Fall World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 29, Issue 3

Full Contents Now Available!

Jon Seals

Securing patient data is a critical mission for Healthcare IT Leadership. Each and every year, countless dollars, thousands of man hours, numerous programs and myriad teams are dedicated to this charter of protecting patient and privacy information.

At Citrix, we understand. You could even say that mandating data security is in our DNA. Every product that Citrix builds reflects the core mindset ‘The Secure Delivery of Apps and Data on any device, on any network, at any time!’ It’s that simple!

In this blog post, I’d like to outline both the security that is inherently built into our XenApp and XenDesktop products and the new feature sets we continue to add throughout our product releases. This is what enables us to deliver secure data where and when you, our customers, need it.

...

https://www.citrix.com/blogs/2016/05/12/new-ways-to-keep-healthcare-data-secure/

AUSTIN, Texas – Texans who suffered damage or loss from the April flooding and were referred to the U.S. Small Business Administration could lose some income-based FEMA grants if they don’t complete and submit SBA’s loan application.

Other Needs Assistance grants may cover uninsured losses for furniture, appliances and other personal property, even vehicles. Survivors will not be considered for this type of assistance unless they have completed and returned the SBA loan application.  The information on the application is used to determine eligibility for income-based assistance.

Applicants from Austin, Colorado, Fayette, Fort Bend, Grimes, Harris, Liberty, Montgomery, Parker, San Jacinto, Waller and Wharton counties should complete the SBA loan application, even if they don’t want a loan.

“If you don’t complete the SBA loan application, you could be leaving ‘money on the table’ for your recovery,” said Federal Coordinating Officer Kevin Hannes, who is in charge of FEMA’s operations in Texas. “We use that application to check eligibility for additional grants.”

Some types of Other Needs Assistance—medical, dental and funeral expenses—are not SBA dependent and completing the loan application is not required. However, it is always recommended by recovery experts.

SBA is the federal government’s primary source of money for the long-term rebuilding of disaster-damaged private property, offering low-interest disaster assistance loans to businesses of all sizes, private nonprofit organizations, homeowners and renters.

Survivors should start the loan process as soon as possible, and those who qualify for an SBA loan are under no obligation to accept it.  If approved and the loan is not accepted, the survivor may be ineligible for additional federal assistance.

Submit an SBA loan application even if you are waiting for an insurance settlement.  You may be able to begin your recovery immediately with a low-interest SBA disaster loan. The loan balance will be reduced by the settlement from your insurance. SBA loans may also be available for losses not covered by insurance.

Homeowners may borrow up to $200,000 from SBA to repair or replace their primary residence. Homeowners and renters may borrow up to $40,000 from SBA to replace personal property.

Businesses may borrow up to $2 million for any combination of property damage or economic injury. SBA offers low-interest working capital loans (called Economic Injury Disaster Loans) to small businesses and most private nonprofit organizations of all sizes having difficulty meeting obligations as a result of the disaster.

Disaster loan information and application forms are also available from SBA’s Customer Service Center by calling 800-659-2955 or email disastercustomerservice@sba.gov. Individuals who are deaf or hard‑of‑hearing may call 800-877-8339. For more disaster assistance information or to download applications, visit sba.gov/disaster. Completed applications should be mailed to: U.S. Small Business Administration, Processing and Disbursement Center, 14925 Kingsport Road, Fort Worth, TX  76155.

Texans can register online at DisasterAssistance.gov or by phone at 800-621-3362 (FEMA). Persons who are deaf, hard of hearing or have a speech disability and use a TTY, should call 800-462-7585. Those who use 711 or Video Relay Service, call 800-621-3362.Toll-free numbers are open from 7 a.m. to 10 p.m., seven days a week. Multilingual operators are available.

For more information on Texas recovery, visit the disaster webpage for the April storms at fema.gov/disaster/4269; or visit the Texas Division of Emergency Management website at txdps.state.tx.us/dem. Follow us on Twitter @femaregion6.

# # #

FEMA's mission is to support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, recover from, and mitigate all hazards.

(TNS) — Research groups nationwide churn out hurricane forecasts as fast and furious as the spin of a tropical cyclone as the June 1 start of storm season approaches.

Already, at least four predictions have been issued, with the big daddy of all storm forecasters — the National Oceanic Atmospheric Administration — waiting until May 27 to offer its guidance.

But National Hurricane Center Director Rick Knabb, who spoke Wednesday at the Governor's Hurricane Conference in Orlando, criticized forecasts that are overly specific about how many storms will hit the U.S. and where.

His concern: People won't prepare if they believe they aren't on the hurricane hit list.

...

http://www.emergencymgmt.com/disaster/Have-Hurricane-Forecasts-Gotten-Overly-Specific.html

When a crisis strikes, an emergency action plan can be all that stands between a timely, orderly response and chaos. When it comes to your own plan, how prepared is your organization for the myriad of threats it faces?

Considering that nearly two-thirds of organizations report having activated their emergency communications protocols at least once in the previous year, it’s clearly important to have an actionable, up-to-date plan. Faced with a growing number of potential threats, it’s no wonder that many organizations are moving away from the traditional, hard-copy methods of emergency planning to a more advanced, technologically-savvy approach, using mobile apps as a key component for housing, updating and distributing their plans.

Before the next crisis hits, now is the time to ask yourself if your own organization would benefit from doing the same. To guide your decision, let’s take a look at some of the key benefits of moving your emergency action plan from binders to a mobile app:

...

http://www.rockdovesolutions.com/blog/6-benefits-of-moving-your-emergency-action-plan-from-binders-to-mobile

Despite the doubling of data breaches in the banking, credit and financial sectors between 2014 and 2015, most IT professionals in financial services are overconfident in their abilities to detect and remediate data breaches. According to a new study by endpoint detection, security and compliance company Tripwire, 60% of these professionals either did not know or had only a general idea of how long it would take to isolate or remove an unauthorized device from the organization’s networks, but 87% said they could do so within minutes or hours.

When it comes to detecting suspicious and risky activity, confidence routinely exceeded capability. While 92% believe vulnerability scanning systems would generate an alert within minutes or hours if an unauthorized device was discovered on their network, for example, 77% said they automatically discover 80% or less of the devices on their networks. Three out of 10 do not detect all attempts to gain unauthorized access to files or network-accessible file shares. When it comes to patching vulnerabilities, 40% said that less than 80% of patches are successfully fixed in a typical cycle.

The confidence but lack of comprehension may reflect that many of the protections in place are motivated by compliance more than security, Tripwire asserts.

...

http://www.riskmanagementmonitor.com/financial-services-it-overconfident-in-breach-detection-skills/

Appvance, The Enterprise Software Testing Experts, Report That WANdisco Fusion Outperformed Cloudera BDR for Hadoop Data Replication, Backup and Recovery

SAN RAMON, Calif. – WANdisco (LSE: WAND) the leading provider of software enabling global enterprises to meet today's data challenges of secure storage, scalability and availability, today announced the results of a recent competitive evaluation of WANdisco Fusion against Cloudera BDR (Backup and Disaster Recovery), covering both functionality and performance, undertaken by third party enterprise software testing firm Appvance.

In summary, Appvance recommended WANdisco Fusion, with its patented active-transactional replication technology over Cloudera BDR, for Hadoop data replication, backup and recovery.

"In our comparison tests of Cloudera BDR and WANdisco Fusion, we found WANdisco provides functionality, performance and availability not possible with Cloudera BDR," said Frank Cohen, Founder, Appvance. "WANdisco Fusion's replication technology avoids BDR's risk of data loss with automated disaster recovery after outages, and ensures availability even when entire data centers go offline. This is especially critical in regulated industries where production data and current backups must be available at all times."

Key findings:

  • WANdisco Fusion's active-transactional replication with automated forward recovery avoids Cloudera BDR's risk of data loss and extended downtime after outages. Cloudera BDR runs in batch and requires the replication job to be restarted from the beginning after an outage
  • WANdisco Fusion replicated the same data volumes up to 90% faster than BDR without impacting the performance of other applications running on the clusters
  • WANdisco Fusion performed full cluster backups up to 37% faster than BDR, used 40% less memory and allowed clusters to be available for other applications while the backup was running. BDR resource contention does not allow other applications to run during a backup
  • WANdisco Fusion ingests and replicates data at the same time, making it ideal for streaming fast data applications that require replication, unlike Cloudera BDR, which requires files to be written and closed
  • WANdisco Fusion replicates data between Hadoop clusters running on any distribution, version and storage, including cloud storage. Cloudera BDR only replicates data between clusters running specific versions of Cloudera's CDH distribution of Hadoop, creating vendor lock-in.

Download the full report

Learn more and download a free copy of Appvance's complete findings in their report entitled, "Comparing WANdisco Fusion to Cloudera BDR, A Methodology and Results," at: www.wandisco.com/fusion-vs-bdr.

About WANdisco

WANdisco (LSE: WAND) is a provider of enterprise-ready, non-stop software solutions that enable globally distributed organizations to meet today's data challenges of secure storage, scalability and availability. WANdisco's products are differentiated by the company's patented, active-transactional data replication technology, serving crucial high availability (HA) requirements, including Hadoop Big Data and Application Lifecycle Management (ALM), including Apache Subversion and Git. Fortune Global 1000 companies, including Juniper Networks, Motorola, and Halliburton, rely on WANdisco for performance, reliability, security and availability. For additional information, please visit http://www.wandisco.com.

About Appvance Inc.

Appvance provides Appvance UTP, the first unified automated testing platform makes Continuous Delivery faster, cheaper and better.

Built from the ground up with agile and cloud services in mind, Appvance UTP meets the needs of both DevOps and Quality Assurance teams for speed, rigor and security. For the past 15 years Appvance Founder Frank Cohen has led performance and developer productivity evaluations of Integration, Web Service, Mobile, Storage, and Web app platforms. Appvance is a venture-backed technology company headquartered in San Jose, CA, with offices in Costa Rica and India and funded by Javelin Ventures, Staenberg Ventures, Social Internet Fund, FundersClub, Three Bridges Ventures and HB Asset Management. Learn more at www.appvance.com.

Apache Hadoop and Subversion are trademarks of the Apache Software Foundation (ASF). Appvance is a trademark of Appvance Inc. All other product and company names herein may be trademarks of their registered owners.

 

CloudLock Cloud Access Security Broker to Provide Cloud and On-Premises CASB Cyber Threat Detection Solution for IBM Security QRadar SIEM

WALTHAM, Mass. – CloudLock®, a leading provider of Cloud Access Security Broker (CASB) and Cybersecurity-as-a-Service solutions, today announced it has received IBM PartnerWorld's Ready for IBM Security Intelligence designation for its CloudLock Cloud Security Fabric. As a result, CloudLock has been validated to integrate with IBM Security products to help better protect customers around the world.

"Amidst an ever-growing cyber-threat landscape, modern security teams face an incredibly daunting challenge," said Manolo Gonzalez, VP, Platform and Technology Alliances at CloudLock. "We are thrilled to work with a security leader such as IBM to deliver impactful integrated security incident and event management (SIEM) and CASB solutions that not only streamline operations but enable deeper levels of actionable insight and control for both on-prem and cloud applications, for our customers worldwide."

The proliferation of enterprise cloud application adoption presents new challenges -- and opportunities -- for security teams to protect sensitive assets across cloud and on-premise environments. As demonstrated by CloudLock in the Q3 2015 Cloud Cybersecurity Report, organizations have an average of 540 unique, user-enabled cloud applications that go unvetted by IT and security staff. These threats of data breaches and the rise of cloud malware compound the challenge to remain secure and compliant with access to corporate systems.

The CloudLock® Cloud Security Fabric™ is the cloud-native CASB and Cloud Cybersecurity Platform that helps organizations securely leverage the cloud for apps they buy and build. CloudLock delivers security for any cloud application and platform, including IaaS, PaaS, and IDaaS and orchestrates security across an organization's existing investments.

The CloudLock integration with IBM Security QRadar simultaneously addresses cloud and on-premises cyber threats with advanced incident detection intelligence, providing effective threat management across the hybrid IT infrastructure. With cross-platform visibility, customers can develop in-depth analytics dashboards and cross reference security incidents across environments.

The Ready for IBM Security Intelligence alliance is designed to promote technology collaboration and integration to expand and enhance security coverage, collapse silos of information, and increase situational awareness and insights. With the PartnerWorld program and Ready for Security Intelligence validation, IBM supports collaboration with its Business Partners to enable the integration of product capabilities and improved security capabilities for mutual customers.

For more details on CloudLock's solution visit https://www.cloudlock.com/partners/IBM-Security and CloudLock for IBM Security QRadar SIEM on IBM PartnerWorld Global Solutions Directory.

About CloudLock
CloudLock, the leading CASB and Cybersecurity-as-a-Service provider, offers the Cloud Security Fabric™ enabling enterprises to protect their data in the cloud, reduce risk, achieve compliance, manage threats and increase productivity by continuously monitoring and protecting more than one billion files for more than 10 million end users daily. CloudLock delivers the only complete, risk-appropriate and people-centric approach to cloud cybersecurity. Learn more at www.cloudlock.com.

The Business Continuity Institute - May 13, 2016 08:41 BST

Britain’s businesses are being urged to better protect themselves from cyber criminals after research by the UK government into cyber security found two thirds of large businesses experienced a cyber breach or attack in the past year.

The Cyber Security Breaches Survey found that while one in four large firms experiencing a breach did so at least once a month, only half of all firms have taken any recommended actions to identify and address vulnerabilities. Even fewer, about a third of all firms, had formal written cyber security policies and only 10% had an incident management plan in place.

From this, it is clear to see why cyber attacks and data breaches rank as the top two threats to organizations, as highlighted in the Business Continuity Institute's latest Horizon Scan Report. The vast majority of respondents to a global survey (85% and 80% respectively) expressed concern about the prospect of these threats materialising.

Ed Vaizey, UK Minister for the Digital Economy, said: "Too many firms are losing money, data and consumer confidence with the vast number of cyber attacks. It’s absolutely crucial businesses are secure and can protect data."

Despite the flexibility that the cloud offers customers, a new survey by Microsoft and 451 Research suggests that customers are fiercely loyal to their primary service provider.

According to the survey, The Digital Revolution, Powered by Cloud, which was released Wednesday at the Microsoft Cloud & Hosting Summit in Washington, more than one-third of customers (38 percent) surveyed said they plan to increase spending with their primary cloud and hosting service provider upon contract renewal.

In an interview with The WHIR, Microsoft’s vice president, Hosting and Cloud Service Provider Business, Aziz Benmalek said that this indicates the critical role service providers play in continuing to “drive organic growth in existing customers and help them in their cloud journey.”

...

http://www.datacenterknowledge.com/archives/2016/05/12/survey-cloud-users-no-rush-switch-providers/

Virtualized infrastructure (VMs, virtual networking, software-defined storage, etc.) provides a flexible, well-understood and secure platform on top of which a diverse set of workloads can be efficiently deployed and managed. Containers, such as Docker, provide a convenient method to package, distribute and deploy applications.

Both technologies provide useful abstractions, but at different layers in the stack. By making these layers work well with each other, the overall stack can more effectively meet the needs of both application developers and infrastructure administrators.

...

https://www.citrix.com/blogs/2016/05/12/containers-or-virtual-machines-its-not-necessarily-one-or-the-other-get-the-best-of-both-worlds/