What happens if there is no internet access? Cloud-based solutions are not helpful, unless classes are moved to the local coffee shop, but only so many students can fit thought the doors. What happens if the server hosting exams or grades goes down during finals? Do students get sent home indefinitely until the problem is fixed. One of the widest ranging threats to an educational institution’s Information infrastructure today are Distributed Denial of Service (DDoS) attacks. These attacks are very common on the networks of our colleges and universities and are increasingly being seen at high schools across America. At Arbor we have worked with educational institutions to implement comprehensive solutions to protect against DDoS attacks, including a group of state and regional educational organizations with a combined network that supports more than 1.4 million students and school internet access. The network provides access to high stakes online testing, such as PARCC, AIR, and MAP1 and supports integrated Education Management Information Systems with student data reporting, student information systems, and state fiscal software applications. The shared network was experiencing an increasing number of DDoS attacks – 28 attacks in 28 days was reported at one time. Adding to the issue was that not all the attacks throughout the network were detected or reported. Administrators were aware of “low and slow” DDoS tactics targeting applications with lesser volumes of traffic that were very difficult to identify. (NetEvents)

It is that time of year, where kids of all ages are heading back to school, with fresh, unwrapped school supplies in their backpacks with their smartphones, tablets, and laptops. Teacher and school administrators are busy preparing for their new incoming class of students, entering in student data, setting up distribution lists, updating their syllabuses, and setting up their grading systems among the many things our teachers do for our children. Hard at work behind the scenes are the computers, networks, servers, applications, and cloud infrastructure that supports all of the applications that our teachers, administrators, and students depend upon throughout the school year. While all of these various technologies have enabled a modern teaching and learning experience and provided efficiencies to our school systems, their availability is under appreciated. As we have come to rely on these technologies more, their availability has grown in importance as well. Traditionally we think of the availability of our school in terms of the building(s) being open or closed, such as closed for a snow day, or worse for a natural disaster. But what happens when one piece of IT infrastructure that is used every day in our schools does not work? What happens if there is no internet access? Cloud-based solutions are not helpful, unless classes are moved to the local coffee shop, but only so many students can fit thought the doors. What happens if the server hosting exams or grades goes down during finals? Do students get sent home indefinitely until the problem is fixed. One of the widest ranging threats to an educational institution’s Information infrastructure today are Distributed Denial of Service (DDoS) attacks. These attacks are very common on the networks of our colleges and universities and are increasingly being seen at high schools across America. At Arbor we have worked with educational institutions to implement comprehensive solutions to protect against DDoS attacks, including a group of state and regional educational organizations with a combined network that supports more than 1.4 million students and school internet access. The network provides access to high stakes online testing, such as PARCC, AIR, and MAP1 and supports integrated Education Management Information Systems with student data reporting, student information systems, and state fiscal software applications. The shared network was experiencing an increasing number of DDoS attacks – 28 attacks in 28 days was reported at one time. Adding to the issue was that not all the attacks throughout the network were detected or reported. Administrators were aware of “low and slow” DDoS tactics targeting applications with lesser volumes of traffic that were very difficult to identify. (NetEvents)

[via India Telecom News]

2016 Congressional Report: CylancePROTECT Halted OPM Breach

Congressional Report Concludes CylancePROTECT Played a Pivotal Role in Discovering, Stopping and Remediating Malware that Caused OPM Data Breach. Cylance Inc, the company that is revolutionizing cybersecurity through the use of artificial intelligence to proactively prevent advanced persistent threats and malware, was named in a report today released by Chairman Jason Chaffetz (R-UT) with the House Committee on Oversight and Government Reform as having played a critical role in discovering, halting and remediating the data breach at the United States Office of Personnel Management in 2015. The report says that the company’s CylancePROTECT product was first used following discovery of the compromise to positively identify and stop the APT attack attributed to “Shell Crew” and/or “Deputy Dog” hacker teams, commonly associated with Chinese origin, and says, “The significance of the cutting edge preventative technology offered by Cylance in responding to the OPM data breach cannot be understated.” “We consider it an honor to have been able to help stop and clean up this vicious attack,” said Stuart McClure, founder, president and CEO at Cylance. “The OPM breach, and countless others like it, is exactly why we were compelled to apply artificial intelligence to fighting hackers, whether state actors, rogue hackers, organized criminal groups, or cyber terrorists. Our mission is to protect everyone under the sun and we are just getting started.” “We knew at Assurance Data that CylancePROTECT was game-changing technology when it was first released,” said Matthew Morrison, president and CEO at Assurance Data, a long-time channel partner of Cylance and a leading information security consultant for the federal government. “Seeing for ourselves how advanced malware was slipping past traditional endpoint security products, we recommended CylancePROTECT to the Office of Personnel Management and recommended its use on all computers and servers,” he added. US-CERT issued a report on April 24, 2015 stating that OPM discovered suspicious activity on its networks on April 16, 2015. On April 17, 2015, Jeff Wagner emailed OPM’s then Chief Information Officer Donna Seymour to report that Cylance officials were “coming in to help with the forensics” because “it was their tool that found the malware.” Today’s report notes that “CylancePROTECT was the first tool that OPM used after the agency learned its network was compromised, and the tool immediately found malware and set about cleaning OPM’s enterprise.” The report quotes OPM’s IT Security Officer Jeff Wagner as saying that Cylance was able to find things that other tools could not “because of the unique way that Cylance functions and operates. It doesn’t utilize a standard signature of heuristics or indicators, like normal signatures in the past have been done, it utilizes a unique proprietary method.” (NetEvents)

Congressional Report Concludes CylancePROTECT Played a Pivotal Role in Discovering, Stopping and Remediating Malware that Caused OPM Data Breach. Cylance Inc, the company that is revolutionizing cybersecurity through the use of artificial intelligence to proactively prevent advanced persistent threats and malware, was named in a report today released by Chairman Jason Chaffetz (R-UT) with the House Committee on Oversight and Government Reform as having played a critical role in discovering, halting and remediating the data breach at the United States Office of Personnel Management in 2015. The report says that the company’s CylancePROTECT product was first used following discovery of the compromise to positively identify and stop the APT attack attributed to “Shell Crew” and/or “Deputy Dog” hacker teams, commonly associated with Chinese origin, and says, “The significance of the cutting edge preventative technology offered by Cylance in responding to the OPM data breach cannot be understated.” “We consider it an honor to have been able to help stop and clean up this vicious attack,” said Stuart McClure, founder, president and CEO at Cylance. “The OPM breach, and countless others like it, is exactly why we were compelled to apply artificial intelligence to fighting hackers, whether state actors, rogue hackers, organized criminal groups, or cyber terrorists. Our mission is to protect everyone under the sun and we are just getting started.” “We knew at Assurance Data that CylancePROTECT was game-changing technology when it was first released,” said Matthew Morrison, president and CEO at Assurance Data, a long-time channel partner of Cylance and a leading information security consultant for the federal government. “Seeing for ourselves how advanced malware was slipping past traditional endpoint security products, we recommended CylancePROTECT to the Office of Personnel Management and recommended its use on all computers and servers,” he added. US-CERT issued a report on April 24, 2015 stating that OPM discovered suspicious activity on its networks on April 16, 2015. On April 17, 2015, Jeff Wagner emailed OPM’s then Chief Information Officer Donna Seymour to report that Cylance officials were “coming in to help with the forensics” because “it was their tool that found the malware.” Today’s report notes that “CylancePROTECT was the first tool that OPM used after the agency learned its network was compromised, and the tool immediately found malware and set about cleaning OPM’s enterprise.” The report quotes OPM’s IT Security Officer Jeff Wagner as saying that Cylance was able to find things that other tools could not “because of the unique way that Cylance functions and operates. It doesn’t utilize a standard signature of heuristics or indicators, like normal signatures in the past have been done, it utilizes a unique proprietary method.” (NetEvents)

[via India Telecom News]

India’s Internet Is Really Slooooooooooooooooow

Google may be the world’s biggest Internet company, but Rajan Anandan, the head of its India operation, says he’s become just as focused on what users are doing offline. His team has led Google’s push into apps that can download data for later use without an active mobile connection. One helps people navigate New Delhi public transit; another lets users store YouTube videos for replay; a third offers an offline version of Google Maps. These efforts all have the same goal: making Google products easy to use even with poor Internet connections. About 375 million to 400 million people in India are online, the world’s second-largest Internet population after China. Many depend on mobile connections that can only be generously called spotty. Source

Google may be the world’s biggest Internet company, but Rajan Anandan, the head of its India operation, says he’s become just as focused on what users are doing offline. His team has led Google’s push into apps that can download data for later use without an active mobile connection. One helps people navigate New Delhi public transit; another lets users store YouTube videos for replay; a third offers an offline version of Google Maps. These efforts all have the same goal: making Google products easy to use even with poor Internet connections. About 375 million to 400 million people in India are online, the world’s second-largest Internet population after China. Many depend on mobile connections that can only be generously called spotty. Source

[via India Telecom News]