New Over-the-Air Deployment Enables AirWatch Customers to Deliver Wandera Mobile Security to Thousands of Devices in an Instant
SAN FRANCISCO, Calif. – Today, Wandera the leading global provider of security and management for mobile data announced new integrations with its partner AirWatch, the leader in enterprise mobility management. VMware AirWatch® customers are now able to effortlessly deploy Wandera's Secure Mobile Gateway across any number of enterprise mobile devices directly from the AirWatch console. Administrators simply select the desired group of devices and Wandera's threat prevention services are silently pushed over-the-air to the mobile device with no interruption to the employee's enjoyment of their device.
"The new Wandera over-the-air deployment through AirWatch has made deployment seamless and significantly faster," said Jim Bryant, Enterprise Mobility Management engineer, Grupo Santander.
The Wandera Secure Mobile Gateway protects enterprises' mobile devices with real-time threat prevention, compliance and data cost management. Wandera's multi-level architecture includes the world's first cloud gateway for mobile. Wandera analyzes billions of daily inputs to detect emerging mobile attacks and protect sensitive company data. The on-device app integration with AirWatch enables administrators to identify and block threats such as data leaks, malware and man-in-the-middle attacks, and respond with real-time policy enforcement.
"We've worked closely with Wandera, as a part of the AirWatch Mobile Security Alliance, to give our mutual customers a simpler way to deliver threat prevention services," said Erik Frieberg, vice president, Marketing, End-User Computing, VMware. "This additional integration builds upon an already strong partnership with Wandera and delivers on our goal to simplify the mobile security lifecycle for our mutual customers."
"Integrating with VMware AirWatch, the world's foremost enterprise mobile device management solution, delivers on our promise to our global customers," said Stijn Paumen, VP Business Development at Wandera. "The product integration can significantly reduce administrative overhead and allow our mutual customers' mobility teams to gain increased security, visibility and control over their entire mobile fleet in seconds."
In support of this new integration phase, Wandera is launching a special mobile security offer for new customers using VMware AirWatch until 30 September 2016:
- 30-day free mobile security audit powered by Wandera, allowing customers to enroll 20 to 500 devices to receive an audit report highlighting mobile threats and risk exposure
- Three months free Wandera service if the customer moves forward with a standard Wandera order following the audit
- One-day free trial of Wandera Professional services for any customer over 1,000 devices
Wandera is also pleased to support a number of AirWatch Connect™ Local events hosted in April and May this year. Participants can look forward to a full day of technical sessions, networking and group discussions focused on enabling end-users, empowering IT and implementing the latest solutions from AirWatch. Register online for an event near you.
Wandera is the leader in mobile data security and management, protecting enterprises with real-time threat prevention, compliance and data cost management. Wandera's multi-level architecture, which includes a pioneering cloud gateway for mobile, offers unrivalled visibility and control. With the industry's largest mobile dataset, Wandera analyzes billions of daily inputs across its network in real-time to detect emerging mobile attacks and protect sensitive company data. Founded in 2012, Wandera is headquartered in San Francisco and London. For more information visit the website www.wandera.com.
VMware, AirWatch, and AirWatch Connect are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in the United States and other jurisdictions. Use of the word 'partner' or 'partnership' does not imply a legal partnership relationship between VMware and any other company.
Blue Coat Cloud Data Protection Enables Customers to Proactively Address Emerging Data Protection Regulations That Can Complicate Cloud Adoption
SUNNYVALE, Calif. – Blue Coat Systems, a leader in enterprise security, today announced the availability of the Blue Coat Cloud Data Protection Solution for Oracle Applications Cloud, which includes Customer Experience (CX), Enterprise Resource Planning (ERP), and Human Capital Management (HCM).
As use of cloud applications grows, enterprises may face challenges regarding data privacy, compliance and security. These may include compliance requirements for personal information, protected health information and strict data governance rules.
Beginning with Oracle Sales Cloud, the combined solution is intended to assist enterprises located in countries and regions subject to increasingly strict data protection regulations, and those in industries such as financial services, public sector and healthcare, to adopt the award-winning Oracle Sales Cloud, and provide them with a new tool to help address applicable data privacy requirements governing their business.
Enterprises that wish to take advantage of a cloud deployment, or require a single global instance even though they operate in multiple countries, face an interesting challenge -- how to operate in the cloud without splitting up their data. To address this challenge, Oracle collaborated with Blue Coat, an innovative leader in a fast-growing category referred to as Cloud Access Security Broker (CASB).
Blue Coat Cloud Data Protection uses patented data tokenization and encryption capabilities to put enterprises in control of their regulated data, regardless of where the information resides, both in-use and at-rest in the cloud. Whether deployed in a Blue Coat cloud service located within a customer's home country, or within their own datacenter, the Blue Coat solution for Oracle Sales Cloud replaces information selected by the customer with meaningless token values before it leaves the enterprise's Blue Coat server and goes to the cloud for processing and storage, rendering the data meaningless to all but authorized parties.
Oracle and Blue Coat worked closely to design a solution that does not impact the end user experience with Oracle Sales Cloud -- they can still use features, like searching, sorting and reporting, even on the data that has been tokenized. This collaboration provides businesses facing regulatory challenges with an additional option to implement cloud solutions faster and easier than previously possible.
"Many customers operate in geographic regions or vertical sectors where the regulatory environment places restrictive rules on data transfer that complicate cloud adoption," said Rondy Ng, senior vice president, Oracle. "By providing a simple approach to tokenize or encrypt data before it leaves an enterprise's environment, our work with Blue Coat gives them an additional option to enjoy the benefits of the Oracle Cloud."
Blue Coat is a Gold-level member of Oracle PartnerNetwork (OPN).
"With solutions like ProxySG installed in thousands of companies around the globe, enterprises rely on Blue Coat to address their daily security and compliance challenges, including new issues emerging as they look to take advantage of the cloud," said Michael Fey, president and COO, Blue Coat. "Oracle is laser-focused on helping its customers make a smooth transition to its powerful cloud solutions, and we have invested heavily in technologies to assist in this process. This important partnership is a big win for our customers and business."
About Blue Coat
Blue Coat is a leading provider of advanced web security for global enterprises and governments, protecting 15,000 organizations every day. Through the Blue Coat Security Platform, Blue Coat unites network, security and cloud, protecting enterprises and their users from cyber threats -- whether they are on the network, on the web, in the cloud or mobile. Blue Coat was acquired by Bain Capital in March 2015. For additional information, please visit www.bluecoat.com.
Blue Coat and the Blue Coat logo are registered trademarks or trademarks of Blue Coat Systems, Inc. or its affiliates in the United States and certain other countries. Oracle is a registered trademark of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. All other trademarks mentioned in this document are the property of their respective owners.
Infrastructure-as-a-service company has grown over the past two decades from a regional hosting company to a leading mission-critical solutions provider
NEW YORK – NYI, an enterprise grade data center and managed IT solutions provider enabling customers to build customized infrastructure, is celebrating its 20th anniversary. Over the past two decades, NYI has transformed from a small website design and hosting company serving a handful of local enterprises to a leading customized, mission-critical solutions provider delivering services from coast to coast.
With humble beginnings as the brain child of brothers Erik and Phillip Koblence, NYI has grown into one of the most trusted leaders in enterprise-class infrastructure solutions, serving numerous verticals, including media and publishing, financial services, technology, and life sciences. Through the years, three key pillars of NYI’s philosophy have driven the growth and success oAnother major contributor to the company’s success has been its consistent 100% uptime in the face of natural disasters and forces majeure over the last 20 years. NYI data centers were engineered for resilience with N+1 UPS configurations. The New York facility offers over 2 megawatts of power, and the New Jersey data center has 5 megawatts of power and a 2N generator configuration. In addition, NYI’s fully meshed, BGP4-based, fault-tolerant network offers no single point of failure.f the company — accessibility, responsibility and a hyper-focus on customer success. These core values remain intact today and continue to drive the company to remain at the forefront of the industry.
“It is incredible to look back on the past 20 years of NYI’s history,” states Phil Koblence, Chief Operating Officer of NYI. “I was just a kid when this company was created, commuting back and forth from college on the weekends to consult with companies on their IT environments and host their websites. While our offerings have grown substantially and evolved, our core values remain the same today as they did at the beginning. NYI doesn’t just bark a solution at our customers. We speak with customers individually to gain insight into their requirements and develop unique, custom-tailored solutions.”
"I’m very proud of NYI and its growth over the past two decades,” said Erik Koblence, Chief Executive Officer of NYI. “NYI’s evolution from a small website design company to the infrastructure services provider we are today gave us a first-hand understanding of the growing pains companies experience. That is why we are so in tune with problem solving and designing the best IT solutions for our clients.”
NYI recently announced its participation in the Startup Infrastructure in a Post-Cloud Era event to be held April 21, 2016 at 6:30 p.m. at the LMHQ facility in New York City. The event brings together industry experts to help attendees determine when cloud is appropriate and where scaling infrastructure makes sense. To register, please click here.
NYI owns and operates data centers in New York and New Jersey. In addition to serving the Northeast, NYI also extends its data center, managed and cloud services across the coast, with facilities located in Seattle and Los Angeles. With 100% uptime, NYI facilities are SSAE-16, HIPAA and PCI compliant and offer 24x7x365 onsite support.
For more information about NYI, visit http://www.nyi.net
At NYI, we understand you’re important and so is your business. Our approach is simple, effective and unique in our marketplace. We look beyond our world-class data centers and focus on supporting customer growth and success acting as a genuine extension of your IT team. Since 1996, we have provided our customers with fully managed, highly customized infrastructure solutions built to suit their specific business and mission critical IT needs. Our customers view us as a true partner; always available for round-the-clock support from a team they know and trust.
Colocation - Cloud - Hybrid - Managed Services - Disaster Recovery
NYI is SSAE 16, PCI and HIPAA-compliant. For more information, visit www.nyi.net; call (800) 288-7387; or follow the company on Twitter and LinkedIn.
Netwrix Auditor for Office 365 provides visibility and user behavior analytics to enable protection of cloud-based email services against cyber threats
IRVINE, Calif. – Netwrix Corporation, a provider of IT auditing software that delivers complete visibility into IT infrastructure changes and data access, has released Netwrix Auditor for Office 365. The application delivers complete visibility into Exchange Online by detecting and reporting on changes made to Exchange objects, configurations and permissions, as well as non-owner mailbox access to Exchange Online user mailboxes.
According to the Netwrix 2015 Cloud Security Survey, almost 50% of companies start their cloud-based operations with migrating their email systems to the cloud. However, companies are not confident about cloud security: 69% acknowledge the risks of unauthorized access and 43% recognize the risk of account hijacking. In order to mitigate security risks, ensure uninterrupted email service and speed up the troubleshooting of disruptive changes, companies need to gain rigorous control over sensitive email systems. Netwrix Auditor for Office 365, a part of the recently announced Netwrix Auditor 8.0 platform, is designed to overcome the limitations of Exchange Online’s native auditing tools, such as lack of reporting capabilities and consolidation of all necessary details into a single view.
Key features of Netwrix Auditor for Office 365 include:
Maximized visibility on the full spectrum of changes: Informs users about Exchange Online configuration changes with all necessary details, such as what was changed, who made a change and where a change occurred, as well as the before and after values and IP addresses, improving Office 365 email security.
Scheduled and on-demand reports and dashboards: Enables easy Office 365 security analytics by delivering timely and complete audit information in scheduled and on-demand reports and dashboards that offer multiple usability options, including filtering, sorting and exporting in various formats.
Continuous regulatory compliance: Helps establish a secure and compliant Exchange Online organization by offering the broadest range of scheduled and on-demand reports, dashboards and data search to address specific requirements of PCI DSS 3.0, HIPAA, SOX, FISMA/NIST800-53, ISO/IEC 27001 and other compliance regulations.
Non-owner mailbox access auditing: Detects Exchange Online mailbox access by someone other than the owner and notifies mailbox owners about all such activity to prevent privilege escalation issues. Reports specify exactly what actions were performed on specific mailbox items, the client used and the computer’s IP address.
“The largest to-date Panama Papers data breach teaches us that today we all live in the reality of the ever-growing security risks,” said Alex Vovk, CEO and co-founder of Netwrix. “Since it is almost impossible to predict where a cyberattack would come from, any company should enable complete visibility into most critical systems to spot anomalies that might result in a data breach. Deep understanding of who touches sensitive mailbox data will detect insider threat and data exfiltration to strengthen security of cloud environment and ensure companies that any unstructured data is under control.”
To learn more about how to enable hybrid cloud visibility and strengthen your email security, please visit http://www.netwrix.com/office_365_auditing.html.
About Netwrix Corporation
Netwrix Corporation provides IT auditing software that delivers complete visibility into IT infrastructure changes and data access, including who changed what, when and where each change was made, and who has access to what. Over 150,000 IT departments worldwide rely on Netwrix to audit IT infrastructure changes and data access, prepare reports required for passing compliance audits, and increase the efficiency of IT operations. Founded in 2006, Netwrix has earned more than 70 industry awards and was named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S. For more information, visit www.netwrix.com
Regroup Mass Notification, the award-winning provider of emergency and day-to-day notification solutions, today announced the launch of their AlertManager Mobile Appfor IOS and Android to empower mobile users to quickly launch critical alerts directly from their smartphones.
AlertManager allows users to easily initiate a notification on the go from any location without having to log into the system. Advance features like pre-written Quick Posts facilitate one-click alerting from an user-friendly interface to guarantee important alerts are sent out on time.
This new application empowers both admins and recipients to send and receive multimodal alerts via text/SMS, text-to-speech, voice, email and push notifications.
Key features and benefits of AlertManager include:
Real-time, two-way communication between admins and recipients
Push notifications that ensure critical alerts are always delivered
Two-step Quick Post feature facilitates one-click alerting
Customizable Quick Post templates that can include event-specific text, multimedia, attachments, images and recorded messages
Populated recipient lists empower admins to easily reach specific people or groups
HTML, rich-text editor
NWS/NOAA weather alerts as they are issued
“We at Regroup are very excited about this new application that will allow our clients to leverage the power of mobile technologies to improve communications and reach recipients wherever they are at any moment. This developments comes after months of hard work and intense testing that we believe will simplify communications for many organizations,” said Joe DiPasquale, CEO of Regroup.
Regroup, the leading provider of Emergency and Mass Notification solutions offers easy one-click messaging to mobile phones (text/voice), landlines, email, social media, websites and more. Regroup stands apart from other mass communication systems with its ease of use, automated messaging capabilities, seamless integration with client databases and other third-party systems, unparalleled 24/7 customer support and unlimited text/voice/email messaging. Regroup’s powerful, yet easy-to-use mass communications platform is leveraged by universities, state/local governments, corporations and nonprofits across North America to streamline emergency and day-to-day communications.
New Joint Offering Enables Seamless SharePoint Migration to the Cloud and SharePoint Server 2016
* "Maximize The Business Value Of New ECM Deployments With A Clear Migration Strategy" By Cheryl McKinnon with Leslie Owens and Emily Jedinak, Forrester, June 3, 2014
Former NSC Director of Cybersecurity Policy Leads Company's Assessment Program Designed to Identify Attack Surface and Secure High-Value Assets
SUNNYVALE, Calif. – Illumio, the Adaptive Security Company, today announced the launch of its Attack Surface Assessment Program (ASAP). Illumio ASAP gives enterprises MRI-like visibility inside the data center and cloud by providing a map of high-value assets and open communications pathways between applications. It then enables organizations to understand -- and radically reduce -- the attack surface of their high-value assets.
In a computing era where an average of 96 percent of systems have been breached (FireEye, Maginot Revisited, 2015), Illumio ASAP addresses the security gap inside the data center and cloud created by network segmentation technologies. It is designed for organizations who want to proactively identify and eliminate existing risks inside their data center and cloud associated with the lateral spread of attacks. ASAP's network- and application-level visibility enables IT Security teams to identify unknown traffic between development and production environments, as well as communication pathways that make high-value applications vulnerable to attackers.
"Once an attacker is inside a data center or cloud, their 'dwell time' -- the period they can scan a compromised network for high-value data before being detected -- can be upwards of 100-200 days," said Doug Cahill, ESG. "Technologies like the Illumio Attack Surface Assessment Program can give organizations additional visibility that can help them restrict attackers' ability to conduct network reconnaissance or eliminate infrastructure vulnerabilities before they can ever be exploited."
The development of Illumio ASAP was led by Nathaniel Gleicher, Head of Cybersecurity Strategy for Illumio and former Director for Cybersecurity Policy for the National Security Council at the White House.
"Because network segmentation tools tend to be coarse grained and incredibly complex to deploy at scale, the interior geography of most data centers is still fairly open," said Gleicher. "This large attack surface favors attackers, because once they get in they can quickly move to high-value targets, and be extremely difficult to identify and contain. Illumio ASAP is designed to rebalance the playing field between defenders and attackers."
Illumio ASAP Benefits
Illumio ASAP highlights the servers and communications flows that attackers are most likely to target in their search for high-value assets. The custom Illumio assessment report gives organizations a draft plan for eliminating the attack surface inside their data centers and clouds by using adaptive segmentation to harden their security posture.
- VIDEO: Why You Need Illumio ASAP: https://youtu.be/-ovOPspQRwY
- VIDEO: What You Get with Illumio ASAP: https://youtu.be/d6K2XWq46vM
Illumio delivers adaptive security for every computing environment, protecting the 80 percent of data center and cloud traffic missed by the perimeter. The company's Adaptive Security Platform™ visualizes application traffic and delivers continuous, scalable, and dynamic policy and enforcement to every bare-metal server, VM, container, and VDI within data centers and public clouds. Using Illumio, enterprises such as Morgan Stanley, Plantronics, NTT, Salesforce, King Entertainment, NetSuite, and Creative Artists Agency have achieved secure application and cloud migration, environmental segmentation, compliance, and high-value application protection from breaches and threats with no changes to applications or infrastructure. For more information, visit www.illumio.com or follow @Illumio.
(TNS) - As they so often do, 911 calls came fast and furious on a recent weekday afternoon. A residential burglary. A business burglary. A person with a gun. They all happened at once, in different Evansville neighborhoods.
Amy Worthington was on top of it. Seated in the City-County Dispatch Center, with four computer screens in front of her and her headset in place, Worthington navigated Evansville Police Department officers to each event.
Officers were stretched so thin at the time that Worthington had to send two patrol units that normally work the South Sector out of their jurisdiction to one of the burglaries. It was such a busy few minutes that at one point, only three EPD cars were freely patrolling the city.
Until recently, I knew nothing about enterprise security beyond some of the more widely publicized breaches in the United States.
That said, after spending most of 2016 immersed in the space, I’ve come to appreciate just how challenging and broad an issue security has become to enterprises.
I’ve also come to believe that our best hope for solving security is by understanding humans — the perpetrators and victims of cyberattacks — and, as a result, I’m convinced that security is fundamentally a human identity problem.
(TNS) - Japan was intensifying search and rescue operations on the southern island of Kyushu Friday amid a series of aftershocks, after a 6.5-magnitude earthquake killed at least 9 people and injured about 1,100, the government said.
The government deployed more than 3,000 people to Kumamoto prefecture, the hardest-hit region in Thursday's quake, as Prime Minister Shinzo Abe vowed to make its utmost efforts in the operations.
"We will do our best to ensure the safety of residents," Abe told reporters.
Walls and houses collapsed in Mashiki, a rural town of 33,000 residents, 900 kilometres south-west of Tokyo, when the quake struck at 9:26 pm Thursday (1226 GMT) at a depth of 11 kilometres, local officials said.