DECENT’s Feature-Packed Wallet Stores Custom Tokens
InfiNet Wireless LATAM conference drives wireless development forward following Colombian crime crackdown
QNAP Extends Surveillance Integration Scale with Dahua Technology Network Cameras
NordVPN provides easy and effective online security tips
Palo Alto Networks Korea Held Media Conference on Prospect of 2018 Cybersecurity
USPTO Awards CellTrust Secure SMS and MMS Patent
Wedge Networks Increases Functionality and Performance of Industry Leading Malware Prevention Platform
JASK Expands Platform Beyond SIEM to Transform How SOC Operators Visualize Cyber Attacks
gumi Secures $30M for New Global Blockchain and Crypto Investment Fund
Response to Claims of VPNFilter Malware Infections: Security Concerns Were Addressed in 2017
Eco-friendly Blockchain Project “SEED” invites Global Citizens to Save Earth by Reducing Carbon Emissions
An environmentally friendly blockchain project SEED (Sino Eco Energy Development, CEO/Co-Founder: Yuan Wei Song, http://seedfoundation.io/) has been launched in Singapore. People can participate in the project in two ways: by directly participating in an eco-friendly energy business project or by proving that they are taking action to reduce carbon emissions. According to the Fifth Assessment Report (AR5) published by the Intergovernmental Panel on Climate Change (IPCC), global warming by 2 degrees Celsius is a serious threat to humanity. The report warns that if that happens, the Earth's ecosystem will go through an irrecoverable course. Many animals and vegetation will cease to exist due to the shift in water levels and changes in average temperatures. “Under the agreement built upon the convention held in Paris in 2015 within the United Nations Framework Convention on Climate Change, countries are taking various steps to keep the rise in temperature within 2 degrees by 2020. Yet, what the climate change of 2 degrees means hasn't been well communicated throughout the world. People don't know what they can do to reduce carbon emissions." said Yuan Wei Song CEO of the SEED Foundation. On the goal of the project, he said "The SEED project aims to open investment opportunities for highly profitable eco-friendly energy businesses to everyone. Previously, those were available only for institutional investors or persons of substantial financial means. With the SEED project, any individual can make profit by participating in those businesses or by receive rewards from making eco-friendliness a way of life." With the SEED project, any individual can participate in a large-scale energy business to make profits by investing small amounts in SEED coin. Also, people can download a mobile app and receive ZERA coins through “Physical Eco Proof of Work,” proving that they chose eco-friendly ways of living such as walking or cycling instead of driving. ZERA coins can be exchanged to SEED in the SEED Exchange, so they can save the coins to participate in energy businesses. The “SEED International Center,” a 55 floor multi complex to be built on a 16,600㎡ plot in downtown Jakarta, is the first project, will start next year and completion will be in 2023. This complex has a passive energy design with energy efficient glass. Solar panels and geothermal heat pumps will be used for power generation, while rainwater harvesting, rooftop gardens, green pathways and ecological streams enable the complex to maximize the use of green technology and to minimize carbon emissions. Initial pre-sale for SEED coins will start at 20:00 (UTC+4) May 13, 2018. Pre-sales volume will be within 10% of total SEEDs to be issued at public sales, further information can be found at the SEED website http://seedfoundation.io.
NetFoundry and AWS IoT Analytics: Innovation without compromising security
NetFoundry™, the leader of Application-Specific Networking, announces its role as a global launch partner to Amazon Web Services’ new AWS IoT Analytics platform, released today at Hannover Messe. NetFoundry enables AWS IoT Analytics customers to securely and reliably connect to AWS using any Internet connection. NetFoundry uniquely protects the IoT site and devices, blocking Internet-originated attacks such as botnets and DDoS, in addition to encrypting and securing the data between the IoT edge and AWS edge. NetFoundry’s software and APIs enable new customers to spin up their own IoT networks in minutes. “Zero trust and least privilege access in a world that is increasingly moving towards dynamically changing containerized services is pivotal, which is yet again where NetFoundry scores with its capability to integrate with automation frameworks via its APIs”, said Martin Braem, COO of Klarrio, “whereas we used to be forced to try to force-fit VPNs into the IoT paradigm, now we have a software-based solution which was purpose-built for IoT networking needs”. AWS IoT Analytics enables customers to process, store, and analyze their IoT data without having to deal with the costs and complexity of trying to build such a robust solution. At Hannover Messe, AWS demonstrated a ‘Connected Factory’ that produces IoT data and sends that data to AWS IoT Analytics in the cloud, over a NetFoundry software defined private network, protecting the factory from network attacks such as botnets and DDoS, as well as providing secure, reliable connectivity between the factory and the AWS IoT Analytics cloud. Like AWS, NetFoundry provides its core infrastructure as a fully managed, on-demand service so that customers control the networks without managing the infrastructure itself. Organizations use existing Internet connections as short on-ramps to NetFoundry’s managed global core network, built over the Internet, across multiple tier-one providers. NetFoundry uses a zero trust, software defined perimeter (SDP) with identity-secured networking to enable IoT customers to securely connect to AWS in minutes, pairing NetFoundry’s network agility with AWS’s IoT Analytics agility, and enabling business policies to dynamically control software defined networks. Customers use the NetFoundry Multi-Cloud Gateway, available in the AWS Marketplace, to securely connect their AWS instances to IoT sites, personal devices or data centers. Each device or site connected via NetFoundry is secured via bi-directional certificate validation and software firewalls, included as part of NetFoundry’s fully managed service. NetFoundry’s partnerships and API integrations with leading hardware root of trust solutions, IoT platforms and IoT application providers enables customers to get secure, reliable IoT networking built into their solution. “The capabilities of AWS IoT Analytics in enabling the transformation of vast amounts of data into actionable information, without the high costs and steep learning curve of other IoT platforms, enables NetFoundry's IoT customers to get the ROI they need” , said Michael Kochanik, Head of Global Channels and NetFoundry Co-founder, “With AWS IoT Analytics, we can integrate IoT networking capabilities to provide our IoT customers with ‘one-stop shopping’ including data collection, networking, analysis, transformations, storage and visualization. Partnering with AWS enables our customers to get integrated, end-to-end agility, security, performance and cost efficiency at scale.”
Radware Held Press Conference on Cloud Scrubbing Seoul Center Opening Announcement
On December 19, 2017, Radware (Regional director Kim Do-geon) announced that it opened a cloud scrubbing center in Korea from October 2017 to defend against DDoS attacks at a press conference held in Grand InterContinental Seoul Parnas. Kim Do-geon, CEO of Radware Korea, said, "We want to be welcomed by many customers by analyzing domestic customer's requirements and market environment, and will develop flexible and quick service model by taking advantage of cloud service." He also said, "Radware has become the first vendor to provide a cloud service or build a well-configured scrubbing center in Seoul among a number of vendors seeking such business in Korea. This year and next year will be remembered as years of great change. I will continue doing what I have been doing, but I still expect they will be years with great change." ▲ Radware Korea has established an infrastructure in Korea that enables cyber terror defense such as DDoS without data leakage. ▲ Terence Ying, Vice President of Sales-APAC, introduced about global trends. ▲ Yaniv Hoffman, Chief Vice President of Global Technical, explained about technical backgrounds and achievements. Through the Cloud Center, which is built by integrating Radware’s technology of DDoS, WAF and ADC, an infrastructure for domestic customers to offer global services of DDoS Protection and Web Application security is established. The establishment of a cloud center in Korea is the first in the industry that provides DDoS service. Through this, a variety of benefits became available, such as detection and defense against DDoS attacks in Korea, providing excellent Internet communication environment, and resolving compliance due to data transmission. In addition, Radware will accommodate a variety of networking approaches to provide customized services for enterprise customers, financial institutions and small and medium-sized businesses, and services optimized to environment of companies operating data center or companies that are considering moving or moved to the cloud such as AWS and MS Azure. Terence Ying, Vice President of Sales-APAC, said, "Asia, including Korea, is a very important market for Radware, and five of the nine cloud scrubbing centers are located in Asia to provide optimal services to customers in the area. We are very pleased to announce our Radware service to Korean business customers through the establishment of a scrubbing center in Korea. We expect to see good results by visiting partners for partnership with our corporate customers who are reviewing services during this visit." Yaniv Hoffman, Chief Vice President of Global Technical, said, "Radware recommends customers three things. It's important to have a Robust Cloud Security Network. This is because of the obstacles in this area. In order to maintain and strengthen this system, members of the Exceptional Cloud Team must be engaged. Of course, Superior Technology is the base. Radware has all three of these elements and is providing its customers with solutions and services."
Ziften Announces Membership in Microsoft Intelligent Security Association
Ziften, a leading provider of all-the-time endpoint visibility and control for client devices, servers, and cloud VMs, today announced its membership in Microsoft’s newly-created Intelligent Security Association forging partnerships to defend against a world of increased threats. Even the best defenses can be breached and security teams must respond more quickly and more aggressively to ensure the safety of their data and systems. Ziften delivers fully integrated threat protection that covers mutual customers’ macOS and Linux endpoints and virtual cloud systems with a foundation of shared intelligence and the power of the cloud to transform monitoring of enterprise systems. Today’s announcement builds on the November 8 news that Ziften’s Zenith security platform is integrated with Windows Defender Advanced Threat Protection (ATP) from Microsoft delivering a cloud-based, “single pane of glass” to detect, view, investigate, and respond to advanced cyber-attacks and breaches on Windows, macOS and Linux-based endpoints. Customer Benefits Ziften’s security integration with Windows Defender ATP helps organizations speed detection of attacks and zero-day exploits, uncover the full scope of any breach, and quickly respond to contain attacks and prevent recurrence on Windows, as well as macOS and Linux systems. Ziften’s membership in the new Microsoft Intelligent Security Association will benefit mutual customers through: Threat Protection for all Endpoints and the Cloud: The integration delivers advanced endpoint detection and response solutions, and cloud visibility and security solutions for Windows, macOS, and Linux systems. Easy to Integrate Security Solutions: The simple Ziften “2-click” integration with Windows Defender ATP enables customers to detect, view, investigate, and respond to advanced cyber-attacks using only the Windows Defender ATP management console. Intelligence Sharing to Turn the Tide to Customers’ Advantage: Working within the Intelligent Security Association, Ziften’s integration brings intelligence signals from additional sources to bear, helping customers detect and respond to threats faster. Putting the Power of the Cloud to Work: The power of the cloud transforms monitoring at scale. The integrated, Azure powered approach means customers can instantaneously search 6 months of rich machine timeline unifying security events from Windows, macOS, and Linux-based systems – both physical and virtual. “We believe our membership in the Microsoft Intelligent Security Association is a huge win for our mutual customers and prospects,” said Chuck Leaver, CEO of Ziften. “As security vendors, we all recognize the need to cooperate and collaborate to protect our customers and their employees. Kudos to Microsoft for leading this industry effort. The days of siloed endpoint security tools that provide only incomplete, point-in-time data exposing organizations to unacceptable risks and unnecessary costs is ending. Together, we help security teams to address today’s visibility, security and control challenges at the endpoint and in the cloud.” Andrew Conway, General Manager, Microsoft 365 Security, Microsoft Corp. added, “The Microsoft Intelligent Security Association improves cooperation from leading sources to protect mutual customers. Continued integration and intelligence sharing from Ziften within the context of the Microsoft Intelligent Security Graph enables customers to more quickly and accurately detect, investigate and respond to attacks across their entire endpoint and cloud base.”
Indonesia’s First Dedicated Homeland Security Conference And Expo Opens In September
Comexposium Singapore, Organiser of leading homeland security event is delighted to announce the inaugural Homeland Security (HLS) Indonesia 2018 conference and exhibition, a biennial event dedicated to bringing the latest expertise, products and solutions to address Indonesia's growing requirements in counter-terrorism, homeland security and law enforcement. HLS Indonesia 2018 has the official Indonesian Government support from the Ministry of Law and Human Rights, the National Narcotics Agency (BNN), the National Counter-Terrorism Agency (BNPT), and the Indonesian National Police (POLRI). ASEAN defence ministers have identified terrorism as the single biggest threat to the Southeast Asian region. In a joint statement following a retreat in Singapore on 6 February 2018, the ministers noted that: "Terrorism is a severe threat to ASEAN's progress, prosperity and very way of life." Indeed, with a population of over 265 million and an archipelago comprising over 17,000 islands to protect, homeland security has gained prominence in Indonesia over the last decade. Market intelligence firm Research and Markets has projected a 32% growth in related spending from US$6.4 billion in 2018 to US$9.6 billion in 2022.The increasing expenditure will support the Indonesian government's commitment to address the increasing threat of terrorism, and to manage piracy and illegal fishing, illegal immigration, drug smuggling, and criminal activities in the nation. These requirements are expected to increase demand for the latest security training and technologies, including access control, airport security, biometric systems, command and control, infrastructure protection, integrated security systems, as well as land and maritime surveillance systems, to name just a few. HLS Indonesia 2018 will be held at the Jakarta Convention Center from 19-20 September, occupying approximately 3,000 m2 of prime exhibition space. Comexposium Singapore expects to match 100 leading international and local exhibitors with 10,000 trade visitors from the government's civil defence, homeland security, immigration, police, and transport agencies for the inaugural event. A high-level conference, chaired by Mr R.Rakyan Adi Brata, HS, CCTP, Expert Advisor to the House of Representatives for Law, Human Rights & Security and tentatively titled: Indonesia's New Terrorist Landscape -- The Collaborative Response, will be co-located with the exhibition to bring the latest insights from leading experts from around the world. The conference is expected to attract approximately 400 delegates from government agencies, industry professionals, and academia.
Ziften Enters Australia New Zealand Market; Launches “Fast Start” Program for Microsoft Windows Defender ATP Resellers
Ziften, the leading provider of all-the-time visibility and control for client devices, servers, and cloud VMs, today announced its entry into the ANZ cybersecurity market with the appointment of Greg Kieser as Ziften Country Manager ANZ, and in partnership with global services partner Insentra to assist with distribution and regional customer training and support. "As cyber security threats continue to hit all sectors of business, this is the right time for me to join Ziften and expand the opportunity for success in ANZ," said Greg Kieser, Country Manager ANZ, Ziften. "I’m looking forward to quickly building Ziften’s share in the ANZ market, and to working closely with Insentra and Microsoft to do so." Ziften is also announcing the launch of its Fast Start program for onboarding Microsoft Windows Defender Advanced Threat Protection (ATP) channel partners globally. This follows Ziften’s previously announced strategic business and technology collaboration with Microsoft, and integration of its Zenith® systems and security operations platform with Windows Defender ATP. The Ziften Fast Start program expedites the acceptance and on-boarding of existing Windows Defender ATP partners into the Ziften channel partner program. The integrated solution provides joint customers with a cloud-based, “single pane of glass” to detect, view, investigate, and respond to advanced cyber-attacks and breaches on Windows, macOS, and Linux endpoints – including physical, virtual, and cloud-based systems. “Ziften is 100% focused on delivering customer value through channel partners”, said Greg McCreight, SVP of Worldwide Channels, Ziften. “With our Fast Start program, we are providing hands-on partnership to existing Microsoft channel partners, rapidly enabling them to solve customer’s post-breach security challenges across their entire systems environments with Ziften and Microsoft.” “As a global Microsoft partner, teaming with Ziften to offer their Zenith security platform integrated with Microsoft Windows Defender ATP was a no-brainer”, said Ronnie Altit, Chief Executive Officer, Insentra. “We’re thrilled at the seamless integration between Zenith and Windows Defender ATP giving our partners and their customers holistic protection and visibility across their Windows and non-Windows systems. Ziften has been a pleasure to work with, and supportive at every step of the process. We expect to be extremely successful offering this powerful security solution to our partners and providing the local Australia and New Zealand pre-sales, deployment and support for the Ziften security solution.” The integrated, cloud-powered approach supports the most highly complex multi-system, multi-cloud enterprise environments. And the Ziften Fast Start program provides existing Windows Defender ATP channel partners and service providers with rich benefits, including: Expedited Acceptance and On-Boarding – Ziften and Insentra channel managers and field sales work directly with qualified partners to get them up and running offering the Ziften Zenith endpoint security solution integrated with Windows Defender ATP. Superior Security Value – Channel partners are uniquely positioned to offer their customers greater security value across more of their overall environment than ever, increasing the number of supported and secured Windows, macOS, and Linux systems. Hands-On Partnership – Once signed on, Ziften and Insentra field sales, sales engineers, and marketing teams support daily pre-sales engagements, drive new sales opportunities, and help to close more deals with Microsoft and Ziften endpoint security.
Atari Film Producers Announce Disruptive Project Financing with “Bushnell Token” Cryptocurrency
Vision Tree, a media production and financing company, today announced an innovative film funding model with intent to launch a private pre-sale for Bushnell Token in early Spring. Bushnell Token is an ERC-20 security token that offers gamers and Atari fans a unique way to co-own and participate in the film from start to finish. While the film has received offers from conventional and studio-sourced financing, Vision Tree has elected cryptocurrency funding to accelerate the film making path in a whole new way, offering Bushnell Token holders receiving pro rata earnings from the upcoming Atari movie. Additionally, fans will vote on key decisions for the project including selection of the official trailer, select cast members and more. Given the gaming and entertainment industry’s increasing adoption of blockchain and cryptocurrency backed projects, Bushnell Token’s unique use case is expected to resonate with film enthusiasts and Atari fans alike. Dates for the private pre-sale of Bushnell Token will be announced in the coming weeks, and key information on the token sale, including the whitepaper, token structure and project use case, will be available on the film website: www.AtariMovie.co. Nolan Bushnell said: “With Atari, a paradigm shift began in the way people interacted with technology. Atari’s renegade approach resulted in it becoming the fastest growing company in the U.S. in its time. Blockchain represents a new environment that needs to be explored in all its dimensions: games, movies, books, art, etc. It is an innovative approach, fueling economic models and matching support with funding. The idea that we have a new way to fund things is fascinating and powerful.” Brian Hecker, Director of the Atari movie, said: “Reflecting on how far we’ve come in our short-lived tech age, Nolan is a true unsung hero, having introduced the computer to the masses in ’72, before even pocket calculators hit the mainstream. Nolan’s work ethic, coupled with his rebellious spirit, has inspired me each day of our 10-year journey working with him and his family to get the story right. We couldn’t be more thrilled to engage with all tech-lovers, game enthusiasts, and dreamers who’ve been told ‘no’ to help bring this incredible underdog story to the big screen.” J.D. Seraphine, Co-Founder of Vision Tree, said: "The option of an ICO has been very disruptive to the venture capital community and traditional financing methods, while it’s been very beneficial to us. Entertainment companies can engage directly with their audience and crowdsource financing at such a great scale now. We’ve seen success with our own films, namely Sirius, and we’re seeing many successful film projects continue momentum and traction through an ICO. We’re excited to be one of the first to utilize an ICO and a cryptocurrency to engage with audiences and finance a film in this way.”
Wedge Networks Partners Bangkok Systems To Bring Wedge Absolute Real-time Protection To The Royal Thai Army Hospital
Wedge Networks, the leader in real-time threat prevention, has been working with its partner, Bangkok Systems, to bring its Wedge Absolute Real-time Protection (WedgeARP) solution to the Thai market and has recently deployed it in the Royal Thai Army Hospital. WedgeARP utilizes technologies that incorporate Deep Learning techniques at the network layer to deliver the industry’s highest accuracy and performance for real-time, inline detection and blocking of both known and new, previously unknown Ransomware and other malware. WedgeARP also offers a malware analyzer service which further enriches this capability by executing and characterizing suspected malware and then feeding the results back to WedgeARP systems globally to improve malware prevention speed and accuracy for all customers using the platform. “Malware prevention is job number one but elevating threat intelligence is also critically important,” said James Hamilton, CEO of Wedge Networks, Inc. “Our customers also want to understand the intentions of blocked threats. We are pleased to be working with Bangkok Systems to provide our security solutions where they are greatly needed within the Royal Thai Army Hospital.” Kris Nawani, IT Security Solution Manager, Bangkok Systems & Software Company, said, “BKK Systems partners with market-leading vendors to deliver best of breed technologies that help enterprises solve ongoing advanced network security problems, such as blocking ransomware and zero-days, in their complex IT infrastructures. Wedge Absolute Real-time Protection is a perfect fit into the BKK Systems security solutions portfolio and helps to eradicate advanced malware intrusions as well as provides valuable insights into what is happening within the networks themselves.”
Ocado unveils AI-based fraud detection system for online orders powered by Google Cloud
Today Ocado Technology (the technology division of Ocado, the world's largest online only supermarket) is revealing the world's first AI-based fraud detection system for online grocery purchases. The new system relies on an advanced machine learning algorithm developed by Ocado Technology using TensorFlow and the power of Google Cloud. The system is part of the Ocado Smart Platform (OSP), an end-to-end solution designed to power all aspects of a retailer's e-commerce business. OSP has been licensed by multiple grocers worldwide, including Morrisons in the UK, Groupe Casino in France, and Sobeys in Canada. Online fraud typically covers any instance where an order is delivered but not paid for. Fraud can happen as a result of a genuine mistake (a customer entering the wrong personal details or using an expired card accidentally) but, occasionally, it can also be the result of malicious intent. If left unchecked, fraud can propagate to other systems and companies and affect customer service. Therefore, Ocado Technology developed a mechanism of predicting and recognizing these incidents among millions of other normal events using data collected from past orders, including cases of fraud. The engineers then implemented a deep neural network using TensorFlow and uploaded the whole fraud detection system to the cloud. The model has already achieved significant success, improving Ocado’s precision of detecting fraud by a factor of 15.
JASK Brings AI-powered Security Platform to Europe in Partnership with Ignition Technology
JASK, the provider of the industry's only Autonomous Security Operations Center (ASOC) platform, today announced the launch of JASK Answers for Channel Partners in the UK and Europe. Ignition Technology, JASK's first specialist Value Added Distributor (VAD) partner, will make JASK's ASOC platform available to UK customers through its network of channel partners. The JASK ASOC platform is an artificial intelligence (A.I.) and machine learning data solution for security personnel. The platform automates the collection, normalization, correlation and analysis of alerts, helping security operations center (SOC) analysts focus on the highest-priority threats to streamline investigations and deliver faster, real-time response. The platform is open and extensible, enabling customers to build on their current investments. JASK's channel-driven global expansion comes on the heels of the introduction of the JASK Answers Partner Network, which brings together the industry's leading cybersecurity solution providers and technology alliance partners. The program is led by industry veteran Marc Davis, JASK Vice President of Channels and Alliances. "JASK enables security analysts everywhere to maximise their efficiency and focus their efforts on distilled data insights,” said Davis. “With JASK Answers, we are committed to enabling our reseller partners in the UK to deliver the best possible products and services to their business customers.” "Partnering with JASK allows us to meet the need for improved visibility and security analyst efficiency, while getting the training, marketing resources and selling incentives that empower us to become trusted advisors to our clients," said Sean Remnant, CSO of Ignition. In addition to serving as a strategic JASK distribution partner, Ignition is also a major Cylance distributor. JASK and Cylance recently announced a strategic partnership to integrate the CylancePROTECT AI-powered endpoint security with JASK ASOC platform for compelling device visibility. "Both Ignition and JASK are important Cylance partners in their own respects," said Didi Dayton, Vice President of Worldwide Channels and Alliances of Cylance. "The combination of JASK and Cylance delivers customers a single source for unparalleled visibility and protection across all data and assets, and our shared partnership with Ignition only extends the reach of this combined solution to the high-growth EMEA market." JASK Answers for channel partners provides robust benefits including: ● Rewards incentivising new leads ● Tailored, specialist sales support, training and resources to ensure optimal chances for success ● Demand generation support to help partners raise awareness and jointly market solutions based on the JASK ASOC platform. The JASK Answers for Channel Partners programme is designed to deliver the margin and support needed to enable JASK solution provider partners, including value-added resellers, national resellers, and distributors, to successfully promote sales and support customers in the UK and Europe.
QNAP Launches QVR Center and QVR Guard, Extending QVR Pro’s Surveillance Deployment Scope and Providing a Failover Recording Solution
QNAP® Systems, Inc. today announced the official release of QVR Center and QVR Guard, two comprehensive applications for QVR Pro that add central management and high-availability failover to QVR Pro. “QNAP continues to develop advanced surveillance applications to meet the growing needs for complex surveillance environments. QVR Center offers a central management platform for multiple QVR Pros, while QVR Guard provides dependable redundancy for QVR Pro, ensuring uninterrupted surveillance recordings,” said David Tsao, product manager of QNAP. QVR Center simplifies surveillance tasks by allowing central management of multiple QVR Pros deployed within offices, schools, public spaces, workplaces, and other environments. Users can centrally monitor live feeds, play back surveillance footage, and receive event notifications from multiple QVR Pros to respond quicker to events. QVR Guard is a high-availability failover management app to protect QVR Pro from system failure and to ensure uninterruptible surveillance recordings. QVR Guard features failover functionality that automatically takes over recording tasks from the QVR Pro server if an unexpected system fault or hardware failure occurs. Recording files are saved on the QVR Guard NAS until the QVR Pro system reboots and functions normally. Availability QVR Center and QVR Guard are now available from the QTS App Center. Learn more about QVR Center at https://www.qnap.com/solution/qvr-center/en/ Learn more about QVR Guard at https://www.qnap.com/solution/qvr-guard/en/ System Requirements QVR Center 1. x86-based (64-bit) QNAP NAS with at least 2GB RAM. 2. QTS 4.3.3 (or later). 3. Container Station 1.7.2551 (or later) must be installed before QVR Center can be used. QVR Guard 1. x86-based (64-bit) QNAP NAS with at least 4GB RAM (8GB RAM is recommended for the smoothest usage experience). 2. QTS 4.3.3 (or later). 3. Container Station 1.7.2551 (or later) must be installed before QVR Guard can be used.
Radiflow Reveals First Documented Cryptocurrency Malware Attack on a SCADA Network
Radiflow, a provider of cybersecurity solutions for critical infrastructure, today announced that the company has revealed the first documented cryptocurrency malware attack on a SCADA network of a critical infrastructure operator. Radiflow discovered this cryptocurrency malware attack as part of routine and ongoing monitoring of the OT network of a water utility customer. The company reports that this attack infected several servers in the OT network in order to mine the Monero cryptocurrency. A cryptocurrency malware attack increases device CPU and network bandwidth consumption, causing the response times of tools used to monitor physical changes on an OT network, such as HMI and SCADA servers, to be severely impaired. This, in turn, reduces the control a critical infrastructure operator has over its operations and slows down its response times to operational problems. Radiflow’s research team uncovered that this cryptocurrency malware was designed to run in a stealth mode on a computer or device and even disable its security tools in order to operate undetected and maximize its mining processes for as long as possible. “Cryptocurrency malware attacks involve extremely high CPU processing and network bandwidth consumption, which can threaten the stability and availability of the physical processes of a critical infrastructure operator,” explained Yehonatan Kfir, CTO at Radiflow. “While it is known that ransomware attacks have been launched on OT networks, this new case of a cryptocurrency malware attack on an OT network poses new threats as it runs in stealth mode and can remain undetected over time.” This cryptocurrency malware attack was discovered by Radiflow’s iSID industrial intrusion detection system while monitoring the network of the waste water site of this utility customer. iSID identified and alerted in real-time to several abnormalities, including unexpected HTTP communications and changes to the topology of the customer’s OT network as well as communication attempts with suspicious IP addresses. “PCs in an OT network run sensitive HMI and SCADA applications that cannot get the latest Windows, antivirus and other important updates and will always be vulnerable to malware attacks,” continued Kfir. “The best way to address this risk is using an intrusion detection system that passively monitors the communication in the OT network and detects anomalies in real-time caused by such malware.” Radiflow’s research team is continuing to research the events surrounding this malware attack in close cooperation with local regulatory authorities. “We are very proud to report that our technology has prevented this potentially damaging attack. Given the attractiveness of cryptocurrency mining and its increasing need for processing power, we will not be surprised if we will continue to see such attacks on other OT networks,” added Ilan Barda, CEO of Radiflow. “This case emphasizes the need for a holistic cybersecurity solution for OT networks, including access control, intrusion detection and analytics services with the relevant expertise.”
CellTrust SL2 Selected by Merrill Lynch Wealth Management for New Client-to-Advisor Text Messaging Solution
CellTrust Corporation, a global leader in enterprise mobile communications compliance enforcement, confidentiality and security, today announced Merrill Lynch Wealth Management selected CellTrust’s “SL2” for their new Client-to-Advisor text messaging solution. The latest development in Merrill Lynch Wealth Management’s industry-leading suite of new digital, mobile and social technologies – the CellTrust SL2 texting option will manage, track, and deliver text messaging as part of a rapidly growing range of resources available to the firm’s nearly 15,000 financial advisors. Those enrolled in Merrill’s mobility program will be able to text with clients on both Apple and Android devices and through a web interface, which provides secure access to corporate email, calendar, and contacts from devices linked to their office phone numbers – the only number clients will need in order to text with their advisors. With the CellTrust SL2 for BlackBerry app, all communication is time- and date-stamped, tracked, logged and archived. “CellTrust is very pleased to have been selected by Merrill Lynch Wealth Management to provide their new Client-to-Advisor text messaging solution,” said Sean Moshir, Chairman and CEO of CellTrust. “Thousands of financial advisors across the globe are now using CellTrust SL2 since its launch in April 2017 and we are now empowering many financial organizations with seamless mobile communications that can be secured, traced and archived to help meet regulatory compliance while enhancing customer service.” The second generation of CellTrust SecureLine, SL2, launched in April 2017, has been successfully implemented across seventy-eight financial service organizations with tens of thousands of licenses in use around the world. With its unique user-based, multi-device access, real-time analytics and expanded desktop access and user management—SL2 delivers the usability and productivity benefits of BYOD while allowing organizations to manage, trace and archive mobile voice and SMS in support of compliance. CellTrust partners with a number of leading enterprise mobility management- (EMM) and long-term archiving providers to support an integrated, compliant BYOD solution which enables regulated industries to put communication policies in place and enforce them.
Ziften Ascends in Cybersecurity Market: Security Operations Platform Receives Industry Analyst, Independent Lab, and Technology Partner Recognition
Enterprise organizations need to more effectively manage security risk exposures in an era of multifaceted attacks. Stovepipe cyber security tools and limited endpoint management have not worked. They only provide partial, point-in-time data that leaves gaps for security and IT teams to piece together manually. Ziften, a provider of all-the-time visibility and control for client endpoints, servers, and cloud VMs, today announced industry-wide recognition of its Zenith systems and security operations platform. The company was cited by industry analyst firm Enterprise Management Associates (EMA), and successfully evaluated by independent lab, Broadband-Testing. The recognition adds to the momentum for Ziften after announcing integration of Zenith with Windows Defender Advanced Threat Protection by Microsoft in November. Recognized as EMA Technology Innovator EMA recently named Ziften Zenith as an “EMA Technology Innovator” as part of its 2017 Next-Generation Endpoint Security (NGES) Vendor Landscape and Five-Year Market Forecast. In its report and corresponding webinar, EMA highlights Ziften Zenith as a solution with a differentiated approach to defending the endpoint. “Ziften services extend well beyond the normal NGES vendors”, said David Monahan, Research Director, Security and Risk Management, EMA. “Zenith provides continuous endpoint visibility and control for exceptional insight into the endpoint and its interaction with the network, enabling organizations to efficiently manage security risk exposures, and detect and respond to advanced threats that are attacking endpoints.” Received Broadband-Testing’s Seal of Approval Europe’s leading independent lab, Broadband-Testing recently awarded Ziften Zenith its Seal of Approval in its Ziften Zenith Review. Broadband-Testing’s hands-on deployment and evaluation of Ziften Zenith features and functionality highlighted the following key benefits: “Key to Ziften’s approach to endpoint security is total visibility. With its Zenith platform, Ziften has a product that ticks all the SysSecOps boxes and more.” “Deployment is simple, especially in a cloud-based scenario as tested. Scalability also looks to be excellent – the biggest customer deployment to date is in excess of 110,000 endpoints.” “Data analysis options are extensive with a huge amount of information available from the Ziften console - a single view of the whole endpoint infrastructure. Additionally, Ziften provides the concept of extensions for custom data collection, beyond the reach of most vendors.” Steve Broadhead, Founder & Director of Broadband-Testing Labs, commented, “Overall, Ziften has a very competitive offering that provides endpoint security and management, and one that must be on every evaluation short-list.” Continued Momentum After Integration with Windows Defender Advanced Threat Protection Today’s announcement builds on the November 8 news that Ziften’s Zenith systems and security operations platform would integrate with Windows Defender Advanced Threat Protection from Microsoft and extend support to Linux and Mac in addition to Windows. The solution delivers a cloud-based, “single pane of glass” to detect, view, investigate, and respond to advanced cyber-attacks and breaches on Windows, macOS and Linux-based endpoints. Ziften’s integration with Windows Defender Advanced Threat Protection helps organizations speed detection of attacks and zero-day exploits, uncover the full scope of a breach, quickly respond to contain attacks and prevent recurrence, and as a result, increase overall security operations productivity.
Accessing Internet in Iran & Other Restricted Countries: NordVPN Offers Alternative Domains
Protests in Iran have been going on for about a week now, and the authorities have restricted social media, the main tool of circulating anti-government information. Iran has blocked Telegram, and Internet has been cut off in several cities where protests have taken place as Iran’s interior minister announced that social networks are “causing violence and fear.” Telegram was the most popular communications app in Iran with over 40 million users. Twitter and Facebook have already been banned in Iran since 2009. Iran is just one example of government cutting off social media and Internet around the world in an attempt to silence freedom of speech and anti-government messages. Living in countries where Internet access is blocked or restricted has made local people very resourceful – they use “unlocked” phones where they can install illegal apps or Google App Engine that conceals a user’s Google activity. NordVPN, a VPN service provider, has designed domains that are meant to function in the countries where the web is restricted. For example, nordme.org domain is used for the Middle Eastern countries. So even if VPN is blocked, and the official NordVPN website is not accessible in these countries, by visiting a dedicated domain, local users will be able to access the website, configure a VPN and, once connected - to reach all blocked websites and apps, including Telegram, Facebook or Twitter. “We stand for the freedom of speech, and are determined to help people access the unrestricted Internet in all the countries where it gets shut down, like Iran,” said Marty P. Kamden, CMO of NordVPN. “That’s why we had to devise an alternative way to provide people with access to our service. We see that this method is really working – currently, for example, we have a big jump in users from Iran. In addition, we provide free emergency VPN for 5 days – or more if needed.” To access the free emergency VPN, visit NordVPN’s emergency page.
Open Source Innovation Strengthens Cloudera's Cybersecurity Solution
Cloudera announced the availability of Apache Spot 1.0 (incubating), which enables fast, easy, and more scaleable cybersecurity machine learning. Spot is a community-driven cybersecurity project, built to bring advanced analytics to all IT Telemetry data on an open, scalable platform. Since Cloudera's cybersecurity solution is built on Spot, this open source release strengthens the solution allowing enterprises to more effectively accelerate advanced threat detection at scale. Spot provides a community based approach to cybersecurity allowing organizations to collaborate across industries while simultaneously changing the economics of cybersecurity. The Spot open source project delivers visibility into security threats by providing advanced threat detection using machine learning and advanced analytics. Spot is built on top of Cloudera's platform leveraging Apache Spark and Hadoop, optimized for Intel hardware, and provides the ability to ingest and store high volumes of IT telemetry data for advanced threat detection with machine learning, accelerated threat investigation with complete contextual information at analyst finger tips, and a future-proofed open source infrastructure that changes the economics of cybersecurity. Highlights from the Spot 1.0 release (incubating) include: Improved machine learning performance with Spot's upgrade to Apache Spark 2.1. Better run times and model performance for all DNS, proxy, and NetFlow workloads due to improvements to the Suspicious Connects open source machine learning models. Tighter integration with Cloudera's platform to take advantage of Cloudera components while enhancing the Apache Spot open data model. Cloudera's cybersecurity solution, built on Apache Spot, uses advanced machine learning to baseline normal enterprise behavior across networks, endpoints, and users in order to see anomalies within the enterprise. Creating a single pane of glass for complete contextual security data allows for organizations to store multiple years worth of data at a lower cost while accelerating threat investigation and response. As cybersecurity threats become more mature and unique, organizations are in need of an open source approach to extend enterprise visibility while laying the foundation for advanced machine learning threat detection.
Fasoo.com FDI 2017 Press Conference
On the afternoon of the April 5th, Fasoo.com held a press conference on 'Fasoo Digital Intelligence (FDI) 2017' at JW Marriott Hotel Seoul. This event was prepared to introduce the features and major programs of the event prior to the launch of Fasoo.com's annual event, 'FDI 2017,' and officials including Cho Kyu-gon, President and CEO of Fasoo.com, Inc., attended the event. Cho Kyu-gon said, "The whirlwind of great change called the Fourth Industrial Revolution is a big threat to everyone, but it is also a tremendous opportunity for a prepared company.” And, "Today is the age of platform competition, not solution competition. Fasoo.com will be able to gain competitiveness to lead a new age through the smarter and more extended platform offered in various fields." ▲ Fasoo.com held 'Fasoo Digital Intelligence (FDI) 2017' press conference. ▲ Cho Kyu-gon said, "It will be possible to gain competitiveness through Fasoo.com's smart and extended platform." According to the announcement, 'FDI 2017' will be held in Grand Ballroom of JW Marriott Hotel Seoul from 2 pm on April 5. FDI, the 10th event this year, introduces Fasoo.com's various latest upgrades and new services as an intelligent platform under the theme 'Experience Intelligent Digital Platform'. First, at the keynote session, John Herring, President and CEO of Fasoo, Inc., who was newly recruited in North America corporation earlier this year to further expand its presence in the North American market, examined global security trends and key issues, and introduced data security market conditions and sales strategies. Through the session presentation, Fasoo.com then suggested a data-driven security strategy that addresses the ongoing threat of information leakage and a practical solution to that. It presented implementation method of intelligent data security platform that detects threats in real time and consistently complements policies through various products included in ‘Fasoo Data Security Total Service Framework’. ▲ Various products related to intelligent digital platform were presented at the event. ▲ Fasoo.com provides from data security consulting to design-build-management service. Moreover, a session presentation about ‘Fasoo Data Security Total Service’ that will be newly presented from this year was progressed to deliver ‘Fasoo Data Security Framework’ more effectively to customers. Suggesting the right direction of information protection mainly focused on data, ’Fasoo Data Security Total Service' is Fasoo.com's specialized service that provides from data security consulting to design-build-management service to protect core business data. In addition, Fasoo.com exhibited 3.0 version of intelligent memo application service 'DigitalPage' based on artificial intelligence that is greatly improved in its usability, and 5.0 version of intelligent security platform application 'Sparrow'. Listed in application security testing section of Gartner Magic Quadrant this year, ‘Sparrow’ has further enhanced the product's perfection with more powerful engine performance and intelligence enhancements based on the machine learning. Besides, the intelligent document platform 'Wrapsody,’ which can manage all the documents regardless of where they are, and the latest upgrade version of the intelligent non-discrimination platform 'Analytic DID', launched last year, were also available through demo demonstrations. ▲ ‘Sparrow’ 5.0 enhanced machine learning-based intelligent functionality. ▲ ‘DigitalPage’ 3.0 became more convenient to store and use memos. ▲ ‘Wrapsody’ can manage documents regardless of where they are.