Fall World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 29, Issue 3

Full Contents Now Available!

Jon Seals

Public Utility Commission of Texas Chooses Netwrix Auditor Over Competitor to Audit Critical IT Systems for Security and Compliance

IRVINE, Calif. – Netwrix Corporation, a provider of IT auditing software that delivers complete visibility into IT infrastructure changes and data access, announced today that the Public Utility Commission of Texas has adopted Netwrix Auditor to ensure continuous compliance and prepare for annual audits, as well as to gain visibility into its IT environment.

The Public Utility Commission (PUC) of Texas in Austin regulates the state's electric and telecommunication utilities, implements respective legislation, and offers assistance in resolving consumer complaints. The company wanted to enable more granular control over its critical systems and applications, as well as to simplify compliance processes. PUC professionals evaluated Netwrix Auditor and Dell Change Auditor to explore their functionality and test how both products would perform within the organization's IT infrastructure. The Public Utility Commission (PUC) of Texas chose Netwrix Auditor overall because of the product's easy installation process and flexibility, as well as short time to productively use the Netwrix Auditor platform.

Netwrix Auditor is an IT auditing software that delivers complete visibility into IT infrastructure changes and data access. Netwrix Auditor provides actionable audit data about who has access to what, any changes made, and when and where each change has occurred. This helps companies pass compliance audits with far less effort and expense, mitigate the risk of insider-caused security breaches, and keep tabs on what users are doing in the IT environment and why. Netwrix Auditor supports monitoring of the broadest variety of IT systems, including Active Directory, Exchange, file servers, SharePoint, SQL Server, VMware, and Windows Server.

"When it came down to choosing between Netwrix and Dell, we tested both solutions in a trial mode, and the difference became even more obvious," said Paul Hopson, Information Security Officer at Public Utility Commission of Texas in Austin. "Netwrix Auditor is easier to install, has less restrictions to hardware, and support is very good if you have any questions or issues. Dell Change Auditor was much more expensive, and its interface is not that simple. Netwrix doesn't make things harder than they should be, so we didn't need any trainings to get started. What we finally bought was the all-in-one pack -- one solution to audit everything from a single console, amazing reporting, both default and custom reports, and dashboards for enterprise overview. Also, we didn't want to worry about product life cycle and whether our purchased solution would be maintained, so Netwrix Auditor was a great choice."

"Netwrix Auditor is an IT auditing platform that is able to resolve compliance, security, and operational problems experienced by companies from all industries," said Michael Fimin, CEO and cofounder of Netwrix. "We are happy to justify our customers' trust and provide them with outstanding functionality, powerful reporting capabilities, and consistently high level of support and maintenance. Since we allocate all of our resources to the development of Netwrix Auditor, we can assure all our clients that we will continue to improve Netwrix Auditor in accordance with the pressing cyber threats and business needs."

Learn more about replacing your legacy solution with Netwrix Auditor: www.netwrix.com/go/competitive_replacement

About Netwrix Corporation
Netwrix Corporation provides IT auditing software that delivers complete visibility into IT infrastructure changes and data access, including who changed what, when and where each change was made, and who has access to what. Over 150,000 IT departments worldwide rely on Netwrix to audit IT infrastructure changes and data access, prepare reports required for passing compliance audits, and increase the efficiency of IT operations. Founded in 2006, Netwrix has earned more than 70 industry awards and was named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest-growing companies in the U.S. For more information, visit www.netwrix.com.

Cyber Advanced Warning System™ Brings Continuous Live Exploit Testing to Group Tests

AUSTIN, Texas – NSS Labs, the world's leading information security research and advisory company, today announced it has taken security product testing to a new level by incorporating the Cyber Advanced Warning System™ (CAWS) into all applicable security product group tests. CAWS is the world's first and only security as a service (SaaS) solution that pinpoints active exploits, identifies targeted asset types, and measures security product effectiveness against exploits continuously. Given the highly dynamic nature of threats, continuous threat handling insight is a significant improvement in providing purchase and risk mitigation guidance to enterprise security teams.

Cyber criminals constantly adapt to deployed defenses, countering with new exploits on a daily basis, sometimes more frequently. In theory, all security products receive regular signature and software updates to account for changing attack techniques and/or delivery vehicles. However, those updates are not perfect and can be limited by vendor information, capabilities and priorities -- protection is not always aligned with what adversaries are using in active exploit campaigns. CAWS continuously measures security product effectiveness against active exploits and notifies security teams when they are at risk so actions can be taken: prioritize a patch, limit a vulnerable application's access to the internet, etc.

Security products are typically evaluated for the key aspects of security effectiveness, performance and total cost of ownership (TCO). While the latter two only change when products or pricing change, the security effectiveness of any product is subject to the continuously changing threat landscape. The addition of CAWS results to NSS Labs Group Tests provides a dynamic view into each product's performance against active threats on the internet throughout the live testing cycle of any applicable group test. Customers and prospects can continue to see how products are performing -- even after the live test has completed -- by subscribing to CAWS. Security product testing has never been more current and relevant.

"Today's cyber threats evolve faster than ever. The defenses that work today may be completely off the mark tomorrow," said Vikram Phatak, CEO of NSS Labs. "Knowing when you are at risk and the specific sources of that risk is key to taking action."

The next generation firewall (NGFW) Group Test, to be released at the 2016 RSA Conference, will be the first to rely upon CAWS for the live stack portion of its security effectiveness testing. To get more detailed information on the Cyber Advanced Warning System, join the NSS webinar on February 23, at 1:00 PM CST.

About NSS Labs, Inc.

NSS Labs, Inc. is the global leader in security product testing and advisory services, providing businesses with the objective information, analysis, and tools they need to successfully manage cyber security risk. NSS offers advanced solutions including the Cyber Advanced Warning System (CAWS) -- a cloud service that continuously captures live attacks being used by threat actors, and tests security products against those attacks in real time. CEOs, CIOs, CISOs, and information security professionals from many of the world's largest and most demanding enterprises rely on insight from NSS. For more information, visit www.nsslabs.com


AppEnsure Delivers Operational Intelligence and Uses Unique Analytics to Provide Meaningful and Actionable Root Cause Diagnostics to Improve Company Productivity in Real Time

SHREWSBURY, NJ – Lifeboat Distribution (NASDAQ: WSTG), an international specialty distributor for virtualization, security, network infrastructure, and other technically sophisticated products, today announced a distribution agreement with AppEnsure, a leading provider of a B2B enterprise application performance solution for cloud and virtualized environments. Lifeboat will distribute AppEnsure's end-user centric application performance monitoring and management solution to their network of resellers, VARs and systems integrators in the United States and Canada.

The toughest job in IT is finding the root cause of poor application performance. Slow applications are profitability killers -- and applications service delivery is crucial for business success. With so many end points and a dynamic, virtualized, distributed application topology, the only viable approach today is to understand the end user experience, as measured by response time, and relate that to the response of the specific elements in the application topology supporting that service delivery. AppEnsure automatically identifies each application by name, provides a real-time topology map for that application, and then provides a root cause analysis when response time, throughput, or error rate for the application deviates from normal behavior. To help illustrate the importance of improving application response time, Jeff Bezos, CEO at Amazon, states for his company, "For every 100ms of reduced response time, we experience a 1% increase in revenue."

"AppEnsure is the first and only solution that measures response time and throughput for all mission-critical applications automatically for both custom-developed and purchased applications, in all locations -- including physical, virtualized, public and private cloud," said Colin Macnab, CEO of AppEnsure. "Delivering true demand profiling, AppEnsure improves company productivity and revenue-generation, and reduces application outages and slowdowns by over 95%."

"As IT infrastructures become more complex and new technologies continue to disrupt application performance, enterprises have a strong need for an advanced solution that can quickly troubleshoot and diagnose application problems across multiple locations," said William R. Botti, Executive Vice President at Lifeboat Distribution. "Our agreement today will enable our partners to deliver AppEnsure's End User Centric APM solution to meet this growing demand -- and to generate highly profitable, recurring revenue streams while satisfying their customers' need to protect revenue and business productivity. We are thrilled that AppEnsure selected Lifeboat as their first distributor in North America."

Lifeboat will promote AppEnsure's application performance monitoring and management solution in conjunction with their extensive line card of virtualization products. Resellers and managed service providers interested in offering AppEnsure's APM solution should contact Lifeboat by phone at +1.800.847.7078 (US), or +1.888.523.7777 (Canada), or by email at sales@lifeboatdistribution.com.

About Lifeboat Distribution
Lifeboat Distribution, a subsidiary of Wayside Technology Group, Inc. (NASDAQ: WSTG), is an international value added distributor for virtualization/cloud computing, security, application and network infrastructure, business continuity/disaster recovery, database infrastructure and management, application lifecycle management, science/engineering, and other technically sophisticated products. The company helps vendors recruit and build multinational solution provider networks, power their networks, and drive incremental sales revenues that complement existing sales channels. Lifeboat Distribution services thousands of solution providers, VARs, systems integrators, corporate resellers, and consultants worldwide, helping them power a rich opportunity stream, expand their margin+ services revenues, and build profitable product and service businesses. For more information, visit www.lifeboatdistribution.com, or call +1.800.847.7078 (US), +1.732.389.0037 (International), +1.888.523.7777 (Canada), or +31.36.8200.236 (Europe). Follow Lifeboat Distribution on Twitter (@LifeboatVAD) and Facebook (LifeboatDistribution).

About AppEnsure
AppEnsure offers an application performance monitoring and management solution for managing response time and throughput of all applications, in all locations. The company's solution delivers simple application management for both custom developed and purchased applications written to both Windows and Linux and deployed on physical, virtual or cloud infrastructures. Founded in 2012, AppEnsure is based in Santa Clara, California at the Citrix headquarters and is a Citrix Startup Accelerator company. To learn more, visit http://www.appensure.com.

Lifeboat is a registered trademark of Lifeboat Distribution in the US and other countries. All other company names or product names may be the trademarks of their respective owners.

Solution Combines CloudLock's Cloud Access Security Broker With FireEye's Security Data Analytics and Threat Intelligence for Integrated Orchestration Against Data Breaches and Cyber Attacks

WALTHAM, Mass. – CloudLock®, the leading provider of Cloud Access Security Broker (CASB) and Cybersecurity-as-a-Service solutions, and FireEye, Inc. (NASDAQ: FEYE), a leader in stopping today's advanced cyber attacks, today announced their technology partnership, integrating CloudLock's Security Fabric with the FireEye® Threat Analytics Platform™ (TAP™) to provide security incident visibility and reporting from one platform. CloudLock also announced they have joined the FireEye Cyber Security Coalition to share security knowledge on emerging threats and best practices between the partners.

"In 2015 there was a proliferation of data breaches and inadvertent exposures, affecting organizations across every vertical," said Manolo Gonzalez, Head of Alliance Partner Ecosystem at CloudLock. "We couldn't be more thrilled to join forces with such a highly-respected authority on cyberthreats to address these emerging risks. We look forward to enhancing the impact of our collective cybersecurity expertise for our customers across the globe and expanding our relationship with FireEye in the areas of malware prevention and threat intelligence."

The exponential growth in the adoption of cloud applications increases security risks such as cloud malware and data breaches by malicious actors. The CloudLock and FireEye integration addresses the growing list of security threats by providing orchestrated security incident intelligence and reporting capabilities for an enhanced view of cloud application risks. Customers can build analytics dashboards for cross-platform visibility into incidents and cross reference such instances across their on-premises and cloud environments. By aggregating CloudLock and FireEye security incidents, as well as correlating suspicious user behavior, security teams gain unique cloud environment insights, including identifying potential compromised accounts, data breaches and vulnerabilities due to misconfiguration, in the dashboard of FireEye's TAP.

"Both FireEye and CloudLock have been critical to our CyberSOC efforts, and the integration opens up exciting new possibilities for us. We will be able to identify and respond to threats faster due to the combined expertise of the industry leading security vendors," said Kerry Boyer, ISO, CSU Fullerton.

"The explosion of enterprise cloud adoption underscores the importance of building and integrating secure applications to protect critical assets as well as user accounts," said Ed Barry, VP, Cyber Security Coalition, FireEye. "By deploying the FireEye platform with a leading native, multi-mode CASB provider, CloudLock, our joint customers unlock new visibility and control into their cloud environments."

CloudLock has also announced they have joined the FireEye Cyber Security Coalition (CSC), which creates a foundation to facilitate the sharing of intelligence and advanced workflows, enabling partners to better leverage and operationalize the FireEye platform. CSC Partners are enabled to integrate with the FireEye platform to share intelligence, providing for accelerated workflows that deliver superior detection of advanced threats and reduced response times.

For more details on the solution or to request a demo see https://www.cloudlock.com/partners/fireeye.

About CloudLock
CloudLock is the cloud-native CASB and Cloud Cybersecurity Platform that helps organizations securely leverage cloud apps they buy and build. CloudLock delivers security visibility and control for SaaS, IaaS, PaaS and IDaaS environments across the entire enterprise in seconds. Founded by Israeli Elite Cybersecurity Military Intelligence experts, the company delivers actionable cybersecurity intelligence through its data scientist-led CyberLab and crowdsourced security analytics across billions of data points daily. CloudLock has been recognized by Inc. Magazine as the fastest growing security product company in the U.S. and by Glassdoor as one of the top 3 best places to work in the U.S. Learn more at www.cloudlock.com.

About FireEye, Inc.
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 4,400 customers across 67 countries, including more than 680 of the Forbes Global 2000.

MINNEAPOLIS, Minn. – DataBank, Ltd., a leading super-regional provider of outsourced solutions for data center, cloud and managed services has announced the expansion of both data center capacity and cloud services in their premier Minneapolis-Saint Paul-area facility. The addition of a cloud node and the commencement of construction on the site’s second data hall will increase the facility’s onsite IT service suite as well as augment the available white-floor data center space by over 15,000 sqft, to accommodate increasing market demand.

DataBank’s site, known as MSP2, is located on a dedicated and secured site in the Southeastern Twin Cities suburb of Eagan, MN. The Tier-III (Uptime Institute Certified - Constructed) facility boasts some of the highest specs for a multi-tenant data center in the entire region. Designed for 20MW of onsite power (diverse feeds of 10MW A&B), the 2N design in both utility and onsite power generation has differentiated DataBank to discerning businesses seeking the utmost security and uptime availability.

“We are very pleased with the interest and growth of demand in this market for the high quality services we offer,” said Tim Moore, DataBank’s CEO. “The expansion we’ve begun in both space and cloud services represent our commitment to offer the best outsourced information technology solutions here in the Twin Cities.”

In addition to the two Minneapolis-area sites, DataBank’s super-regional footprint also includes two enterprise-class data centers in Kansas City, as well two more in Dallas. To find out additional details on DataBank data center facilities and suite of managed services, please visit the company website at http://www.databank.com.

About DataBank
DataBank is a leading provider of enterprise-class business solutions for Data Center, Managed Services, and Cloud. We aim to provide our customers with 100% uptime availability of all their critical data, applications and deployed infrastructure. Our suite of services is anchored by our top-tier data center environments and highly available robust connectivity. We offer customized deployments tailored to effectively manage risk, improve technology performance and allow our clients to focus on their own core business objectives. DataBank is headquartered in the historic former Federal Reserve Bank Building in downtown Dallas, TX and has additional data centers in North Dallas, Minneapolis and Kansas City. For more information on DataBank locations and services, please visit http://www.databank.com or call 1(800) 840-7533.

The cyber thief develops a new advantage, breaks into an IT system, and swipes data. An enterprise spots the hack too late, figures out how it was done, and changes its defense to stop the hack from happening again. The defense holds until the cyber thief figures out the next work-around.

That is the action/reaction cycle. Like a perverse iteration of Newton's third law, every clever action is followed by an equally clever reaction.

Companies are getting wise to this, adding depth to their cyber-defenses to contain, rather than prevent breaches. Yet, there can be no change in strategy without a change in thinking first.



From an investor’s point of view, Rackspace Hosting is now operating in uncharted territory, and Mr. Market hates uncertainty.

Fanatical belief in “fanatical support” and anecdotes about the potential of managed services for Amazon Web Services and Microsoft’s Azure, Private Cloud, and Office 365 simply didn’t excite analysts on the Q4 2015 earnings call.

Rackspace (RAX) investors bid the stock up 3 percent to close at $18.17 prior to the release of Q4 earnings and full-year 2015 results after the bell Tuesday.



Cloud computing has completely revolutionized the way businesses handle data. No longer limited by their own hardware, companies can now take advantage of technology tools offered by providers around the world. This trend will only continue as more organizations transition storage and compute power to the cloud. According to analysts at Gartner, cloud services are predicted to grow to $244 billion by 2017.

With all the benefits the cloud has to offer, it is imperative that businesses develop the essential awareness and master the fundamental security capabilities required to safely and securely deploy cloud computing solutions. This is especially critical for functions—and even entire industries—with a high risk of data breach, such as payroll processing, human resources management, health care services and anything related to financial data, from consumer banking to payment card transactions to retirement fund distributions.



Across the world, hackers are taking control of networks, locking away files and demanding sizeable ransoms to return data to the rightful owner. This is the ransomware nightmare, one that a Hollywood hospital has been swallowed up by in the last week. The body confirmed it agreed to pay its attackers $17,000 in Bitcoin to return to some kind of normality. Meanwhile, FORBES has learned of a virulent strain of ransomware called Locky that’s infecting at least 90,000 machines a day.

The Hollywood Presbyterian Medical Center’s own nightmare started on 5 February, when staff noticed they could not access the network. It was soon determined hackers had locked up those files and wanted 40 Bitcoins (worth around $17,000) for the decryption key required to unlock the machines. Original reports had put the ransom at 9,000 Bitcoin (worth roughly $3.6 million), but Allen Stefanek, president and CEO of Hollywood Presbyterian Medical Center, said in an official statement they were inaccurate.

Despite receiving assistance from local police and security experts, the hospital chose to pay the attackers. “The quickest and most efficient way to restore our systems and administrative functions was to pay the ransom and obtain the decryption key. In the best interest of restoring normal operations, we did this.”



Thursday, 18 February 2016 00:00

How mature are vendor risk management programs?

The recently published 2015 Risk Management Association (RMA) Third-Party/ Vendor Risk Management Survey report provides insights into the third-party risk management programs of leading financial services organizations of various asset sizes across the US, Canada, and Europe. The report, featuring the perspectives of 80 financial services institutions, provides detailed information on the current challenges and best practices in third-party risk management. All the participating institutions are regulated by one or more of the following regulators – OCC, FRB, FDIC, State, FINRA, and OSFI (Canada).

The survey is an update to, and extension of, the 2014 Third-Party/ Vendor Risk Management Survey conducted by the RMA, and is designed to track the progress and evolution of third-party risk management practices at financial services companies. Both the 2015 and 2014 surveys were sponsored by MetricStream.

Some key findings from the 2015 RMA survey include:

  • 35 percent of the institutions surveyed reported that their vendor third-party risk management program is fully mature, compared to 0 percent in 2014. However, only 13.8 percent of respondents reported that their non-vendor third-party risk management program is fully mature.
  • 50 percent of the respondents said that non-vendor third-party risk management is a regulatory requirement and their institution is formally addressing the risk.
  • The majority of institutions surveyed have a ‘center-led’ or ‘hybrid’ approach to supporting the first line of defense / defence in the execution of their responsibilities for both vendor and non-vendor third-party relationships. Meanwhile, the number of FTEs supporting related activities has grown since the 2014 survey.
  • Technology adoption is much higher than reported in the 2014 survey. Today, only a minority (28.8 percent) of the respondents still use manual tools such as MS Access, Excel, or SharePoint to manage their third-party risk management programs. Most institutions also acquire data from third parties like Dunn and Bradstreet, LexisNexis, and Moody's to support due diligence and monitoring.
  • 17 institutions surveyed disclosed that they have achieved ‘clean’ regulatory examinations.
  • According to respondents, the areas that received criticism during the most recent regulatory exams included due diligence: quality and completeness of documentation (20 percent), consistency of program across all lines of business (18.8 percent), monitoring (18.8%), and business continuity / resilience (15 percent).