• WHAT IF YOU COULD HAVE A CONTINUITY, COMPLIANCE AND RISK CLOUD SOLUTION THAT... INTRODUCING FRONTLINE LIVE 5 WHERE CONTINUITY AND COMPLIANCE CONVERGE

    Continuity Logic’s Frontline Live 5™ is the first leader in Gartner’s Magic Quadrant Business Continuity (BCMP) software category that has effectively converged continuity, risk and compliance in a one easy to use cloud-based solution.

Fall World 2015

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 28, Issue 3

Full Contents Now Available!

Jon Seals

Flexera Software sets new bar for software license security, helping software vendors and intelligent device manufacturers protect their intellectual property and reduce revenue leakage

         

MAIDENHEAD, U.K. – Flexera Software, provider of next-generation software licensing, compliance and installation solutions for application producers and enterprises, announced enhancements to FlexNet Licensing, the software licensing solution within the company’s market-leading software monetisation suite for software vendors and intelligent device manufacturers. FlexNet Licensing now empowers producers to erect a “Ring of Defense” around their software applications with best-in class tamper resistance, code obfuscation and tamper detection.

 

According to a recent BSA Global Software Survey, 43 percent of the software installed on PCs around the world, totaling more than $62 billion in value, was not properly licensed. “The amount of revenue illegally being siphoned away from producers due to unauthorised software use is staggering,” said Mathieu Baissac, Vice President of Product Management at Flexera Software. “Today’s hackers are extremely sophisticated and relentless, leaving vulnerable the application producers that fail to implement the latest security measures.

 

FlexNet Licensing offers best-in-class, multi-faceted, patent-pending tamper resistance to ward off hackers, allowing producers to better guard their intellectual property, protect revenues, and focus on their core competencies.”

 

Ring of Defense: Resistance, Obfuscation and Detection

FlexNet Licensing’s Ring of Defense, tamper-resistance strategy is analogous to fortifying a home against burglary by making it significantly more difficult to gain entry and steal what’s inside:

  • Resistance – Adding a “Moat” Around Software: FlexNet Licensing establishes a secure barrier around the software – a moat – making illegal entry by hackers significantly more difficult by preventing debugging and application signature spoofing – techniques hackers undertake to reverse engineer the application and gain illegal entry.
  • Obfuscation – Hiding the “Front Door”: Enhanced code-obfuscation makes it harder for hackers to conduct static analysis on the application to find an entry point – the “front door.” FlexNet Licensing hides strings, variables and functions that control the flow of software and application data, which may contain sensitive information, making it significantly more difficult for hackers to find the code logic and gain illegal entry.
  • Detection – Adding “Motion Sensors” and “Alarms” Signaling Intrusion: FlexNet Licensing helps ensure application integrity and maximise protection against binary tampering through innovative techniques that detect when hackers try to modify the application in memory and on disk. It also provides “call-home” notification alerts – effectively detecting unauthorised intrusion within the application and sounding the alarm to notify the producer of the illegal intrusion.

 

Enhanced Virtualisation and Cloud Support

Today’s release also provides enhancements to better enable producers to support their applications in the cloud and other virtualised environments. New Microsoft Virtual Machine Generation ID helps producers detect cloning and ensure that their customers stay in compliance in virtual environments that leverage Microsoft Virtual Machine Generation ID. With this support, producers can choose to prevent cloning of their software, or implement licensing models to monetise cloning when it does occur. Other enhancements include the ability to detect and deny running in a virtual environment.

 

Among other things these virtualisation protections prevent virtual machine cloning, minimising accidental out-of-compliance issues during datacenter moves from physical to virtual infrastructures. Supported hypervisors include VMware ESX/ESXi, Microsoft Hyper-V, Citrix XenServer for clone detection on Windows and detection of Oracle Virtual Box and Parallels hypervisor.

 

Moreover, as a result of a collaboration recently announced between Microsoft and Flexera Software, application producers can now also leverage FlexNet Licensing to seamlessly execute their premise-born applications in Microsoft Azure. This empowers producers to increase market share by capturing revenue from customers shifting their priorities to cloud-based solutions, and capture additional revenue streams by attracting new customers through a variety of usage models that align to different demand scenarios, such as burst of use, minutes of use, and the like.

SYDNEY – NetComm Wireless Limited (ASX: NTC), a leading developer of wireless Machine-to-Machine (M2M) devices, will today enter the health industry with the launch of its NetComm Wireless n-Hub (NTC-20) at the 2014 mHealth Summit in Washington, DC. Designed to meet rising global demand for M2M healthcare solutions, the n-Hub connects diverse Bluetooth and WiFi enabled mHealth devices to the speed and coverage of cellular networks.

The n-Hub will facilitate healthcare sector innovation as the global ecosystem of mHealth devices grows to exceed 650 million by 2020. The device enables secure data to be sent from the remote patient or client to their practitioner.

"The n-Hub is a game-changer for the global healthcare sector. It combines simplicity with open system flexibility to improve efficiencies, reduce costs and ultimately improve patient outcomes. The n-Hub has the capacity to drive innovation across a wide range of applications such as monitoring the health of elderly relatives, post surgery patient care and keeping tabs on personal health, to name a few, said David Stewart, Managing Director and CEO, NetComm Wireless.

Engineered for seamless deployment, the n-Hub connects to global networks and its open architecture enable interoperability with most management platforms. Its open Linux Operating System and Software Development Kit (SDK) also enables the freedom to create software applications for virtually any healthcare requirement. 


The software rich n-Hub features: internal antennas for easy deployment; multiple layers of power backup; redundant antennas for increased reliability; an intuitive OLED display and a user friendly interface for simple onsite setup; multimode power and mount options and non-intrusive integration into any home, medical, commercial or industrial environment.

 
About NetComm Wireless Limited
NetComm Wireless Limited (ASX: NTC) is a leading developer of Machine-to-Machine (M2M) devices and solutions globally. The company provides 3G, 4G and rural broadband new generation fixed-wireless devices that underpin an increasingly connected world. Leading telecommunications carriers, core network providers and system integrators utilise NetComm Wireless' solutions to optimise network performance and to support their connected products and services in the M2M and rural broadband markets. For the past 32 years, NetComm Wireless has developed a portfolio of world first data communication products, and is now a globally recognised wireless innovator. Headquartered in Sydney (Australia), NetComm Wireless has offices in the US, Europe/UK, New Zealand, Middle East and Japan. For more information visit www.netcommwireless.com.

New Release Delivers Deeper Collaboration and Hybrid Integrations, Increases Business Value Messaging

 

LONDON, UKxMatters, inc., a leader in communication-enabled business processes, today introduced the latest release of the xMatters On-Demand cloud platform. Available globally today, the technology enables efficient two-way enterprise-wide intelligent communications and alerting. The new release boasts significantly enhanced collaboration features, a cloud-to-enterprise hybrid integration agent, enhancements to executive and employee messaging and more.

 

Today’s modern enterprise cannot afford business interruptions, whether they are IT operations-, business operations- or business continuity-related. With more automation, more diversified IT infrastructures and more dispersed workforces, when something goes wrong, it is critical to have quick resolve and a reliable system in place to locate the right person to rectify the situation.

 

xMatters facilitates effective two-way communications to the relevant internal teams and external service providers responsible for a rapid resolution, from assigning a service ticket to the on-call resolution team to setting up an instant conference bridge during a crisis situation and escalating communications in alignment with pre-defined processes. This makes distributed teams more social, collaborative and efficient, and the overall business more effective, agile and competitive.

 

The new xMatters On-Demand cloud release addresses multiple key market trends and challenges facing IT departments today, including the need for a better view of IT optimization and improvements in team collaborations. Recent industry research concluded by 2017, 30 percent of large enterprises will have full teams of business-technology optimizers focused on extracting more value from IT. xMatters’ new technology release allows for an efficient and proactive response via rapid and tailored communications to business owners, management and also customers, thus providing more strategic value to the business.

What’s more, lingering industry concerns about cloud security are squarely addressed with the new release. Security has been significantly strengthened given the new ability to integrate cloud systems from behind the firewall.

 

Highlighted new features and functionality for the latest xMatters On-Demand cloud release include:

  • Stronger Collaboration: New mobile features and reporting enhancements allowing users to collaborate in an even more meaningful and streamlined way. Users can now append menu-based responses with free-text annotations during an incident. Incident teams can view a history of the conversation from the Communication Center allowing for a clear picture of who is doing what during an incident.
  • Integration Agent: xMatters’ closed-loop integration capabilities have been significantly strengthened with a new agent that enables the integration of xMatters’ intelligent communications with complementary applications, providing more security and reliability through firewalls. These new cloud-to-software integration capabilities are particularly valuable to larger enterprises running hybrid IT environments with legacy systems running behind the firewall that not only need to trigger communications to the xMatters cloud, but also require updates with delivery information, annotations and status updates. With a closed-loop integration, software systems can maintain a full delivery record, annotation log and have their workflow advanced by xMatters’ cloud systems.
  • Strengthened Mobility Capabilities: Users will also enjoy added value from their mobile devices for remote monitoring with new repeating alert preferences, the ability to view historical messages and the inclusion of free-form text annotations.
  • Enhanced Business Value Messaging: New subscription enhancements support subscription managers with large and diverse groups. This allows IT teams to easily communicate issues such as service degradation or outages to key stakeholders that include management, client-facing teams and also end users.
  • Improved Data Quality: New automated detection of bad SMS and voice numbers, and reporting enhancements to track bad contact data will save enterprise IT teams even more valuable time.

To learn more about xMatters’ new cloud On-Demand communications platform, go to: www.xmatters.com/blog/Stronger-Collaboration-Highlights-xMatters-Fall-Release.

 

“As we know all too well, unplanned interruptions to the business can be catastrophic to a company’s bottom line and their reputation. We have combined all that is great with the promises of cloud-based technologies with our background in monitoring a company’s processes and services to provide IT and operations teams a modern new way to quickly communicate and resolve problems,” said Troy McAlpin, CEO of xMatters. “Our new release tackles major challenges facing IT departments, including the ability to securely integrate enterprise systems that reside behind-the-firewall with our cloud communications systems and providing the ability for IT teams to expedite communicates about issues to business owners, management and also customers, to add even more value.”

 

Resources

 

About xMatters, inc.

xMatters’ cloud-based communications solutions enable any business process or application to trigger two-way communications (text, voice, email, SMS, etc.) throughout the extended enterprise during time-sensitive events. With over a decade of experience in rapid communication, xMatters serves more than 1,000 leading global firms to ensure business operations run smoothly and effectively during incidents such as IT failures, product recalls, natural disasters, dynamic staffing, service outages, medical emergencies and supply-chain disruption. xMatters is headquartered in San Ramon, CA with additional offices in London and Sydney.

The year ahead will see other industries and disciplines adopt software development technology and collaboration practices while the Internet of Things matures and security threats persist

Key Points:

  • The Internet of Things will drive new cross-functional collaboration among previously siloed teams
  • DevOps, Continuous Delivery and other practices that were previously exclusive to software development will spread across the enterprise
  • Software vulnerabilities such as Heartbleed will persist as the industry deals with the first major technology failure related to privacy or data collection/transmission in a connected device
  • In 2015, the automotive industry will make significant progress in creating regulations for self-driving cars, which will make the concept a reality by the end of the decade

 

WOKINGHAM, UK.Perforce Software today announced predictions for technology trends in 2015. The overarching forecast is that product development and design teams will adopt technologies and best practices from software development while embracing the cross-team collaboration needed to develop Internet of Things devices.

 

“2015 will be the time when we truly experience what has been said for years about software being everywhere,” said Christopher Seiwald, founder and CEO of Perforce. “Other industries and disciplines will adopt technologies and best practices from the software development industry, while the software development industry evolves to support the surge of connected devices.”

Perforce’s predictions for 2015 are:

  • The Internet of Things (IoT) Redefines Collaboration: With hardware and software coming together in smart devices, teams working on those components will need to collaborate more closely. Software developers, for example, will need to keep APIs top of mind to ensure millions of devices can connect to each other and the internet seamlessly. The enterprise will adapt to the changing needs of cross-functional teams by implementing new practices and technologies.
  • DevOps and Continuous Delivery (CD) Go beyond Software: While both DevOps and CD have their roots in software development, the key principles of collaboration and automation respectively will evolve to teams across the enterprise. 2015 will see disciplines such as design engineering adopt software development practices such as version management, which will lead to more efficient and productive organisations across various industries.
  • Software Remains Vulnerable and the Internet of Things Doesn’t Help: The frequency of security risks due to software vulnerabilities will continue to grow and bugs like Heartbleed will become commonplace. IoT will introduce new opportunities for vulnerabilities with the addition of APIs to previously unconnected devices. 2015 will see the first major IoT failure in the form of data collection and/or transmission errors or a privacy breach.
  • Self-driving Cars Get Closer to Becoming a Reality: While the technology behind self-driving cars is available and successful prototypes have been built, concerns around liability, insurance and legal implications will persist. The automotive industry will make significant headway in bringing these cars on the road in 2015, but they won’t be commonplace until the end of the decade.

 

About Perforce Software

Perforce offers the industry’s most advanced version management and collaboration platform. Perforce protects its customers most valuable IP and enables teams to collaborate without conflict on any type of file—from source code to industrial designs to business documents. The company’s technology is unique in its ability to manage large binary content while scaling to support globally distributed teams—a vital capability for organizations looking to produce better products faster through Continuous Delivery practices. Perforce serves more than 10,500 customers, from start-ups to the most innovative and impactful brands in the world such as Samsung, NVIDIA, SAP, Pixar, National Instruments, Salesforce.com and the New York Stock Exchange. Perforce offers all of its products as well as access to its award-winning technical support free of charge for up to 20 users. According to an independent study, companies that migrate to Perforce improve developer productivity by 15% and release their products 25% faster. The company is headquartered in Alameda, California, with offices in the United Kingdom, Canada and Australia, and sales partners around the globe. For more information, please visit www.perforce.com.

Extract from the Institute of Risk Management’s Extended Enterprise study advances benefits of moving from supplier assessment to supplier risk management

 

READING, UKSureCloud®, a supplier of Cloud-based Governance, Risk and Compliance (GRC) solutions, today announced the immediate availability of its paper for enterprise risk practitioners entitled Supplier assurance: advancing from assessment to risk management. Written by SureCloud CEO, Richard Hibbert, the paper is a short extract from October 2014’s highly influential Institute of Risk Management (IRM) report ‘Extended Enterprise: Managing Risk in Complex 21st Century Organisations’. The 138-page study calls on companies to take a more proactive stance to supply chain crises rather than implementing new ‘tick box’ compliance processes that further add to complexity. It also provides an analysis of the role behaviour plays in ensuring consistency of culture and practice throughout every link in the chain.

 

“The IRM first became aware of our in-depth expertise in the field of Third Party Supplier Assurance after seeing us present successful customer implementations at major industry events,” said Richard Hibbert, CEO at SureCloud. “We were obviously thrilled and honoured when they asked us if we would work with them on this ground-breaking and insightful piece of work.”

 

SureCloud’s paper examines how the vast quantity and transient nature of supplier relationships today demand assurance capabilities that are not only consistent, efficient and scalable, but also provide analytic capabilities. It explains how this gives organisations new competencies to identify, prioritise and reduce operational risks in the supply chain. It pushes the case for establishing a framework that allows controlled business growth and maintains high levels of quality without having to introduce additional levels of complexity.

 

“The new IRM report shows how the response by enterprise to recent supply chain crises like the horse meat scandal, Rana Plaza or BP has invariably been to introduce extra rules and regulations that add new layers of complexity and ultimately leave workers even more vulnerable,” said Carolyn Williams, technical director, Institute of Risk Management. “With the support of enlightened partners like SureCloud we aim to change the mind set of risk management executives by persuading them there is greater value in improved process automation and communication than simply relying on conventional ‘tick box compliance’ methods.”

 

“SureCloud is proud to support this thought-provoking study which will provide risk professionals and executives with an appreciation of the risks posed by direct and arms-length trading relationships, and paves the way for effective management of these risks,” continued Richard Hibbert. “We are passionate that compliance as a discipline deserves a much higher profile and reports like this one by influential industry bodies like the IRM are changing perceptions by helping enterprises understand how they can use it to achieve tangible benefits.”

 

An executive summary of the IRM study ‘Extended Enterprise: Managing Risk in Complex 21st Century Organisations’ is available free-of-charge while the full paper may be accessed by IRM members.

Business customers such as financial and healthcare institutions can now extend secure, private connectivity to their employees who work from home

Awarded “Best Service of the Year for North America” by the Metro Ethernet Forum

 

PHILADELPHIA – Comcast Business today announced the ability to deliver business Ethernet services to millions of homes within its footprint, providing employees working from home with secure connectivity to their corporate network. The new Ethernet @Home service, which is delivered over Comcast’s hybrid-fiber coax network, allows business customers such as financial and healthcare institutions to extend private links to their corporate networks to doctors, professors and analysts who work from home. Representing a dramatic expansion of Ethernet service availability, Ethernet @Home is an innovative new option for IT departments looking to connect employees as part of a comprehensive Ethernet network solution.

According to recent estimates from Global Workplace Analytics, approximately 50 percent of the U.S. workforce holds a job that is compatible with at least part-time work from home. Also, the Telework Research Network report “The State of Telework in the U.S.,” states that full-time teleworkers are expected to increase to nearly five million by 2016, an increase of almost 70 percent. Comcast’s Ethernet @Home addresses this trend as businesses look to extend connectivity to employees working from home using a unified Ethernet network that offers simplified monitoring and management for IT.

“In healthcare, the network is crucial. A key role of healthcare IT is to ensure that clinicians have uninterrupted access to images, EMRs and other information to care for patients when and where needed,” said Jayashree Raman, vice president and chief information officer for Cooper University Health Care. “Comcast’s Ethernet @Home gives our radiologists the ability to quickly and securely review images and patient files from their homes over Cooper’s private network, letting them provide the best care for their patients in a timely manner.”

Based on Comcast’s extensive hybrid fiber and coax network reach, Ethernet @Home offers short installation intervals with low construction costs and efficient integration with fiber-based end points of a customer’s existing Comcast Business Ethernet service. Available in multiple service types, Ethernet @Home is designed to address a variety of use cases, including:

  • Healthcare – can provide connection to physicians and other healthcare employees as well as executives working from home.
  • IT – network and application managers need access to the corporate network to monitor and address service delivery issues at night or on weekends.
  • Corporate Executives – many companies want to provide secure, private connectivity to their executives for accessing the corporate network from their homes.
  • Professional Sports – coaches, general managers, owners and other staff want secure, private connectivity for accessing the team’s network and sending confidential information about contracts, playbooks, trades and other details from home.

“As the hours and locations of today’s modern workplace become increasingly flexible, IT is spending too much time troubleshooting connectivity issues due to a poor user experience or log-in errors for VPNs or remote desktop services over the public Internet, resulting in frustrated and unproductive employees working from home,” said Scott Cassell, senior director, Enterprise Data & IP, Comcast Business. “As part of our strategy to offer Ethernet everywhere, Ethernet @Home helps eliminate that complexity and provides a user experience for employees at home that is the same as if they were at work – their corporate network is just there and available – opening up secure, high-performance teleworking options for more workers.”

Due to its significant potential to increase Ethernet service availability in the U.S., Ethernet @Home was recently awarded the Best Service of the Year for North America in the Metro Ethernet Forum’s (MEF) 2014 Ethernet Excellence Awards. The judging panel for the MEF awards includes senior industry analysts and Ethernet experts from IDC, Infonetics Research, Vertical Systems Group, Gartner, Frost & Sullivan, Ovum and the Rayno Report. Comcast Business also was awarded Best Application of the Year in Health, Best Application of the Year in Government as well as the Ethernet Industry Person of the Year.

Generally available across the Comcast Business footprint, Ethernet @Home comes in Ethernet Dedicated Internet (EDI), Ethernet Private Line (EPL) and Ethernet Virtual Private Line (EVPL) service types at symmetric bandwidth speeds up to 10 Mbps and backed by a service level agreement.

 

About Comcast Business
Comcast Business, a unit of Comcast Cable, provides advanced communication solutions to help organizations of all sizes meet their business objectives. Through a next-generation network that is backed by 24/7 technical support, Comcast delivers Business Internet, Ethernet, TV and a full portfolio of Voice services for cost-effective, simplified communications management.

For more information, call 866-429-3085.

Follow us on Twitter @ComcastBusiness and on other social media networks at http://business.comcast.com/social.

 

About Comcast Cable:

Comcast Cable is the nation's largest video, high-speed Internet and phone provider to residential customers under the XFINITY brand and also provides these services to businesses.  Comcast has invested in technology to build an advanced network that delivers among the fastest broadband speeds, and brings customers personalized video, communications and home management offerings.  Comcast Corporation (Nasdaq: CMCSA, CMCSK) is a global media and technology company.  Visit www.comcastcorporation.com for more information.

Monday, 08 December 2014 00:00

The future of business continuity

undefined

The sun is now setting on 2014 and we can look forward to welcoming in the new year. 2014 was the 20th anniversary of the Business Continuity Institute but the commemorations were never about reflecting back on the previous 20 years, but rather looking to the future and the new horizon that awaits us all. The BCI’s outgoing Chairman – Steve Mellish FBCI – referred to this as his 2020 Mission.

Who better to write about where the industry is heading than those who will perhaps be doing most to shape that future, those who are just starting out in their careers? '20 in their 20s' is a series of essays written by business continuity professionals from across the world who are all still aged in their twenties, so all still with a long career ahead of them.

This publication is what these twenty young professionals feel are the challenges that the business continuity industry will be facing in the future. Some relate to the particular industry they work in and some relate to the region that they are based in, however they all give an idea of what may lie ahead.

To read '20 in their 20s: The future of business continuity', click here.

On October 20, 2014, Wyndham Worldwide Corporation won dismissal of a shareholder derivative suit seeking damages arising out of three data breaches that occurred between 2008 and 2010.  Dennis Palkon, et al. v. Stephen P. Holmes, et al., Case No. 2:14-cv-01234 (D. N.J. Oct. 20, 2014). Wyndham prevailed, but the litigation carries key cybersecurity warnings for officers and directors.

Businesses suffering data breaches end up litigating on multiple fronts. Wyndham had to defend itself against the shareholder derivative action and against a Federal Trade Commission action.  In other data breach-related cases, the Securities & Exchange Commission, the Department of Justice and state regulatory agencies have asserted jurisdiction. Regulatory actions only compound exposure from private civil actions.

Officers and directors play a key role in cybersecurity. Wyndham’s directors supported the company as it defended its conduct and procedures before the FTC. However, they also had to satisfy their fiduciary duties to assess whether the breaches were the result of negligent or reckless conduct by Wyndham’s officers, which may have required the company to file its own civil action against its officers. It is not difficult to imagine situations in which a Board of Directors determines that the company’s officers acted wrongfully or negligently and end up with a choice between suing the company’s own officers for their conduct or foregoing such a lawsuit and facing derivative litigation from shareholders.

...

http://www.corporatecomplianceinsights.com/consequences-data-breach-lessons-wyndham-worldwide/

The hyperscale data center industry has made no secret of its desire to leverage renewable energy to the greatest extent possible. When you start measuring density in megawatts, any solution that helps cut the power bill is welcome.

Lately, much of the activity has centered on wind, with top-tier data producers signing long-term agreements with wind farms near their newest plants, or in some cases building capacity on-site.

Google, for example, recently teamed up with Dutch utility Eneco to provide wind energy to the company’s new facility in Eemshaven in the Netherlands. The goal is to run the plant on 100 percent wind that is sourced from Eneco’s farm in nearby Delfzijl, and in fact, the data center is expected to draw the full output of the facility for the 10-year lifespan of the contract. The data center is expected to go on-line in mid-2016.

...

http://www.itbusinessedge.com/blogs/infrastructure/is-renewable-energy-truly-providing-the-winds-of-change-in-the-data-center.html

Earlier today, we published a report that dissects global risk perceptions of business and technology management leaders. One of the most eye-popping observations from our analysis is how customer obsession dramatically alters the risk mindset of business decision-makers.

Out of seven strategic initiatives -- including “grow revenues,” “reduce costs,” and “better comply with regulations,” -- improve the experience of our customers is the most frequently cited priority for business and IT decision-makers over the next 12 months. When you compare those “customer-obsessed” decision-makers (i.e. those who believe customer experience is a critical priority) versus others who view customer experience as a lower priority, drastic differences appear in how they view, prioritize, and manage risk.

Customer obsession has the following effects on business decision-makers’ risk perceptions:

...

http://blogs.forrester.com/nick_hayes/14-12-05-the_global_risk_environment_looks_a_lot_different_in_the_age_of_the_customer