Infrastructure-as-a-service company has grown over the past two decades from a regional hosting company to a leading mission-critical solutions provider
NEW YORK – NYI, an enterprise grade data center and managed IT solutions provider enabling customers to build customized infrastructure, is celebrating its 20th anniversary. Over the past two decades, NYI has transformed from a small website design and hosting company serving a handful of local enterprises to a leading customized, mission-critical solutions provider delivering services from coast to coast.
With humble beginnings as the brain child of brothers Erik and Phillip Koblence, NYI has grown into one of the most trusted leaders in enterprise-class infrastructure solutions, serving numerous verticals, including media and publishing, financial services, technology, and life sciences. Through the years, three key pillars of NYI’s philosophy have driven the growth and success oAnother major contributor to the company’s success has been its consistent 100% uptime in the face of natural disasters and forces majeure over the last 20 years. NYI data centers were engineered for resilience with N+1 UPS configurations. The New York facility offers over 2 megawatts of power, and the New Jersey data center has 5 megawatts of power and a 2N generator configuration. In addition, NYI’s fully meshed, BGP4-based, fault-tolerant network offers no single point of failure.f the company — accessibility, responsibility and a hyper-focus on customer success. These core values remain intact today and continue to drive the company to remain at the forefront of the industry.
“It is incredible to look back on the past 20 years of NYI’s history,” states Phil Koblence, Chief Operating Officer of NYI. “I was just a kid when this company was created, commuting back and forth from college on the weekends to consult with companies on their IT environments and host their websites. While our offerings have grown substantially and evolved, our core values remain the same today as they did at the beginning. NYI doesn’t just bark a solution at our customers. We speak with customers individually to gain insight into their requirements and develop unique, custom-tailored solutions.”
"I’m very proud of NYI and its growth over the past two decades,” said Erik Koblence, Chief Executive Officer of NYI. “NYI’s evolution from a small website design company to the infrastructure services provider we are today gave us a first-hand understanding of the growing pains companies experience. That is why we are so in tune with problem solving and designing the best IT solutions for our clients.”
NYI recently announced its participation in the Startup Infrastructure in a Post-Cloud Era event to be held April 21, 2016 at 6:30 p.m. at the LMHQ facility in New York City. The event brings together industry experts to help attendees determine when cloud is appropriate and where scaling infrastructure makes sense. To register, please click here.
NYI owns and operates data centers in New York and New Jersey. In addition to serving the Northeast, NYI also extends its data center, managed and cloud services across the coast, with facilities located in Seattle and Los Angeles. With 100% uptime, NYI facilities are SSAE-16, HIPAA and PCI compliant and offer 24x7x365 onsite support.
For more information about NYI, visit http://www.nyi.net
At NYI, we understand you’re important and so is your business. Our approach is simple, effective and unique in our marketplace. We look beyond our world-class data centers and focus on supporting customer growth and success acting as a genuine extension of your IT team. Since 1996, we have provided our customers with fully managed, highly customized infrastructure solutions built to suit their specific business and mission critical IT needs. Our customers view us as a true partner; always available for round-the-clock support from a team they know and trust.
Colocation - Cloud - Hybrid - Managed Services - Disaster Recovery
NYI is SSAE 16, PCI and HIPAA-compliant. For more information, visit www.nyi.net; call (800) 288-7387; or follow the company on Twitter and LinkedIn.
Netwrix Auditor for Office 365 provides visibility and user behavior analytics to enable protection of cloud-based email services against cyber threats
IRVINE, Calif. – Netwrix Corporation, a provider of IT auditing software that delivers complete visibility into IT infrastructure changes and data access, has released Netwrix Auditor for Office 365. The application delivers complete visibility into Exchange Online by detecting and reporting on changes made to Exchange objects, configurations and permissions, as well as non-owner mailbox access to Exchange Online user mailboxes.
According to the Netwrix 2015 Cloud Security Survey, almost 50% of companies start their cloud-based operations with migrating their email systems to the cloud. However, companies are not confident about cloud security: 69% acknowledge the risks of unauthorized access and 43% recognize the risk of account hijacking. In order to mitigate security risks, ensure uninterrupted email service and speed up the troubleshooting of disruptive changes, companies need to gain rigorous control over sensitive email systems. Netwrix Auditor for Office 365, a part of the recently announced Netwrix Auditor 8.0 platform, is designed to overcome the limitations of Exchange Online’s native auditing tools, such as lack of reporting capabilities and consolidation of all necessary details into a single view.
Key features of Netwrix Auditor for Office 365 include:
Maximized visibility on the full spectrum of changes: Informs users about Exchange Online configuration changes with all necessary details, such as what was changed, who made a change and where a change occurred, as well as the before and after values and IP addresses, improving Office 365 email security.
Scheduled and on-demand reports and dashboards: Enables easy Office 365 security analytics by delivering timely and complete audit information in scheduled and on-demand reports and dashboards that offer multiple usability options, including filtering, sorting and exporting in various formats.
Continuous regulatory compliance: Helps establish a secure and compliant Exchange Online organization by offering the broadest range of scheduled and on-demand reports, dashboards and data search to address specific requirements of PCI DSS 3.0, HIPAA, SOX, FISMA/NIST800-53, ISO/IEC 27001 and other compliance regulations.
Non-owner mailbox access auditing: Detects Exchange Online mailbox access by someone other than the owner and notifies mailbox owners about all such activity to prevent privilege escalation issues. Reports specify exactly what actions were performed on specific mailbox items, the client used and the computer’s IP address.
“The largest to-date Panama Papers data breach teaches us that today we all live in the reality of the ever-growing security risks,” said Alex Vovk, CEO and co-founder of Netwrix. “Since it is almost impossible to predict where a cyberattack would come from, any company should enable complete visibility into most critical systems to spot anomalies that might result in a data breach. Deep understanding of who touches sensitive mailbox data will detect insider threat and data exfiltration to strengthen security of cloud environment and ensure companies that any unstructured data is under control.”
To learn more about how to enable hybrid cloud visibility and strengthen your email security, please visit http://www.netwrix.com/office_365_auditing.html.
About Netwrix Corporation
Netwrix Corporation provides IT auditing software that delivers complete visibility into IT infrastructure changes and data access, including who changed what, when and where each change was made, and who has access to what. Over 150,000 IT departments worldwide rely on Netwrix to audit IT infrastructure changes and data access, prepare reports required for passing compliance audits, and increase the efficiency of IT operations. Founded in 2006, Netwrix has earned more than 70 industry awards and was named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S. For more information, visit www.netwrix.com
Regroup Mass Notification, the award-winning provider of emergency and day-to-day notification solutions, today announced the launch of their AlertManager Mobile Appfor IOS and Android to empower mobile users to quickly launch critical alerts directly from their smartphones.
AlertManager allows users to easily initiate a notification on the go from any location without having to log into the system. Advance features like pre-written Quick Posts facilitate one-click alerting from an user-friendly interface to guarantee important alerts are sent out on time.
This new application empowers both admins and recipients to send and receive multimodal alerts via text/SMS, text-to-speech, voice, email and push notifications.
Key features and benefits of AlertManager include:
Real-time, two-way communication between admins and recipients
Push notifications that ensure critical alerts are always delivered
Two-step Quick Post feature facilitates one-click alerting
Customizable Quick Post templates that can include event-specific text, multimedia, attachments, images and recorded messages
Populated recipient lists empower admins to easily reach specific people or groups
HTML, rich-text editor
NWS/NOAA weather alerts as they are issued
“We at Regroup are very excited about this new application that will allow our clients to leverage the power of mobile technologies to improve communications and reach recipients wherever they are at any moment. This developments comes after months of hard work and intense testing that we believe will simplify communications for many organizations,” said Joe DiPasquale, CEO of Regroup.
Regroup, the leading provider of Emergency and Mass Notification solutions offers easy one-click messaging to mobile phones (text/voice), landlines, email, social media, websites and more. Regroup stands apart from other mass communication systems with its ease of use, automated messaging capabilities, seamless integration with client databases and other third-party systems, unparalleled 24/7 customer support and unlimited text/voice/email messaging. Regroup’s powerful, yet easy-to-use mass communications platform is leveraged by universities, state/local governments, corporations and nonprofits across North America to streamline emergency and day-to-day communications.
New Joint Offering Enables Seamless SharePoint Migration to the Cloud and SharePoint Server 2016
* "Maximize The Business Value Of New ECM Deployments With A Clear Migration Strategy" By Cheryl McKinnon with Leslie Owens and Emily Jedinak, Forrester, June 3, 2014
Former NSC Director of Cybersecurity Policy Leads Company's Assessment Program Designed to Identify Attack Surface and Secure High-Value Assets
SUNNYVALE, Calif. – Illumio, the Adaptive Security Company, today announced the launch of its Attack Surface Assessment Program (ASAP). Illumio ASAP gives enterprises MRI-like visibility inside the data center and cloud by providing a map of high-value assets and open communications pathways between applications. It then enables organizations to understand -- and radically reduce -- the attack surface of their high-value assets.
In a computing era where an average of 96 percent of systems have been breached (FireEye, Maginot Revisited, 2015), Illumio ASAP addresses the security gap inside the data center and cloud created by network segmentation technologies. It is designed for organizations who want to proactively identify and eliminate existing risks inside their data center and cloud associated with the lateral spread of attacks. ASAP's network- and application-level visibility enables IT Security teams to identify unknown traffic between development and production environments, as well as communication pathways that make high-value applications vulnerable to attackers.
"Once an attacker is inside a data center or cloud, their 'dwell time' -- the period they can scan a compromised network for high-value data before being detected -- can be upwards of 100-200 days," said Doug Cahill, ESG. "Technologies like the Illumio Attack Surface Assessment Program can give organizations additional visibility that can help them restrict attackers' ability to conduct network reconnaissance or eliminate infrastructure vulnerabilities before they can ever be exploited."
The development of Illumio ASAP was led by Nathaniel Gleicher, Head of Cybersecurity Strategy for Illumio and former Director for Cybersecurity Policy for the National Security Council at the White House.
"Because network segmentation tools tend to be coarse grained and incredibly complex to deploy at scale, the interior geography of most data centers is still fairly open," said Gleicher. "This large attack surface favors attackers, because once they get in they can quickly move to high-value targets, and be extremely difficult to identify and contain. Illumio ASAP is designed to rebalance the playing field between defenders and attackers."
Illumio ASAP Benefits
Illumio ASAP highlights the servers and communications flows that attackers are most likely to target in their search for high-value assets. The custom Illumio assessment report gives organizations a draft plan for eliminating the attack surface inside their data centers and clouds by using adaptive segmentation to harden their security posture.
- VIDEO: Why You Need Illumio ASAP: https://youtu.be/-ovOPspQRwY
- VIDEO: What You Get with Illumio ASAP: https://youtu.be/d6K2XWq46vM
Illumio delivers adaptive security for every computing environment, protecting the 80 percent of data center and cloud traffic missed by the perimeter. The company's Adaptive Security Platform™ visualizes application traffic and delivers continuous, scalable, and dynamic policy and enforcement to every bare-metal server, VM, container, and VDI within data centers and public clouds. Using Illumio, enterprises such as Morgan Stanley, Plantronics, NTT, Salesforce, King Entertainment, NetSuite, and Creative Artists Agency have achieved secure application and cloud migration, environmental segmentation, compliance, and high-value application protection from breaches and threats with no changes to applications or infrastructure. For more information, visit www.illumio.com or follow @Illumio.
(TNS) - As they so often do, 911 calls came fast and furious on a recent weekday afternoon. A residential burglary. A business burglary. A person with a gun. They all happened at once, in different Evansville neighborhoods.
Amy Worthington was on top of it. Seated in the City-County Dispatch Center, with four computer screens in front of her and her headset in place, Worthington navigated Evansville Police Department officers to each event.
Officers were stretched so thin at the time that Worthington had to send two patrol units that normally work the South Sector out of their jurisdiction to one of the burglaries. It was such a busy few minutes that at one point, only three EPD cars were freely patrolling the city.
Until recently, I knew nothing about enterprise security beyond some of the more widely publicized breaches in the United States.
That said, after spending most of 2016 immersed in the space, I’ve come to appreciate just how challenging and broad an issue security has become to enterprises.
I’ve also come to believe that our best hope for solving security is by understanding humans — the perpetrators and victims of cyberattacks — and, as a result, I’m convinced that security is fundamentally a human identity problem.
(TNS) - Japan was intensifying search and rescue operations on the southern island of Kyushu Friday amid a series of aftershocks, after a 6.5-magnitude earthquake killed at least 9 people and injured about 1,100, the government said.
The government deployed more than 3,000 people to Kumamoto prefecture, the hardest-hit region in Thursday's quake, as Prime Minister Shinzo Abe vowed to make its utmost efforts in the operations.
"We will do our best to ensure the safety of residents," Abe told reporters.
Walls and houses collapsed in Mashiki, a rural town of 33,000 residents, 900 kilometres south-west of Tokyo, when the quake struck at 9:26 pm Thursday (1226 GMT) at a depth of 11 kilometres, local officials said.
(TNS) - Boyd County 911 will begin a transition from Nixle alerts to more specific updates through AlertSense.
Boyd 911 Director Sandy Ott said the new system will feature geo-locating capabilities and voice dialing to landlines so alerts can not only be more specific, but also reach those who do not have access to text messaging or computers.
Administrative training will begin this summer and Ott hopes the new system can launch as soon as June 1.
Ott explained that AlertSense will allow government agencies to post from the same source so that users will not have to sign up for individual alerts.
There is a lot to be said for the hybrid cloud. It blends local control and security with scale-out resources and operational flexibility, all of which are emerging as crucial factors as organizations make the transition to digital business models.
Indeed, if the hybrid cloud were not so effective, no one would give it a second thought. But this does not mean it is trouble-free. And the further along the enterprise goes in the transition to cloud-based infrastructure, the more glaring the deficiencies become.
At the moment, of course, the benefits outweigh the risks in the eyes of most enterprise managers. According to a global survey of 500 IT decision makers, the vast majority say the hybrid cloud is crucial in maintaining a competitive advantage and lowering the cost of data infrastructure. This is manifesting itself in a number of ways, including improved collaboration between IT and line-of-business managers and increased self-service resource provisioning so knowledge workers don’t succumb to the lure of shadow IT. The challenge, however, is to ensure that resources and data sets can be integrated across local and distributed infrastructure, while at the same time building up internal skillsets to oversee this new form of infrastructure and to ensure it does not get bogged down with overly complex management and security systems.