Spring World 2017

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 29, Issue 4

Full Contents Now Available!

Jon Seals

New Application Uses Behavioral Analytics to Detect Ransomware as It Enters Corporate Networks

NATIONAL HARBOR, MD – Exabeam, the leader in user and entity behavior analytics (UEBA) for security, today announced Exabeam Analytics for Ransomware, a new application designed for early detection of ransomware, one of the most pressing security threats in 2016. With this new application, Exabeam can provide significant early detection across the corporate network, in the absence of third party security controls. Unlike other security products, Exabeam can detect ransomware movement and activity in the network, the servers, workstations, BYOD devices, and cloud services.

In April of this year, the DHS released a report indicating that the National Cybersecurity and Communications Integration Center (NCCIC) had received 321 reports of ransomware-related activity affecting 29 different federal agencies since June 2015. In the same month, HIMSS Analytics released survey results indicating that half of the U.S. hospitals surveyed had been hit by ransomware. Another 25% indicated that they had no way of knowing if ransomware had penetrated their networks.

"Ask any CISO about their biggest challenge today, and ransomware will almost certainly be the response," said Nir Polak, CEO of Exabeam. "It's bypassing security tools and overwhelming already-overburdened security analysts. Exabeam Analytics for Ransomware addresses both detection and response, bringing relief to stressed security departments. As the Internet of Things grows, the ability to monitor entity (i.e. machine) behavior becomes critical to IT security and this is our newest entry in that market."

Ransomware can significantly disrupt business operations by threatening data access and integrity. However, this threat is usually detected too late to stop its effects. Because ransomware changes often and spreads quickly, many legacy detection techniques are ineffective, and result in temporary -- and potentially permanent -- data loss. Exabeam uses cutting-edge techniques to detect ransomware as it first enters the network and begins to spread. These techniques include both behavioral analysis and file analysis:

  • Detecting new (i.e. unknown) ransomware via machine-learning. With no signatures and no static correlation rules, Exabeam learns the normal file and document behaviors of an organization's employees, and quickly finds the anomalies associated with ransomware infection.
  • Detecting known ransomware via indicators of compromise. Known ransomware processes use certain file extensions and have known patterns or other indicators listed in threat intelligence feeds. The Exabeam Threat Research Team verifies these indicators and implements them in the product.
  • Infrastructure-wide, hybrid-cloud ransomware protection. By looking at machine logs, Exabeam can detect ransomware operating on endpoints, in the datacenter or against cloud based storage services. For example, an employee might access corporate files on the cloud sharing service Box from home, using his personal device, and in the process, allow ransomware to begin encrypting the Box files. Other employees accessing the same corporate files enable the malware to infect their corporate workstations and begin moving across the corporate network. Only Exabeam can detect this activity end to end, and early enough to prevent disruption.

Exabeam Analytics for Ransomware can inter-operate with specific security technologies, such as endpoint protection products, to perform additional analytics.

Exabeam Analytics for Ransomware is available as either a physical appliance or a virtual machine. It can be deployed in hours and delivers true security insight quickly. Existing customers can upgrade their systems to gain these new capabilities. Pricing is based on number of users. For more information, go to: http://www.exabeam.com/product/applications

About Exabeam
Exabeam's security intelligence solution leverages existing log, endpoint, and other data to quickly detect advanced attacks, prioritize incidents and guide effective response. The company's Stateful User Tracking™ automates the work of security analysts by resolving individual security events and behavioral anomalies into a complete attack chain. This dramatically reduces response times and uncovers attack impacts that would otherwise go unseen. Built by seasoned security experts and enterprise IT veterans from Imperva, ArcSight and Sumo Logic, Exabeam is headquartered in San Mateo, California and is privately funded by Aspect Ventures, Icon Ventures, investor Shlomo Kramer and Norwest Venture Partners. Visit us on Facebook or Twitter and follow us on LinkedIn.

Extending the VMware AirWatch Platform to Cloud Security Partners Offer Validated and Integrated Solutions for Cloud and Mobile Security

PALO ALTO, Calif. – VMware, Inc. (NYSE: VMW), a global leader in cloud infrastructure and business mobility, today announced five leading cloud access security broker (CASB) leaders have joined the Mobile Security Alliance. The addition of Blue Coat Systems, Inc., CloudLock, Netskope, Palo Alto Networks and Skyhigh Networks adds to the growing support from security industry leaders for the VMware AirWatch® Enterprise Mobility Management™ (EMM) platform to collaboratively solve the challenge of mobile and cloud security. Integrating VMware Workspace™ ONE™ with products from CASB partners can deliver validated solutions that provide security, visibility and control of applications and devices, and secure digital workspaces from the cloud.

"VMware AirWatch is an Enterprise Mobility Management leader with a proven platform for the mobile-cloud era," said Noah Wasmer, senior vice president, product management, mobile products, End-User Computing, VMware. "We are extending the mobility management and identity management technologies in VMware Workspace ONE to the industry's leading cloud security providers to give customers a holistic view of their mobile-cloud health and security. Optimized integration between VMware Workspace ONE and CASB partner solutions enable quick action and remediation against threats from a single platform, simplifying mobile-cloud security and management."

As organizations embrace mobile and cloud technologies, security across cloud applications is a key factor in corporate security compliance. Integrations between CASB solutions, VMware AirWatch and VMware Workspace ONE help unify enterprise mobility, identity management and cloud security to provide customers a secure and compliant environment. The integrated solutions offer organizations the ability to detect security vulnerabilities in cloud applications and enforce specific actions on mobile devices seamlessly and instantly, reducing the risk and vulnerabilities of mobile devices accessing cloud applications. These joint solutions support common mobile-cloud use cases including secure cloud collaboration, access to sensitive information in customer reference management (CRM) products and, the reduction and control of "shadow IT."

The Mobile Security Alliance launched in 2015 and is supported by 17 partners, including Check Point Software Technologies, FireEye, Intel Security and Palo Alto Networks. Members work in conjunction with VMware engineering to develop validated, joint solutions and aligned roadmaps, providing customers seamless security management from a single pane of glass. The Mobile Security Alliance focuses on four key security areas: device, application, network and cloud.


Validated and integrated solutions from VMware, Blue Coat Systems, Inc., CloudLock, Netskope, Palo Alto Networks and Skyhigh Networks are available today.

Supporting Quotes:

"The rate of smartphone and tablet adoption by the workforce has caught many enterprises off guard and ill prepared to maximize the full benefit of these devices while ensuring its secure use. The most logical approach is to deploy best-of-breed enterprise mobility management and content security solutions together at the enterprise to smartphones and tablets. Blue Coat and VMware have teamed up to offer a completely interoperable and comprehensive security solution to address the need and to safeguard enterprise customer data." - Peter Doggart, vice president of Business Development, Blue Coat Systems, Inc.

"We're very excited to announce the expansion of our initial collaboration with VMware on EMM and identity, enabling joint customers to benefit from end-to-end security visibility across their cloud and mobile infrastructure. Through the combination of these best-of-breed technologies -- VMware AirWatch, VMware Identity Manager™ and CloudLock's CASB and cybersecurity platform -- we can deliver unified remediation of risks with zero impact on users, without requiring agents." - Manolo Gonzalez, vice president of Platform and Technology Alliances, CloudLock

"We look forward to providing our joint customers enhanced capabilities and deeper integration as part of the Mobile Security Alliance. Employees and enterprises alike have embraced the combination of mobile and cloud to ensure productivity and efficiency, and integrating the Netskope Active Platform with VMware AirWatch and VMware Identity Manager provides IT with exceptional real-time visibility and actionable control for both sanctioned and unsanctioned cloud app traffic on mobile devices." - Rick Holden, vice president of Business Development and Alliances, Netskope

"Cloud applications built for mobile devices have become indispensable productivity tools for many organizations. With this growing trend, many IT teams are struggling to extend policy enforcement across devices, users and cloud applications. The extension of our partnership with VMware to include Aperture will provide a unique approach to securing SaaS applications accessed through mobile devices to prevent data risk, malware insertion and compliance violations." - Chad Kinzelberg, senior vice president of Corporate and Business Development, Palo Alto Networks

"In today's mobile-cloud era, organizations are seeking integrated solutions that provide seamless visibility and policy enforcement across users (identity), device and data. Skyhigh's proven scale across more than 30 million users, comprehensive deployment options (proxy and API), industry leading DLP and user behavior analytics, and agentless approach allows organizations to embrace mobile and cloud solutions while seamlessly enforcing their security, compliance and governance policies. We are thrilled to partner with VMware to bring the largest deployment of EMM with the largest deployment of CASB to deliver best-in-class mobile-cloud security for the industry." - Kamal Shah, senior vice president of products and marketing, Skyhigh Networks

Additional Resources

  • Watch a discussion between Sanjay Poonen, executive vice president and general manager, End-User Computing and head of global marketing and communications, VMware and Rajiv Gupta, chief executive officer, Skyhigh Networks
  • For information about the new unified endpoint management and security solution, VMware TrustPoint™ also announced today, read the press release here
  • For information about the updates to VMware Workspace™ ONE also announced today, read the press release here
  • Follow us on Twitter and Facebook

About VMware

VMware is a leader in cloud infrastructure and business mobility. Built on VMware's industry-leading virtualization technology, our solutions deliver a brave new model of IT that is fluid, instant and more secure. Customers can innovate faster by rapidly developing, automatically delivering and more safely consuming any application. With 2015 revenues of $6.6 billion, VMware has more than 500,000 customers and 75,000 partners. The company is headquartered in Silicon Valley with offices throughout the world and can be found online at www.vmware.com.

VMware, AirWatch, AirWatch Enterprise Mobility Management, VMware Workspace, Workspace One, and VMware Identity Manager are registered trademarks or trademarks of VMware, Inc. or its subsidiaries in the United States and other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.


NetApp SolidFire's Scale-out Design and Guaranteed Performance Enable Telecommunications Innovator to Deliver Transformational Cloud Services to Customers in the Philippines and Across Asia

BOULDER, Colo. – NetApp SolidFire (NASDAQ: NTAP), the leader in all-flash storage systems built for the Next Generation Data Center, today announced that Globe Telecom, a leading full-service telecommunications company in the Philippines, through its Globe Business group, has deployed NetApp SolidFire's all-flash scale-out storage platform to support its Virtual Private Cloud and Dedicated Private Cloud offerings. With NetApp SolidFire's automated, scalable infrastructure that guarantees performance, Globe Business' internal and external customers can meet their storage capacity and performance needs today and in the future at a cost two to three times lower than before.

Globe Business provides an entire suite of products and services for mobile, fixed, broadband, data connections, internet and managed services. With its own network of data centers around the country, Globe Business prides itself on continuously improving value-added services for its customers. In order to accelerate its cloud offerings and give it an even better competitive edge, Globe Business turned to NetApp SolidFire to modernize its data center infrastructure, and in turn, enable its customers to harness cloud technology's transformational capabilities.

NetApp SolidFire's unique all-flash architecture met all of Globe Business' criteria to help its customers embrace cloud-first principles, optimize resources, and maximize business opportunities. Thanks to its volume-level Quality of Service (QoS), Globe Business can deliver guaranteed, fast and predictable performance to its customers. With NetApp SolidFire's scale-out design, customers can scale and control performance and capacity independently, without downtime or disruption. Utilizing NetApp SolidFire's always-on data-at-rest encryption and real-time replication, customer data always stays safe and secure.

The NetApp SolidFire platform is deeply integrated with VMware vSphere via its REST-based API, allowing for complete automation, instant provisioning and end-to-end monitoring. These features, in combination with NetApp SolidFire's comprehensive data reduction capabilities, enable Globe Business to realize significant cost-savings that translate into competitive pricing options for its customers. In addition, NetApp SolidFire's partner AISC assisted Globe Business with solution positioning and continues to provide high-quality vendor support.

"With its flexibility and cost efficiency, more and more companies in the Philippines are taking advantage of cloud computing. As they demand higher performance versus just capacity, we realized that adding more disks to the rack was too expensive and inefficient," said Mike Frausing, Globe Senior Advisor for Enterprise and IT Enabled Services Group. "With NetApp SolidFire's all-flash scale-out architecture, our customers have confidence that we can meet their needs for guaranteed levels of performance. We can offer reliable cloud services at a better price, providing a competitive -- and a domestic -- alternative to foreign cloud providers."

"With storage infrastructure fueled by NetApp SolidFire, Globe Business can now deliver services with the speed and agility demanded by their customers," said Stuart Oliver, global service provider programs manager at NetApp SolidFire. "By deploying NetApp SolidFire's all-flash storage, Globe Business was able to build its next-generation cloud service environment to successfully serve the cloud and hosting needs of its customers and a become a disruptor in an increasingly competitive market."

"The telecom market in the Philippines is among the most vibrant and innovative in Asia/Pacific region with service providers offering innovative data services to help businesses and consumers successfully embark into IDC's 3rd Platform era," said Rajnish Arora, Vice President, Enterprise Computing, IDC Asia/Pacific. "By providing differentiated services like guaranteed performance and scale-out storage, cloud service providers gain a significant edge over their competition and are uniquely positioned to meet the needs of the most demanding customers."

Learn how NetApp SolidFire powers the most demanding data centers in the world. Read more about how the Fueled by SolidFire program helps cloud providers define, develop and capitalize on new market opportunities made possible with NetApp SolidFire storage infrastructure.

About Globe
Globe is a leading full service telecommunications company in the Philippines, serving the needs of consumers and businesses across an entire suite of products and services including mobile, fixed, broadband, data connections, internet and managed services. Its principals are Ayala Corporation and Singapore Telecom who are acknowledged industry leaders in the country and in the region. For more information, visit www.globe.com.ph.

About Globe Business
The corporate arm of leading telecommunications company in the Philippines Globe Telecom, Globe Business provides a comprehensive range of ICT interconnectivity solutions for the country's top industries, businesses and commercial enterprises engineered according to their business requirements and enabling them continuous access to information. The portfolio of products and services comprise of mobile, wireline, broadband, data connections, internet, managed services and IT-enabling services as well as cloud computing solutions which it pioneered in the country. The company's data center and carrier ethernet services are ISO- and MEF global standards-certified, respectively. For more information, visit www.globe.com.ph/business.

About NetApp SolidFire
NetApp SolidFire (NASDAQ: NTAP) is the market leader in all-flash storage systems built for the Next Generation Data Center. Leveraging SolidFire's all-flash architecture, with volume-level Quality of Service (QoS) controls, customers now can guarantee storage performance to thousands of applications within a shared infrastructure. Coupling this functionality with in-line data reduction techniques and system-wide automation results in substantial capital and operating cost savings relative to traditional disk and basic all-flash storage systems.

About NetApp
Leading organizations worldwide count on NetApp for software, systems and services to manage and store their data. Customers value our teamwork, expertise and passion for helping them succeed now and into the future. To learn more, visit www.netapp.com

NetApp and the NetApp logo are trademarks of NetApp, Inc. All other marks are the property of their respective owners. Use of the word "partner" or "partnership" does not imply a legal partnership between NetApp and any other company.

Image Available: http://www.marketwire.com/library/MwGo/2016/6/10/11G102400/Images/FBSF-48612e0e0ae89264985603302375c0b7.jpeg

Large Italian Utility Provider Uses 1200R Security Appliance to Enhance Visibility and Control of SCADA Networks

MILAN, ITALY – Check Point® Software Technologies Ltd. (NASDAQ: CHKP) today announced Acea Distribuzione, part of Acea Group, one of the largest Italian public utility companies for power and water supply, has deployed Check Point's 1200R security gateway appliances to secure its critical infrastructure, SCADA network and control systems.

Following the findings of the Panoptesec project, Acea selected the Check Point solution following a competitive tender for a customizable, rugged solution that would work in harsh operating environments, including primary and secondary energy switching and distribution sites, while meeting specific technical requirements. The 1200R appliance was the only proven solution to meet these requirements, and Acea worked with systems integrator DGS Group to deploy it within the company's existing network infrastructure.

Additionally, the 1200R will integrate with the Panoptesec cyber defence decision support infrastructure. This EU-funded initiative addresses the challenges of detecting vulnerabilities and possible attacks on sensitive information and essential networks and services by enabling individuals, companies and organisations to handle security incidents. Panoptesec delivers a continuous cyber security monitoring and response capability in real-time. It proactively and reactively evaluates system weaknesses to identify potential attacks, provide a list of prioritised response actions to automatically manage cyber incidents.

"We wanted to protect our internal and external SCADA assets as well as all the relevant Command & Control centers," says Andrea Guarino, ICT Security, Privacy and Compliance manager at Acea. "The 'pain point' was being able to detect and block all 'normal' attacks against our networks and those attacks specifically targeting SCADA networks and devices. We also needed to ensure we had full visibility of the SCADA command sequences, both sent and received, on the controlled networks and that we were able to record them for forensic and analysis purposes. The Check Point solution was the only one to meet all of our criteria."

The Check Point 1200R has also improved overall performance on Acea's SCADA networks thanks to the traffic filtering done on the appliance: this could potentially enable more peripheral devices to be deployed on existing servers and communication lines.

"The Check Point solution provides us with enhanced security and has improved our ability to identify and respond to potential vulnerabilities," added Andrea Guarino at Acea. "We now also have a better understanding of the command flows and information used by our SCADA systems and industrial control systems. Furthermore, we can now monitor and analyze network traffic, enabling us to improve our overall security posture."

Acea was the first company to utilise the Panoptesec service to centralise data and resources from its commercial partners and suppliers, collating information provided by various cyber security defence systems and probes, including firewall, IPS / IDS, Silent Defense and Syslog. This centralised information simplifies analysis and monitoring, driving further efficiencies.

Amnon Bar-Lev, President at Check Point says: "Our 1200R appliance is optimized for deployment in the harshest of industrial environments and remote locations, to support SCADA networks and control systems. It delivers unrivaled security for critical infrastructure, designed to prevent access and the disruption of vital processes."

The Check Point 1200R is a purpose-built, ruggedized security gateway appliance for harsh industrial environments and remote deployments. It enables full visibility and granular control of SCADA traffic to prevent network, devices and logical process attacks. With over 780 SCADA commands and parameters within the Check Point Firewall and Application Control Software Blades, and over 280 SCADA-specific IPS signatures, Check Point offers the most extensive SCADA security support. Specialized threat reports in Check Point Next Generation SmartEvent provide full reports on SCADA traffic to grant quick and detailed forensics for incident investigations. This overall security solution also has regulation compliance monitoring with the Check Point Compliance Blade.

Follow Check Point via:
Check Point Blog: http://blog.checkpoint.com/
Twitter: http://www.twitter.com/checkpointsw
Facebook: http://www.facebook.com/checkpointsoftware
YouTube: http://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises -- from networks to mobile devices - in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.

Enterprise Random Password Manager Counters the Increasing Security Risks on the Linux Platform

LOS ANGELES, Calif. – Lieberman Software Corporation is advancing the security of the Linux enterprise by keeping the privileged attack surface in constant motion on Linux systems. The announcement was made at the Gartner Security and Risk Management Summit, where the company is exhibiting this week in booth #719.

Growth of Linux Deployments Creates Need for Linux Security
The growth of Linux deployments has accelerated exponentially. One of the biggest sectors of this increase has been in the cloud, where Linux's flexibility as an automated platform is particularly convenient. According to a recent estimate, Linux is used for 79 percent of cloud deployments.1

The increased popularity of Linux, however, has also led to a rise of security vulnerabilities on the platform. Unsecured Linux servers are often attacked because of poor privileged credential management. Default passwords that are never changed, cryptographically weak passwords set for human convenience, and sudo settings with unknown consequences are common Linux security challenges.

Privileged Access Management for the Linux Enterprise
With the release of Enterprise Random Password Manager™ (ERPM) v5.5.0, Lieberman Software significantly improved Linux security, whether on premises or in the cloud. ERPM contains cyber attacks that penetrate the network perimeter. It does so by securing the privileged accounts needed to access critical systems.

With the new version of ERPM, Linux privileged accounts become a moving target for attackers. Privileged access is locked down to satisfy internal security and regulatory compliance audit requirements -- even for the root user.

"Linux requires security that can be every bit as flexible and automated as it is," said Jonathan Sander, VP of Product Strategy at Lieberman Software. "ERPM provides exactly the scale, speed, and automation required to match the needs of the dynamic Linux world."

ERPM's Linux Security Features

  • Linux Discovery - ERPM can build an inventory of Linux systems. It scans the network, identifies systems, and starts managing them. ERPM also finds accounts, SSH Keys, sudo policies and more. This allows users to secure their systems quickly and efficiently.
  • Password Rotation - ERPM removes Linux privileged passwords from people's heads, notebooks, and spreadsheets and puts them in a secure, encrypted library. Only authorized and audited personnel can access the passwords.
  • Full sudo Policy Visibility - ERPM takes in sudoers policy files from every host it manages and lays out the policies in place for each one of them. Users can see how and where privileges are granted.
  •  SSH Key Pair Discovery and Management - ERPM finds SSH key pairs, catalogs them, and shows where they exist. It can use SSH key pairs for all its own connections to improve security and rotate critical SSH keys.
  • Script & Orchestration Friendly - ERPM offers comprehensive web services in SOAP and JSON formats. There's no need for Linux administrators to compromise on their scripting, automation, orchestration and application integration duties.

Learn more about ERPM at www.liebsoft.com/erpm.

About Lieberman Software Corporation
Lieberman Software blocks cyber attacks that bypass conventional enterprise defenses and penetrate the network perimeter. The company provides award-winning privileged identity management and security management products. By automatically securing privileged access -- both on-premises and in the cloud -- Lieberman Software controls access to systems with sensitive data, and defends against malicious insiders, zero day attacks and other advanced cyber threats. For more information, visit www.liebsoft.com.

Product and company names herein may be trademarks of their registered owners.

1 Linux is Winning Enterprise Cloud Market Share at Expense of Windows, Egan Orion, The Inquirer, 05 December 2014


LAS VEGAS, NV – Pentair, a leading global industrial company, offers the first two hour UL/ULC listed fire-resistant system. First invented in 1896, and first produced commercially as ‘Pyrotenax’ in 1936, today this citical technology is utilized world-wide for the safe evacuation of buildings and for continued operation of firefighting equipment.

“Our UL 2196 Listed Pyrotenax System 1850 Mineral Insulated (MI) Fire Rated Wiring ensures a minimum of two hours of electricity to critical emergency and life-saving equipment in the event of a fire,” Brad Faulconer, VP & GM, Pentair Thermal Building Solutions. In 2012, all listed fire-resistive cables were de-classified by UL following research conducted on polymer-insulated fire-resistive cables, some of which showed a high failure rate under fire-test conditions. Since that time, UL conducted testing on Pentair’s Pyrotenax Mineral Insulated cables, which utilize a different technology than polymer-insulated cables and are constructed of non-combustible, inorganic materials. UL concluded that Pentair’s cables were not subject to the failure modes found in the research testing. This reinstatement was the first in the industry.

This system can be found globally in hospitals, tunnels, subways, airports and high rise buildings. They protect fire alarm wiring, fire fighting systems, elevators and places of public assembly where fire protection of critical circuits is required. Unlike conventional cables, the Pyrotenax System 1850 MI wire consists of solid copper conductors in a continuous copper sheath with magnesium powder insulation, without needing a conduit for protection. With an all inorganic construction, there will be zero smoke or flame spread if a fire breaks out.


About Pentair Technical Solutions

Pentair Technical Solutions is a global leader of systems and solutions that safeguard industrial controls, electrical components, communications hardware, electronic devices, pipelines, processes and buildings. Its premier brands CADDY, ERICO, Hoffman, LENTON, Raychem, Schroff, and Tracer provide a comprehensive range of standard, modified and custom engineered solutions for energy, industrial, infrastructure, commercial, communications, medical, security and defense applications.

Pentair Thermal Building Solutions help protect people, processes and infrastructure with an extensive range of quality solutions and turnkey services to maintain temperature or prevent freezing in commercial and residential applications. For more information, visit www.pentairthermal.com.

About Pentair plc

Pentair plc (www.pentair.com) provides leading products, services, and solutions industry-wide for the many different requirements of its customers in the fields of water and other fluids, thermal management, and equipment protection. With 2015 revenues of $6.4 billion, Pentair employs around 30,000 people worldwide.

Kallman Worldwide to represent Asia’s leading homeland security and civil defense exhibition


WALDWICK, N.J. American manufacturers and suppliers dedicated to homeland security and civil defense will find keen interest in their products and services at Milipol Asia-Pacific, thebiennial exhibition formerly known as Global Security Asia, April 4-6, 2017 in Singapore.


Held every other year since 2005, the 2017 edition will be the show’s first as part of the highly respected Milipol brand family that includes Milipol Paris, first held in 1984, and Milipol Qatar, introduced in 1996. In 2015 the show attracted more than 180 exhibiting companies from 32 countries and 5,000-plus professional visitors, drawn from 45 nations around the world. Official delegations were welcomed from 11 countries.


To help introduce more American companies to this influential and growing marketplace, show organizers have contracted Kallman Worldwide to representMilipol Asia-Pacific 2017 in the United States, and to organize the U.S. presence at the event. Kallman’s500 sqmU.S. International Pavilion will be America’s headquarters at the show: a destination for buyers looking for an efficient way to meet a critical mass of U.S. suppliers, an on-site business hub for U.S. exhibitors looking to maximize their exposure and time at the event, and a forum for all to share ideas and insights.


Milipol Asia-Pacific addresses critical infrastructure issues such as informationand communication systems, economic and industrial intelligence, systems integrationand risk analysis,” said Kallman Worldwide President and CEO Tom Kallman."We are proud to represent this well-established and growing international business event, and promote the opportunity to our nation's defense and security equipment, product and service providers."


Product and service areas of focus at Milipol Asia Pacific will include CBRN defense, forensic scienceservices, law enforcement, anti-terrorism, special forces, crime, security of public places,border control, airport and port security, road safety, security of financial systems andprison management.



Export with purpose. Exhibit with confidence. Kallman Worldwide is an export marketing advocate focused on helping the United States of America and its leading businesses capitalize on international trade shows and events to grow their share of global markets. Our flagship U.S. International Pavilion programs cover all the details of creating and presenting a professional business environment to buyers, enabling exhibitors, clients and partners to make the most of their event opportunities, cultivate meaningful global business relationships and account for a measurable return on their export marketing investment.

Since 1963, Kallman has helped more than 10,000 companies, associations and government agencies stand out at nearly 1,000 industry and professional events in 46 countries. The company is headquartered in Waldwick, N.J., and staffs a Latin America office in Santiago, Chile, where it also owns and operates the U.S. Regional Trade Center. For more information visit www.kallman.com.

At least $7 billion—that’s how much global disasters and severe weather are expected to cost insurers and reinsurers in May.

Aon Benfield’s latest Global Catastrophe Recap Report notes that the Fort McMurray wildfire in Alberta, Canada, will become the costliest disaster in the country’s history.

Insured losses—including physical damage and business interruption—are expected to be in excess of $3.1 billion, while total economic losses will be well into the billions of dollars.



Friday, 10 June 2016 00:00

How does RAID storage work: key terms

Redundant Array of Independent (originally Inexpensive) Disks (RAID) is a term used for computer data storage systems that spread and/or replicate data across multiple drives. RAID technology has revolutionised enterprise data storage and was designed with two key goals: to increased data reliability and increased I/O (input/output) performance.

Unfortunately though, RAID storage isn’t a perfect technology and as a result data loss can still occur when using these systems. In this post we’ll explore how RAID levels work and how data can be stored (and lost!) with this type of storage.



The IT security market is very crowded. Along with death and taxes, this is a truth we can pin down irrefutably. London has just played host to its annual InfoSec event and the Olympia conference centre was crammed with over a hundred firms all claiming to offer ‘a new approach to threat intelligence’ and so on. As repetitively deflating as some of these claims are, a few trends are emerging.

Every year there’s a new IT security theme. We’ve had Cyberecrime-as-a-Service, we’ve had ransomware and we’ve had Advanced Persistent Threats (APTs)… this year it’s watching the attack surface and seeing malicious payloads being delivered by cybercriminals to analyse the crime and improve security – we could call it ‘live-hack-attack-analysis’, or something like that.

On the other side of Europe, Helsinki Finland headquartered F-Secure (whose cheif reseach officer Mikko Hyppönen also presented at InfoSec) is reflecting this trend for live reactive analysis. The firm’s technology proposition combines decoy sensors, threat intelligence and a 24/7 monitoring team to produce what it claims to be a more holistic approach to security. Hmm, it still doesn’t sound markedly differentiated from any other vendor does it?