Milestone product release follows successful operator trials and feature alignment
SAN DIEGO – XCellAir, the experts in Wi-Fi Quality of Experience (QoE), today announces the general availability of its XCellRAN™ Carrier Wi-Fi software solution. At the launch of XCellAir last February, the solution was in a beta form ready to engage customers in lab and field trials. After extensive customer engagement, trials and feedback, the product is now being made generally available.
The XCellRAN Carrier Wi-Fi solution is a scalable QoE system for operators’ entire carrier Wi-Fi network, from residential homespots through to outdoor metro area deployments. During this year’s Mobile World Congress, visitors to the XCellAir stand (#7A71), will be able to see first-hand how the product is helping operators provide reliable Wi-Fi performance across their networks, increasing capacity, extending coverage and reducing cost.
The rise in demand for data and connectivity has seen Wi-Fi rise in prominence as a universal and interoperable technology, embedded in an ever-growing number of devices. However, Wi-Fi services, especially in the home, are largely unmanaged, and operators cannot hope to monetize these services without vastly improved QoE for users. While issues around connectivity, roaming and authentication are being addressed, there are still gaps around critical areas such as radio resource optimization (RRO), automated operations and scalability.
The XCellRAN Carrier Wi-Fi solution unlocks unutilized unlicensed spectrum, actively tracking and automatically fixing network and access point-level issues before they affect service. Going beyond simple enterprise-centric Wi-Fi radio resource management (RRM), XCellAir provides the industry’s first Carrier Wi-Fi Self Organizing Network (SON) system.
XCellRAN automates the configuration process and provides radio optimization and fault tracking, thereby enabling the network and access points to heal themselves while seamlessly improving QoE for users. It also provides operators state-of-the-art visibility into the network, including dashboards and analytics, to understand exactly what is happening in the Wi-Fi environment. With XCellRAN, operators can evaluate the strengths and overcome weaknesses in their network before launching new voice and video services. Furthermore, as a cloud-based software product, XCellRAN works across multiple markets and deployment scenarios using capacity as needed, supporting millions of access points while preserving the flexibility and cost advantages inherent to Wi-Fi.
“Since we launched last year, we have experienced tremendous demand for the Carrier Wi-Fi solution, and invested considerably in development of its core capabilities. Multiple trials have demonstrated its effectiveness and allowed us to fine-tune the product to enable large scale deployments,” said Amit Agarwal, CEO of XCellAir.
“With our XCellRAN system, operators can have clear visibility into their networks, ensure the optimal use of available Wi-Fi capacity, improve the service quality in congested areas and ensure excellent quality of experience even in areas where there is interference from sources outside the control of the XCellRAN system. One year from our company’s launch, we are thrilled to be announcing the general availability of our XCellRAN Carrier Wi-Fi solution as a product to the market.”
For more information on the XCellRAN Carrier Wi-Fi solution, please visit http://xcellair.com/xcellran-for-carrier-wi-fi/.
XCellAir brings order to the potential chaos of using unlicensed spectrum when deploying a dense radio network of Wi-Fi access points and cellular small cells. Based in San Diego, CA, XCellAir provides cloud-based Quality of Experience (QoE) solutions that automates the management and optimization of these networks. XCellAir enables wireless service providers to meet the challenges and capture the opportunity presented by the insatiable thirst for data and ubiquitous connectivity.
XCellAir will showcase its XCellRAN product portfolio in Hall 7, Stand 7A71 at Mobile World Congress in Barcelona, February 22-25. To schedule a meeting with XCellAir’s experts and experience the XCellRAN product in person, contact firstname.lastname@example.org.
There has been a lot of talk lately in the Business Continuity industry about a “next generation” of Business Continuity planning. In a recent article from Continuity Central, David Lundstedt asserts that Business Continuity is Broken. But is it? Are we clinging too tightly to our old ways of creating plans and delivering results? Businesses and technologies change very rapidly—are we keeping up?
“The business continuity industry is evolving slowly. It must evolve, and some significant changes in perspective are warranted,” stated MHA CEO Michael Herrera. “We must be careful not to lose sight of the real goal: organizational survival/resilience.“
In the Continuity 2.0 Manifesto (first made available in September 2015) David Lindstedt and Mark Armour argue that “traditional approaches in business continuity management have become increasingly ineffectual.” Over the years, technology and organizations have undergone tremendous changes, but business continuity methodology has not kept pace. Small, incremental adjustments that focus increasingly on compliance over resilience are cited as contributors to “a progressively untenable state of ineffectual practice, executive disinterest, and an inability to demonstrate the value of continuity programs and practitioners.”
ServiceNow Geneva Customers Now Have Access to Industry-Leading Technology for Quick and Easy Management of Major Incidents
SAN RAMON, Calif. – xMatters, inc., a leader in communication-enabled business processes, today announced it has received certification of its integration application with the latest ServiceNow release, Geneva. The integration application is available now in the ServiceNow Store at: http://bit.ly/1QFjn8R.
Certification by ServiceNow signifies xMatters has again successfully completed a set of defined tests focused on integration interoperability, security and performance. The certification also ensures that best practices are utilized in the design and implementation of xMatters with ServiceNow. Joint customers can also find the xMatters integration application in the ServiceNow store compatible with the Dublin, Eureka and Fuji releases.
xMatters' award-winning cloud platform accelerates business processes through intelligent communication. The technology pinpoints and proactively alerts the individuals, teams and external service providers required to work together to quickly manage any business scenario along with resolving incidents, such as service disruptions and technical issues that interrupt the flow of day-to-day operations. The closed-loop solution records all notifications from xMatters back into the originating ServiceNow incident ticket for reporting and post mortem purposes.
"New research shows businesses continue to struggle in their responses to frequent IT incidents and that poor planning is a factor. On average nearly 60 percent of large organizations experience a major IT outage at least monthly. No doubt about it, the business is taking a big hit as it scrambles to get back on its feet," said Doug Peete, Senior VP of Product Management at xMatters. "We're pleased to offer ServiceNow customers with an integration to our technology and help them add intelligent communications to their critical enterprise service management processes."
The two companies have a long and successful relationship, with xMatters' technology integrating with ServiceNow's Enterprise Service Management Platform dating back to the Berlin release. xMatters and ServiceNow provide services and tools to a myriad of joint global customers who are leaders in their fields. Customers come from the retail, financial services, energy, technology, services, media, consumer goods, manufacturing and healthcare industries.
xMatters will be demonstrating its intelligent cloud communications technology running on the ServiceNow Geneva release at Knowledge16 in April.
For more information on the xMatters technology, go to: http://www.xmatters.com/products/.
- Website: http://www.xmatters.com/
- Products: http://www.xmatters.com/products/
- Solutions: http://www.xmatters.com/solutions/
- Blog: http://blog.xmatters.com/
- Latest News: http://www.xmatters.com/company/press-news/
- Twitter: http://twitter.com/xMatters_inc
- Facebook: http://www.facebook.com/xMatters
About xMatters, inc.
xMatters' cloud-based communications solutions enable any business process or application to trigger two-way communications (push, voice, email, SMS, etc.) throughout the extended enterprise during time-sensitive events. With over a decade of experience in rapid communication, xMatters serves more than 1,000 leading global firms to ensure business operations run smoothly and effectively during incidents such as IT failures, product recalls, natural disasters, dynamic staffing, service outages, medical emergencies and supply-chain disruption. xMatters is headquartered in San Ramon, CA with additional offices in London and Sydney.
Behavioral Search Solution Empowers Any Security Professional to Identify and Stop Cybercriminals
SAN MATEO, Calif. – Exabeam, the leader in user behavior analytics (UBA) for security, today announced Threat Hunter, a new product for the instant and targeted querying of security big data by anyone. With Threat Hunter, security professionals can proactively identify and respond to adversaries within their networks. The product enables analysts to search, pivot, and drill down across multiple dimensions of user activity to find sessions that contain specific risky behaviors.
"The promise of User Behavior Analytics is that the system will notify security analysts about risky activities, and Exabeam excelled at that in ESG Lab testing," said Tony Palmer, senior lab analyst, Enterprise Strategy Group. "Exabeam's Threat Hunter provides the other half of the equation -- the ability to ask the system which users match a specific set of risk criteria and get useful answers."
Today's enterprise breaches are after more than credit card numbers. Advanced persistent threat attacks (APT) are becoming the norm, with cybercriminals breaking into corporate networks using stolen credentials and targeting high-value, sensitive data. According to ISACA, 74 percent of enterprises surveyed think they will be a target for advanced persistent threat (APT) attacks, and 28 percent have already been attacked. Exabeam's leading UBA platform uncovers APT attacks using big data science to alert security teams to suspicious user behavior even if they change locations, devices, or logins.
Threat Hunter builds on the Exabeam platform by allowing any security analyst to execute a multi-dimensional search and drill-down of user sessions to actively hunt for imposters or malicious insiders based on their unusual behavior. Threat Hunter is the only UBA-related product that allows the security analyst to interrogate and query the system to find user session that match specific criteria.
Threat Hunter provides:
- Increased security - Find advanced persistent threats before they cause data loss.
- Reduced chance of data breach - Find attackers that are hiding in the network by staying under the radar.
- Faster response to cyber attacks - Effectively remove all adversaries once an attack is detected by finding all traces of activity.
"To date, UBA products have only offered something like a recommendation engine for security alerts. It's like using Netflix but you can only see the suggestions for you, never search for what you want," said Nir Polak, CEO of Exabeam. "With Threat Hunter, Exabeam gives you the power of advanced search to find the imposters in your infrastructure. It's is the only UBA solution that solves security searching as well as alerting."
Threat Hunter is available now. Pricing is based on number of users and is licensed via subscription.
Exabeam's user behavior analytics solution leverages existing log data to quickly detect advanced attacks, prioritize incidents and guide effective response. The company's Stateful User Tracking™ automates the work of security analysts by resolving individual security events and behavioral anomalies into a complete attack chain. This dramatically reduces response times and uncovers attack impacts that would otherwise go unseen. Built by seasoned security experts and enterprise IT veterans from Imperva, ArcSight and Sumo Logic, Exabeam is headquartered in San Mateo, California and is privately funded by Aspect Ventures, Icon Ventures, Investor Shlomo Kramer and Norwest Venture Partners. Visit us on Facebook or Twitter and follow us on LinkedIn.
Ad Agency Drives Success for Top Brands With Oracle Database Cloud
REDWOOD SHORES, Calif. – Surdell and Partners, a full service advertising and marketing agency, is using Oracle Database Cloud, part of Oracle Cloud Platform, to deliver near real-time intelligence to its clients, including retailers Cabela's, Kohl's, and Gabe's.
In the highly competitive advertising and marketing space, Surdell and Partners needed to focus its limited IT resources on strategic activities that enable it to distinguish its services from much larger agencies. To better utilize its IT resources, Surdell and Partners migrated its on-premises Oracle environment to the Oracle Cloud. This has enabled Surdell and Partners to improve processes, reduce operations costs, deliver its SaaS solutions faster, and drive business growth for its customers.
"Oracle Database Cloud is a perfect solution for us," said Adam Kanzmeier, Director of Customer Intelligence and Strategic Consulting, Surdell and Partners. "It offloads resource-intensive infrastructure and database administrator work, enabling us to focus on our core business, and that has allowed us to provide better service and more flexibility for our clients. We can now provide our customers with capacity and resources on demand with the click of a button, not in days, weeks or even longer, as would have been the case in pre-cloud days. With nearly instant access to information, we're helping our clients become predictive rather than reactive, resulting in better decisions for their business."
Through Oracle Cloud, Surdell and Partners dramatically improved its speed to market. With Oracle's unmatched multitenant database capabilities, Surdell and Partners can manage many databases as a single unit, significantly reducing operations costs. Oracle Application Express provides a simple, single-tier architecture for rapid database application development, which has allowed Surdell and Partners to build mobile-enabled cloud applications easily. As a result, Surdell and Partners' customers can conveniently access real-time information from their mobile devices. Surdell and Partners' solutions running on Oracle Cloud Platform have also enhanced its credibility and instilled confidence with its customers.
With its customers' data in the Oracle Cloud, and not on its premises, Surdell and Partners has been relieved of questions about security audits and processes that were standard when its infrastructure was on premises. In their due diligence, Surdell and Partners looked at other cloud solutions and although Amazon hosts Oracle Database, only Oracle provides the bundle of database services, professional management and database back-up they needed.
"Many of our clients are marketing lines of business in retail companies, and the struggle they often face is getting the information they need to make key business decisions, whether it's about inventory, pricing, timing of a campaign, etc. They need to make real-time decisions and often their internal IT departments don't have the bandwidth to support their needs. In the past, an option was for a retailer's IT department to bring in contractors, but that typically adds the additional burden of getting them up-to-speed. With Oracle Database Cloud, we can take the burden off of our clients' IT departments and provide much more flexibility to our customers to access the information they need when it's needed," added Kanzmeier.
The integrated Oracle Cloud Platform solution Surdell and Partners chose consisted of Oracle Database Cloud, Oracle Application Express and Oracle Database Backup Service and it has been using this solution since the summer of 2015.
Oracle Cloud Platform provides developers, IT professionals, and business users with a comprehensive, integrated portfolio of platform services that enables them to innovate faster, increase productivity and lower costs. Customers use Oracle Cloud Platform to integrate existing technology with next-generation cloud services, accelerate application development and deployment and lead business transformation. More than 4,100 customers are already using the Oracle Cloud Platform to transform their businesses. The Oracle Cloud Platform is part of the Oracle Cloud, which continues to show strong adoption, supporting 70+ million users and more than 34 billion transactions each day. It runs on more than 50,000 devices and more than 800 petabytes of storage in 19 data centers around the world.
Part of Oracle Cloud Platform, Oracle Database Cloud and Oracle Database Exadata Cloud provide extensive data management capabilities and extreme performance options in the cloud for deployment of business-critical workloads.
- Oracle Cloud Platform
- Oracle Database Cloud
- Surdell & Partners
- Join Oracle Cloud on Facebook and follow on Twitter
Oracle offers a comprehensive and fully integrated stack of cloud applications and platform services. For more information about Oracle (NYSE: ORCL), visit oracle.com.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
Results Show Hackers Access Other Apps, Download and Crack Encrypted Files, and Attempt to Cover Their Tracks
CAMPBELL, Calif. – Bitglass, the Total Data Protection company, released the results of its second annual "Where's Your Data" experiment, designed to help organizations understand what happens to sensitive data once it has been stolen. For Project Cumulus, Bitglass researchers created a digital identity for an employee of a fictitious retail bank, a functional web portal for the bank, and a Google Drive account, complete with real credit-card data. The team then leaked "phished" Google Apps credentials to the Dark Web and tracked activity across the fictitious employee's online accounts. Within the first 24 hours, there were five attempted bank logins and three attempted Google Drive logins. Files were downloaded within 48 hours of the initial leak. Bitglass' Cloud Access Security Broker (CASB) monitoring showed that over the course of a month, the account was viewed hundreds of times and many hackers successfully accessed the victim's other online accounts.
The Bitglass Threat Research Team created a complete online persona for an employee of a fictitious bank and pretended that the employee's Google Drive credentials were "stolen" via a larger phishing campaign. Bitglass researchers populated the dummy Google Drive account with fake bank data, including several files that contained real credit card numbers and work-product. What the visitors didn't know was that the Bitglass CASB had been deployed in monitor-only mode. Files were embedded with Bitglass watermarks, and all Google Drive activities -- from logins to downloads -- were monitored by Bitglass.
Bitglass observed an immediate spike in activity once the credentials were leaked onto the Dark Web. Hackers tested the fake bank employee's Google Drive credentials in a number of the victim's other accounts and were quick to download files, including those with real credit-card information.
- Over 1,400 visits were recorded to the Dark Web credentials and the fictitious bank's web portal
- One in ten hackers attempted to log in to Google with the leaked credentials
- 94 percent of hackers who accessed the Google Drive uncovered the victim's other online accounts and attempted to log into the bank's web portal
- 12 percent of hackers who successfully accessed the Google Drive attempted to download files with sensitive content. Several cracked encrypted files after download.
- 68 percent all logins came from Tor-anonymized IP addresses
Hackers Modify Their Techniques
In the company's first data experiment, conducted a year ago, the Bitglass team leaked watermarked documents onto the Dark Web. The files were viewed 200 times in the first few days, but the frequency of downloads quickly decreased. In the prior experiment, few downloads used any form of anonymization via Tor, which made them easy to track. After an eight-month quiet period, Bitglass researchers noticed a large number of downloads via Tor late last year. This, coupled with the high rate of Tor usage in the bank experiment, suggests hackers are becoming more security conscious, realizing that they need to mask IPs when possible to avoid getting caught.
"Our second data-tracking experiment reveals the dangers of reusing passwords and shows just how quickly phished credentials can spread, exposing sensitive corporate and personal data," said Nat Kausik, CEO, Bitglass. "Organizations need a comprehensive solution that provides a more secure means of authenticating users and enables IT to quickly identify breaches and control access to sensitive data."
- Hackers came from more than 30 countries across six continents
- Percentages of the countries with non-Tor visits to the bank web portal are as follows:
- Russia: 34.85 percent
- U.S.: 15.67 percent
- China: 3.5 percent
- Japan: 2 percent
Information about the experiment can be found here:
Register for our webinar "Project Cumulus: Behind the Experiment," live on February 24 at 10am PT | 1pm ET.
Bitglass is a Cloud Access Security Broker that delivers innovative technologies that transcend the network perimeter to deliver total data protection for the enterprise -- in the cloud, at access, on mobile devices, on the network and anywhere on the Internet. Bitglass was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution. Bitglass is based in Silicon Valley.
Annual Cyber Risk Report Reveals Attack Sophistication on the Rise While Organizations Struggle to Keep Pace With Dissolving Perimeter and Diversifying Platforms
As the traditional network perimeter disappears and attack surfaces grow, security professionals are challenged with protecting users, applications and data -- without stifling innovation or delaying enterprise timelines. This year's Cyber Risk Report examines the 2015 threat landscape in this context, providing actionable intelligence around key areas of risk including application vulnerabilities, security patching and the growing monetization of malware. The report also highlights important industry issues such as new security research regulations, the "collateral damage" from high profile data breaches, shifting political agendas, and the ongoing debate over privacy and security.
"In 2015, we saw attackers infiltrate networks at an alarming rate, leading to some of the largest data breaches to date, but now is not the time to take the foot off the gas and put the enterprise on lockdown," said Sue Barsamian (@suebarsamian), senior vice president and general manager, HPE Security Products, Hewlett Packard Enterprise. "We must learn from these incidents, understand and monitor the risk environment, and build security into the fabric of the organization to better mitigate known and unknown threats, which will enable companies to fearlessly innovate and accelerate business growth."
Applications are the New Battlefield
While web applications pose significant risk to enterprises, mobile applications present growing and distinctive risks.
- Mobile applications' frequent use of personally identifiable information presents significant vulnerabilities in the storage and transmission of private and sensitive information.1
- Approximately 75 percent of the mobile applications scanned exhibited at least one critical or high-severity security vulnerability, compared to 35 percent of non-mobile applications.1
- Vulnerabilities due to API abuse are much more common in mobile applications than web applications, while error handling -- the anticipation, detection, and resolution of errors -- is more often found in web applications.1
Patch or Perish
Software vulnerability exploitation continues to be a primary vector for attack, with mobile exploits gaining traction.
- Similar to 2014, the top ten vulnerabilities exploited in 2015 were more than one year old, with 68 percent being three years old or more.3
- In 2015, Microsoft Windows represented the most targeted software platform, with 42 percent of the top 20 discovered exploits directed at Microsoft platforms and applications.3
- 29 percent of all successful exploits in 2015 continued to use a 2010 Stuxnet infection vector that has been patched twice.3
Monetization of Malware
Malware has evolved from being simply disruptive to a revenue-generating activity for attackers. While the overall number of newly discovered malware samples declined 3.6 percent year-over-year, the attack targets shifted notably in line with evolving enterprise trends and focused heavily on monetization.
- As the number of connected mobile devices expands, malware is diversifying to target the most popular mobile operating platforms. The number of Android threats, malware, and potentially unwanted applications have grown to more than 10,000 new threats discovered daily, reaching a total year-over-year increase of 153 percent. Apple iOS represented the greatest growth rate, with a malware sample increase of more than 230 percent.2
- Malware attacks on ATMs use hardware, software loaded onto the ATM, or a combination of both to steal credit card information. In some cases, attacks at the software level bypass card authentication to directly dispense cash.2
- Banking Trojans, such as variants of the Zbot Trojan, continue to be problematic despite protection efforts. More than 100,000 of these were detected in 2015. 2
- Ransomware is an increasingly successful attack model, with several ransomware families wreaking havoc in 2015 by encrypting files of consumer and corporate users alike. Examples include: Cryptolocker, Cryptowall, CoinVault, BitCryptor, TorrentLocker, TeslaCrypt, and others.2
Actionable Intelligence & Recommendations
- Apps are the New Battlefield: The network perimeter is vanishing; attackers have shifted focus to target applications directly. Security professionals must adjust their approach accordingly, defending not just the edge but the interactions between users, applications and data regardless of location or device.
- Patch or Perish: 2015 was a record year for the number of security vulnerabilities reported and patches issued, but patching does little good if end users don't install them for fear of unintended consequences.4 Security teams must be more vigilant about applying patches at both the enterprise and individual user level. Software vendors must be more transparent about the implications of their patches so that end-users aren't afraid to deploy them.
- Monetization of Malware: Ransomware attacks targeting the enterprise and individuals are on the rise, requiring both increased awareness and preparation on the part of security professionals to avoid the loss of sensitive data. The best protection against ransomware is a sound backup policy for all important files on the system.
- Prepare for Shifting Politics: Cross-border agreements pose challenges for enterprises struggling to keep their systems secure and in compliance. Organizations must follow the changing legislative activity closely and maintain a flexible security approach.
Related Videos, Infographic and Webinar
- Cyber Risk Report 2016 Videos: HPE Security Products senior vice president and general manager, Sue Barsamian provides an overview of the threat landscape and a behind the scenes discussion with three of the security researchers that dedicate their careers to helping the security community better understand the threats their organization's face.
- Infographic: This year's Cyber Risk Report details the evolving nature of cybercrime as well as the developing legislation meant to curtail it. Get the key findings and recommendations of this innovative research at a glance.
- Webcast: Register for the on-demand webcast on March 14 at 11a.m. PT to hear how HPE Security Research talks about the key themes and the recommendations you can apply.
Published by HPE Security Research, the annual report offers in-depth industry data and analysis on the most pressing security issues, providing business leaders and security professionals with actionable intelligence to better protect their digital enterprises and drive fearless innovation.
The full methodology is detailed in the report. HPE will be addressing the latest trends in enterprise security at the RSA Conference 2016, taking place February 29 - March 4 in San Francisco. Additional information about HPE at this year's conference is available here. Keep up with event happenings by following the event hashtag #RSAC and follow @HPE_Security.
About HPE Security
HPE Security helps organizations protect their business-critical digital assets by building security into the fabric of the enterprise, detecting and responding to advanced threats, and safeguarding continuity and compliance to effectively mitigate risk. With an integrated suite of market-leading products, services, threat intelligence and security research, HPE Security empowers organizations to balance protection with innovation to keep pace with today's idea economy. Find out more about HPE Security at https://www.hpe.com/us/en/solutions/protect-digital.html.
Join HPE Software on LinkedIn and follow @HPE_Software on Twitter. To learn more about HPE Enterprise Security products and services on Twitter, please follow @HPE_Security and join HPE Enterprise Security on LinkedIn.
About Hewlett Packard Enterprise
Hewlett Packard Enterprise is an industry-leading technology company that enables customers to go further, faster. With the industry's most comprehensive portfolio, spanning the cloud to the data center to workplace applications, our technology and services help customers around the world make IT more efficient, more productive and more secure.
1 HPE Security Fortify on Demand Findings included in the HPE Cyber Risk Report 2016, HPE Security Research, February 2016, software analysis section, pages 54-63
2 HPE Cyber Risk Report 2016, HPE Security Research, February 2016, malware section, pages 34-51
3 HPE Cyber Risk Report 2016, HPE Security Research, February 2016, exploits section, pages 30-33
4 HP Security Briefing, Episode 22, June 2015
This document contains forward-looking statements within the meaning of the safe harbor provisions of the Private Securities Litigation Reform Act of 1995. Such statements involve risks, uncertainties and assumptions. If such risks or uncertainties materialize or such assumptions prove incorrect, the results of Hewlett Packard Enterprise could differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements, including any statements of the plans, strategies and objectives of Hewlett Packard Enterprise for future operations; other statements of expectation or belief; and any statements of assumptions underlying any of the foregoing. Risks, uncertainties and assumptions include the possibility that expected benefits may not materialize as expected and other risks that are described in Hewlett Packard Enterprise's filings with the Securities and Exchange Commission, including but not limited to the risks described in Hewlett Packard Enterprise's Registration Statement on Form 10 dated July 1, 2015, as amended August 10, 2015, September 4, 2015, September 15, 2015, September 28, 2015 and October 7, 2015. Hewlett Packard Enterprise assumes no obligation and does not intend to update these forward-looking statements.
TrueNAS Provides 3x-4x Faster Backups Than Using Local Disk
SAN JOSE, Calif. – iXsystems, an industry leader in storage and servers driven by Open Source, announced that it has partnered with Veeam® Software, innovative provider of Availability for the Always-On Enterprise™, giving iXsystems' clients a VM-aware backup and restore solution for their TrueNAS unified storage infrastructure. iXsystems is a Veeam Technology Alliance Partner and is pleased to be able to integrate and validate our solutions with Veeam's availability solutions, resulting in joint product offerings for our mutual customers.
Analysts have shown that TrueNAS storage arrays are leading the industry in feature, performance, and capacity per dollar, offered at less than half the price of alternatives. Combining TrueNAS with Veeam lets administrators keep their backup data on an enterprise storage array instead of paying for a server with local storage. Therefore administrators can utilize their same procedures to protect their VMs, while also gaining the benefits of TrueNAS' wide variety of storage services, protocols, and superior performance and advanced data protection.
Its modular hardware components, high speed read and write caching, the ability to scale storage painlessly, ease of management, and cost per gigabyte are additional factors that make TrueNAS the right solution for keeping Veeam backup data. TrueNAS is based on OpenZFS and gives customers a self-healing file system for their backup storage, which means that their backup data stays pristine and secure.
"The Veeam backups are working great," said Todd Lamonia, President and CEO of IT Worldwide Services. "I am using Veeam's Direct SAN Access transport mode which connects directly to the TrueNAS using iSCSI which improves the data transfer throughput and reduces the amount of time to backup each VM significantly."
Minimizing downtime and data loss is essential for IT Worldwide Services. With data growing at approximately 50% annually, meeting recovery objectives became a challenge, so they deployed Veeam® Backup & Replication™ and TrueNAS. TrueNAS ensured that Veeam could quickly backup IT Worldwide Services' VMs with no change to existing procedures.
Since deploying their TrueNAS system and implementing Veeam Backup and Replication™, IT Worldwide services saw the time needed for their daily maintenance tasks drop by 75% and their application loading times were twice as fast.
TrueNAS uses TrueCache™ to combine RAM and nonvolatile flash with high-density spinning disks to save you money when increasing capacity and gives you blazing performance for backups. This and its modular, toolless design improve backup infrastructure costs. As backup needs grow, TrueNAS allows for seamless capacity expansion, and increasing the performance of TrueNAS is as simple as upgrading storage controllers, all without interrupting backup tasks.
"Your data is critical to your business. Data continues to grow rapidly and protecting it is more demanding. You can think of data protection like insurance: you only need it when things go wrong," said Gary Archer, Director of Storage Marketing at iXsystems. "TrueNAS ensures a customer's VMs are not corrupted, gives their VMs solid-state performance with spinning-disk capacity, integrates with VMware vCenter, and supports VAAI. Integrating with Veeam also ensures that a customer's VM backups stay pristine."
By leveraging decades of expertise in hardware design, its contributions to many Open Source software communities, and corporate stewardship of leading Open Source projects (FreeNAS and PC-BSD), iXsystems has become an industry leader in building innovative storage solutions and superior enterprise servers for a global marketplace that relies on open technology.
Thousands of companies, universities, and government organizations have come to rely on iXsystems' storage, servers, and consultative approach to doing business. Headquartered in the heart of Silicon Valley since its founding in 1996, through incorporation into BSDi in 2000, and expansion as iXsystems in 2005, the dedication to white-glove customer service, industry-leading support, and transparent technological contributions has never wavered and continues to help lay the foundation for a new era powered by open technology.
Innovations in Next-Generation Firewall Platform and New Security Segmentation Service Empower Customers to Better Defend Against Advanced Threats
SAN JOSE, Calf. – As global companies embrace new digital business opportunities, cybersecurity is regularly cited as a top concern impeding growth and innovation. To give businesses the confidence to pursue digital opportunities to enable growth, Cisco (NASDAQ: CSCO) has made security a top priority and is today announcing innovations to its flagship Next-Generation Firewall. The goal: to deliver leading protection to keep organizations safer.
Cisco's first fully integrated, threat-focused Cisco Firepower™ Next-Generation Firewall (NGFW) marks a significant departure from the focus of legacy NGFWs on application control. By focusing instead on threat defense, Cisco will help organizations better manage and minimize risk. Think of it as legacy NGFWs protecting "homes" by securing windows and doors, whereas Cisco's approach is to identify, detect and protect against would-be burglars no matter how they try to gain access to a property.
Cisco is also introducing the Cisco Security Segmentation Service, an advisory service that helps organizations create security controls that enhance compliance, breach containment, threat detection, content security and data loss prevention across their IT infrastructure.
Both offerings are aimed at protecting against bold and resilient threats from increasingly sophisticated cyberattacks.
Firepower NGFW's Threat-Focused Capabilities Set It Apart
Traditional NGFWs continue to focus on application enablement and control, which limit the ability to protect against the breadth of threats in today's business environment. Cisco's approach is different. Cisco empowers customers to easily manage and dynamically update protection from the endpoint to the network, and out to the cloud, by going beyond applications and identifying and stopping threats, both known and unknown.
Cisco's Firepower NGFW is the industry's first to link contextual information about how users are connecting to applications, with threat intelligence and policy enforcement. Gaining this level of visibility across a business environment accelerates threat detection and response, and enhances protection.
Cisco's NGFW can also automate and fine-tune security measures to rapidly harden defenses, based on its ability to see vulnerabilities, assets and threats. The consistent and pervasive advanced security capabilities provide protection that point solutions cannot deliver.
Firepower NGFW Integrates Controls and Attack Detection and Response to Enable Business Growth
The new Cisco Firepower™ NGFW significantly improves the speed, simplicity and effectiveness of attack detection and response. It combines Cisco's stateful firewalling technology and industry-leading threat services in a single solution. The threat services take protection to a new level, beyond application visibility and control, and include Next-Generation Intrusion Prevention System, Advanced Malware Protection and reputation-based URL filtering.
Cisco's integrated NGFW incorporates Cisco and complementary third-party solutions and uniquely enables intelligence and context to be shared between solutions. Now businesses can effectively correlate previously disparate pieces of information to identify and stop advanced attacks more rapidly wherever they may be. This has competitive implications for organizations looking to deploy cloud, virtual environment, new Internet of Things (IoT) solutions and mobile endpoints to securely drive new business opportunities.
New Firepower Appliances Launched for High-Performance Applications
Cisco is releasing new Cisco Firepower 4100 Series appliances for high-performance applications within mid- to large-sized organizations. They are the highest performing, density-optimized appliances in their class, capable of high-throughput and low latency threat inspection, sufficient for high-frequency trading and data center deployments. They are among the first with 40GbE network connectivity in a compact, one rack-unit space.
Firepower Management Center Integrates Security Solutions in Single Nerve Center
The new Cisco Firepower Management Center serves as the nerve center for the Firepower NGFW, providing a rich, unified management console. It features shared intelligence, shared contextual awareness, and consistent policy enforcement for the Cisco Firepower NGFW plus other Cisco security and network solutions.
Complementary third-party solutions, beginning with Radware for Distributed Denial of Service (DDoS), also are integrated through the Cisco Firepower Management Center. The management center provides rich, comprehensive management, delivering information and insight in a single console. Other NGFWs often require users to switch between three or more consoles to gain the same detail.
Security Segmentation Service Customizes Design to Manage Risk
The Cisco Security Segmentation Service is an advisory service that designs a custom-tailored framework that reduces risk, simplifies audit profiles, secures data and helps businesses comply with board-level requirements.
Cisco Services has developed the Security Segmentation Service to help organizations create a strategic infrastructure segment strategy. Cisco's approach is customer-specific, extends beyond the network, and incorporates reusable design patterns to apply security controls across compliance, breach containment, threat detection, content security, data loss prevention, and other distinct security disciplines.
Opportunities for Channel Partners
These new security offers provide Cisco channel partners with an expanded end-to-end portfolio and represent additional profitability opportunities. When combined with Cisco's threat-centric security approach, channel partners are able to simplify and reduce costs of managing their customers' security environments through a unified management platform. They also can increase cross-sell opportunities enabled by strong network integration, and drive new revenue streams through new services and licensing options.
In addition, Cisco is investing in developing security practice acceleration programs, training and enablement for both products and services so channel partners can fuel growth and increase profitability.
"Attackers are getting bolder and coordinating their efforts. The industrialization of hacking is putting businesses on the defensive against a growing group of adversaries that steal information for profit. In the last three years, Cisco has spent billions in strategic cybersecurity acquisitions and internal innovations to help stay ahead of the world's most malicious attacks that threaten organizations. For businesses to get real value and manage risk as they implement digital operational models, their security platforms need to integrate into the business and support growth opportunities. This means taking a threat-centric approach, with protection from the mobile endpoint to the cloud."
"The Cisco Firepower NGFW acts as a unifying platform, integrating Cisco and third-party security solutions for increased correlation and context. The result is better protection, and faster detection and response to advanced threats. The Cisco Segmentation Service will help our customers build a dynamic, resilient secure infrastructure to combat threats in real-time."
-- David Goeckeler, Senior Vice President and General Manager, Security Business Group, Cisco
Introducing Cisco Firepower 4100 Series Next-Generation Firewall
Take a Strategic Approach to Security Segmentation
Follow Cisco on Twitter @CiscoSecurity
Like Cisco Security on Facebook
Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. For ongoing news, please go to http://thenetwork.cisco.com.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company.
Advances Address Untapped Opportunity in Data Preparation, Data Discovery, and Harmonization of Sources Including Automated Pattern-Matching Across Diverse Sources for Faster Insights
MENLO PARK, Calif. – ClearStory Data, the company bringing business-oriented Data Intelligence to everyone through fast-cycle, disparate data analysis, today announced a breakthrough advancement to its industry-first data inference and Intelligent Data Harmonization™ capabilities called Infinite Data Overlap Detection (IDOD). With this innovation and the research behind it, ClearStory's Spark-based, business-ready analytics solution now detects and infers data patterns and customer-specific data types for all values for all data types in every source that a user connects to as part of an analysis. The benefit to organizations is more automation in data discovery and even faster blending of sources to further eliminate traditional data modeling complexities and speed business insights.
Earlier this month, Gartner named ClearStory Data a Visionary in its debut in the Magic Quadrant for 2016 Business Intelligence and Analytics Platforms.* As the MQ report notes: "Market awareness and adoption of smart data discovery will extend data discovery to a wider range of users, increasing the reach and impact of analytics. These emerging capabilities facilitate discovery of hidden patterns in large, complex and increasingly multi-structured datasets, without building models or writing algorithms or queries."
ClearStory's IDOD advancement addresses exactly the types of complexities that are prevalent across all Global 2000 organizations. The new ability to blend and harmonize "categorical value" data sources that are highly dimensional solves the root cause for the biggest delays and IT challenges in speeding business insights. Organizations benefit from more precise insights on large, complex data sources including ones with a high degree of customer-specific information, which is common in companies across industries and contributes to a rise in data analysis complexity.
ClearStory's new, large-scale IDOD capability is used to determine how complex data from multiple sources should be blended, viewed, and visualized on the fly. IDOD plays the role of data modeling advisor to the business user, enabling them to blend data together and discover insights quickly, without data modeling expertise and days or weeks of manual effort. ClearStory's approach replaces traditional methods of manually matching data or and data relationships across diverse sources. Traditional approaches are not sustainable as businesses have reached an urgent need to see business insights faster.
In primary research conducted in October 2015, nearly 70 percent of companies polled report they need access to refreshed data insights either hourly or daily. Eighty-six percent of them struggle with this challenge on a regular basis where four or more data sources and file formats are involved for analysis. A majority of respondents (68 percent) report they experienced "data blindness" at least once per week because they could not spot "what's happening now, and why" soon enough, impacting their ability to make smart decisions and perform their jobs well.
The most difficult part of this problem being addressed has always been the customer-specific attributes and distinct customer values and nuances of data such as product names, category names, distinct phone numbers, product codes, and unique brand attributes; all which are prevalent across any G2000 company as well as small to medium-sized businesses. Such data and attributes have traditionally required heavy manual data wrangling to reconcile and inspect many thousands to millions of unique values with integrity and consistency.
Take one of these data sources and add to that more such sources that need to be blended together, and what results is a long, painful and error-prone process. As the data sources update, the subsequent repeated headache of preparing and modeling all the data relationships becomes unsustainable for even sophisticated data stewards. The business impact is major delays in reaching insights which ClearStory's new smart machine-based approach directly addresses.
Highlights of the new Infinite Data Value Overlap capability include:
- Smarter Data Inference: Detects and infers the overlap of categorical values for all data types across hundreds, millions or even billions of unique values for attributes across all the source data being analyzed;
- Infinite Types: No limits on how many unique custom data types, custom dimensions, or values can be recognized in each source for data inference and data harmonization;
- Extensibility: New data types can be easily patterned and plugged into the capability for increased automation of vertical industries' custom data types. This brings a powerful way to address vertical-specific and customer-specific data nuances and complexities. Further, it allows the ClearStory system to learn customer-specific attributes that further accelerate reaching insights and significantly reduce manual and complex data modeling.
- Granular Data Scoring and Data Relationships - Detailed granular scores are calculated for each custom data type and the values within are used to determine the right way to automatically blend data sources together into a holistic, harmonized view. Even data sources with hundred of millions of unique values per attribute can be intelligently inferred and automatically scored and matched to enable users to reach fast meaningful insights;
- Simple User Experience: As in all areas of the ClearStory Data solution, ease of use and an intuitive user experience is of the utmost importance. With IDOD, ClearStory extends its data inference and Intelligent Data Harmonization™ user interface and experience to surface the power of the new, advanced processing engine in a simple, user-friendly way so users can be self-sufficient on even complex data sources.
"ClearStory's introduction of automated, machine-based advancements in data preparation, discovery and data harmonization continues to build on its Spark-based core IP to process large-scale data at high speeds," said Dr. Tim Howes, CTO of ClearStory Data. "By adding the advanced IDOD capability to automatically recognize infinite categories, values and granularities in data sources, we speed the cycle of data to insights by addressing a significant pain point that enterprises across all industries face today: the intricate, tedious task and massive time sink caused by manual data wrangling on large, complex data."
ClearStory Data's new capabilities are offered as a core part of the ClearStory solution and customers can experience it as part of their standard offering. For more advanced users, the data extensibility feature can also be made available as a premium API-based service.
*Gartner, Inc., "Magic Quadrant for Business Intelligence and Analytics Platforms" by Josh Parenteau, Rita L. Sallam, Cindi Howson, Joao Tapadinhas, Kurt Schlegel, Thomas W. Oestreich, February 4, 2016.
About ClearStory Data
ClearStory Data is bringing Data Intelligence to everyone to accelerate the way business leaders get answers from more data, on a faster cycle, across any number of disparate data sources. ClearStory Data's solution simplifies data access to internal and external sources, automates data harmonization via Intelligent Data Harmonization™ across disparate data, enables fast, collaborative exploration, and reduces business wait time for insights via Interactive, Collaborative StoryBoards™. ClearStory Data lets business users be more self-reliant in reaching richer, faster insights. Its end-to-end solution includes an integrated Spark-based data processing platform and an incredibly simple user application model for business consumption of insights. The company is headquartered in Menlo Park, CA and backed by Andreessen Horowitz, DAG Ventures, Google Ventures, Khosla Ventures and Kleiner Perkins Caufield & Byers (KPCB).