Fall World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Spring Journal

Volume 29, Issue 2

Full Contents Now Available!

Jon Seals

Cloud and big data environments demand high assurance data centric security


PLANTATION, Fla.Thales, leader in critical information systems and cybersecurity, and Vormetric, a provider of data-centric security to the world’s leading companies, announce that the Vormetric Data Security Manager (DSM) is now secured with Thales nShield hardware security modules (HSMs). Customers in highly regulated and security conscious industries such as finance and banking can now benefit from the heightened levels of trust and security provided by Thales HSMs.


Vormetric DSM centralizes control of data-at-rest security enabling organizations to protect their sensitive data and meet new security mandates and compliance requirements. Where high levels of trust and security are demanded Thales HSMs provide FIPS 140-2 certified protection and key management.


To meet the demands of customers with deployments distributed across multiple data centres, Thales HSMs offer Vormetric a superior approach to HSM initialization and ongoing administration. By utilizing the unique Thales Security World architecture customers can increase their security posture without the operational difficulties often associated with alternative solutions.


Ashvin Kamaraju, vice president of product development at Vormetric says:

“Our security conscious customers demand high levels of assurance and Vormetric has long offered these customers the option of an embedded FIPS 140-2 certified module. Thales HSMs are a critical component in meeting this security standard and also offer superior scalability to meet the demands of customers working in cloud and multi data-centre environments”.


Cindy Provin, president, Thales e-Security, Inc. says:

“As ever-greater volumes of data move to the cloud and big data environments the way in which data is stored, accessed and processed demands a data-centric security approach. Properly encrypted data is worthless to cyber-criminals and the deployment of FIPS-validated hardware is a long proven method to ensure encryption keys are safely stored and managed. The integrated delivery of Thales HSMs with Vormetric’s DSM allows customers to take advantage of best-in-class cryptographic hardware protection and key management, adding a further layer of security and reducing their operational risk.”


Thales recently signed a definitive agreement to acquire Vormetric which, when completed, will extend Thales’ data protection and key management solutions to further protect enterprises against cybersecurity threats.


For further information read the case study: www.thales-esecurity.com/knowledge-base/case-studies/vormetric


For industry insight and views on the latest key management trends check out our blog www.thales-esecurity.com/blogs


Follow Thales e-Security on Twitter @Thalesesecurity, LinkedIn, Facebook and YouTube


About Vormetric

Vormetric’s comprehensive high-performance data security platform helps companies move confidently and quickly. Our seamless and scalable platform is the most effective way to protect data wherever it resides—any file, database and application in any server environment. Advanced transparent encryption, powerful access controls and centralized key management let organizations encrypt everything efficiently, with minimal disruption. Regardless of content, database or application—whether physical, virtual or in the cloud—Vormetric Data Security enables confidence, speed and trust by encrypting the data that builds business.


About Thales e-Security

Thales e-Security is a leading global provider of trusted cryptographic solutions with a 40-year track record of protecting the world’s most sensitive applications and information. Thales solutions enhance privacy, trusted identities, and secure payments with certified, high performance encryption and digital signature technology for customers in a wide range markets including financial services, high technology, manufacturing, and government. Thales e-Security has a worldwide support capability, with regional headquarters in the United States, United Kingdom, and Hong Kong. www.thales-esecurity.com


About Thales

Thales is a global technology leader for the Aerospace, Transport, Defence and Security markets. With 61,000 employees in 56 countries, Thales reported sales of €13 billion in 2014. With over 20,000 engineers and researchers, Thales has a unique capability to design and deploy equipment, systems and services to meet the most complex security requirements. Its unique international footprint allows it to work closely with its customers all over the world.

Positioned as a value-added systems integrator, equipment supplier and service provider, Thales is one of Europe’s leading players in the security market. The Group’s security teams work with government agencies, local authorities and enterprise customers to develop and deploy integrated, resilient solutions to protect citizens, sensitive data and critical infrastructure.

Drawing on its strong cryptographic capabilities, Thales is one of the world leaders in cybersecurity products and solutions for critical state and military infrastructures, satellite networks and industrial and financial companies. With a presence throughout the entire security chain, Thales offers a comprehensive range of services and solutions ranging from security consulting, intrusion detection and architecture design to system certification, development and through-life management of products and services, and security supervision with Security Operation Centres in France, the United Kingdom and The Netherlands.

Leading bank modernises the processing of its credit applications and inheritance documents


LONDONABBYY, a leading provider of document recognition, data capture, and linguistic technologies, today announced that Banque Populaire de l’Ouest, a member of France’s second largest banking group – Banque Populaire Caisses d’Épargne (BPCE) – has successfully overhauled two strategic document-based processes thanks to ADOC Solutions, an ABBYY Gold Certified Solution Partner.


The inheritance and credit departments at Banque Populaire de l’Ouest manage thousands of cases per year and deal with a wide variety of document types. The documents arrive through multiple channels including post and email. To help get a handle on these complex processes Banque Populaire de l’Ouest turned to ADOC Solutions, an ABBYY solution partner and an expert in document management solutions. ADOC Solutions was initially selected as a service provider by the Caisse d’Épargne Bretagne Pays de Loire (CEBPL), member of the BPCE group, for whom they developed a document digitisation solution in 2012.


“The success of the project for CEBPL was an important factor for Banque Populaire de l’Ouest in choosing ADOC Solutions for its digitisation project in its inheritance and credit departments. The goal was to facilitate access to information for all employees and eliminate the manual circulation of paper documents,” says Jean-Sébastien Wagner, general director at ADOC Solutions.


To power the solution, they chose a digital mailroom solution for automation needs of customer oriented businesses. It is a feature-rich solution that digitises, intelligently classifies and quickly routes content throughout an organisation.


“ABBYY offers a wide range of products which help banks and other organisations of different sizes to manage considerable volumes of documents, as well as process and understand their content,” indicates Gregory Laborderie, commercial director at ABBYY France. “Thanks to our solutions, we can respond to customer needs in the digital world.”


Prior to implementing the solution the bank received all documents in paper form and distributed and processed them manually. Now all document handling takes place automatically – the incoming documents can be easily digitised and classified. Then, based on the classified information, the documents are allocated to the employee in charge. The solution was easily implemented and customised according to the needs and requirements of the bank. The teams mastered it quickly due to its ease of use, practicality, improvement of customer responsiveness and simplicity in circulating documents.


To learn more, please visit: www.abbyy.com/en/flexicapture-for-mailrooms



ABBYY UK is a member of the ABBYY Group and supports sales and marketing activities in Western Europe. ABBYY is a leading provider of document recognition, data capture, and linguistic technologies and services. Its products include the ABBYY FineReader line of optical character recognition (OCR) applications, ABBYY FlexiCapture line of data capture solutions, and development tools. ABBYY offers Professional Services to help customers implementing business solutions based on ABBYY’s products. Paper-intensive organisations from all over the world use ABBYY solutions to automate time- and labour-consuming tasks and to streamline business processes. ABBYY products are used in large-scale government projects such as those of Australian Taxation Office, Lithuanian Tax Inspectorate, Ministry of Education of Russia, Ministry of Education of Ukraine, Montgomery County Government of the USA and the Government of Canada. Companies that license ABBYY technologies include BancTec, Canon, EMC/Captiva, Hewlett-Packard, KnowledgeLake, Microsoft, NewSoft, Notable Solutions, Samsung Electronics and more. ABBYY OCR applications are shipped with equipment from the world’s top manufacturers such as Epson, Fujitsu, Fuji Xerox, Microtek, Panasonic, PFU, Plustek, Ricoh, Toshiba, and Xerox. ABBYY is an international company with offices in Germany, the UK, France, Spain, Ukraine, Cyprus, Russia, the United States, Canada, Australia, Japan and Taiwan. For more information, visit www.ABBYY.com

ABBYY, the ABBYY Logo and ABBYY FineReader are either registered trademarks or trademarks of ABBYY Software Ltd. Texthelp, and Snapverter are trademarks or registered trademarks of Texthelp Limited. Google and Chrome are registered trademarks of Google Inc. Microsoft is a registered trademark of Microsoft Corporation in the United States and/or other countries. Bookshare is a registered trademark of Beneficient Technology Inc. Other product names mentioned herein may be trademarks and/or registered trademarks of their respective owners and are hereby recognised.

Cloud Contact Centre and Skype for Business solution implemented across 3 continents in just 4 months


LONDONBrüel & Kjær, a global leader in sound and vibration measurement and management, has implemented a new Contact Centre and Skype for Business dedicated cloud solution with global SIP trunking from Interoute, owner operator of a global cloud services platform and one of Europe's largest networks. The new communications platform was up and running within just four months of contract signature. Brüel & Kjær has transformed its customer service delivery across the globe using the new collaborative, flexible and cost effective features.


Brüel & Kjær is the world's largest manufacturer and supplier of sound and vibration measurement equipment, systems and solutions. The company operates through an international network of partners and sales offices, with its local teams supported by a global group of engineering specialists. This business model requires an integrated communications solution that not only facilitated collaborative working through international voice, video and screen sharing, but which also supported its customer call centre service.


Jonas Toft Olesen, Global IT Manager at Brüel & Kjær, commented: “As a global organisation, the way we work with our customers is changing and it’s important that we get closer to provide the best service. Interoute is now a strategic partner for us because it was the only provider we found who could merge our telephony, Contact Centre and Skype for Business solutions on a global scale – and they reduced our costs by more than half in the process. Interoute has a huge network and global presence and was able to port our numbers everywhere that we needed them.”


Mark Lewis, VP Communications and Connectivity at Interoute, said: “With innovative global customers such as Airbus and Ferrari, fast and high quality communications is a vital foundation for Brüel & Kjær’s success. Interoute’s global infrastructure provides flexibility and scale for Brüel & Kjær’s, allowing the company to transform its customer support and bring new solutions and services to market quickly.”


Interoute Hosted Skype for Business integrated with Contact Centre and telephony

-          Brings Brüel & Kjær’s customers, customer service representatives and in-house experts closer together, regardless of geographical location and time-zones.

-          Integrates useful collaboration features such as Presence with Contact Centre, making it easy to know who is available, share screens and chat, enabling more interactive and productive calls.

-          Includes Interoute One voice DDIs which provide local calls globally, with simplified billing and cost visibility across the organisation.


Brüel & Kjær’s solution uses Interoute Virtual Data Centre cloud zones in Hong Kong, New York and Amsterdam, ideally located to host Skype for Business and Contact Centre close to users, lowering latency, and improving call quality.


About Brüel & Kjær

Brüel & Kjær Sound & Vibration Measurement A/S supplies integrated solutions for the measurement and analysis of sound and vibration. As a world-leader in sound and vibration measurement and analysis, we use our core competences to help industry and governments solve their sound and vibration challenges so they can concentrate on their primary task: efficiency in commerce and administration. Our Mission is to help our customers measure and manage the quality of sound and vibration in their products and in the environment. Our Vision is to be the first choice and long-term business partner, delivering innovative technical solutions which create sustainable value for our customers. We will be a profitable business and a great place to work.



About Interoute

Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centres, 14 virtual data centres and 31 colocation centres, with connections to 195 additional third-party data centres across Europe. Its full-service Unified ICT platform serves international enterprises and many of the world’s leading service providers, as well as governments and universities. Interoute’s Unified ICT strategy provides solutions for enterprises seeking connectivity and a scalable, secure advanced platform on which they can build their voice, video, computing and data services, as well as service providers in need of high capacity international data transit and infrastructure. With established operations throughout Europe and USA, Interoute also owns and operates 24 connected city networks within Europe's major business centres. www.interoute.com


Forward-Looking Statements

This communication contains certain forward-looking statements. A forward-looking statement is any statement that does not relate to historical facts and events, and can be identified by the use of such words and phrases as “according to estimates”, “aims”, “anticipates”, “assumes”, “believes”, “could”, “estimates”, “expects”, “forecasts”, “intends”, “is of the opinion”, “may”, “plans”, “potential”, “predicts”, “projects”, “should”, “to the knowledge of”, “will”, “would” or, in each case their negatives or other similar expressions, which are intended to identify a statement as forward-looking. This applies, in particular, to statements containing information on future financial results, plans, or expectations regarding business and management, future growth or profitability and general economic and regulatory conditions and other matters affecting Interoute.

Forward-looking statements reflect the current views of Interoute’s management (“Management”) on future events, which are based on the assumptions of the Management and involve known and unknown risks, uncertainties and other factors that may cause Interoute’s actual results, performance or achievements to be materially different from any future results, performance or achievements expressed or implied by these forward-looking statements. The occurrence or non-occurrence of an assumption could cause Interoute’s actual financial condition and results of operations to differ materially from, or fail to meet expectations expressed or implied by, such forward-looking statements.

Interoute’s business is subject to a number of risks and uncertainties that could also cause a forward-looking statement, estimate or prediction to differ materially from those expressed or implied by the forward-looking statements contained in this communication. The information, opinions and forward-looking statements contained in this communication speak only as at its date and are subject to change without notice. Interoute does not undertake any obligation to review, update, confirm or to release publicly any revisions to any forward-looking statements to reflect events that occur or circumstances that arise in relation to the content of this communication.

WISP Leverages Cloud-Based Compass Consumer Connect Plus Software and GigaCenters in Homes and Businesses to Deliver New Services and Gain Powerful Operational Efficiencies

STEAMBOAT SPRINGS, Colo. – Calix, Inc. (NYSE: CALX), the world leader in enabling service providers to deliver a gigabit experience to their subscribers, today announced that ZIRKEL Wireless is utilizing Calix 844E GigaCenters and Compass Consumer Connect Plus software to provide a superior broadband experience to their residential and business subscribers. ZIRKEL, a wireless Internet service provider (WISP) serving over nine communities in northwest Colorado's Routt and Moffatt Counties, has leveraged the combination of GigaCenters and cloud-based Compass Consumer Connect Plus software to deliver an optimized broadband experience -- increasing subscriber satisfaction through streamlined support calls, facilitating remote troubleshooting of subscribers' in-home Wi-Fi networks, and enabling new value-added services. Over the past year, the combined GigaCenter and Compass Consumer Connect Plus solution has helped hundreds of traditional wireline service providers deliver Carrier Class Wi-Fi services to their subscribers and is now proving to be a powerful solution for WISPs as well.

"For the past few years, we had seen the vast majority of our support calls centered around Wi-Fi routers within our subscribers' homes, which were not even devices ZIRKEL Wireless was providing to them," said Alan Belvo, President and owner of ZIRKEL Wireless. "We decided to address this need head-on and selected the Calix GigaCenters and Compass Consumer Connect Plus software to extend our presence into our subscribers' homes and businesses and provide a managed Wi-Fi service. We are already receiving overwhelmingly positive feedback from customers and we are looking forward to not only expanding our GigaCenter deployment, but also expanding our service portfolio with the new capabilities they provide."

ZIRKEL Wireless had not previously offered wireless routers to its Internet subscribers and they identified a need for Carrier Class Wi-Fi service within their customer base. However, by moving inside the subscriber home for the first time, ZIRKEL Wireless needed a long-term solution that was both easy to install and manage, and straightforward for their customer support team. With the combination of the 844E GigaCenter and Compass Consumer Connect Plus, ZIRKEL Wireless has experienced all of these benefits and has been able to pass along additional benefits to subscribers by quickly and remotely managing their Wi-Fi networks. 

"Since we began deploying the Calix 844E GigaCenters and utilizing the unique features of Compass Consumer Connect Plus, like Site Scan, we have seen a significant decrease in the overall number of support calls, as well as the percentage of calls that require a truck roll," said Josh Nowak, sales and support manager at ZIRKEL Wireless. "While we have eliminated many troubleshooting issues, we have also been able to upsell new and existing subscribers to faster speeds and value-added services that more closely meet their broadband needs. In 2016, we are planning to take that to the next level with new managed voice and OTT video services, which are now options for us given the combination of Calix GigaCenters and Compass software."

"The ability to fully manage the broadband service experience, including Carrier Class Wi-Fi, all the way to the subscriber device is paramount to all communications service providers -- whether they are wireless or wireline," said John Colvin, senior vice president of North America sales at Calix. "It is exciting to see a forward-looking WISP like ZIRKEL Wireless make the leap into their subscribers' homes and businesses, transforming both their own service offerings and owning end-to-end the experience that their subscribers receive. Once this vantage point is established, service providers like ZIRKEL Wireless can use powerful platforms like the GigaCenter and Compass software to rapidly introduce new services that meet the ever-changing needs of their subscribers at an accelerating rate, and reap the benefits of being the superior broadband service experience provider in their markets."

About Calix

Calix, Inc. (NYSE: CALX) is a global leader in access innovation. Its Unified Access portfolio of broadband communications access software, systems, and services enables communications service providers worldwide to transform their networks and become the broadband provider of choice to their subscribers. For more information, visit the Calix website at www.calix.com.

This press release may contain forward-looking statements that are based upon management's current expectations and are inherently uncertain. Forward-looking statements are based upon information available to us as of the date of this release, and we assume no obligation to revise or update any such forward-looking statement to reflect any event or circumstance after the date of this release, except as required by law. Actual results and the timing of events could differ materially from current expectations based on risks and uncertainties affecting Calix's business. The reader is cautioned not to rely on the forward-looking statements contained in this press release. Additional information on potential factors that could affect Calix's results and other risks and uncertainties are detailed in its reports on Form 10-Q for the third fiscal quarter of 2015 and Annual Report on Form 10-K for the fiscal year 2014, filed with the SEC and available at www.sec.gov.

New Release Delivers Unparalleled Business Agility and Security by Managing Application Connectivity Throughout the Entire Application Lifecycle and Across Complex Hybrid Cloud Environments

RIDGEFIELD PARK, NJ – AlgoSec, the market leader for Security Policy Management, today released the latest version of the AlgoSec Security Management solution. Version 6.9 enables companies to accelerate application delivery while ensuring security, through intelligent automated workflows that migrate business application connectivity across any heterogeneous enterprise network. The new release also provides unparalleled, application-centric visibility and reporting of traffic flow risks. Additionally, with enhanced support for next generation firewalls, software defined data centers (SDDC), and public cloud platforms, the AlgoSec Security Management solution 6.9 delivers comprehensive security policy management for existing and emerging enterprise networks and security controls.

"Applications play a critical role in a digital business, and their availability has become very important for business continuity. Network Security Policy Management (NSPM) tools provide application-based visibility and control, making management of application connectivity easier1," wrote Gartner analysts Adam Hils and Rajpreet Kaur.

The AlgoSec Security Management Suite version 6.9 enables users to:

  • Automate and Simplify Application Migration Projects: AlgoSec now automates and streamlines the end-to-end process of migrating connectivity in bulk for multiple applications. From cloud migrations to DevOps scenarios, AlgoSec's built-in workflows automatically identify all the relevant connectivity flows that are affected by the planned migration, and then generates the necessary change requests to the underlying network traffic flows, all while ensuring the integrity of the security policy and network access.
  • Automatically Assess Application and Connectivity Risks: AlgoSec 6.9 provides detailed reports that identify and analyze the risks for each business application and their connectivity flows, and pinpoints the specific flows associated with each risk. This is achieved through analytics integrated with vulnerability data from major players such as Qualys, Rapid7 and Tenable Nessus.
  • Get an Executive View of Security: The new executive dashboard provides a holistic view of key application and network security KPIs from across the AlgoSec Security Management solution. Through the dashboard's intuitive graphical charts, graphs and tables, users can select, view, analyze, customize and export any security data that's important to their organization.
  • Advanced Support for Palo Alto Networks Next Generation Firewalls (NGFWs): AlgoSec seamlessly integrates with Palo Alto Networks NGFWs to automate application and user aware security policy management -- including hands-free policy push. AlgoSec supports the entire security policy management lifecycle for Palo Alto Networks' NGFWs and Panorama™ network security management -- from application connectivity discovery, through ongoing management and compliance, to rule recertification and secure decommissioning.
  • Manage Security in Software Defined Data Centers (SDDC): Enhanced support for VMware NSX distributed firewalls allows users to automatically manage and enforce north-south and east-west micro-segmentation security policies across their SDDCs.
  • Easily Extend the Security Policy to Disaster Recovery (DR) Sites: AlgoSec extends any security policy change on a primary site to the DR sites. In the event of a disaster, the backup DR devices will have full security connectivity and can automatically replace the primary devices immediately.

"Business applications power the enterprise, and therefore companies need a streamlined process in order to deploy, change or migrate application connectivity quickly and securely," said Edy Almer, VP Products, AlgoSec. "With the latest release of the AlgoSec Security Management solution we're enhancing our application-centric approach and providing organizations with holistic visibility and automated security policy management to enable them to provision application connectivity across any heterogeneous enterprise network -- at the speed of their businesses."

The AlgoSec Security Management solution manages complex network security policies throughout their lifecycle -- from discovering application connectivity requirements, through ongoing change management and proactive risk analysis, to secure decommissioning. With powerful visibility across firewalls and cloud security controls, AlgoSec simplifies, automates and orchestrates security policy management to accelerate application delivery while ensuring security and continuous compliance across the enterprise.

The AlgoSec Security Management Suite version 6.9 is generally available, with pricing starting at $10,000.

About AlgoSec

AlgoSec simplifies, automates and orchestrates security policy management to enable enterprise organizations and service providers to manage security at the speed of business. Over 1,500 of the world's leading organizations, including 20 of the Fortune 50, rely on AlgoSec to optimize their network security policy throughout its lifecycle, to accelerate application delivery while ensuring security and compliance. For the past 5 years, AlgoSec has been profitable with an average annual growth rate of 41%. Moreover, since its inception, AlgoSec has been committed to the success of each and every customer, and provides the industry's only money-back guarantee.

1 Source: Gartner Network Security Policy Management Solutions Have Evolved, by Adam Hils, Rajpreet Kaur, 30 October, 2015.


Businesses Make Strides in Advancing Security Posture in the Face of Persistent Attacks That Take Advantage of Aging Infrastructure and Data Leaks Through Browser Extensions

SAN JOSE, Calif. – The Cisco® (NASDAQ: CSCO) 2016 Annual Security Report released today, which examines threat intelligence and cybersecurity trends, reveals that only 45 percent of organizations worldwide are confident in their security posture as today's attackers launch more sophisticated, bold and resilient campaigns.

While executives may be uncertain about their security strength, 92 percent of them agree that regulators and investors will expect companies to manage cybersecurity risk exposure. These leaders are increasing measures to secure their organizations' future, particularly as they digitize their operations.

The report highlights the challenges businesses face due to the rapid advancements of attackers. Hackers increasingly tap into legitimate resources to launch effective campaigns for profit-gain. Additionally, direct attacks by cybercriminals, leveraging ransomware alone, put $34 million a year per campaign into their hands. These miscreants continue to operate unconstrained by regulatory barriers.

Businesses are up against security challenges that inhibit their ability to detect, mitigate and recover from common and professional cyberattacks. Aging infrastructure and outdated organizational structure and practices are putting them at risk.

The study sounds a global call-to-arms for greater collaboration and investment in the processes, technologies and people to protect against industrialized adversaries.

Top Research Findings

  • Decreasing confidence, increasing transparency: Less than half of businesses surveyed were confident in their ability to determine the scope of a network compromise and to remediate damage. But, an overwhelming majority of finance and line-of-business executives agreed that regulators and investors expect companies to provide greater transparency on future cybersecurity risk. This points to security as a growing boardroom concern.
  • Aging infrastructure: Between 2014 and 2015, the number of organizations that said their security infrastructure was up-to-date dropped by 10 percent. The survey discovered that 92 percent of Internet devices are running known vulnerabilities. Thirty-one percent of all devices analyzed are no longer supported or maintained by the vendor.
  • SMBs as a potential weak link: As more enterprises look closely at their supply chain and small business partnerships, they are finding that these organizations use fewer threat defense tools and processes. For example, from 2014 to 2015 the number of SMBs that used web security dropped more than 10 percent. This indicates potential risk to enterprises due to structural weaknesses.
  • Outsourcing on the rise: As part of a trend to address the talent shortage, enterprises of all sizes are realizing the value of outsourcing services to balance their security portfolios. This includes consulting, security auditing and incident response. SMBs, which often lack resources for an effective security posture, are improving their security approach, in part, by outsourcing, which is up to 23 percent in 2015 over 14 percent the previous year.
  • Shifting server activity: Online criminals have shifted to compromised servers, such as those for WordPress, to support their attacks, leveraging social media platforms for nefarious purposes. For example, the number of WordPress domains used by criminals grew 221 percent between February and October 2015.
  • Browser-based data leakage: While often viewed by security teams as a low-level threat, malicious browser extensions have been a potential source of major data leaks, affecting more than 85 percent of organizations. Adware, malvertising, and even common websites or obituary columns have led to breaches for those who do not regularly update their software.
  • The DNS blind spot: Nearly 92 percent of "known bad" malware was found to use DNS as a key capability. This is frequently a security "blind spot" as security teams and DNS experts typically work in different IT groups within a company and don't interact frequently.
  • Time to detection faster: The industry estimate for time to detection of a cybercrime is an unacceptable 100 to 200 days. Cisco has further reduced this figure from 46 to 17.5 hours, since the 2015 Cisco Midyear Security Report was released. Shrinking the time to detection has been shown to minimize cyberattack damage, lowering risk and impact to customers and infrastructures worldwide.
  • Trust matters: With organizations increasingly adopting digitization strategies for their operations, the combined volume of data, devices, sensors, and services are creating new needs for transparency, trustworthiness, and accountability for customers.

For a complete copy of the 2016 Cisco Annual Security Research report, and to read more about Cisco's recommendations as to what businesses can do to mitigate against risk, click here.

About the Report
The Cisco 2016 Annual Security Report analyzes the most compelling trends and issues in cybersecurity from Cisco security experts on the advances made by both the security industry and by the criminals hoping to break through security defenses. In addition, the report highlights key findings from Cisco's second annual Security Capabilities Benchmark Study, focused on security professionals' perceptions of the state of security in their organizations. Geopolitical trends, insights into perceptions of cybersecurity risk and trustworthiness, and the tenets of an Integrated Threat Defense round out the report.

Supporting Quote
"Security is resiliency by design, privacy in mind, and trust transparently seen. With IoT and digitization taking hold in every business, technology capability must be built, bought, and operated with each of these elements in mind. We cannot create more technical debt. Instead, we must meet the challenge head on today."
-- John N. Stewart, senior vice president, chief security and trust officer, Cisco

Supporting Resources
Cisco Video with Chuck Robbins, John N. Stewart: 2016 Cisco Annual Security Report: Executive Perspectives
Cisco Annual Security Report
Cisco Blog: Forewarned is Forearmed: Announcing the 2016 Cisco Annual Security Report
Cisco Infographic
Follow Cisco on Twitter @CiscoSecurity
Like Cisco Security on Facebook

About Cisco

Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. For ongoing news, please go to http://thenetwork.cisco.com.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. 

RSS Feed for Cisco: http://newsroom.cisco.com/rss-feeds

New Facility to Be Anchored by Large European Broadband and Network Provider as Content and Cloud Demand Drives International Expansion

HERNDON, Va. – EdgeConneX®, the global leader in data center solutions at the edge of the network, today announces it is expanding its data center footprint internationally with a new Edge Data Center® (EDC) deployment in Amsterdam. The expansion addresses growing customer demand for the fastest and most reliable physical delivery of content, cloud and applications to local market consumers and enterprises overseas. In addition to the initial Amsterdam deployment, EdgeConneX plans to deploy EDCs throughout Europe, including markets in Ireland, Italy, France, Austria, Germany, and the United Kingdom.

According to Cisco's® 2014-2019 Global Cloud Index, cloud traffic will consume 83% of all data center traffic by 2019. At that time, annual global cloud IP traffic will reach 8.6 ZB, more than quadrupling since 2014. This massive-scale cloud adoption and the resulting burst in traffic to and from data centers are driving the need to distribute cloud infrastructure to more locations at the edge of the network. These new and distributed Edge locations satisfy the performance, security and economic requirements that consumers and enterprises demand, and which traditional Internet and network architectures can no longer adequately support. Whether it's streaming 4K content, real-time interactive gaming, industrial Internet of Things (IoT) or cloud computing, enabling the Internet of Everywhere requires a more highly distributed network architecture, with infrastructure deployed much closer in proximity to end-users.

To enable the Internet of Everywhere, EdgeConneX's model is to deploy purpose-built, state-of-the-art facilities in markets across a region, extending the Internet's edge as close to enterprises and end-users as possible. To date, EdgeConneX has built 23 data centers across the U.S. to support the ever-growing demand for bandwidth-intensive content and cloud applications. 

"Our Amsterdam facility will be our first Edge Data Center in Europe and we look to replicate our U.S. model internationally, supporting a highly distributed data center architecture at the edge of the Internet," says Clint Heiden, Chief Commercial Officer, EdgeConneX. "We are excited to see the adoption of our strategy by leading European broadband and Internet providers. Our Amsterdam Edge Data Center is a collaborative ecosystem effort and is the first step to bringing our business model benefits to all of Europe."

EdgeConneX's model best supports initiatives to deliver exceptionally fast service in The Netherlands via localization of cloud and content. To access the Internet and cloud, consumer and business customers demand secure and resilient service without sacrificing speed. The Amsterdam EDC is purpose-built and precisely located to provide the shortest and fastest routes for content, cloud and application delivery to local consumers, enterprises and Internet customers throughout The Netherlands. 

For more information about EdgeConneX and its leading Edge of network infrastructure solutions for expanding and improving access to wireless and data communications, visit edgeconnex.com or email info@edgeconnex.com.

About EdgeConneX®
EdgeConneX® is a global data center provider specializing in infrastructure solutions at the edge of the network. They provide Space, Power & Connectivity for content, network, cloud, colocation, CDNs and service providers, as well as wireless carriers, telecommunications companies, and commercial property owners. EdgeConneX has created a new Edge for traditional networks, offering superior performance and economics. Their purpose-built Meet You Points® optimize delivery of data at network-critical locations closest to the end-user. For more information, please visit the EdgeConneX Internet of Everywhere at edgeconnex.com.

Edge Data Centers enable the distribution of content at the edge, featuring the ability to support power densities of 20+kW per rack and 600 watts per square foot, as well as simplified per kW pricing to address the needs of the Internet's fastest growing users. Every location offers fiber diversity, including network, building access, conduit system, and carrier, as well as remote hands resources, convenient customer workspace and tenant access to the EdgeConneX next generation data center operating system, EdgeOS. Edge Data Centers are SOC 2 - Type 2, PCI-DSS and HIPAA certified.

Company Experiencing Exponential Growth in Enterprise Asset Management and Manufacturing Solutions Business

ROCHESTER, NY – Omni-ID, the leading global supplier of high-performance, industrial RFID tags and ProVIEW visual tagging systems today announced it has raised $21 million to expand its global presence and product portfolio to support accelerating demand for its IoT based solutions for industry.

This announcement follows a year of growth for Omni-ID, including exponential increases in demand for its enterprise asset management and manufacturing solutions. Omni-ID, already the #1 supplier and manufacturer of industrial RFID tags globally, now boasts the only IoT based e-paper solution for material flow management, ProVIEW. The system is the first to replace commonly used paper based labeling to enable dynamic control of material flows in manufacturing. The company's existing customer base comprises some of the largest automotive, energy, technology and government entities around the globe.

"We've experienced a remarkable level of growth over the past several years -- a true testament to the value and quality of the solutions that we're providing to the marketplace," said George E. Daddis, Jr. PhD, CEO of Omni-ID. "This investment will continue to fuel our growth with additions to the engineering and global sales teams allowing us to keep up with the strong demand for our products and solutions. Additionally, to support our growing customer base, we will be opening new offices in Germany and India in the coming weeks -- adding to our current US, UK and China locations."

Leading this investment round were current Omni-ID investor Trillium International, along with new investment from GE Ventures, Stonehenge Growth Equity Partners and YFY group, a current Omni-ID partner and the world's leading e-paper manufacturer.

"For years, Omni-ID has been the leader in developing and providing industrial RFID solutions for asset tracking," said Jim Stoffel, Trillium International. "We've continued to invest in the company as they leverage their proven technical competencies and deep customer relationships to solve one of the most critical problems of 21st century capital goods manufacturing -- material flows. They've developed the next 'big thing' and the momentum is growing. We're pleased to continue our support as the company accelerates to meet the growing customer demand for its industrial IoT based solutions."

"Omni-ID's technologies are creating a new standard for advanced manufacturing," said Ralph Taylor-Smith, GE Ventures. "We're constantly on the lookout for companies with game-changing technology to drive the digital industrial era -- we quickly identified Omni-ID as one of those companies. With their strong leadership role in their existing markets, technical expertise and market knowledge -- they've developed a truly intuitive product in ProVIEW that simply addresses the issues plaguing manufacturers today because of static, un-trackable paper-based systems."

With this investment, Brian Model of Stonehenge Growth Equity Partners, Ralph Taylor-Smith of GE Ventures, Bingyi Lin of YFY group and George Daddis of Omni-ID have officially joined Jim Stoffel and Jose Coronas of Trillium International on Omni-ID's board of directors.

About Omni-ID
Based in Rochester, NY, Omni-ID has developed original, patented technologies for on-metal and visual tagging to enable a broad range of applications to improve asset tracking, supply chain management and work-in-process. Omni-ID is the leading supplier of RFID tags and visual tagging systems for Manufacturing & Logistics, Energy, IT Assets and Tool Tracking. Omni-ID's versatile family of products provides a complete range of tags and auto-ID solutions for tracking and identification challenges, with unprecedented accuracy, in any environment. For more information, visit www.omni-id.com.

About Trillium International

Trillium International is a Rochester, N.Y. based private equity firm managing early stage and growth equity funds. The investments are primarily in technology companies in North America, Europe and the Far East. Trillium International partners have extensive early stage/private equity investment and management experience, having been chief executive officers, presidents, operating executives, and board members of a wide variety of startups, joint ventures, and Fortune 100 multinationals. http://trilliuminternationalllc.com/

About GE Ventures
GE Ventures identifies, scales and accelerates ideas that will help make the world work better. Focused on the areas of software, advanced manufacturing, energy and healthcare, GE Ventures combines equity investing, new business creation, licensing and technology transfer to deliver an innovation platform designed to drive growth for partners and GE. For more information, please visit www.geventures.com or follow on Twitter (@GE_Ventures) and LinkedIn

About Stonehenge Growth Equity Partners

Since 1999, the team at Stonehenge Growth Equity Partners (SGEP) has been investing in growth stage businesses. By developing trusted relationships with experienced entrepreneurs, SGEP supports its portfolio companies through the most dynamic phases of their lifecycles. Based in Tampa, FL, SGEP invests in companies where an entrepreneur is applying proven technology to solve a business problem. These technology-enabled businesses, located in the southeastern United States, typically generate at least $3M of revenue and are profitable. Our target investment size is $1M to $5M in each portfolio company. For more information, visit www.StonehengeGrowthEquity.com

About YFY Group

Founded in 1924, YFY is an investment company with a diversified portfolio encompassing the world's leading maker of electronic paper, the world's largest contract maker of RFID inlays, the leading specialty paper supplier in Asia, a leading packaging provider in Greater China, one of the leading financial services company in Taiwan, and Taiwan's leading consumer products company. Through its subsidiary, YFY also manages the leading Taiwanese biotech venture fund. www.yfy.com

Data-Centric Security Solution Innovator Achieves Key Milestones as It Meets Growing Demands of the Data-Driven Enterprise

FREMONT, Calif. – Dataguise, a technology leader in secure business execution, today announced strong growth in 2015 as demand for its flagship solution, DgSecure®, escalates. Year-over-year (2014-2015) revenue grew 460 percent in 2015 and is on track to increase in 2016, demonstrating that the company's solution for protecting sensitive information in big data, unstructured data, and RDBMS addresses the requirements for secure business execution.

According to International Data Corporation (IDC), "The big data technology and services market is a fast-growing, multibillion-dollar worldwide market. It is expanding rapidly as large IT companies and start-ups vie for customers and market share. IDC expects the big data technology and services market to grow at a 26.24 percent compound annual growth rate through 2018 to reach $41.52 billion."1

2015 was a notable year for Dataguise as the company entered new markets and introduced advanced technology to detect, audit, protect, and monitor sensitive data.2 The pillars that support the company's year-over-year revenue growth of 460 percent include the adoption of DgSecure by Fortune 500 customers more than three times over the previous year. 25% of new sales resulted from cloud-based deployments of the data-centric security solution across platforms such as Microsoft Azure and Amazon S3. Dataguise also signed many new partners, for a 400 percent increase in indirect sales channel growth that now includes partners such as Trace3 and Optive. Sales infrastructure was also expanded to meet the rising demand with 12 new sales team members added in 2015.

"Enterprises understand the opportunities that are possible with secure data analysis and Dataguise allows for this on the preferred IT platforms in use today," said Eric Hankins, chief data intelligence architect, Trace3. "Additionally, Dataguise's solution mitigates the risk associated with combining previously untapped data blending enabled by data lakes. With this, organizations gain new insights and drive additional revenue streams at lower costs by leveraging the insights gained from compliant data analytics, whether on-premise or in the cloud. We applaud the efforts of Dataguise in this space."

"The importance of business analytics driven by the insights of data is helping organizations to better understand all areas of their business," said Tim Stevens, vice president, corporate and business development, Cloudera. "In many cases, this data may assist in strengthening profit centers or generating new revenue. Dataguise enhances business analytics by ensuring data security is part of the process."

"With a platform that enables global real-time data applications, enterprises are engaging MapR to tap the universe of big data in new and innovative ways," said Steve Wooledge, vice president product marketing, MapR Technologies. "As a respected partner, Dataguise provides additional assurance for organizations that demand absolute protection and security to safely let the broadest set of users analyze highly sensitive data whether in-flight or at-rest. We are pleased that the trust they have earned is driving traction for DgSecure."

"Secure business execution is a top priority as organizations seek to leverage the untapped potential of data," said Manmeet Singh, CEO, Dataguise. "Dataguise safely unlocks the value of organizational data to facilitate the data-driven enterprise, enabling businesses to use data as a strategic asset and to make much smarter decisions. Thanks to our entire team, the success of Dataguise is a result of the safe delivery of insights to our customers, opening the door to exponential growth opportunities."

To learn more about Dataguise and DgSecure, please visit our resource center at http://www.dataguise.com/resources/

Tweet This: @Dataguise Gains Strong Momentum with 460% Growth as Organizations Move Toward Secure Business Execution - http://goo.gl/GdDTgd - #BigData


About Dataguise
Dataguise is the leader in secure business execution, delivering data-centric security solutions that detect and protect an enterprise's sensitive data, no matter where it lives, what it is comingled with, or who needs to leverage it. Dataguise solutions free the enterprise from traditional security constraints to support the data-driven organization and maximize the business value of information. DgSecure by Dataguise makes data security painless, delivering a powerful solution that provides the highest level of protection without the need for programming. The company is proud to secure the data of many Fortune 500 companies committed to responsible data stewardship. To learn more about how Dataguise is spearheading the secure data revolution, visit: www.dataguise.com

1 International Data Corporation (IDC), Worldwide Big Data Technology and Services 2014-2018 Forecast, Document # 250458, http://www.idc.com/getdoc.jsp?containerId=250458
2 Dataguise, Dataguise Announces Secured Database Access and Sensitive Data Protection on Microsoft Azure Cloud Platform, December 9, 2015; Dataguise Showcases First Data-Centric Security Solution for DataStax


Open Source Transparency Key to Spurring Widespread Implementation

SANTA CLARA, Calif. – The CloudRouter® Project today announced a collaboration with Princeton University designed to fundamentally change the interdomain traffic delivery by dramatically improving performance and scalability of Software Defined Exchange Points (SDX). SDX has been significantly rewritten as iSDX to improve performance and scalability on an "industrial scale," hence the additional "i." By teaming with CloudRouter, researchers at Princeton University will be able to test iSDX in the real world on an industrial scale.

"CloudRouter and Princeton are working closely together on upstream technology development to move SDN forward. This is a glimpse of the next-generation of SDX progressing beyond academic theory and into real-world industrial use cases," said David Jorm, Senior Manager, Product Security and Technology Services at IIX and CloudRouter Academic Research Partnerships Liaison. "This shows the flexibility of using open source network technologies in carrier networks and demonstrates the potential to solve SDN problems through collaboration."

With SDX, layer 3 routing decisions can be based on many diverse attributes of packets, not just the destination IP. This enables applications such as inbound traffic engineering, redirection of traffic to middleboxes, wide-area server load balancing, and blocking of unwanted traffic. An SDX controller, developed at Princeton, enables routing decisions and collaboration between ISPs that is more flexible than today's Border Gateway Protocol (BGP)-based routing.

"At Princeton, my work focuses on the intersection of Internet Routing and SDN. I am thankful to the CloudRouter Project for allowing me to work on-site with their team and model a production network to help increase the understanding of real-world industry issues," said Arpit Gupta, Princeton University, Computer Science Department. "It is very exciting to explore how iSDX can eventually be deployed to solve real-world interconnection problems."

CloudRouter is known for strong academic connections. In 2015, CloudRouter announced a technology partnership with Australia National University to build layer 3 router configuration automation technology for the OpenDaylight Project.

iSDX and CloudRouter software are available for download as images or as source code on GitHub.

iSDX on Github: https://github.com/sdn-ixp
CloudRouter on Github: https://github.com/cloudrouter

About the CloudRouter Project

The CloudRouter Project is a collaborative open source project to develop a freely available software-based router designed to securely run on physical, virtual and cloud environments that support software-defined networking infrastructures. CloudRouter aims to facilitate migration to the cloud without giving up control over network routing and governance. It includes the features of traditional hardware routers, as well as support for emerging technologies such as containers and software-defined interconnection. To help bridge legacy infrastructure with the cloud, the project is focused on bringing simplicity to network interconnection, a traditionally complex process. The CloudRouter Project sponsors include Australia National University, CloudBees, Cloudius Systems, IIX, NGINX, OpenDaylight and Princeton University.

CloudRouter is a registered trademark of IIX Inc. All other trademarks are the property of their respective owners.