As Halloween approaches, clowns aren’t the only unwelcome guests making headlines this holiday season. In the world of IT, malware is sinking its teeth into business data everywhere. Ransomware continues to hold business data hostage until companies pay up. Often, hackers demand payment within 72 hours or data will be deleted. Spooky.
So how can we defend the data from a ransomware encryption? In Q2 2016, Datto conducted a survey of 1,100 managed service providers (MSPs) to uncover the trends behind this creepy software. Below, I’ve highlighted some of the current hacker tricks that have been wildly successful when it comes to infecting systems.
Aligned Energy claims it has achieved a breakthrough in reusing waste heat exhausted by servers in the data center – a concept that is not new but difficult to implement in data centers effectively.
The Danbury, Connecticut-based company says the combination of its data center cooling system and a system by the Swedish company Climeon, which converts low-grade waste heat into electricity, can serve as an effective energy source for a data center.
The solution addresses two fundamental problems in data center waste-heat reuse: low-temperature heat produced by servers and the difficulty of transporting heat efficiently. Climeon’s technology is able to put low-grade heat to use efficiently, while using energy produced by a data center to power the same data center means heat doesn’t have to be moved over long distances.
TALLAHASSEE, Fla. – Florida residents returning to or repairing homes damaged by Hurricane Matthew should keep in mind that safety should always be their first consideration when inspecting and cleaning up buildings damaged by flood waters.
Below are a few simple guidelines to follow that will make the clean-up and salvage process safer and easier:
Always wear protective clothing including long-sleeved shirts, long pants, rubber or plastic gloves and waterproof boots or shoes.
Before entering your home, look outside for damaged power lines, gas lines and other exterior damage.
Take photos of your damage before you begin clean up and save repair receipts.
Your home may be contaminated with mold, which raises the health risk for those with asthma, allergies and breathing conditions. Refer to the Center for Disease Control for more info on mold: www.cdc.gov/disasters/hurricanes/pdf/flyer-get-rid-of-mold.pdf.
Open doors and windows so your house can air out before spending any length of time inside.
Turn off main electrical power and water systems and don’t use gas appliances until a professional can ensure they are safe.
Check all ceilings and floors for signs of sagging or other potentially dangerous structural damage.
Throw out all foods, beverages and medicines exposed to flood waters or mud including canned goods and containers with food or liquid.
Also, throw out any items that absorb water and cannot be cleaned or disinfected (mattresses, carpeting, stuffed animals, etc.).
Beware of snakes, insects, alligators and other animals that may be on your property or in your home.
Remove all drywall and insulation that has been in contact with flood waters.
Clean all hard surfaces (flooring, countertops, appliances, sinks, etc.) thoroughly with hot water and soap or detergent.
Before returning to your home, make sure you have the following items among your clean-up and salvage supplies: government-issued photo ID (driver’s license, etc.) and proof of address; bottled water and non-perishable foods; first aid kit; cleanser or hand cleaning gel; hygiene products and toilet paper; insect repellent and sunscreen; flashlights and extra batteries; camera or cell phone to document damage; a list of important phone numbers; and plenty of cash (ATMs may not work).
It’s also smart to create a back-up communication plan with family and friends in case you’re unable to call from your home or other areas affected by the hurricane.
If you haven’t done so already, report your damage from the hurricane to your insurance company and local emergency manager.
For more information on Florida’s disaster recovery visit fema.gov/disaster/4280, twitter.com/FEMA, facebook.com/FEMA, and fema.gov/blog. For imagery, video, graphics and releases, see www.fema.gov/hurricane-Matthew.
With the cost of a breach up 29 percent from 2013 -- and continuing to rise -- according to a recent Ponemon report, enterprise leaders are under mounting pressure to implement security solutions that are effective in detecting threats in this evolving cybersecurity landscape. While organizations generally accept that prevention alone is not enough, data breaches often still go undetected for weeks, months and even years.
Organizations need to know which alarms matter to their organization in order to effectively conduct incident response. Signature-based systems and network management tools are often seen as the traditional approach to organizational security, but these solutions can no longer be the only means for detecting a breach and stopping it before it causes significant harm.
Anomaly detection, which is about enabling proactive incident response by giving security teams the ability to track down potential risks before a simple breach or unusual behavior escalates into a devastating event, is growing in popularity.
Publishes Sixth Annual Study of Cyber Claim Payouts
PHILADELPHIA, Oct. – NetDiligence®, a leading cyber risk assessment and data breach services company, announced today it has published its sixth annual Cyber Claims Study, a study of actual losses for data breach events covered by leading cyber liability insurance carriers.
This year's report summarizes NetDiligence's findings for a sampling of 176 cyber liability insurance claims, 163 of which involved the exposure of sensitive data. The study examines the type of data exposed, the cause of loss, the business sector in which the incident occurred and the size of the affected organization. The study includes analyses on claims due to third-party breaches and claims due to insider involvement, both accidental and malicious. This year's study also includes new analyses on cloud involvement, cyber extortion/ransomware, phishing and POS-related claims.
The primary focus of the study is the costs incurred by underwriters due to cyber claim events, including Crisis Services (forensics, notification, credit/ID monitoring and legal counsel/Breach Coach®), Legal (class action lawsuit defense and settlement), Regulatory (defense and settlement) and PCI (fines).
This year's study finds the average total breach cost was $665K, with an average payout for Crisis Services of $357K. The average claim for a large company was almost $6 million. The average claim in the Financial Services sector was $1.3 million, while the average claim in the Healthcare sector was $726K.
"As an independent and trusted partner to the cyber liability insurance industry, NetDiligence is uniquely positioned to combine data from multiple insurers so that the pool of claims is large enough to ascertain real costs, project future trends and better educate concerned Risk Managers and CFOs," said Mark Greisiger, president of NetDiligence. "We are honored that our cyber liability insurance carrier and broker partners share a sampling of their loss data with NetDiligence. Without them, the valuable insights this educational study provides would not be possible."
AllClear ID is a platinum sponsor of this important industry study for the third straight year. According to Bo Holland, founder and CEO, "The cyber threat landscape today is constantly evolving, and businesses need to be ready to respond in advance of a data breach if they want to have a successful response. To do this, understanding the costs associated with breach events is critical. The insight into claims costs this study provides will enable businesses and industry partners to plan for breaches more effectively and better mitigate financial risk."
The NetDiligence® 2016 Cyber Claims Study is available for download at the NetDiligence website (http://netdiligence.com/portfolio/cyber-claims-study/). eRiskHub® licensors and their clients have exclusive access to an expanded version of the study in the eRiskHub (https://eriskhub.com/).
NetDiligence® is a cyber risk assessment and data breach services company. Since 2001, NetDiligence has conducted enterprise-level cyber risk assessments for a broad variety of organizations, including public entities, financial services, retailers, software developers, medical providers and universities. NetDiligence services are used by leading cyber liability insurers to support loss-control and education objectives. The NetDiligence eRiskHub® (https://eriskhub.com) is licensed by a majority of cyber liability insurers to provide educational and loss-control services to their policyholders. NetDiligence also publishes an annual Cyber Claims Study and hosts annual Cyber Liability Conferences in Philadelphia, Santa Monica and Toronto. For more information, visit http://netdiligence.com/.
About AllClear ID
AllClear ID is the leader in customer security, providing data breach response services to businesses that aim to protect their greatest asset: customers. As an industry leader and trusted partner with more than 10 years of specialized experience in data breach response, AllClear ID has helped thousands of businesses prepare for, respond to, and recover from data breaches, including successfully managing three of the four largest and most complex breach responses in history. The award-winning AllClear ID team is recognized for its expertise, customer service, and innovative solutions. Learn more: www.allclearid.com/business.
RSM US LLP (formerly McGladrey LLP) is the leading provider of audit, tax and consulting services focused on the middle market, with 9,000 people in 86 offices nationwide. It is a licensed CPA firm and the U.S. member of RSM International, a global network of independent audit, tax and consulting firms with more than 38,300 people in over 120 countries. RSM uses its deep understanding of the needs and aspirations of clients to help them succeed. For more information, visit rsmus.com.
About Cipriani & Werner
Cipriani & Werner, P.C. delivers an end-to-end, integrated approach to its clients' privacy and data security needs. Clients of this Mid-Atlantic litigation defense firm benefit from our team of professionals that includes experienced litigators, leaders in crisis communications, forensic IT assessment and mitigation, regulatory compliance and government relations offering services including corporate and IT audits and risk assessments, development of breach response plans, our breach response team and litigation defense. Our clients appreciate the simplicity and certainty of having a single point of contact with a trusted team that has served the insurance industry for more than three decades. For more information, visit www.c-wlaw.com.
About Symantec Cyber Insurance
Symantec Cyber Insurance (https://www.symantec.com/solutions/insurance) provides a robust analytics platform for underwriters, portfolio managers, risk analysts and actuaries to measure cyber risk leveraging the power of Symantec's cyber security intelligence and enable their customers to improve resiliency against emerging cyber attacks. Symantec's cyber security intelligence is being used by global insurance leaders to optimize their portfolios and accurately quantify as well as price cyber risk. Symantec Corporation is the global leader in cyber security. Operating one of the world's largest cyber intelligence networks, we see more threats and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives.
Enables UC Within the Applications and Browsers on the Devices People Use Every Day
SANTA CLARA, Calif. – Avaya today announced a new platform for business communications that fulfills the long-sought promise of unified communications. Avaya Equinox delivers streamlined, mobile-first communications within the applications and browsers employees "live in" for their work. Customizable through the Avaya Breeze™ Client SDK by vertical industry or worker requirements, Avaya Equinox is supported on desktop or mobile devices, and available out-of-the box on the elegant, all-glass Avaya Vantage device.
By consolidating various applications and interfaces into one experience, Avaya Equinox liberates employees and IT departments from disjointed communications that hinder productivity and increase stress. The multitude of real-time and non-real-time communications methods used by workers typically requires a disruptive two- to three-step process of leaving a business application to communicate.
While the vision of UC was to merge methods and simplify access, vendors today still struggle to fully merge all the communication application infrastructure and cloud-based services into a single platform that offers the simplified user experience of Avaya Equinox. Key elements of Avaya Equinox include:
- Mobile First Experience, Action Oriented Workflow for Immediate Response - Workers can quickly see all scheduled meetings, messaging updates, and communications history in one place and take immediate action with a single touch. Optimized to the device -- mobile, tablet, desktop, browser and Avaya Vantage -- the experience maintains mobile simplicity while embracing the benefits inherent in a wide range of devices.
- Skip the Download: Collaborate from a Browser - Avaya Equinox enables robust collaboration from within HTML5 browsers with no downloads or plugins needed, thanks to WebRTC technology. This best- in- class browser experience with full collaboration capabilities eliminates migration challenges for organizations in the process of transitioning desktop business applications to the web and/or shifting applications to the cloud.
- Drive Performance and Differentiate with Smart Digital Solutions - Embed Avaya Equinox communication and collaboration capabilities within business processes or context, or into any business application to create and integrate unique solutions for vertical needs and competitive differentiation. Extend and accelerate smart digital solution creation with the single solution-wide Avaya Breeze™ Client SDK, workflow automation and Avaya Snapp Store ecosystem. Avaya Vantage runs Equinox right out of the box, but is also infinitely customizable through the Client SDK.
- Simply Access True Enterprise Class HD Video and Voice Anywhere, Anytime - Provides reliable, secure, high-quality HD voice and video for communication anywhere on any device, with easy, remote access including VPN-less connectivity. One number reach for all devices accelerates enterprise workflows and deployments; workers even can simultaneously use multiple devices.
- Message with Continuity and Always-On Effectiveness - Persistent, multimedia messaging for text, audio, video, images and files allows employees to access and send team messages in real time -- or anytime. A conversation initiated on the desktop in the morning can be picked back up on the mobile device at lunchtime, for example. Workers can even message those who are offline for more efficient team interaction. One click from the messaging function escalates the session to a call or conference.
- Reduce the Complexity and Expense of Multiple 'UC' Solutions - Avaya Equinox provides a single platform that supports all the different modes of conferencing. High scale audio conferencing, extensive web collaboration, rich multi-vendor HD video, even event streaming to 100,000 users in an all-in-one software solution. Users have one login and one easy solution to learn, and IT has one solution to support with one set of statistics, single provisioning, and a smaller footprint with higher efficiency and lower costs.
Avaya Equinox is generally available globally this calendar quarter, with the advance conferencing capability coming in the first quarter of 2017. The platform is sold on a per-user, suite licensing basis with subscription or perpetual pricing models, along with a traditional concurrent user pricing option for conferencing.
"The vision for unified communications has always been a streamlined, user and IT-friendly experience that enables work to proceed without disruption. Integrating the wide variety of forms and methods of communication into a single flow has been an unmet challenge -- until now. Avaya Equinox has conquered that challenge for the good of end users, IT departments and businesses worldwide, delivered by a company with the vision, focus and expertise to define the future of UC."
Gary E. Barnett, SVP and GM, Avaya Engagement Solutions
"As North America's first fully digital hospital, Humber River Hospital continually seeks to enhance patient care and provide positive outcomes. Enabling physicians, nurses and caregivers with real-time secure messaging and communication is one way we can move the needle in that direction. We're excited to be live on the beta of Avaya Equinox as it seamlessly integrates with our tailored workflows, allowing us to revolutionize and transform healthcare."
Kevin Fernandes, Chief Technology Officer, Humber River Hospital
"With Avaya Breeze, it's easy to embed and orchestrate communication flows within Arrow's Internet of Things software platform, Arrow Connect. Avaya Aura and Avaya Equinox enable us to create solutions that connect people together with context from IoT applications and drive higher business performance across a number of industries such as healthcare, manufacturing, Smart Cities and retail."
Dr. Jeff Reed, Chief Technology Officer, Arrow Electronics Systems Integration
"The continuing dislocation of the workplace demands solutions that are inherently mobile, secure and accessible from virtually any device. Avaya Equinox delivers on this and more with a total communications solution that can be embedded in browsers and business applications. The Avaya Breeze Client SDK is not your everyday API - you have all the tools you need in a single solution that can be customized by vertical industry and workgroup needs, just what UC was intended to be."
Rich Costello, Senior Research Analyst for Unified Communications and Collaboration program, IDC
Avaya enables the mission critical, real-time communication applications of the world's most important operations. As the global leader in delivering superior communications experiences, Avaya provides the most complete portfolio of software and services for contact center and unified communications with integrated, secure networking -- offered on premises, in the cloud, or a hybrid. Today's digital world requires some form of communications enablement, and no other company is better positioned to do this than Avaya. For more information, please visit www.avaya.com.
Certain statements contained in this press release may be forward-looking statements. These statements may be identified by the use of forward-looking terminology such as "anticipate," "believe," "continue," "could," "estimate," "expect," "intend," "may," "might," "plan," "potential," "predict," "should" or "will" or other similar terminology. We have based these forward-looking statements on our current expectations, assumptions, estimates and projections. While we believe these are reasonable, such forward looking statements involve known and unknown risks and uncertainties, many of which are beyond our control. These and other important factors may cause our actual results to differ materially from any future results expressed or implied by these forward-looking statements. For a list and description of such risks and uncertainties, please refer to Avaya's filings with the SEC that are available at www.sec.gov. Avaya disclaims any intention or obligation to update or revise any forward-looking statements.
All trademarks identified by ®, TM, or SM are registered marks, trademarks, and service marks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners
Latest release extends multi-layered endpoint protection, strengthens organisation’s core areas of defense
BRACKNELL, UK – Building on a multi-layered approach to defend against ransomware, LANDESK today announced new capabilities to its LANDESK® Security Suite. With a growing number of ransomware threats menacing enterprises, the latest additions aid in closing security gaps across the entire organisation-a strategy that’s recognized as the best way to battle ransomware.
Ransomware is an imminent threat to organisations and shows no signs of slowing down. According to the FBI, criminals have already collected $209 million in revenue in the first quarter of 2016, and that number could exceed $1 billion by year-end. And while the average ransom is still relatively small - between $200 and $5000 - the price is going up.
“The good news is, accepting the inevitable doesn’t mean accepting defeat,” said LANDESK Chief Security Officer Philip Richards. “While ransomware poses a very real threat to organisations and their systems, by taking a sophisticated, multi-dimensional defense to protect against it, organisations can mitigate the negative effects.” Cyber watchdogs like US-CERT and the Center for Internet Security (CIS) agree.
LANDESK Security Suite offers the recommended multi-layered endpoint protection, without disrupting productivity or business operations. With this latest release, LANDESK has expanded its suite in all three critical areas of defense: detection, prevention and remediation. “The LANDESK Security Suite provides a much needed solution that tackles how to respond to ransomware attacks, protect data and devices, and in the worse-case scenario, minimise impact should a security breach occur,” continued Richards.
Detection. No organisation wants to fall victim to malware threats its AV vendor identified and tagged. Still, even with strong protection, it’s important to account for today’s highly dynamic malware, which can transform itself before or after an attack. The Verizon 2015 Data Breach Investigations Report found that 70 to 90 percent of malware samples are unique to a single organisation. That’s why LANDESK Security Suite enhances AV detection with active and passive discovery technologies, visibility across the network and actionable data. In this new release, IT can display information about the applications on each endpoint and act instantly on suspicious and malicious apps.
Prevention. Realistically, ransomware will get in. When that happens, the goal is to minimize the chances it can execute. LANDESK Security Suite offers a range of industry-recommended preventive measures, including, but not limited to, application, device, and connection control and automated application and OS patching.
With compromised websites regularly exploiting known vulnerabilities in software, patching internet-facing applications is particularly critical. That said, it can be time-consuming and applied inconsistently, and may break critical business applications as it seeks to repair others. Even seasoned experts like US-CERT sometimes fail to apply patches as necessary. With that in mind, Security Suite simplifies patch management with best practices, automated processes, fast deployment and no impact on users. In this release, the new Installed Patch Report provides an additional tool for timely, effective patching-offering easy access to data on installed patches and those that still must be applied.
Additionally, Security Suite can now help keep ransomware and other malware from modifying the master boot record and rendering the system useless.
Remediation. Detection and prevention are crucial, and in many cases highly effective, but organisations still need a plan in case ransomware executes on the network. Realistically, all it takes is one user who clicks the wrong link or downloads a malicious attachment in email to fall victim to an attack. Luckily, LANDESK Security Suite adds to the final piece of the protection puzzle. This latest release tackles the most widespread form of ransomware, which encrypts files and hides the critical decryption key before demanding ransom. Security Suite detects any attempt to encrypt files on the local machine, stops the encryption process, and notifies all other computers on the network so the ransomware cannot be unleashed on other users-effectively thwarting the attack.
For more information regarding LANDESK Security Suite, visit http://www.landesk.com/products/security-suite/
LANDESK is the global authority on user-centered IT. By integrating and automating IT tasks, LANDESK helps organisations balance rapidly evolving user requirements with the need to secure critical assets and data. LANDESK is headquartered in Salt Lake City, UT, and has offices all over the world. To learn more, visit www.landesk.com.
Copyright © 2016, LANDESK. All rights reserved.
New version of FreeStor finally removes the barrier of cloud adoption for performance data MELVILLE, N.Y. — FalconStor® Software Inc. (NASDAQ: FALC), a 16-year innovator of software-defined storage solutions, today announced FreeStor® for the hybrid cloud. Building on its heterogeneous storage platform, it has enabled enterprises and cloud service providers (CSPs) to utilize the performance and reliability benefits of block-based enterprise storage within a hybrid model at public cloud prices. “The Data Center for enterprises and CSPs is facing many challenges. Costs are out of control, moving data is becoming costlier and users require common tools to avoid vendor lock-in,” said Roy Illsley, Principal Analyst, Ovum. “A new flexible approach is needed. Organizations need to have the freedom to choose the most appropriate storage platform that meets their pricing and performance level needs, whether that is on- premises, in the cloud or both (using a hybrid model). The new functionality that has been incorporated into FreeStor, offers users the ability to intelligently create a hybrid cloud that few other vendors can match.” New benefits of FreeStor’s intelligent approach to flexible data management include: • Simple, Fair Pricing - organizations now only pay for licensing of their primary instance of data, not the total amount of storage consumed. • Cloud Enablement – enable users to add public cloud storage in order to create a hybrid solution that can be managed through a single pane of glass. • Secure Multi-tenancy – integration with Active Directory or LDAP for authorization, access and audit compliance providing trustworthy security at all levels of an organization’s installation. • Enhanced Analytics – enabling core-to-edge decision-making abilities while providing information for proactive management of SLAs. • Unified Client Management – overcome business disruption with easy, templated agent deployment, simplified configuration and updates, and intelligent analytics from core-to-edge. • Performance Optimization – Improved support for NVMe unlocking new levels of I/O and latency. The addition of Linux 7 compliance together with enhanced, patented application acceleration, workload portability both on-premises and in the cloud, and faster zero-downtime configurations. “Storage is a vital component of any cloud infrastructure whether it’s private, public or hybrid. All organizations, including CSPs, need to unlock on-premises enterprise storage to support their cloud journey and create the data centers of the future,” said Gary Quinn, President, and CEO of FalconStor. “The launch of FreeStor for the hybrid cloud combines simple, more fair pricing models, flexible management tools, analytics and unrivaled performance to build out cloud storage infrastructures. These enhancements will enable IT to migrate and move workloads to the most cost-effective destination and ultimately achieve the goals of the business.” Here’s what others are saying about FreeStor: “FreeStor just works. Without it we would have struggled. It gives me the confidence to get things done. When something happens, FalconStor’s solution fixes the problem quickly and efficiently. To protect our customers, we always have three online copies of their data, this is only possible because with FreeStor we only have to pay for the primary copy, there are no fees for the second, third or more copies” - Brian Meredith, Managing Director, BlueChip “FreeStor helps us to provide infrastructure services that support our business to provide the highest levels of availability and data security. It allows us to support the business by driving faster and lower-cost launches of new products and services.” - Sandor Orban, Technical Lead Infrastructure Services, Sunrise Communications AG “FreeStor is the first real entry, in my opinion, into the service provider realm…FreeStor is an integral part of the Xterity brand, it’s the only DR solution we offer…We feel that it’s a unique fit and allows us to address a unique market need.” - Scott Harris, Vice President of Services, Egenera “FreeStor is a storage solution for a hybrid world” – Lynda Stadtmueller, Vice President Cloud Services, Frost & Sullivan FreeStor for the cloud is currently available through FalconStor’s PartnerChoice resellers as well as direct. For more information or to schedule a demonstration, interested parties can call 631-773-5859 or email email@example.com. About FalconStor FalconStor® Software Inc. (NASDAQ: FALC) is a leading software-defined storage company offering a converged data services software platform that is hardware agnostic. Our open, integrated flagship solution, FreeStor®, reduces vendor lock-in and gives enterprises the freedom to choose the applications and hardware components that make the best sense for their business. We empower organizations to modernize their data center with the right performance, in the right location, all while protecting existing investments. FalconStor’s mission is to maximize data availability and system uptime to ensure nonstop business productivity while simplifying data management to reduce operational costs. Our award-winning solutions are available and supported worldwide by OEMs as well as leading service providers, system integrators, resellers and FalconStor. The Company is headquartered in Melville, N.Y. with offices throughout Europe and the Asia Pacific region. For more information, visit falconstor.com or call 1-866-NOW-FALC (866-669-3252). Follow us on Twitter – Watch us on YouTube – Connect with us on LinkedIn # # # FalconStor, FalconStor Software, FreeStor, and Intelligent Abstraction are trademarks or registered trademarks of FalconStor Software, Inc., in the U.S. and other countries. All other company and product names contained herein may be trademarks of their respective holders.
“Eclipse is the market-leader for legal software solutions and it was clear that Brabners could benefit from a huge ROI with the Proclaim Case Management system. The conveyancing process is managed entirely from the desktop application, including one-click property searches, meaning our Residential Conveyancing team can increase the volume of work as well as profitability per case.”
Jon Taylor, Software Developer at Brabners
Brabners is a full service law firm operating from offices across the North West. With clients ranging from PLCs and SMEs to private clients and public sector bodies, the team brings an in-depth knowledge and a wealth of experience to a range of matters within the legal sector.
The firm’s global reach has meant rapid expansion in recent years, enabling a greater range of services and a proactive approach to providing commercially realistic solutions to legal problems.
The team’s work was entirely paper-based, resulting in a slow and inefficient process. Additionally, fee earners were working on cases individually, producing inconsistent approaches to work, and ultimately resulting in compliance issues.
Essentially, Brabners needed to standardise client inception and matter management across the department.
Working in conjunction with Eclipse, Brabners developed a bespoke case management system for its Residential Conveyancing team - specifically for Plot Sales work - enabling high-level automation and speedier case progression.
Additionally, the firm opted for Proclaim’s integration with PALI (Property and Land Information), an online conveyancing search provider, facilitating one-click searches from the Proclaim desktop, saving hours of data entry.
Repetition is inherent within Plot Sales as document packs are often identical for groups of properties under a specific development or developer. Since implementation, Brabners has seen significant reductions to administrative overheads by utilising Proclaim to automate the majority of case stages, including document production. This has meant fee earners can focus on the legal aspect of their work, whilst increasing overall profitability and case volumes.
Additionally, Brabners is currently in the process of implementing Eclipse’s online case tracking tool, FileView. Linked to the Plot Sales case type, developers will be able to log in securely and view real-time information as and when they need to, providing a convenient and modernised approach to case updates, eliminating continuous interruptions for fee earners.
Due to the success of the Plot Sales software, Brabners is looking to work with Eclipse again to develop a similar case type for the Social Housing department, enabling automatic matter creation and maximised matter management efficiency.
Case Study highlights:
- Bespoke Plot Sales case type
- Comprehensive integration with PALI
- Standardised client inception and matter management
· Real-time client updates via Eclipse’s FileView tool
According to new research published by CTERA Networks, while enterprises continue to migrate workloads to the cloud at a rapid pace, protection of cloud-based servers and applications has not fully evolved to meet enterprise requirements for business continuity and data availability.
CTERA’s new eBook, ‘Game of Clouds’, showcases the findings of CTERA’s inaugural cloud backup survey, and presents a deep look at the state of enterprise cloud data protection. A CTERA-commissioned study was conducted by independent research firm Vanson Bourne to examine the data protection strategies of 400 IT decision makers and IT specialists in organizations using the cloud for application deployment at US, German and French organizations. The study analyzes the benefits and pitfalls of current backup strategies, offers key considerations for organizations moving to the cloud, and looks at the impact of poor backup practices on business continuity.