Spring World 2017

Conference & Exhibit

Attend The #1 BC/DR Event!

Bonus Journal

Volume 29, Issue 5

Full Contents Now Available!

Jon Seals

Jon Seals

EUGENE, Ore. – LightCounting releases Quarterly Market Update Report, presenting analysis of the optical communications industry supply chain in the first half of 2016, including the market shares of the leading suppliers of 100G DWDM transport equipment.

LightCounting's Quarterly sales database, released along with the report, includes estimates for shipments and pricing of more than 100 optical components and modules in the first two quarters of 2016 and actual data for 2014-2015. More than 20 leading optical transceiver suppliers contributed data to this report.

Spending on property, plant, and equipment by 16 leading cloud companies grew by a whopping 54% in Q1 2016 compared to Q1 2015, after taking a breather in the latter half of 2015. While property, plant, and equipment includes a wide range of purchases outside data centers and networks, the upward trend carried over into optical networking. Increased DCI spending by the leading cloud players helped to drive record growth in 100G DWDM ports. Cisco and Juniper reported a significant increase in router sales to cloud companies, also contributing to very strong demand for client-side 10km reach LR4 100GbE optics.

Shipments of 100m, 0.5km and 2km 100GbE optics to cloud companies also picked up in early 2016, but sales remained modest in comparison with 100GbE LR4. Several suppliers interviewed by LightCounting reported a sharp increase in purchases of these products by cloud companies in June 2016 and expectations are very strong for the second half of the year.

"LightCounting's report on Mega Datacenter Optics, published in March 2016, forecasts that sales of 100GbE optics to cloud companies will reach $300 million in 2016" -- commented Dr. Vladimir G. Kozlov, CEO and Founder of LightCounting. "The latest market data supports these findings, but the product mix will remain volatile in 2016."

Detailed information on the report is available at: Market Update Report.

Threat Research for May 2016 Shows a Continuing Rise in the Number of Active Malware Families Attacking Business Networks; Banking Malware Increases

SAN CARLOS, Calif. – Check Point® Software Technologies Ltd. (NASDAQ: CHKP) today published its latest Threat Index, revealing the number of active global malware families increased by 15 percent in May 2016.

Check Point detected 2,300 unique and active malware families attacking business networks in May. It was the second month running Check Point has observed an increase in the number of unique malware families, having previously reported a 50 percent increase from March to April. The continued rise in the number of active malware variants highlights the wide range of threats and scale of challenges security teams face in preventing an attack on their business critical information. Most notably:

  • While Conficker remained the most commonly used malware in the period, banking malware Trojan Tinba became the second most prevalent form of infection last month, allowing hackers to steal victim's credentials using web-injects, activated as users try to log-in to their banking website.
  • Attacks against mobile devices also remained constant as Android malware HummingBad remained in the overall top 10 of malware attacks across all platforms globally during the period. Despite only being discovered by Check Point researchers in February, it has rapidly become commonly used; indicating hackers view Android mobile devices as weak spots in enterprise security and as potentially high reward targets.

"We continue to see a significant increase in the number of unique and active malware families targeting business networks, which speaks to the effort hackers are putting into creating new zero-day attacks and the scale of the challenge businesses face in securing their network against cyber criminals," said Nathan Shuchami, head of threat prevention, Check Point. "Organizations need to consider using advanced threat prevention measures on networks, endpoints and mobile devices to stop malware at the pre-infection stage to ensure they are effectively secured against the latest threats."

In May, Conficker was the most prominent family accounting for 14 percent of recognized attacks; while second and third placed Tinba and Sality were responsible for 9 percent each. The top ten families were responsible for 60 percent of all recognized attacks.

1. Conficker - Worm that allows remote operations, malware downloads, and credential theft by disabling Microsoft Windows systems security services. Infected machines are controlled by a botnet, which contacts its Command & Control server to receive instructions.

2. Tinba - Also referred to as Tiny Banker or Zusy, Tinba is a banking trojan that steals the victim's credentials using web injections. It becomes activated when users try to login to their banking website.

3. Sality - Virus that infects Microsoft Windows systems to allow remote operations and downloads of additional malware. Due to its complexity and ability to adapt, Sality is widely considered to be one of the most formidable malware to date.

Mobile malware families continued to pose a significant threat to businesses mobile devices during May with six entries into the top 100 overall families. Most of these targeted Android, but in a continuation of the trend seen in April several targeted iOS. The top three mobile families were:

1. HummingBad - Android malware that establishes a persistent rootkit on the device, installs fraudulent applications, and with slight modifications could enable additional malicious activity such as installing a keylogger, stealing credentials and bypassing encrypted email containers used by enterprises.

2. Iop - Android malware that installs applications and displays excessive advertising by using root access on the mobile device. The amount of ads and installed apps makes it difficult for the user to continue using the device as usual.

3. XcodeGhost - A compromised version of the iOS developer platform Xcode. This unofficial version of Xcode was altered so that it injects malicious code into any app that was developed and compiled using it. The injected code sends app info to a Command & Control server, allowing the infected app to read the device clipboard.

About the Check Point Threat Index

Check Point's Threat Index is based on threat intelligence drawn from its ThreatCloud World Cyber Threat Map, which tracks how and where cyberattacks are taking place worldwide in real time. The Threat Map is powered by Check Point's ThreatCloud™ intelligence, the largest collaborative network to fight cybercrime, which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database holds over 250 million addresses analyzed for bot discovery, over 11 million malware signatures and over 5.5 million infected websites, and identifies millions of malware types daily.

Check Point's Threat Prevention Resources are available at: http://www.checkpoint.com/threat-prevention-resources/index.html.

Follow Check Point via:

Twitter: http://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: http://blog.checkpoint.com
YouTube: http://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises -- from networks to mobile devices -- in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.

FARNBOROUGH – There are many good reasons for moving IT infrastructure into a third party data centre but the actual migration can be a time of high stress for everyone involved. Datum has launched Datum Concierge to support clients through the transition and ensure smoother, more effective deployment.


From its launch in 2013, Datum has specialised in providing service-enhanced co-location from its highly engineered data centre within the secure Cody Technology Park in Farnborough. In practice this has meant that Datum clients have always been able to rely on the Datum team as an active partner for their outsourced co-location, assisting and supporting at every stage. Appreciative feedback from clients prompted Datum to formalise the approach, taking the Datum way of doing business and delivering it in the form of Datum Concierge.


The Concierge service provides clients with guidance, advice and practical support at every stage, building on the experience and knowledge of the Datum team. Included in the package is advice to deliver potential time and money savings in the design in line with the client’s desired business outcomes, a Datum engineer on site to guide and support when critical kit is being transitioned and nerves are frayed, and an allocated Client Service Manager to be the key go-to for any queries.


After one sizeable migration project, a new enterprise client was recently prompted to write: “The weekend wasn't without some hairy moments but we have our infrastructure in place. The Datum staff were excellent as expected. Thanks to everyone at Datum for assisting in the transition, great service.”


Dominic Phillips, Managing Director at Datum Datacentres, concludes: “In common with our sister company, Attenda, client service is at the centre of the way we operate and it makes sense to package up the Datum approach to demonstrate the value that service-enhanced co-location can bring. Datum Concierge is an expression of the Datum ethos of ensuring we have satisfied clients with whom we build long term relationships.”


About Datum Datacentres

Datum provides leading-edge carrier and cloud neutral co-location data centres to enterprises and service providers. As part of the Attenda IT Services group, delivering always-on availability, robust security and enterprise class service is hard wired into our operations. Our data centres are trusted as secure environments for content, data and business critical IT to connect with a neutral choice of networks and cloud service providers.

Datum FRN1 has capacity for more than 1,000 co-location racks within a high security campus in Farnborough, which is fast developing as a strategic London-edge data centre hub. The facility incorporates a pressurised free-air cooling design that delivers enhanced environmental efficiencies and supports high density computing to 30kW per rack as standard. Always on availability is supported by resilience in both design and operations underwritten by a 100% uptime SLA with helpdesk and remote hands services which are available 24x365.


WASHINGTON – On Monday, the Department of Homeland Security (DHS) issued its highly-anticipated call to industry to share solutions for the Biometric Exit Program. The Request for Information (RFI), issued by U.S. Customs and Border Protection (CBP), explains that CBP intends to add biometrics to confirm when foreign nationals are departing the United States, in order to deter visa overstays, to identify criminals, and to defeat imposters.

"It's a very helpful RFI," commented Michael Dougherty, CEO of the Secure Identity & Biometrics Association. "In short order it explains the background for Biometric Exit, outlines the experiments that CBP has made using different biometric modalities at the air, land and sea ports, clearly discusses the goals and objectives of the Program, and then encourages vendors to explain how they can help CBP satisfy its challenges while minimizing risk and life cycle costs."

"In turn, DHS will see a significant response to the RFI from industry," said Dougherty. "Companies have made great technological strides in their ability to capture and match biometrics at speed to manage and ease travel, and to do so affordably. Their inputs, which are due on July 1, will be important to DHS as it creates the statement of work for its eventual request for proposals."

Dougherty, who previously worked at DHS' Border and Transportation Security Directorate and later served as the Citizenship and Immigration Services Ombudsman, commented that "DHS has become very good at substantive outreach to industry, which is important for the Department in understanding what's technologically possible, and important for vendors who want to understand DHS' requirements so that they can create solutions that will aid DHS in fulfilling its different missions."

"Dialogue and understanding between DHS, its government partners and industry is critical," said Dougherty. "To help promote that dialogue, SIBA has put together an 'Identity and Biometrics Innovations Forum' to take place at the Reagan Building on June 29. Our goal is to put together, in one place and on a single day, important speakers from the agencies and components that are key to implementing state-of-art biometric and identity management systems for facilitating travel, maintaining the integrity of the immigration system, and combating terrorism and crime."

"The Forum," remarked Dougherty, "will feature panelists from the Transportation and Security Administration (TSA) and the National Institute of Standards and Technology (NIST) to discuss screening innovations to increase accuracy, speed and throughput. They will be followed by CBP, which will provide an update on Biometric Exit and the future of traveler management. We will then hear from the DHS Office of Biometric and Identity Management (OBIM) and the FBI Biometrics Center of Excellence on advances in the sharing of biometric and biographic information with domestic and international partners."

"We are delighted with the level of interest in the Forum," concluded Dougherty, "creating occasions where government and industry can examine problems together is an important objective for SIBA."


Experienced Cloud and Managed Infrastructure Company Launches New Website, Announces 20/2.0 Vision Strategy

BOCA RATON, Fla. Host.net, a multinational provider of cloud, managed infrastructure and network services, announces today the celebration of its 20-year anniversary and the launch of its 20/2.0 Vision initiative. This reinvigorated approach includes the enhancement of its presence in the marketplace and a new website to demonstrate its strategic focus. The website can still be found at www.host.net and contains updated information about the company and its goals for 2016 and beyond.

Host.net was founded in 1996 as an Internet service provider based in Boca Raton, Fla. Since then, the company has evolved and expanded to better serve its clients through unique, customized solutions and a focus on customer service and collaboration. Host.net also adopted a phrase to convey is people-focused philosophy – Technology Humanized™. This consists of recognition the business world is constantly evolving, and the technology that powers it is exponentially becoming a larger component of its success. Host.net works closely with each of its clients, no matter the size of the company, to understand their needs and cater to their specific requirements. Host.net also boasts the fastest enterprise storage available with DataCore, which recently announced new record-breaking performance results for high-availability, hyper-converged storage solutions.

“One of our core values is teamwork,” states Host.net Chief Evangelist Lenny Chesal. “We are laser-focused on collaboration as a key element to the success of our clients, our partners and Host.net as a whole. Our 20/2.0 Vision initiative represents the next step in that evolution. We are recognizing how far we have come during the past 20 years, while looking forward to where we plan to go during the next two decades. This is the essence of Host.net 2.0 – to learn from our past to grow towards the future, keeping pace with ever-changing technology in order to provide the best support possible to our clients.”

“At Host.net, we explain to each and every one of our clients we are here to keep them and their data connected and protected,” explains Host.net CEO Jason Katz. “We are dedicated to continued growth with our clients, and within the marketplace as a whole. Host.net has been in this business for 20 years and we understand better than anyone what it takes for organizations to succeed. Our company offers solutions ranging from cloud, hybrid, colocation, connectivity and disaster recovery to ensure every client who trusts us with their critical data can rest easy knowing our team is monitoring and protecting that vital element of their business 24/7/365.”

Host.net data centers are located in Boca Raton and Ft. Lauderdale, FL and Atlanta, GA, and are marked by better than 99.999% uptime with no single points of failure. For more information, please visit www.host.net. Follow Host.net on Twitter and LinkedIn.


About Host.net
Host.net is a multinational cloud company offering managed infrastructure services. Specializing in colocation and network transport and transit solutions for enterprise organizations, the company custom designs total solutions tailored to the needs of its clients. Accomplishing uninterrupted service availability, increasing technology capabilities and improving operational efficiencies are hallmarks of Host.net's services. The company operates multiple enterprise-class data centers connected to an extensive fiber-optic backbone that delivers Internet and layer 2 communications across a wide array of last-mile options. Host.net services clients in most major metropolitan regions of North America as well as portions of Latin America. Additional information about Host.net is available at http://www.host.net. You can also follow Host.net on Twitter and LinkedIn.