Spring World 2017

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 29, Issue 4

Full Contents Now Available!

Jon Seals

Bay Area Company With Global Reach Counts on RagingWire's Sacramento Data Center for High Density Power and Low-Latency Networks in a Secured Location Outside the Earthquake Zone

SAN JOSE, Calif. – RagingWire Data Centers, the nation's premier data center provider and an NTT Communications group company, announced today that MobiTV, a global leader in enabling the delivery of live and on-demand multi-screen TV services, is celebrating its tenth year in RagingWire's Sacramento data center with 100% availability. RagingWire made the announcement at the Datacenter Dynamics (DCD) Webscale conference where it is a Lead Sponsor. DCD Webscale is being held at the San Jose Convention Center bringing together 1200+ senior business, operations, and technology professionals from the world's largest internet companies to discuss the future of digital infrastructure in the "Zettabyte Era."

MobiTV, a pioneering webscale company in the Bay Area, houses its IT systems at RagingWire's 650,000 square foot Sacramento data center campus, the largest in California. These IT systems serve MobiTV's global customer base of broadband/DSL operators, cable and IPTV operators, as well as wireless and over-the-top operators including top-tier providers: AT&T, Deutsche Telekom, Sprint, T-Mobile, US Cellular, and Verizon.

MobiTV's end-to-end platform helps service providers reduce time to market and control costs associated with the deployment and operation of high concurrency, multiple platform digital media services. The company's connected media solutions solve the complexity of delivering video content across massive networks, multiple operating systems, and millions of devices while managing associated digital rights. MobiTV collaborates with industry leading media partners including NBC, CBS, ESPN, Disney, and others to deliver cutting edge TV everywhere solutions to mobile devices.

"MobiTV is committed to delivering highly available and secure live and on-demand programming to millions of concurrent users through the top telecommunications services providers in the world," said Bill Routt, Chief Operating Officer at MobiTV. "RagingWire has been our trusted data center partner for 10 years, meeting our requirements for 100% availability and content security in a seismically safe location, where we have room to scale our technology platform as our business grows."

In 2006, MobiTV decided to consolidate its data center footprint from two locations in the Bay Area into a single data center that was driving distance to their Emeryville headquarters, but safe from earthquake risk. The data center needed to have 100% power availability, mission critical and secured operations, and always-on global telecommunications. In addition, the data center needed to address MobiTV's needs for obtaining a facility assessment for the Motion Picture Association of America's (MPAA) content security program. After evaluating multiple data center providers in Northern California, MobiTV selected RagingWire's Sacramento campus. Today, MobiTV has two integrated deployments at RagingWire with a total of 1,100 square feet to support its production and corporate IT systems.

"RagingWire's Sacramento data center campus is an ideal location for Bay Area companies looking for data centers with minimal earthquake risk, low-latency network access, and reduced power utility costs," said Casey Fann, Vice President of Operations/Professional Services at MobiTV. "By selecting RagingWire, MobiTV has a partner to facilitate the delivery of live or on-demand reliable, and world-class media content with 100% uptime and impeccable customer service."

RagingWire is one of the largest wholesale data center providers in the world with nearly one million square feet of data center capacity in the United States and three million square feet in development in Ashburn, Virginia; Sacramento, California; Dallas, Texas, and other top North American data center markets. The Sacramento CA3 Data Center opened in 2015, extending RagingWire's world class data center campus in Northern California with 180,000 square feet and 14 MW of critical IT power. All RagingWire data center sites are interconnected using redundant telecommunications providers and diverse independent network paths to enable application workloads to be distributed for reliability and performance. The company is known for delivering customized and scalable one and two megawatt vaults as well as multi-rack and cage colocation solutions, all with 100% availability.

As part of the global data center platform of NTT Communications, RagingWire's colocation solutions have earned the distinction of Nexcenter™ data center services. Through Nexcenter data center services, RagingWire customers can deploy information and communications technology (ICT) systems across 140 data center sites worldwide under a common contractual framework and receive consistently high levels of performance. RagingWire solutions leverage its patented 2N+2® electrical design and superior operations model which was recognized with the highest Net Promoter® Score in the data center industry.

"We are proud to have served MobiTV as their data center provider over the last 10 years," said Tim Nicols, Vice President Sales and Business Development at RagingWire. "Starting in the year 2000, MobiTV solved the technical challenge of delivering high quality television content to mobile devices. Today MobiTV's technology platform running in RagingWire's Sacramento data center campus delivers hundreds of TV channels, thousands of live events, and billions of streaming minutes to millions of devices around the world."

About RagingWire Data Centers

RagingWire Data Centers designs, builds, and operates mission critical data centers that deliver 100% availability and high-density power. The company currently has over 80MW of critical IT load spread across nearly 1 million square feet of data center infrastructure in Northern California and Ashburn, Virginia, with significant growth plans in both locations, Dallas, Texas, and other top North American data center markets. As an NTT Communications group company, RagingWire is one of the largest wholesale data center providers in the world and one of the most financially strong companies in the data center industry. RagingWire Nexcenter colocation services are delivered as part of the global network of 140 data centers operated by NTT Communications. For more information visit www.ragingwire.com.

Net Promoter, Net Promoter Score, and NPS are trademarks of Satmetrix Systems, Inc., Bain & Company, Inc., and Fred Reichheld.

Customers Gain a Single View of Security Events for the Entire Security Lifecycle

SANTA CLARA, Calif. – Palerra, a leading Cloud Access Security Broker (CASB) with a revolutionary approach, today extended its Enterprise Security Ecosystem to include leading Security Information and Event Management (SIEM) solutions. Initial SIEM integrations include HP ArcSight ESM, IBM® QRadar® SIEM, and Splunk Enterprise. SIEMs are used to collect, correlate, and manage network logs, as well as remediate and report on enterprise security incidents, but they don't often include a view of the Cloud. By sending prioritized Cloud security alerts based on its industry leading data science and anomaly detection to a SIEM for visualization and remediation, Palerra LORIC serves as a critical integration point to deliver a single view of security events for the entire security lifecycle.

"Unlike other CASB solutions, LORIC is a platform that was designed to solve today's problems and anticipate tomorrow's needs. One way to accomplish that is through integration," said Rohit Gupta, Palerra CEO. "Instead of duplicating existing enterprise security investments, our strategy is to integrate and leverage them, giving Palerra customers enhanced value at the lowest total cost of ownership. We believe that a CASB needs to embrace and empower the enterprise security ecosystem, not force a rip and replace, or replicate existing investments."

Palerra LORIC SIEM integrations deliver two significant advantages to customers:

  • Palerra LORIC incorporates prioritized Cloud security alerts into SIEM dashboards and reports to enable a single pane of glass across both enterprise and Cloud security.
  • Palerra LORIC Discovery imports SIEM logs correlated from perimeter devices such as Firewalls and Secure Web Gateways to provide expanded shadow IT visibility without the need for multiple integration points.

In addition to SIEM integration, the Palerra Enterprise Security Ecosystem includes integrations with other solutions such as Identity as a Service (IDaaS), Next Generation Firewalls (NGFW), Secure Web Gateways (SWG), Data Loss and Prevention (DLP), Mobile Threat Management (MTM), and IT Service Management (ITSM). These integrations allow Palerra LORIC to leverage existing security functionality to enforce access controls, coordinate threat detection, improve visibility, and accelerate remediation of incidents.

Both HP ArcSight ESM and IBM QRadar SIEM integrations are available today. Splunk Enterprise Integration will be available in the second half of 2016.

To learn more about Palerra LORIC:

About Palerra
Palerra helps organizations protect their business-critical Cloud infrastructure and data with Palerra LORIC™, the industry-leading solution for Cloud security automation. Palerra is the only Cloud Access Security Broker (CASB) that provides visibility and security across the entire security lifecycle from infrastructure to applications, enabling organizations to realize the full promise of the Cloud. Leading enterprises including BMC Software, Jefferies, and VMware leverage LORIC for continuous monitoring and security of their Cloud applications. Palerra is a privately held company funded by Norwest Venture Partners, Wing Venture Capital, and August Capital, and is headquartered in Santa Clara, Calif. For more information, visit www.palerra.com.

JSC Network Company Completes Major Overhaul of Contact Center Operations That Serve Over 3.7 Million Consumers in One of Russia's Most Industrialized Regions

MOSCOW, RUSSIA – Avaya today announced the completion of a multi-year contact center modernization project for the largest state-owned utility in the Republic of Tatarstan. The project provides JSC Network Company Tatarstan with an efficient, multimedia customer service operation to serve nearly 3.7 million consumers in one of Russia's most industrialized regions.

The JSC modernization project encompassed the full complement of the Avaya Customer Engagement Solutions portfolio, including services from design through implementation and staff training, providing the utility with the following benefits:

  • A single overarching infrastructure that is easier to manage and consolidates multiple platforms
  • The ability to proactively notify consumers with necessary information, allowing customers to use a range of options to contact the utility
  • Faster, better responses to customer requests through to improved call handling
  • More efficient, informed self-service channels
  • Increased staff mobility and optimized workforce management
  • Reduced expenses through more efficient call routing and simplifying communications costs through optimized routing
  • Reduced maintenance costs and time to resolution due to the simplicity and consistency of the management interface
  • More resilient contact center operation able to handle more customer inquiries
  • Added flexibility to easily implement capabilities planned for the future.

Register Now for the Global Webinar: Experience is Everything--Digitally Transforming the Customer Experience. Wednesday, July 20, 2016. Webinar features Sheila McGee-Smith, founder & principal analyst, McGee-Smith Analytics, and Karen Hardy, senior director, product management, Avaya. Attendees will learn:

• The importance of multi-touch customer experiences

• How data and analytics re-shape customer service outcomes

• How Avaya Oceana™ can innovate, optimize and future-proof your customers' journey

• Register here: http://bit.ly/29QGFem


"This project allowed Avaya to apply their deep expertise in building effective corporate communication infrastructures. The Avaya architecture enabled a seamless integration of the new solutions with existing communications, providing JSC with a faster, high quality operation that will deliver a new level of customer service for the company."
- Oleg Manyahin, regional manager in the Urals Federal District Volga Federal District and Avaya

"Avaya Customer Engagement Solutions harmoniously fit into the business processes of our company. The well-organized project was coordinated by Avaya business partner, Sledge, meeting all technical requirements through extensive pre-research and solution design. In the future, we expect that Avaya solutions will be considered in the company branches to create a single telecommunications platform."
- Buravov Alexander, head of the supervisory control service of JSC Network Company

About Avaya

Avaya is a leading provider of solutions that enable customer and team engagement across multiple channels and devices for better customer experience, increased productivity and enhanced financial performance. Its world-class contact center and unified communications technologies and services are available in a wide variety of flexible on-premises and cloud deployment options that seamlessly integrate with non-Avaya applications. The Avaya Engagement Environment enables third parties to create and customize business applications for competitive advantage. The Avaya fabric-based networking solutions help simplify and accelerate the deployment of business critical applications and services. For more information please visit www.avaya.com.

Certain statements contained in this press release may be forward-looking statements. These statements may be identified by the use of forward-looking terminology such as "anticipate," "believe," "continue," "could," "estimate," "expect," "intend," "may," "might," "plan," "potential," "predict," "should" or "will" or other similar terminology. We have based these forward-looking statements on our current expectations, assumptions, estimates and projections. While we believe these are reasonable, such forward-looking statements involve known and unknown risks and uncertainties, many of which are beyond our control. These and other important factors may cause our actual results to differ materially from any future results expressed or implied by these forward-looking statements. For a list and description of such risks and uncertainties, please refer to Avaya's filings with the SEC that are available at www.sec.gov. Avaya disclaims any intention or obligation to update or revise any forward-looking statements.

All trademarks identified by ®, TM, or SM are registered marks, trademarks, and service marks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners.

Follow Avaya on Twitter, Facebook, YouTube, LinkedIn, Flickr, and the Avaya Connected Blog.

Rsam Launches New Vendor Risk Management Bundles to Help Companies Quickly Gain Control Over Vendor Risk

SECAUCUS, NJ – A recent Rsam poll showed that 50 percent of organizations assess less than 15 percent of their vendors for reputational, financial and/or data security risk -- the remaining 50 percent averaged a 30 percent assessment rate. The poll respondents included nearly 100 GRC professionals who attended the Rsam webinar titled, "Six Vendor Risk Management Time Killers." The poll also showed that participants intend to increase vendor assessments by 60% in 2017.

Given the large vendor assessment gap, Rsam has created new Vendor Risk Management (VRM) bundles, delivered via software-as-a-service (SaaS), to help organizations gain control quickly and in an automated, manageable way. Risk professionals can choose among several options -- VRM Starter, VRN Standard or VRM Premium -- and have a baseline up and running in 30 days. The bundles vary based on numbers of employee users, vendor users and features. All are configured on Rsam's enterprise platform, which makes them easily adaptable on the fly. As with all Rsam modules, organizations can adapt and mature their program without the constraints of hard-coded software or unnatural artificial workflows.

Managing vendor risk is challenging for most organizations, whether they have a universe of a few hundred or thousands. Third-party relationships are more entwined than ever due to the volume of interactions that occur daily and the business criticality of many outsourcing arrangements. While the scope of risk increasing, the scrutiny from external forces like regulators, shareholders and the media is also on the rise.

"Organizations of every size want to gain control over vendor risk but many simply don't have the resources to make a dent," said Vivek Shivananda, CEO of Rsam. "We advise risk professionals to start with the basics, get a program up and running quickly, demonstrate success and iterate from there. Toward that end, our new Vendor Risk Management (VRM) bundles will help companies implement programs for as few as 200 vendors and up to thousands in as few as 30 days."

About Rsam

Rsam is the fastest time-to-value and most flexible GRC, Vendor Risk Management and Security Operations, Analytics & Reporting (SOAR) platform provider. The Rsam platform allows companies to leverage out-of-the-box solutions and "Build Your Own" (BYO) applications for a wide range of risk and compliance functional areas, including audit, business continuity management, compliance, enterprise risk, IT risk, incident management, operational risk, policy management, threat management, vulnerability management, security incident response management, vendor risk management, regulatory change management and more. Learn more at http://www.rsam.com.


SAN JOSE, Calif. – Diablo Technologies today announced the production release and volume availability of its Memory1™ 128GB DDR4 system memory module. The 128GB module and accompanying Diablo Memory Expansion (DMX) software provides 1TB or 2TB of system memory in a single two-socket server – unleashing the power of Big Memory for Big Data. Memory1 is now available to OEMs, system integrators and end-users for production deployment.

Memory1 provides the highest-capacity system memory solution on the market, enabling massive increases in server and application capability. Diablo’s JEDEC-compliant, flash-based DIMMs, interface seamlessly with existing server architectures and require no changes to hardware, operating systems, or applications. Memory1 is ideal for environments that require large memory footprints for workloads such as big data analytics, caching, and complex web applications.
“Achieving Memory1 production release is a significant milestone for Diablo and the industry. Customers are reporting compelling economic benefits and powerful gains in performance for a wide variety of Big Data applications,” said Mark Stibitz, Chief Executive Officer of Diablo Technologies. “Memory1 provides more processing power per server, allowing data centers to cost-effectively scale-out and tackle workloads previously beyond their reach.”
Memory1 is the continuation of Diablo’s award-winning innovation and market leadership in bringing NAND-Flash deeper into the Cloud and Enterprise Datacenter. For pricing and availability, please contact sales@diablo-technologies.com. Tweet This: Diablo Technologies #Memory1 is now shipping in volume to #OEMs, #systemintegrators and end users #BigMemoryForBigData www.diablo-technologies.com
FOLLOW DIABLO https://twitter.com/diablo_tech https://www.facebook.com/pages/Diablo-Technologies/369582183128064
ABOUT DIABLO TECHNOLOGIES Diablo is at the forefront of developing breakthrough technologies for next-generation enterprise computing. The company’s flagship Memory1 is a first-of-its-kind Flash-as-memory technology that delivers four times the capacity of the largest DRAM modules. Diablo's Memory Channel Storage platform combines innovative software and hardware architectures with Non-Volatile Memory to introduce a new and disruptive generation of Solid State Storage for data-intensive applications. The Diablo leadership team has decades of experience in system architecture, chipset design, enterprise software and business development at companies including PMC-Sierra, Anobit, AT&T-Microelectronics, Bell Labs, Nortel Networks, Intel, Cisco, AMD, SEGA, Cadence Design Systems, Matrox Graphics, BroadTel Communications and ENQ Semiconductor. Learn more at http://www.diablo-technologies.com.

Thales, leader in critical information systems, cyber security and data protection, and Williams (ETR: WGF1), the leading Formula One team and advanced engineering company have entered into a new technical partnership. As part of the agreement Thales will deliver state-of-the-art cyber security solutions for real-time global telemetry transmission to both WILLIAMS MARTINI RACING and Williams Advanced Engineering, the engineering services and technology division of Williams.


Thales designs, develops and operates resilient and high-performance critical information systems supported by its 2,000 cyber security experts and world class data protection and digital trust management solutions, protecting mission critical data anywhere data resides. Cyber security, especially data protection, is of the utmost importance in the competitive world of Formula One.


The expertise brought by Thales will assist Williams in protecting its confidential high-value data. Thales Datacryptor 5000 delivers high speed data protection with state-of-the-art throughput enhancement and low latency to ensure high assurance, real-time global telemetry transmission from the pitlane back to Williams’ headquarters. Furthermore, with an increasing number of projects being undertaken for external customers through Williams Advanced Engineering, data protection and security has become a priority across the Williams Group.


Marc Darmon, Executive Vice-President, Secure Communication and Information Systems, Thales says:

“Thales is a world class cyber security expert and a globally recognised systems integrator, delivering safety and security critical systems in challenging environments such as Aerospace, Space, Defence, Finance, IT & Technology and Ground Transportation. This agreement builds on the already strong existing relationship between our two companies and our combined skills and expertise. It clearly illustrates Thales’s commitment to accompany its clients in their digital transformation where cyber security is a vital requirement.”


Claire Williams, Deputy Team Principal and Commercial Director, Williams says:

“Williams has undergone a significant digital transformation over the past two years. We are revolutionising our IT infrastructure to make sure that we are well placed to continue innovating. With the help of Thales, we will be introducing cyber security systems that keep our business critical data secure wherever we are in the world.”


About Williams

Williams is a leading Formula One team and advanced engineering company. Formed in 1977 by Sir Frank Williams and Sir Patrick Head, the company has secured 16 FIA Formula One World Championship titles since its foundation. The company's core competencies are the design and manufacture of Formula One race cars, and the deployment of this expertise in running the team's entries into the Grands Prix each season under the name WILLIAMS MARTINI RACING.

Williams Advanced Engineering is the division of Williams that harnesses Formula One derived technology, development pace and knowledge to deliver highly innovative products and services to the motorsport, automotive, aerospace, defence and energy sectors. Working in close collaboration, Williams Advanced Engineering helps its customers meet the sustainability challenges of the 21st century and improve their performance, market position and brand image.


About Thales

Thales is a global technology leader for the Aerospace, Transport, Defence and Security markets. With 62,000 employees in 56 countries, Thales reported sales of €14 billion in 2015. With over 22,000 engineers and researchers, Thales has a unique capability to design and deploy equipment, systems and services to meet the most complex security requirements. Its exceptional international footprint allows it to work closely with its customers all over the world.

Positioned as a value-added systems integrator, equipment supplier and service provider, Thales is one of Europe’s leading players in the security market. Thales solutions secure the four key domains considered vital to modern societies: government, cities, critical infrastructure and cyberspace.

Drawing on its strong cryptographic capabilities, Thales is one of the world leaders in cybersecurity products and solutions for critical state and military infrastructures, satellite networks and industrial and financial companies. With a presence throughout the entire security chain, Thales offers a comprehensive range of services and solutions ranging from data protection and trust management, security consulting, intrusion detection and architecture design to system certification, development and through-life management of products and services, and security supervision with Security Operation Centres in France, the United Kingdom and The Netherlands.

Aspect, first and largest vendor of cloud-based energy and commodity trade and risk management (ETRM / CTRM) software, has seen sales for the first half of the year climb to a record 16-year high as even the largest global organizations are dumping entrenched, legacy software and moving to the cloud.


Booking more than $7M in new business through the first 6 months of the year, an increase of 127% over the same period in 2015, Aspect has become the replacement solution of choice for user organizations blighted by traditional client-server solutions that require either costly upgrades or pay-all-over-again replacement versions to remain competitive. Conversely, Aspect’s monthly subscription model sees fully-tested fresh versions, fixes and upgrades delivered to desktops automatically and transparently at no extra cost.


Now regarded as the CTRM sector disruptor, Aspect has this year signed 8 new deals with global top tier trading companies in the metals, coal and oil trading sectors, including Ferrocadia and MENA Energy. Aspect’s functional expertise, rapid implementation and proven scalability all played an important part in this success. The company did particularly well in North America and the Middle East where sales were consistently ahead of target.


Steve Hughes is CEO of Aspect and formerly of its predecessor OILspace, the company that pioneered cloud CTRM 16 years ago. Since then Aspect’s continually evolving solutions have helped put the cloud front and center of the industry. “The world has moved on but legacy CTRM solutions have not,” said Hughes. “Users are paying for support and updates to software going nowhere. The cloud is a way out of that cycle, a route to software with a future for minimum pain and maximum gain.”


Switchers to Aspect can typically achieve cloud CTRM implementation in as little as eight weeks, with ongoing cost of ownership typically comparable to the cost of support only for legacy software.


“Where once it was just the small and mid-tier market, there’s little doubt that cloud vendors now effectively own the whole market. Meanwhile there’s evidence that legacy vendors are abandoning their traditional products, leaving users themselves to find alternatives,” added Hughes.


About Aspect

Aspect is a leading global provider of multi-commodity trade, risk and operations management applications delivered Software-as-a-Service (SaaS) in the cloud. With almost 500 customers in 90 countries, it’s one of the fastest growing providers with rapid deployment, affordable subscriptions, and immediate ROI for all size companies. Solutions include AspectCTRM®, a full-featured commodity trading and risk management enterprise suite for front, middle and back office. It’s available in three editions: Lite, Standard and Enterprise, expanding in functionality according to the needs and budgets of clients. Aspect is the only ETRM/CTRM solutions provider with market data and analytics tools delivered with its trade and risk functions on the same platform. This provides users with a seamless packaged solution beginning with pre-trade pricing analysis and market assessments via AspectDSC. Aspect’s solutions are available on desktop, tablets and mobile devices and through its new Aspect Partner Program (APP).

Carbon Black Delivers the Industry's Most Complete Next-Gen Endpoint Security Platform, Featuring the Cb Collective Defense Cloud


WALTHAM, Mass. – Carbon Black, the leader in next-generation endpoint security, today announced its acquisition of Confer, a next-generation antivirus (NGAV) company.

Carbon Black is recognized for its market-leading application control, incident response, and threat hunting products that serve more than 2,000 organizations globally. By adding Confer’s NGAV product, Carbon Black delivers the industry’s most complete endpoint security platform. Confer’s software solution will be renamed “Cb Defense.”


“With the acquisition of Confer, organizations of every size can now address their endpoint-security requirements through a single platform,” said Patrick Morley, chief executive officer of Carbon Black. “This extension of the Carbon Black platform is a significant step forward in our vision to create a world safe from cyber-attacks.”


Today’s cyber security war is waged at the endpoint. Incumbent AV providers regularly miss critical malware threats, as noted by Gartner in its 2016 Magic Quadrant for Endpoint Protection Platforms: “44% of reference customers for EPP solutions have been successfully compromised.” In the wake of traditional AV proving to be ineffective, emerging endpoint players have entered the market. However, these players offer incomplete, point solutions that miss entire classes of cyber-attacks. These omissions create a false sense of security and leave enterprises vulnerable.


“The emerging next generation endpoint security market is about more than prevention. Security vendors who offer a comprehensive security platform comprised of prevention, detection and response capabilities will lead the transition from prior generation solutions,” said Doug Cahill, senior analyst at ESG. “With the addition of Confer, Carbon Black is offering such a next-gen platform to address the ever evolving threat landscape.”


Cb Defense Redefines Next Gen AV

“NGAV solutions need to take a far more innovative approach in stopping attacks and be much more effective than legacy AV” said Mark Quinlivan, co-founder and chief executive officer at Confer. “We built Confer to provide a sophisticated, lightweight yet simple solution that includes groundbreaking prevention, detection and incident response.”


Cb Defense uniquely combines behavioral-based prevention techniques with integrated detection and response capabilities to stop cyber-attacks. Its cloud-based, deep-analytics approach blocks both malware and increasingly common malware-less attacks that exploit memory and scripting languages such as PowerShell. Once malware is blocked, Cb Defense gives organizations visibility into how the attack happened, which enables them to proactively fix security problems.


Cb Defense uses a lightweight sensor that installs in less than a minute and consumes less than one percent of the CPU, disk and network. Once installed, Cb Defense can be completely managed from the cloud through an easy-to-use, web-based interface.


Carbon Black Endpoint Security Platform

With the acquisition of Confer, customers will have access to a single platform designed to replace ineffective antivirus, lock down critical systems, and arm incident-response teams with the most advanced tools to proactively hunt down threats. The Cb Endpoint Security Platform is the only solution that provides the flexibility and security required to grow and evolve with an organization’s security needs.

The Cb Endpoint Security Platform is designed to:

  • Stop the Most Attacks. Using a combination of endpoint data and the Cb Collective Defense Cloud, the Cb Endpoint Security Platform stops more attacks than both traditional AV and competing NGAV products. It blocks both malware and malware-less attacks.
  • See Every Threat. The Cb Endpoint Security Platform continuously records all endpoint activity, giving organizations full visibility into how cyber-attacks happen. By capturing and analyzing behaviors, it pinpoints potential exploits and provides complete visibility into each threat.
  • Close Every Gap. With complete threat visibility, the Cb Endpoint Security Platform enables organizations to proactively fix security problems in their environment by leveraging a full suite of remediation capabilities.

Cb Collective Defense Cloud

Confer’s cloud-based analytics engine will become part of the “Cb Collective Defense Cloud,” adding significant depth to the Cb Endpoint Security Platform. The Cb Collective Defense Cloud provides an assessment of what’s safe and what’s not, based on advanced-analytic techniques applied to data from millions of endpoints.

The Cb Collective Defense Cloud:

  1. Continuously records data from more than seven million endpoints protected by Carbon Black products.
  2. Enhances and enriches the data with threat intelligence from dozens of sources including Carbon Black’s Detection eXchange and partner feeds.
  3. Applies rigorous analytic techniques including machine learning, artificial intelligence and behavioral analytics to massive datasets of attacks, threats, behaviors and anomalies.
  4. Streams context and insight to Carbon Black’s offerings where attacks are blocked at the endpoint.

Continuous interactions between the Cb Collective Defense Cloud and Carbon Black’s offerings strengthen the system’s ability to identify malicious activity and become more resilient over time.

Confer Co-founders Paul Morville and Jeff Kraemer will be joining the Carbon Black product and engineering teams respectively. Confer employees will join the Carbon Black team. Terms of the acquisition were not disclosed.


About Carbon Black

Carbon Black has designed the most complete next-gen endpoint security platform, enabling organizations to stop the most attacks, see every threat, close security gaps, and evolve their defenses. The Cb Security Endpoint Platform helps organizations of all sizes replace legacy antivirus technology, lock down systems, and arm incident response teams with advanced tools to proactively hunt down threats. Today, Carbon Black has approximately 2,000 worldwide customers, including 25 of the Fortune 100 and more than 600 employees. Carbon Black was voted Best Endpoint Protection by security professionals in the SANS Institute’s Best of 2015 Awards.

Wednesday, 20 July 2016 00:00

BCM 2000: Essentials of BCM Series


Implementing ISO 22301, 22313,
22320, 22398, 27031, 31000, 19011 & 17022
Includes BCI's 2013 Good Practice Guidelines 
Looking for a course that is based on international standards?
Looking for templates and examples on how to develop a Business Continuity Management System that meets the requirements of the standards? 
Do you like to have fun (and maybe even laugh out loud!) when you learn?
Then BCM 2000: Essentials of Business Continuity Management is the course for you!  Download the Brochure 

Course Description 
BCM 2000: Essentials of Business Continuity Management provides you with knowledge to develop a standards-based, auditable, and actionable business continuity program for your organization.
This course is the critical starting point to developing a program that can be certified ISO 22301. It is comprised of 10 individual modules that can be taken as a series or in combination over time.

Essentials of Business Continuity Management provides the foundation necessary for new or current professionals interested in either developing a career in Business Continuity Management, seeking certification, or for those professionals responsible for developing a business continuity program for their organization.

It is designed to expose the participant to all aspects of a holistic BCM program and to be a solid "how to"guide for building a business continuity program for all types of organizations.

Student activities are included throughout the course and are designed as knowledge checks to reinforce lesson materials and to provide attendees with hands-on activities that will enable them to become familiar with and apply these principles in their jobs.

Delivery Structure
Essentials of BCM is offered as an elearning course that includes the following elements: Download the Brochure
  • Voice over ppts teaching online
  • pdf's of the course book
  • Templates of how to implement the requirements of the standards (sample policies, reports, etc.)
  • Multi-media that is relevant & fun!
  • BCI's 2013 Good Practice Guidelines 
  • Case study
  • Open for Business Toolkit
  • Course review activities to evaluate for comprehension
  • Practice exam questions (for DRII's Qualifying Exam)
  • Online essay for CEU credit  
  • Email access to a qualified expert for questions
  • Online ISO 22301 Lead Implementer Certification Exam included in course fee 
Certification Requirements
Successful completion of the BCM 2000 series with a passing grade on the online ISO 22301 Lead Implementer exam completes the educational component for certification as an ISO 22301 Lead Implementer.

Holders of the ISO 22301 Lead Implementer certification are entitled to apply for statutory membership with the BCI at the AMBCI or MBCI level, subject to evidence of required experience.
With ISO 22301 as an international standard allowing companies to demonstrate their ability to cope with major threats; as well as provide a management systems approach to business continuity management, this course provides you with what you need to develop a program that complies with these certification standards.

Register Here

And if you have questions, don't hesitate to call or send an email.
Lynnda Nelson, President
The International Consortium for Organizational Resilience
866.765.8321 US/Canada  +1630.705.0910 International Calls
BCM 2000: Essentials of Business Continuity Management Series
BCM 2011: Business Continuity Program Development
BCM 2021: The Business Impact Analysis
BCM 2022: The Risk Assessment
BCM 2023: Developing Strategies / Options to Protect the Organization
BCM 2031: Plan Design, Program Structure, & Required Documentation
BCM 2032: Incident Response, Management & Communication
BCM 2033: Business Continuity & Recovery Plans
BCM 2035: Writing the ICT Continuity / IT DR Plan
BCM 2041: Awareness, Training, Testing & Exercising
BCM 2042: Program Evaluation, Improvement & Audit
BCM 2011:  BCM Program Development 
In order to develop a Business Continuity Management System, it is important to understand the requirements of management systems, the core concepts of business continuity, and how to determine the scope of the program, develop policy, and the requirements for leadership and governance. BCM 2011 provides an overview of each of these topics as the foundation for developing and managing the BCMS.  Register Here
BCM 2021:  The Business Impact Analysis
The BIA process is covered from beginning to end with a focus on the identification of the organization's key products and services and the critical activities and resources that support them.  Examples of BIA data gathering questions, methodology, analysis and reporting provided.  Register Here
BCM 2022: The Risk Assessment
Using the ISO 31000 standard on Risk Management as its basis, this course describes the process of conducting a risk assessment and analyzing the results to mitigate risks.  From risk identification, risk description, risk analysis, risk evaluation, risk communication, and risk reporting, this course covers the entire risk assessment process using an enterprise risk management approach.   A key requirement of the standards is the identification of the organization's risk appetite or acceptance and this course provides the methodology for this identification.
In addition, BCM 2022 includes a review of different quantitative and qualitative methods for analyzing risk. Register Here 
BCM 2023:  Developing Strategies / Options to Protect the Organization
This course introduces the student to the challenges of selecting the appropriate strategies / options
for the continuity and recovery of business processes, critical functions, operations and the supporting information technologies within the specified recovery time objective.  Building on the information gathered during the BIA and risk assessment, BCM 2023 explores how to evaluate the different strategies necessary for mitigating risk, continuing operations when possible, and recovering operations if interrupted. BCM 2023 reviews strategies for people, property, assets, technology and information, reputation, suppliers, and financial viability.  Register Here
BCM 2031:  Plan Design, Program Structure & Required Documentation
In order to develop the actual plan documents the organization will need to decide on the approach, methodology and the plan document structure. BCM 2031 outlines the necessary roles and responsibilities of the members of the organization, the key elements that must be included in every plan type, and how to meet the requirements for managing documentation.   Register Here
BCM 2032:  Incident Response, Management & Communications
Implementing procedures for responding to an incident of any kind, managing the incident, and ensuring successful communication with all interested parties before, during and after the incident is an essential requirement for all business continuity programs. BCM 2032 also ties to the requirements of ISO 22320 on Incident Management and PAS 200 on Crisis Management & Communications.  The objective of BCM 2032 is to develop and implement procedures for response to and stabilization of the situation following an incident or event, including establishing and managing an Emergency Operations Center and local command centers during the crisis. Register Here
BCM 2033:  Business Continuity & Recovery Plans
All of the procedures developed as part of strategy development need to be documented in the business continuity and recovery plan. BCM 2033 reviews the requirements for business continuity plans and how to document procedures according to ISO 22301.  Register here
BCM 2034:  ICT Continuity / IT DR Plans & Procedures 
The focus of the ICT Continuity and the IT Disaster Recovery Plan is on the IT infrastructure that supports the business operations and ensuring that the plan in place protects the key infrastructure of
the organization. ISO 27031 on ICT Continuity outlines the methodology for ensuring that the ICT infrastructure supports the BCM infrastructure to ensure that there are no unsupported critical processes and the RTOs can be met. BCM 2034 reviews the guidelines for ICT continuity under ISO 27031, ISO 27001, and NIST 800-34. Register here
BCM 2041:  Awareness, Training, Testing & Exercising 
Building a BCMS culture is an essential component of ensuring a successful program. Determining competence of all parties involved in the business continuity management system and increasing competence through awareness, training, testing, and exercising is a key component of this process and is vital to the success of the BCMS. BCM 2041 also aligns to the guidance of ISO 22398 for developing exercise programs.  Register here
BCM 2042: Program Evaluation, Improvement & Audit 
It is impossible to keep the BCM program current and actionable or to move to a management system without monitoring, measuring, analyzing, and evaluating the BCMS. BCM 2042 explores the requirements for internal audit and management review of the BCMS. Also included are the requirements for writing the audit report based on ISO 19011 and ISO 17022.  Register Here
Save 10%
Did you know that you can save 10% on all ICOR courses if you are a member of one of the following organizations?  Contact them to find out how or email info@theicor.org.
  • ICOR
  • ACP
  • ASIS
  • BRPA
  • IAEM
  • IFMA
Become an ICOR Member Today!
Ransomware is one of the hottest topics in computing, data and internet security and has gained momentum over the last few months. Now, more than ever before, users – home and business users alike – are being aggressively targeted.

When a computer is infected, is there a chance of regaining the valuable data? Can this be done by the user himself? Perhaps by the company’s IT staff? Or even by data recovery specialists like Kroll Ontrack?