Spring World 2017

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 29, Issue 4

Full Contents Now Available!

Jon Seals

PwC US and Vlocity to Provide Clients Industry-Specific, Omni-Channel Cloud-Based Solutions to Deliver High Quality Customer Experiences

SAN FRANCISCO, Calif. – PwC US today announced it has launched a joint business relationship and collaboration agreement with Vlocity, a leading industry cloud company, to help organizations create omni-channel customer experiences tailored for industry-specific needs. As customer expectations continue to grow, organizations are turning to cloud technologies to create specialized business apps that deliver seamless customer interactions across any channel, giving organizations faster time-to-value.

Tweet this: #PwC & @vlocity: Enabling an omni-channel #CustomerExperience http://bit.ly/1ZJtsrg

Through this relationship, clients will be able to leverage cloud-based technology solutions to enhance their customer experience in four key sectors: Insurance, Health Insurance, Communications and Public Sector. Combining Vlocity's industry cloud apps with PwC's deep market and business insights will allow companies to create a unique and tailored interface for their customers.

"Our prime goal is helping businesses stay one step ahead when it comes to anticipating and meeting customer needs," said Preet Takkar, PwC Principal. "PwC's collaboration with Vlocity allows us to offer additional industry-relevant solutions centered around a truly seamless customer engagement -- something very valuable to our clients. The collaboration will bring Vlocity apps built on the Salesforce platform to PwC clients, enabling us to focus more on business value and accelerating innovation."

PwC and Vlocity will team to help clients in the following ways:

Enable business transformation from strategy through execution, utilizing cloud-based technology with industry specificity.

Develop engaging customer and user experiences to drive efficiency, agility, growth, loyalty and evangelism.

Address industry-specific business issues with high-performing, integrated solutions enabling back-office transactions and high-value interactions on multiple devices and channels.

"Both Vlocity and PwC understand that today's forward-looking organizations need to provide unified customer experiences across any channel or industry," said Rip Gerber, Chief Marketing and Alliances Officer, Vlocity. "We are pleased to work with PwC, an innovative collaborator on the Salesforce roster, to help clients lower cost of ownership for cloud deployments while boosting customer retention, business agility and profitability."

Connect with Vlocity

Salesforce is among the trademarks of salesforce.com, Inc.

About PwC

At PwC, our purpose is to build trust in society and solve important problems. We're a network of firms in 157 countries with more than 208,000 people who are committed to delivering quality in assurance, advisory and tax services. Find out more and tell us what matters to you by visiting us at www.pwc.com. PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see www.pwc.com/structure for further details.

About Vlocity, Inc.

Vlocity, a leading industry cloud software company, empowers companies to deliver unified, industry-specific customer experiences. Vlocity industry cloud apps are modern cloud and mobile software that embed industry-specific functionality, best practices and business processes for customer-centric industries. Built in partnership with Salesforce, Vlocity industry cloud apps leverage the omni-channel capabilities of the Salesforce Customer Success Platform to enable companies to achieve faster business agility and time-to-value from the cloud. Learn more at www.vlocity.com and follow us at @vlocity.

AACHEN, GERMANY – INFORM, a global provider of insurance process optimization technology and fraud management, and co-innovator Mohawk Security, a leading provider in classified advertisement databases, today announced a new technology partnership. The partnership will combine Mohawk's huge advertisement database technology with RiskShield of INFORM.

The first phase of the partnership will focus on developing an Automated Ads Search solution connecting Mohawk's extensive database system to RiskShield's smart decision engine adding new functions such as workflow capabilities and risk scoring based on machine-learning technology.

Dr. Andreas Meyer, EVP at INFORM, commented, "With this new partnership we can better support fraud investigators to streamline their workflow, providing direct access to billions of live and historical advertisements and recover fraudulent cases, all within a single platform. This will not only increase the efficiency of fraud investigation, but also improve the validation process of the genuine claims for fast track settlement."

"We are very pleased to form a partnership with INFORM. By combining INFORM's expertise in delivering intelligent decision logic to improve business productivity, with INFORM's vision of insurance process optimization, we can explore exciting new opportunities leveraging Mohawk´s wealth of information for trend analysis and predictive fraud behavior monitoring," said Lars Skaar, CEO of Mohawk Security.

About Mohawk Security
Mohawk Security is a Norwegian technology company that provides access for Banks and Insurance Companies to databases containing classified ads in numeral markets around the globe. Mohawk has currently more than 60+ customers in the Financial Industry and are fast growing. Mohawk Security received the prestigious Gazelle Award in 2015. The Norwegian Gazelle award is given to companies that fulfill requirements regarding required doubling of revenue over the latest four years and a combined positive net result as well as no years with negative growth in turnover.

INFORM is global provider of claims process optimization, workflow automation, compliance and fraud management solutions, assesses the potential for claim fraud at first notice of loss, medical billing fraud, and performs risk assessment within insurance application data. With a predictive approach, RiskShield incorporates time proven methods such as fuzzy logic, pattern recognition, business rules, and the use of both internal and external data sources to score claims quickly and effectively resulting in valuable insights of fraudulent behaviour. RiskShield is used in more than 35 insurance companies currently in Europe and North America, protecting some of the world's largest insurers, including AXA, GEICO and Zurich.

Winner of the Merchant Payments Ecosystem Award 2015 for Best Data Security Solution

New Startup Combines User Behavior With Automated and Adaptive Responses to Protect Enterprises From Security Breaches and Insider Threats

SAN FRANCISCO, Calif. – Preempt today announced it has emerged from stealth with the release of the Preempt Behavioral Firewall. The Behavioral Firewall protects enterprises from security breaches and malicious insiders with an innovative approach that couples User and Entity Behavior Analysis (UEBA) with Adaptive Response to provide the most effective solution for both detecting and responding to threats. This proactive approach allows organizations to preempt threats in real-time without engaging already overwhelmed security teams.

"According to Verizon's DBIR, in 60 percent of breaches, attackers are able to compromise an organization within minutes. This highlights a need for real-time visibility into breach detection and response capabilities that can instantly preempt these threats," said Roman Blachman, co-founder and CTO of Preempt. "We built the Preempt Behavioral Firewall because traditional UEBA products can detect threats, but are unable to respond, and Next Generation Firewalls are too deterministic to understand User Behavior or obtain a fine-grain response to potential breaches and insider threats. One solution is all alert and no action, while the other is too blunt to be impactful."

"To be effective in our organization, gaining visibility into user and entity behavior was just the beginning," said Jim Beers, director of information security at Moravian College in Bethlehem, Pa. "Preempt's adaptive response capabilities will allow us to prevent threats in real-time without additional burden to our security team."

The Preempt Behavioral Firewall mitigates the impact of a breach by instantly verifying the identity of users through a set of adaptive responses dependent on the type of threat, user and other key security vectors. This proactive approach, along with greater visibility and insights, helps customers reduce their attack surface.

Key Capabilities

  • User and Entity Behavior Analysis and Insights provide greater visibility into an organization's risky users, endpoints, stale or compromised accounts, and privileged user behavior. Interactive analytics help reduce the attack surface before an incident occurs.
  • Adaptive Response and Enforcement includes granular response mechanisms (such as block, notify, allow, re-authenticate or multi-factor authentication) to take action and resolve suspicious activities when abnormal behavior is detected, and ensure business continuity.
  • Policy Engine arms security teams with actionable, flexible and customized pre-set rules, as well as personalized policies based on an organization's specific needs, to facilitate smart adaptive security controls that can respond to complex multi-stage threats.
  • Flexible Deployment allows the Behavioral Firewall to be installed in either in-line proxy or span port (sniffer) mode, enabling security organizations to increase security with minimal business risk and gradually enable automated response capabilities as they build confidence in the Behavioral Firewall.

"As the enterprise perimeter becomes obsolete, rather than trying to secure infrastructure, we are seeing a shift to securing humans," said Steve Herrod, managing director at General Catalyst Partners. "This shift has created a multitude of UEBA solutions, but there are two main issues with existing technology. First, the number of false positives puts a ton of unnecessary strain on IT teams, and second, once a threat is detected it is still up to the IT team to find a way to remediate it. Preempt eliminates both of these issues."

In April 2016, Preempt announced $8 million in Series A financing led by General Catalyst Partners with participation from well-known security leaders and innovators, including Mickey Boodaei and Rakesh Loonkar, founders of Trusteer, and Paul Sagan, former CEO of Akamai Technologies.

Additional Resources

About Preempt
Preempt protects enterprises from security breaches and malicious insiders with an innovative and patented approach that couples User and Entity Behavior Analysis and Adaptive Response to provide the most effective solution for both detecting and automatically responding to security threats. This proactive approach allows organizations to preempt threats in real-time without engaging already overwhelmed security teams. The company has its headquarters in San Francisco, CA and development in Israel. Learn more at www.preempt.com.


CloudLock CyberLab Uncovers Exponential Explosion of Third-Party Risky Cloud Apps

NATIONAL HARBOR, MD – The CloudLock CyberLab, CloudLock's security intelligence arm, today released its Q2 2016 Cloud Cybersecurity Report: The Explosion of Apps: 27% are Risky. Based on analysis across 10 million users, 1 billion files, and nearly 160,000 unique applications, the report focuses on one of the riskiest attack vectors in the cloud: connected third party cloud apps.

As more and more organizations adopt cloud platforms, new Shadow IT risk vectors are coming into play in the form of connected third-party apps. These apps (and by extension, their vendors) are authorized using corporate credentials, have programmatic (API) access to corporate data on multiple SaaS platforms via OAuth connections, and can act on behalf of users to access, delete, store, externalize and exfiltrate data.

Key findings:

30x Increase in Connected Apps
The shadow IT dilemma is only becoming more challenging as usage is increasing exponentially year over year. From 2014 to 2016, we've seen nearly a 30x increase in apps from 5,500 to nearly 160,000. Each application instance represents a backdoor through which hackers can infiltrate and externalize sensitive corporate assets.

27% of Apps Connected to Corporate Environments Are High Risk
Measuring risk by a combination of access scopes, community-sourced ratings, and expert-driven analytics, the CloudLock CyberLab found that 27% of third-party apps are classified as high risk through which cybercriminals could gain programmatic access to corporate platforms impersonating end users.

More than Half of Apps Are Banned Due to Security-Related Concerns
An organization may embrace its employees' 'shadow' exploration of innovative technology solutions and sanction a subset of these apps as Productivity IT, but it's essential to closely monitor the connected third-party apps and identify cloud native malware in real time. Security conscious enterprises recognize the high risk associated with connected third-party apps and take immediate action. While apps can be banned for any number of reasons, including concerns around productivity, a clear majority are banned because of the security vulnerabilities they introduce.

Key Recommendation: Reduce Cloud App Risk by Establishing an Acceptable Use Policy
By enacting a high-level strategy, coupled with an Acceptable Application Use Policy, organizations can significantly reduce the application risk level organization-wide. Automating whitelisting or banning of potentially risky applications is an effective strategy. One of CloudLock's customers auto-revokes any app labeled as high risk unless it has been whitelisted based on CloudLock Cloud Application Risk Index (CARI), effectively reducing the unique number of apps by 34%, significantly decreasing the associated risk level. CARI is the industry's first application risk index that relies on trust ratings from over 750 organizations' IT security teams, as well as application access scopes and research-based vulnerability intelligence.

"The shift to the cloud creates a new, virtual security perimeter that includes third-party apps granted access to corporate systems," says CloudLock Director of Customer Insights and Analytics Ayse Kaya Firat. "Today, most employees leverage a wide variety of apps to get their jobs done efficiently, unwittingly exposing corporate data and systems to malware and the possibility of data theft." CloudLock's report shares critical data to help organizations understand the exponential growth of this new risk vector as well as the associated risk and how security conscious enterprises are taking action.

To download the full report, please visit: The Explosion of Apps: 27% are Risky.

About CloudLock's CyberLab
CloudLock is the only security vendor uniquely combining U.S. and Israeli Military Intelligence with real-time, crowdsourced cloud security insight. CloudLock continuously monitors over one billion files daily across more than 10 million users. Security professionals feed into CloudLock's unique security insight through peer-driven, crowdsourced Community Trust Ratings™. This intelligence allows organizations to immediately respond to emerging cloud cyber threats and risky apps.

About CloudLock
CloudLock is the cloud-native CASB and Cloud Cybersecurity Platform that helps organizations securely leverage cloud apps they buy and build. CloudLock delivers security visibility and control for SaaS, IaaS, PaaS and IDaaS environments across the entire enterprise in seconds. Founded by Israeli Elite Cybersecurity Military Intelligence experts, the company delivers actionable cybersecurity intelligence through its data scientist-led CyberLab and crowdsourced security analytics across billions of data points daily. CloudLock has been recognized by Inc. Magazine as the fastest growing security product company in the U.S. and by Glassdoor as one of the top 3 best places to work in the U.S. Learn more at www.cloudlock.com.


Modernization, Harnessing Lean Six Sigma Principles and Avaya Technology, Expected to Yield $1.5 Million in Annual Savings

SANTA CLARA, Calif. – The Defense Health Agency (DHA), a joint, integrated Combat Support Agency that enables the U.S Army, U.S Navy, and U.S. Air Force medical services to provide a medically- ready force in both peacetime and wartime, has signed an agreement with Avaya Government Solutions that will help modernize all points of the DHA's unified communications and contact center architecture, providing superior performance and cost savings. Avaya Government Solutions is a leader in communication and collaboration solutions to support citizens, government employees and warfighters.

The DHA customer agreement and analytics, which were presented at the International Avaya Users Group (IAUG) last week, projects an annual savings of $1.5 million in FY2017 and beyond. The agreement was made possible by Avaya Government Solutions after conducting an enterprise business analysis, based on Lean Six Sigma principles. The comprehensive metrics were developed as a result of a four-step process of discovery, benchmark, scope improvements, and solution that were critical to determining best deployment and savings.

Under the terms of the agreement, Avaya Government Solutions will harness its UC, contact center, and SIP technologies to streamline DHA's enterprise conference premise solution, migrate from legacy to SIP trunks at its headquarters, and enhance equipment maintenance. The agreement with Avaya Government Solutions is expected to generate the following benefits:

  • Reduce OPEX spend by 30%+
  • Eliminate CAPEX required to modernize
  • "Self Fund" investments
  • Accelerate deployment UC capabilities
  • Improve employee, site and program collaboration
  • Minimize risk from "end of life" technology
  • Address cyber requirements


"Avaya Government Solutions provided us with a strong analysis of our current environment and was able to quickly demonstrate savings on day 1 in our contact center infrastructure. Thanks to Avaya Government Solutions, we can now more efficiently serve our soldiers while the savings more than pay for the investment. We look forward to implementation of the Avaya solution and to their continued support."

  • Mack Wyche, Chief, Telecommunications Branch, DHA

"We are proud that our business value analysis, based on Lean Six Sigma principles, clearly demonstrated the superiority of our solution that generated savings immediately. By centralizing the enterprise conferencing solution, the $1.5 million in savings will fully self-fund the upfront capital while immediately improving service for DHA. We welcome an opportunity to help other government agencies wanting superior UC solutions with enhanced service and demonstrated cost savings."

  • Susan Keys, vice president of Avaya Government Solutions

About Avaya Government Solutions

Avaya Government Solutions offers communication and collaboration solutions to support citizens, government employees and warfighters. With our technology and professional services team, agencies can bring the right people together with the right information at the right time. For more information, visit www.avayagov.com.

About Avaya

Avaya is a leading provider of solutions that enable customer and team engagement across multiple channels and devices for better customer experience, increased productivity and enhanced financial performance. Its world-class contact center and unified communications technologies and services are available in a wide variety of flexible on-premises and cloud deployment options that seamlessly integrate with non-Avaya applications. The Avaya Engagement Environment enables third parties to create and customize business applications for competitive advantage. The Avaya fabric-based networking solutions help simplify and accelerate the deployment of business critical applications and services. For more information please visit www.avaya.com.

Certain statements contained in this press release may be forward-looking statements. These statements may be identified by the use of forward-looking terminology such as "anticipate," "believe," "continue," "could," "estimate," "expect," "intend," "may," "might," "plan," "potential," "predict," "should" or "will" or other similar terminology. We have based these forward-looking statements on our current expectations, assumptions, estimates and projections. While we believe these are reasonable, such forward looking statements involve known and unknown risks and uncertainties, many of which are beyond our control. These and other important factors may cause our actual results to differ materially from any future results expressed or implied by these forward-looking statements. For a list and description of such risks and uncertainties, please refer to Avaya's filings with the SEC that are available at www.sec.gov. Avaya disclaims any intention or obligation to update or revise any forward-looking statements.

All trademarks identified by ®, TM, or SM are registered marks, trademarks, and service marks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners

Follow Avaya on Twitter, Facebook, YouTube, Flickr, and the Avaya Connected Blog.

SAN JOSE, Calif. – Cybersecurity provides the critical foundation organizations require to protect themselves, enable trust, move faster, add greater value and grow. However, research indicates there will be a global shortage of two million cybersecurity professionals by 2019. To help close this security skills gap, Cisco (NASDAQ: CSCO) is introducing a $10 million Global Cybersecurity Scholarship program and enhancements to its security certification portfolio.

The Global Cybersecurity Scholarship Program

  • To address the shortfall of security talent, Cisco will invest $10 million in a two-year Global Cybersecurity Scholarship program to increase the pool of available talent with critical cybersecurity proficiency.
  • Cisco will offer training, mentoring and certification that align with the Security Operations Center Analyst industry job role.
  • Cisco will deliver the program in partnership with key Cisco Authorized Learning Partners. This training is designed to address the critical skills deficit, providing on-the-job readiness needed to meet current and future challenges of network security.

Certification Portfolio Updates

  • Cisco is introducing a new Cyber Ops Certification to its portfolio of security certifications and revising its CCIE Security Certification.
  • CCNA Cyber Ops focuses on the role of the security analyst working in a Security Operations Center (SOC) which monitors systems and detects attacks. It introduces IT personnel to some of the skills needed in a SOC, giving them an understanding of how responses are coordinated.
  • The CCNA Cyber Ops expands Cisco's existing associate-level certification offerings, which includes the CCNA Security designation, which focuses on the network security administrator role.
  • The CCIE Security revision addresses new expert-level skills and education needed to prepare security personnel for evolving technologies and security threats. This revision includes assessments on the latest security technologies, including Advanced Threat Protection, Advanced Malware Protection, Next-Generation IPS, Virtualization, Automation and Information Exchange. It also includes a new assessment approach focused on ensuring that candidates demonstrate knowledge and skills with evolving technologies, such as Network Programmability, Cloud and IoT.

Supporting Quote:

Jeanne Beliveau-Dunn, vice president and general manager, Cisco Services, said:
"Cybersecurity is essential to digital success. Many CEOs across the globe tell us their ability to innovate is hampered by their security concerns in the digital world. This creates a big future demand for skill sets that don't exist at scale today. We developed this scholarship program to help jump-start the development of new talent. This includes the opportunity to help diversify the IT security industry by reaching people around the world including veterans, women and those early in their careers, to inspire them to enter the cybersecurity profession. This is just a start to help us educate, train and reskill the job force to become the security IT professionals needed to help address this vast talent shortage."

Supporting Resources:
For more information and to apply for the Cisco Global Security Scholarship visit:

For more information about CCNA Cyber Ops, visit: www.cisco.com/go/ccnacyberops
For more information about CCIE Security, visit: www.cisco.com/go/cciesecurity

Cisco Security Blog: http://blogs.cisco.com/security/cisco-10-million-cybersecurity-scholarship

Social Media Destinations:

About Cisco

Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. For ongoing news, please go to http://thenetwork.cisco.com.

Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.

Embedded Video Available

 In Case of Crisis Version 3.6 Offers Corporate Market an Enhanced Mobile Crisis App, Including End-to-End Encryption

RESTON, Va. – Continuing momentum as the leading mobile resource for the corporate market, RockDove Solutions today announced its crisis app, In Case of Crisis, is available on Windows 10 via smartphone, tablet and desktop. Empowering employees with accessible, actionable information, In Case of Crisis now offers an even larger audience direct access to organizations’ business continuity and crisis communications plans across mobile and computing devices running the major platforms.

Today also marks the launch of version 3.6 of In Case of Crisis with increased security features including full end-to-end encryption of all user information and content on the mobile app.

“Whether organizations are dealing with severe weather, a data hack, corporate scandal or another incident, In Case of Crisis helps turn lengthy business continuity and crisis communications plans into actionable digital playbooks,” said Chris Britton, COO of RockDove Solutions. “We will continue to enhance our mobile app’s functionality to make plans accessible and operational to support a safe workplace and help companies respond to a variety of crises.”

RockDove Solutions’ secure, enterprise-ready, In Case of Crisis app leverages the power and convenience of mobile devices and even desktops, offering employees fingertip access to key contacts, incident forms, notifications, and more. In Case of Crisis is available on iOS, Android™ and Windows 10.

For more information, visit www.rockdovesolutions.com.

About RockDove Solutions

RockDove Solutions, developer of the award winning mobile crisis management solution In Case of Crisis, helps organizations turn their crisis management, business continuity, emergency preparedness, and workplace safety plans into accessible and actionable digital playbooks. Serving hundreds of public and private institutions, in the rapidly growing enterprise mobile marketplace, the company’s award-winning, customizable crisis app prepares companies to quickly and effectively respond to crises. For more information, visit www.rockdovesolutions.com.

Today BioConnect announces the successful deployment of its BioConnect Identity Platform and Suprema biometric hardware for access control at Netwise Hosting Ltd, a leading provider of data centre colocation in London, UK. BioConnect provides identity solutions, with a special focus on data centre colocation customers. BioConnect offers a unique approach which removes the need to manage point-to-point integrations as it couples Suprema biometric readers with over 20 of the leading access control system providers.


Netwise Hosting’s primary focus and fundamental values are speed, security, and stability as they deliver enterprise-level hosted environments to a wide and varied customer-base, working closely with clients all around the world. As Netwise Hosting looked to expand their offering with the development of an additional 11,000 sq. ft. data centre in London, they chose BioConnect to fulfill their security requirements to identify a more fully- featured access control system that checked all the boxes. They saw BioConnect as a leader, with its understanding of specific data centre colocations customer needs – shared spaces of sensitive data require assurance of identity throughout the facility and to be most effective, a standardized way of deploying biometrics coupled with enterprise level support are needed.


“BioConnect really set themselves apart from the competition when it comes to support; they have a small team of highly experienced individuals who know the product and the associated software inside out,” says Matthew Butt, Netwise Hosting Ltd., Managing Director, “We really cannot recommend this aspect of their offering high enough!”


Netwise compared their previous vendor installations and decided on the following requirements: They needed a solution that would allow them to incorporate a clearer view of identity with a multi-authentication biometric solution that would seamlessly integrate into Paxton Net2. The main driver, in addition to finding the correct physical product, was to avoid having duplicate systems and information for access control.


Suprema biometric devices provided and supported by the BioConnect team now cover all high-security ingress and egress locations throughout the data centre facility. These readers provide the highest level of identity authenticity and provide flexibility in indoor/outdoor placement and multifactor authentication with card and fingerprint support. The BioConnect Identity Platform incorporates an advanced plugin architecture to connect directly into Netwise Hosting’s preferred access control software, Paxton Net2. Therefore, in addition to finding the correct physical product, Netwise was able to avoid having duplicate systems and information for access control between their biometric and non-biometric devices running on Paxton Net2.


The addition of BioConnect identity platform meant that Netwise didn’t have to make a tradeoff between software and hardware that would meet their needs – they now have their preferred access control system and multi-authentication biometrics in one single interface for the creation, removal and administration of all users and access zones.


“We chose BioConnect for several reasons, primarily the ability to integrate their system seamlessly with Paxton Net2, but closely followed up by their feature set and quality of the readers themselves,” said Matthew Butt, Managing Director, “The almost immediate availability of the product – coupled with their excellent support – meant they really did stand out from the competition.”


To read the full case study on this deployment, visit www.bioconnect.com/case-studies

Visit BioConnect and Suprema June 21-23 during this month’s IFSEC conference at ExCel London, UK in Stand E1400.


About BioConnect

BioConnect is on a Quest – for Rightful Identity. Why? To empower people to use their unique biometric credentials (their Rightful Identity) in their everyday lives – delivering greater security, assurance and convenience along the way. BioConnect revolutionized the physical access control market with its industry-first identity platform that enables the integration of biometric technology with the industry’s leading access control solutions. And as a representative of the world leader in biometrics and security, Suprema, BioConnect provides and supports the implementation of the top-rated biometric hardware devices (finger, face, card and PIN) and IP access control solutions in select markets. Learn more at www.bioconnect.com.


About Netwise Hosting Ltd.

The Netwise Hosting team take great pride in their ability to offer truly high-end services, without the excessive and restrictive barriers that regularly force businesses out to countryside data centres - many miles from the nearest major business and trading hubs. Access to London data centre space is no longer reserved for firms with enormous IT budgets. SME’s can at last rub shoulders with much larger businesses, deploying their online services from a facility they can really boast about - all managed by a company with core values in line with their own. For more information, visit www.netwisehosting.co.uk/.

From Unreasonable Design Decisions, To Missteps In The Pre-Migration Process, To Poorly Executed Migrations - Learn How to Avoid Falling Victim To The Potential Pitfalls On The Road To Office 365
NEW YORK – Archive360, the leading provider of email archive migration software, today announced it has been featured in the recently published Osterman Research paper entitled, "Migration to Exchange Online and Office 365: A Step-by-Step Guide."  The paper provides highly detailed directions on how best to plan for and execute a migration to Microsoft Exchange Online, as well as the other applications and productivity services available in Office 365.  Archive360 is presented in the paper as an ideal solution for solving email migration challenges, in the most cost effective and efficient manner possible.  It further details Archive360's Archive2Anywhere  data migration platform, which features a legally compliant data reconciliation engine to ensure data is migrated at high speed, while maintaining 100% data fidelity and chain of custody for legal and regulatory compliance. 
"The use of Office 365 across the globe is growing rapidly, driven by a clear value proposition for organizations of all sizes," said Michael Osterman, President Osterman Research.  "While the uptake of Exchange Online is leading the early growth charge, there are significant opportunities for organizations to leverage the many other components of Office 365 to re-invent productivity.  However, from unreasonable design decisions, to missteps in the pre-migration process, to poorly executed migrations - the road to Office 365 is fraught with potential pitfalls."
Osterman continued.  "For those that wish to eliminate one of the biggest headaches associated with a move to Office 365 - migrating the email archive - I strongly encourage checking out Archive360's Archive2Anywhere solution."
"With Archive2Anywhere, users can easily install and start migrating in just about 15 minutes.  Its patented architecture enables Archive2Anywhere to integrate with a wide range of legacy archives at the database and storage level, eliminating the time-consuming error-prone process of pre-indexing or categorization that is otherwise required.  This enables mailbox and journal account extraction within hours of installation.  Ingestion into the target repository is just as fast and easy, while still ensuring chain of custody and orphaned/corrupt data reporting.  And, Archive2Anywhere is the only solution that can clean-up the mess created in Exchange by legacy email archives that 'stubbed' or added 'shortcuts' to email and attachments for mailbox size reduction," said Bill Tolson, Vice President of Marketing, Archive360.  "Bottom line, our award winning Archive2Anwhere has the broadest capabilities, is the easiest to deploy and manage and delivers the fastest performance - all at a completely unbeatable price.  However, don't just take my word for it, try it for yourself."
Request an Archive360 Archive2Anywhere demo here: http://www.archive360.com/email-archiving-software-archive2anywhere/.
Download and read "Migration to Exchange Online and Office 365: A Step-by-Step Guide" here: http://info.archive360.com/whitepaper-migration-to-exchange-online-and-office-365.
About Archive360
Archive360 is the market leader in email archive migration software, successfully migrating more than 12 petabytes of data for more than 500 organizations worldwide since 2012. The company's flagship product, Archive2Anywhere™, is the only solution in the market purpose-built to deliver consistently fast, trouble-free, predictable archive migrations, with verifiable data fidelity and defensible chain of custody reporting. A global organization, Archive360 delivers its solutions through a network of specialist partners.  For further information, please visit: www.archive360.com.

WASHINGTON — Federal Emergency Management Agency (FEMA) in coordination with state, local, tribal, and territorial emergency managers and state broadcasters’ associations, will conduct a test of the Emergency Alert System (EAS) in nine states on Wednesday, June 15th at 2:20 PM MDT/1:20 PM PDT.

Broadcasters from the following locations are voluntarily participating in the test: California, Colorado, Idaho, Montana, North Dakota, Oregon, South Dakota, Wyoming, and Washington. The EAS test is made available to radio, broadcast and cable television systems and is scheduled to last approximately one minute.

The test will verify the delivery and broadcast, and assess the readiness for distribution of a national-level test message. The message of the test will be similar to the regular monthly test message of EAS, normally heard and seen by the public: “This is a national test of the Emergency Alert System. This is only a test.”

Public safety officials need to be sure that in times of an emergency or disaster, they have the methods and systems that will deliver urgent alerts and warnings to the public when needed. 

The EAS test might also be seen and heard in states and tribal areas that border the participating states as well as in Canada and Mexico.

Periodic testing of public alert and warning systems is a way to assess the operational readiness of the infrastructure required for the distribution of a national message and determine what technological improvements need to be addressed. The next national test is scheduled for September 28, 2016. Results from this test will support preparations and improvements leading up to the national test.

Receiving preparedness tips and timely information about weather conditions or other emergency events can make all the difference in knowing when to take action to be safe. FEMA and partners are working to ensure you can receive alerts and warnings quickly through several different technologies no matter where you are–at home, at school, at work, or in the community. The FEMA App, which can be downloaded on both android and apple devices, is one way to ensure you receive both preparedness tips and weather alerts of your choice. Download the FEMA App today.

More information on the Integrated Public Alert and Warning System (IPAWS) and Wireless Emergency Alerts (WEA) is available atwww.fema.gov/ipaws or www.ready.gov/alerts.


Background: In 2007, FEMA began modernizing the nation’s public alert and warning system by integrating new technologies into the existing alert systems.  The new system, known as the Integrated Public Alert and Warning System (IPAWS) became operational in 2011. Today, IPAWS supports over 700 local, state, tribal, and federal users through a standardized message format. IPAWS enables public safety alerting authorities such as emergency managers, police and fire departments to send the same alert and warning message over multiple communication pathways at the same time to citizens in harm’s way, helping to save lives. For more information on FEMA’s IPAWS, go to:http://www.fema.gov/ipaws">www.fema.gov/ipaws.  For more preparedness information, go tohttp://www.ready.gov">www.ready.gov.