Fall World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 29, Issue 3

Full Contents Now Available!

Jon Seals

Regulated Industries Nearly Triple Cloud Adoption Rate Since 2014

CAMPBELL, Calif. – Bitglass, the Total Data Protection company, today announced the results of its second annual Cloud Adoption Report. The global report was compiled through an automated, cloud-based analysis of real-world traffic data from 113,000 organizations and more than 20 industry verticals, including finance, healthcare, education and government. Overall, cloud application adoption across all industries increased more than 71 percent in 2015. Among the most notable findings: cloud adoption in regulated industries experienced stronger-than-anticipated growth, up from 15 percent in 2014 to 39 percent in 2015.

The report reveals which industries have made the most progress in migrating from on-premises to public cloud applications and highlights which of these industries are following security best practices.

"Industries like education and communications are leading the move to cloud, but the surprise is that large corporations, even in heavily regulated industries, are gaining confidence in using cloud apps," says Nat Kausik, CEO of Bitglass. "The emergence of third-party security services from cloud access security brokers is helping to fill cloud security gaps and to make public cloud a reality for all industries."

Key findings:

  • Regulated and Unregulated Industries See Rapid Growth in Adoption
    While cloud adoption has doubled year-over-year in unregulated industries, it has nearly tripled in regulated industries like financial services and healthcare -- a massive change from 2014. Cloud adoption in regulated industries has jumped from 15 percent in 2014 to 39 percent and adoption in unregulated industries has jumped from 26 percent last year to 50 percent this year.
  • Education Setting the Pace for Cloud Adoption, but Security Still a Concern
    While education is moving to the cloud faster than any other vertical, with an overall adoption rate of 83 percent, the industry has not shown a strong preference for one cloud app over another, with 42 percent on Google apps and 41 percent on Office 365. Furthermore, only 6.8 percent of the institutions with Google Apps and 13 percent of institutions with Office 365 use single sign-on, the most basic cloud security function.
  • BYOD and Mobile Intertwined with Healthcare Industry's Need for Cloud Applications
    Healthcare has grown to 37 percent cloud adoption, up from only eight percent in 2014, but remains a laggard due in part to HIPAA compliance concerns. Finding security solutions continues to be a challenge for the healthcare industry due to privacy concerns and limited applicability of Mobile Device Management solutions, where doctors have multiple hospital affiliations but only one device.
  • Large Government Organizations Moving to Cloud More Rapidly than Smaller Counterparts
    47 percent of U.S. government organizations, including state and local governments and contractors have adopted cloud apps. A surprisingly high proportion of government organizations with over 1000 employees, fifty-three percent, have adopted cloud apps. Twenty-seven percent of government organizations sampled use Office 365 and 19 percent use Google Apps.
  • Other Leaders and Laggards in the Cloud Adoption Continuum
    Media and entertainment (55.5 percent), communications (61 percent) and technology sectors (51 percent) all showed high adoption rates, while the financial sector (37.5 percent) made up significant ground year-over-year. While finance made great strides, the industry will likely continue to lag behind others due to high compliance and security requirements.

To access the Bitglass Global Cloud Adoption Report, visit: http://pages.bitglass.com/BitglassReport_CloudOdyssey.html

About Bitglass
Bitglass (bitglass.com) is a Cloud Access Security Broker that delivers innovative technologies that transcend the network perimeter to deliver total data protection for the enterprise -- in the cloud, at access, on mobile devices, on the network and anywhere on the Internet. The company was recently named a 2015 Gartner Cool Vendor in Audit & Compliance. Bitglass was founded in 2013 by a team of industry veterans with a proven track record of innovation and execution. Bitglass is based in Silicon Valley.


Seventy-One Percent of IT Professionals Expect Their Organizations to Be More Secure in 2016

AUSTIN, Texas – Spiceworks, the professional network for IT, today announced the results of a new survey that explores IT professionals' perceptions of the biggest IT security threats and the steps they're taking to prevent security incidents and breaches within their organizations. The study "Battling the Big Hack" found that while 80 percent of organizations experienced a security incident in 2015, 71 percent of IT professionals expect their organizations to be more secure in 2016.

"The results show that IT professionals feel responsible for the security of their organization's data, and in a world where technology is getting more complex and organizationally distributed, their jobs aren't getting any easier," said Sanjay Castelino, VP of Marketing at Spiceworks. "In reaction to these challenges, they're being more proactive about preventing security incidents and breaches by learning about new threats, regularly educating employees about risks, and investing in more advanced security solutions." 

IT professionals brace for external security threats in 2016

The widespread nature of security threats is forcing IT professionals to evaluate their exposure to common and not-so-common issues they may face in 2016. IT professionals were asked to detail the most common security incidents their organizations experienced in 2015 and compare them to the security challenges they expect in 2016.

  • Malware attacks were reported by 51 percent of IT professionals in 2015 followed by phishing and spyware incidents at 38 and 34 percent respectively. This aligns closely to the percent of organizations that are concerned about these incidents in 2016. However, 53 percent said they're concerned about ransomware in 2016, but only 20 percent of organizations experienced a ransomware incident in 2015.
  • Thirty-nine and 37 percent of IT professionals also expressed concern about data theft and password breaches respectively, but only five percent of organizations experienced an incident of data theft in 2015 and only 12 percent experienced a password breach.
  • IT professionals were also asked to disclose their concerns regarding individual hackers or groups. Forty-nine percent said they're concerned about independent hackers, 36 percent cited rogue employees, and 25 percent said organized crime groups. Only 12 percent said they're concerned about cyber-terrorist groups and state-sponsored hackers, and 10 percent indicated concern for hacktivist groups.

Internal threats represent a significant IT security challenge

The fear of IT security incidents goes well beyond external threats. In fact, 80 percent of surveyed IT professionals indicated that end users represent the biggest challenge when it comes to IT security due to a limited understanding of security issues and resistance to security solutions and policies. Additionally, 48 percent of IT professionals believe "shadow IT," the deployment of technology by employees without approval from the IT department, is a risk to their organization.

IT professionals are also concerned about devices that have access to company data but provide less control to protect end users from breaches, such as mobile devices. When asked which network-connected end points are at risk of a security breach in 2016, 81 percent of IT professionals indicated laptops and 73 percent indicated desktops, but smartphones and tablets weren't far behind at 70 and 62 percent respectively. Nearly 50 percent of IT professionals are also concerned about network-connected IoT devices.

In order to protect end users from breaches on various devices in the workplace, 73 percent of IT professionals are enforcing end-user security policies and 72 percent are regularly educating their employees through lessons on topics such as "how to avoid malware" and "how to spot phishing scams." IT professionals are also focused on their own education and ensuring they're up-to-speed on the latest security issues. In fact, 66 percent are taking the time to learn about new threats and 60 percent are regularly evaluating new security solutions. 

Advanced security solutions used to combat threats

Spiceworks' 2016 State of IT report found that security represents IT professionals' most important IT initiative in 2016. As a result, IT pros are preparing to combat internal and external security threats by investing in advanced security solutions in addition to more common IT security tools such as content filtering, firewalls, VPNs, and anti-virus solutions.

When asked how they plan to invest in more advanced solutions in the "Battling the Big Hack" report, 36 percent of IT professionals expect to increase their investment in intrusion detection, 24 percent expect to increase investment in penetration testing, and 22 percent expect to increase investment in advanced threat protection.

"The number one source of a network breach or virus infection are end users that lack an understanding of potential security risks," said CJ Wood, IT director at Decorating Den Interiors. "We have to remember they aren't the IT professionals. It's our job to protect them with comprehensive security tools and make sure they're educated on cyber threats, phishing, spam, and other security issues."

The survey was conducted in October 2015 and included 197 respondents from North America and EMEA. Respondents are among the millions of IT professionals in Spiceworks and represent a variety of company sizes including small-to-medium-sized businesses as well as enterprises. Respondents come from a variety of industries including manufacturing, healthcare, non-profits, education, government, and finance. For more information and a complete list of survey results, visit http://www.spiceworks.com/marketing/it-security/report/.

About Spiceworks Voice of IT
Spiceworks' Voice of IT shares statistics, trends, and opinions collected from millions of IT professionals on the global technology issues that are important to them.

About Spiceworks
Spiceworks is the professional network millions of IT professionals use to connect with one another and thousands of technology brands. The company simplifies how IT professionals discover, buy and manage an estimated $600 billion in technology products and services each year. Headquartered in Austin, Texas, Spiceworks is backed by Adams Street Partners, Austin Ventures, Institutional Venture Partners (IVP), Goldman Sachs, Shasta Ventures and Tenaya Capital. For more information visit http://www.spiceworks.com.

Follow Spiceworks on Twitter: http://twitter.com/spiceworks and connect with Spiceworks on Facebook: http://www.facebook.com/Spiceworks

Spiceworks and Voice of IT are registered trademarks of Spiceworks, Inc. All other names may be trademarks or registered trademarks of their respective owners.

Company Doubles the Number of Contract Customers in 2015 as More Enterprises Adopt Continuous Integration and Continuous Delivery Practices

SAN FRANCISCO, Calif. – Sauce Labs, Inc., provider of the world's largest cloud-based platform for automated testing of web and mobile applications, today announced that its customers have executed more than 400 million tests on its automated testing platform, a four-fold increase in just over 18 months.

"We're in the business of helping our customers accelerate their software development cycles by removing the bottleneck caused by traditional, manual testing," said Charles Ramsey, CEO of Sauce Labs. "Our customers are running more than a million tests per day on our cloud infrastructure to increase their velocity and solidify their competitive edge."

As more and more software development teams shift to Continuous Integration (CI) and Continuous Delivery (CD) methodologies, and with the emergence of the DevOps movement, companies recognize that the only way to optimize these processes is through automated testing. The announcement that the company has surpassed 400 million tests run on its platform underscores the value the market sees in using Sauce Labs -- value that the company's product, sales and leadership teams have worked hard to advance in this past year. 

Other Sauce 2015 milestones and accomplishments include:

Sauce Labs provides a high-performance, cloud-based automated testing platform that is optimized for CI and CD workflows. When tests are automated and run in parallel on virtual machines, testing time is significantly reduced and IT teams no longer need to devote time to managing testing infrastructure. When paired with a CI system, multiple development teams can instantly provision additional testing resources to test web, hybrid and native applications, continuously and affordably. Sauce Labs currently supports more than 700 browser, operating system and device platform combinations.

Helpful Links

About Sauce Labs
Sauce Labs provides the world's largest cloud-based platform for the automated testing of web and mobile applications. Its award-winning service eliminates the time and expense of maintaining an in-house testing infrastructure, freeing development teams of any size to innovate and release better software, faster.

Sauce Labs is a privately held company funded by Toba Capital, Salesforce Ventures, Triage Ventures and the Contrarian Group. For more information, please visit http://saucelabs.com.

TrapX Expands Its North American MSSP Presence With Deception Technology That Enhances Threat Intelligence and Expands Detection Capabilities

SAN MATEO, Calif. – TrapX Security™, a global leader in advanced cybersecurity defense, today announced that SecureData, the leading end-to-end cybersecurity managed service provider specializing in threat intelligence, has entered into a partnership to utilize the TrapX DeceptionGrid™ as part of its expanding portfolio of managed services offerings. The union enhances SecureData's visibility and overall threat detection capabilities, while also bolstering TrapX's position in the North American MSSP space by providing SecureData's customers with the industry's leading deception-based technology.

DeceptionGrid automates the deployment of a network of camouflaged malware traps that are intermingled with real information technology resources. If malware touches DeceptionGrid just once, it sets off a high-confidence alert. Real-time automation isolates the malware and delivers a broad assessment directly to an organization's security operations team.

SecureData security services provide rich, contextualized information and analysis to customers designed to inform them about the key threats they are exposed to, or ones they should watch in the future. When leveraged in tandem with TrapX's deception technology, the combined service provides SecureData customers with an even greater level of next generation threat visibility, allowing them to detect lateral movement and insider based threats. DeceptionGrid technology also further boosts SecureData services by adding a layer of intelligence that is unparalleled in the marketplace.

"The key issues that customers face are understanding if they are at risk of compromise, how to identify when something bad is happening and what to do when it does," said Richard Enderby, Head of Product Management at SecureData Europe. "Offering a managed security service using TrapX Technology allows us to enhance the actionable intelligence we deliver concerning advanced malware and malicious activity within a customer's environment."

"It's no longer a question of 'if' organizations will be targeted by malicious actors, but a matter of 'when,' and traditional perimeter and other security solutions are ill-equipped to deal with today's increasingly stealthy and sophisticated attacks," said Carl Wright, general manager of TrapX Security. "To combat these new threats, both enterprise organizations and MSSPs need to adopt a multi-layered, next-generation security approach that incorporates deception technology in order to provide actionable insights and greatly reduce time to breach detection. We are pleased to be providing SecureData customers with additional intelligence and visibility aimed at bolstering their customers' detection capabilities and alerting them to attacks that often fly under the radar."

Trademark Notice
TrapX Security™ and DeceptionGrid™ are trademarks licensed by TrapX Security, Inc.

Visit the TrapX Website: http://www.trapx.com 

Watch a 60 second introduction to deception technology: http://trapx.com/whitehat-versus-blackhat/

Learn more about DeceptionGrid: http://trapx.com/products/deceptiongrid/

Visit the TrapX blog: http://www.trapx.com/blog/

Follow TrapX on Twitter: @trapxsecurity

Follow TrapX on LinkedIn: https://www.linkedin.com/company/trapx

Like TrapX on Facebook: https://www.facebook.com/pages/TrapX/258804147648401

About TrapX
TrapX Security is a leader in the delivery of advanced threat cybersecurity defense. Our deception-based solutions rapidly detect, analyze and defend against new zero day and APT attacks in real-time. DeceptionGrid provides automated, highly accurate insight into malware and malicious activity unseen by other types of cyber defense. We enable a pro-active security posture, fundamentally changing the economics of cyber defense by shifting the cost to the attacker. The TrapX Security customer base includes global 2000 commercial and government customers around the world in sectors including defense, healthcare, finance, energy, consumer products and other key industries. Learn more at www.trapx.com.

About SecureData
SecureData is a leading provider of managed cybersecurity services. Using our unique Greater Intelligence (GI) platform, bespoke monitoring tools and expert security analysts, we provide customers with rich, contextualised threat information that enables them to adopt an offensive security strategy and respond rapidly to their most urgent and relevant threats. www.secdata.com

New Supercapacitor Meets Highest Environmental and Product Safety Standards

TROY, NY – Paper Battery Company, developer of an innovative supercapacitor-based energy storage and battery enhancement technology, today announced the completion of UL certification for its PowerResponder® product line. PowerResponder is a line of new hybrid supercapacitors with technology enhancements that aim to replace traditional lithium ion batteries in select applications. PowerResponder has also been certified as RoHS compliant, giving it added environmental and safety benefits. The product line will be available in a range of sizes from 90F to 9000F with initial products available to OEM customers by the end of the year. 

"PowerResponder technical innovations, along with high reliability and safety features validated by an independent certified laboratory, make it ideal for consumer and industrial products. Its fast recharge capability enables devices to charge in minutes to be used for hours," said Shreefal Mehta, president and CEO of Paper Battery Company. "By rapidly recharging -- or energy-snacking™ as we like to call it -- customers can now carry just the amount of energy needed for their tasks, with high availability of their device due to the turbo-charging in seconds not hours. The long cycle life of PowerResponder makes it possible to integrate the cell as part of the product, with a life as long as, or longer than, the product it powers."

The PowerResponder hybrid supercapacitor product line from Paper Battery Company leverages advances in technology and form factor to provide a new power source for today's devices, components and accessories. Compared to a typical lithium ion battery, PowerResponder provides 10X higher peak pulse power capacity, 100X greater cycle life, higher reliability in high temperature applications, lower energy density, holds charge with a similar low leakage current and is much safer with no risk of flammability or explosion with runaway heating.

With these advantages, PowerResponder is not subject to the same air cargo concerns and shipping restrictions as lithium ion batteries and can replace lithium ion batteries where safety is a huge concern or where fast charge is valuable for high availability and reliability. The operating voltage range matches that of lithium ion batteries, making it an easy fit to existing electronics with minimal modifications. Compared with existing traditional symmetric supercapacitors (EDLCs), the PowerResponder has an industry-leading 5-7X higher energy density and much higher cell voltage, replacing EDLCs with a cheaper and more compact solution in high energy, high-reliability applications.

The initial target markets for PowerResponder are high-reliability backup power applications, and in consumer and industrial products, replacing existing supercapacitors with cost and volume efficiency, and replacing lithium batteries with added safety benefits. 

The PowerResponder product line is in production now and will be available to OEM customers in the fourth quarter of 2015 in sizes of 90F to 9000F. 

The distinguishing characteristics of PowerResponder include:

  • Industry-leading high energy density
  • Safer than lithium ion batteries with no risk of explosion or internal thermal runaway
  • Drop in replacement for lithium batteries without significant change in electronics
  • Can be fully charged in a minute at full power
  • High reliability under high temperature operation

Paper Battery Company has also released new demonstration videos and application notes on its website showcasing the fast charge functionality. Further product details are available directly through the company's application engineering and sales contacts, Gene Armstrong and Michael Leiber, at sales@paperbatteryco.com.

About Paper Battery Company

The Paper Battery Company has two supercapacitor-based product lines with game-changing ultrathin form factors and industry-leading performance. Its high-energy supercapacitor product line, PowerResponder, can replace batteries or enable companies to use smaller batteries without compromising energy or peak performance. PowerWrapper® is an interstitially placed ultrathin power plane with stable voltage and clean pulse power at all points wherever pulse power is needed.

Supercapacitors can replace batteries or enable companies to use smaller batteries without compromising energy or peak performance. Paper Battery Company's patented form factor solution allows for revolutionary size changes in wearables, accessories, and mobile electronics. The company's products provide scalable voltage, energy and power in a single, ultrathin package. The long life, environmentally friendly device works with existing lithium batteries, reducing waste, and fits in or around existing components.

The company's innovative business model and technology have garnered multiple awards, including the 2015 CES Innovation Award for embedded technology and multiple competitive awards from the NY State Energy and Research Development Authority. For more information go to http://www.paperbatteryco.com

Photos available

Image Available: http://www.marketwire.com/library/MwGo/2015/12/13/11G075578/Images/PBC_ProductionSet_1-ee29e389d9c19f86a612fc02329483a8.jpg
Image Available: http://www.marketwire.com/library/MwGo/2015/12/13/11G075578/Images/ProductCollection_PBC_2-2eaa8bce0dbcbfdca3bbe4e43819cd6f.jpg
Image Available: http://www.marketwire.com/library/MwGo/2015/12/13/11G075578/Images/PBC_ontop_batteries-1c203110b993bdd7886570a17a2a743e.jpg


The Combination of Solace Messaging Technology and DataTorrent RTS Provides Complete Real-Time Analytics Solution

OTTAWA, ON – Solace Systems, a leading provider of data movement technology, today announced a strategic alliance with DataTorrent, a leader in real-time big data analytics and creator of DataTorrent RTS, the world's first open-source, enterprise-grade unified platform for both stream and batch processing on Hadoop.

With the introduction of Hadoop 2.0, an increasing number of companies are looking to move from batch-based to real-time analytics, and investing in new technologies that support the collection, filtration and analysis of real-time information.

Solace's world-class messaging hardware and software enables streaming of very large volumes of information from diverse sources into DataTorrent RTS, giving companies the power to take action in real time and drive greater business value from their data. Solace and DataTorrent both offer elastic capacity to keep up with rising data volumes, and DataTorrent is one of the few applications that can scale to capture as much data as Solace can deliver. Solace can act as a "shock absorber" to eliminate the potentially harmful impact of sudden and unexpected bursts of information, effectively guaranteeing that data is never lost and is always delivered in the same sequence it was sent.

"Competitive pressures in the evolving big data market are driving demand for real-time streaming and data ingestion tools that can seamlessly integrate valuable insights into business operations," said Charu Madan, director of business development, DataTorrent. "The ability to make data-driven business decisions is adding to a company's competitive edge and changing how organizations approach their data strategies."

Solace and DataTorrent have already helped joint customers deploy and integrate their technologies, and as part of this strategic partnership have initiated cooperative engineering efforts to deliver a seamless joint solution.

"DataTorrent's innovative technology gives companies the power to analyze information when it's most valuable, immediately as it's being collected," said Denis King, senior VP, global field operations and strategic alliances, Solace Systems. "Our technology supplies that information at big data scale by aggregating it from a multitude of sources, filtering it and delivering it with high availability, fault tolerance and built-in disaster recovery."

About Solace Systems
Solace provides technology that improves the speed and efficiency with which information flows between applications, connected devices, datacenters and people. High-speed, reliable information sharing is a critical part of modern IT initiatives from accelerating legacy business processes to enabling big data, cloud computing and the Internet of Things. Solace unifies many kinds of data movement so companies can cost-effectively move all of the information associated with better serving customers and making smarter decisions. To learn more visit http://solacesystems.com.

About DataTorrent
DataTorrent is the leader in real-time big data analytics. DataTorrent RTS is the industry's only solution to have a high performing, fault tolerant unified architecture for both data in motion and data at rest. DataTorrent RTS is proven in production environments to reduce time to market, development costs and operational expenditures for Fortune 100 and leading Internet companies. Based in Santa Clara, California, DataTorrent is backed by leading investors including August Capital, GE Ventures, Singtel Innov8, Morado Ventures, and Yahoo co-founder Jerry Yang. For more information, visit http://www.datatorrent.com.

Attivo Certifies as an Intel Security Innovation Alliance Technology Partner

FREMONT, Calif. – Attivo Networks®, an innovator in deception technology for cyber security defense, today announced that its deception-based Attivo BOTsink® solution is now available as an integrated solution with McAfee® Network Security Platform (NSP). The BOTsink solution will add insight into McAfee Network Security Platform providing additional and detailed forensic information on attacker methods and malicious domains. It also provides Snort signatures based on Botnet methods and behavior that can be used to block infected systems from exfiltrating valuable company data or other malicious activities. Attivo also announced that it has joined the Intel® Security Innovation Alliance™ partner program. Under the Innovation Alliance program, Attivo and Intel Security will work together to drive continuous improvement and integrations to simplify an organization's ability to quickly detect, block, quarantine, and remediate against cyber threats.

The Attivo deception platform provides an additional line of cyber defense by detecting inside-the-network threats. Once an attacker is engaged, the events are fed into the Attivo multidimensional correlation engine to generate an attack sequence. As part of this process, the Attivo BOTsink will let the attack continue and talk to the Command and Control (C&C) server through its sinkhole so the attack sequence can be played out and an attacker's methods understood. As the forensic data is collected, the information can be added to McAfee Network Security Platform so that the infection can be isolated and corrective actions taken. This process can be applied to gain an additional understanding of zero-day attacks, HTTPs, and the increasingly challenging issue of phishing.

Phishing has become a favorite method to exploit unsuspecting employees. Social networking had made it easy for attackers to send targeted mail to victims with high rates of engagement success. A benefit of the Intel Security and Attivo integration is the ability to redirect employee C&C communications to the BOTsink solution where access of URL's in a phishing email or malware downloads can be simulated in a controlled sandbox environment. This will enable organizations to determine if the email is malicious and to gain a better understanding of the phisher's intent.

"The Attivo technology brings complementary functionality to McAfee Network Security Platform by providing access to forensic evidence helpful in isolating and responding to a cyber-attack," said D.J. Long, Head of the Intel Security Innovation Alliance. "With the Attivo BOTsink deception platform, our joint customers have access to additional forensic data and reporting that can help them determine an attacker's objectives more quickly and to respond to the attack as needed."

"Integrating with the McAfee Network Security Platforms was a logical extension to the Attivo BOTsink solution, "said Venu Vissamsetty, Vice President of Security Research at Attivo Networks. "The BOTsink multi-correlation engine is designed to analyze and create detailed forensics on cyber attacks. Driven by interest from joint customers, Attivo and Intel Security completed the integration enabling the BOTsink technology and McAfee NSP platform to work seamlessly together to better understand the attackers' intent, provide forensics, send substantiated alerts, and respond to current attacks."


Attivo Networks BOTsink and McAfee NSP Integration Solution Brief

About Attivo Networks
Attivo Networks® is the leader in dynamic deception technology, which in real-time detects intrusions inside the network, data center, and cloud before the data is breached. Leveraging high-interaction deception techniques, the Attivo BOTsink® Solution lures BOTs and APTs to reveal themselves, without generating false positives. Designed for efficiency, there are no dependencies on signatures, database lookup or heavy computation to detect and defend against cyber threats. Attivo solutions capture full forensics and provide the threat intelligence to shut down current and protect against future attacks. www.attivonetworks.com

Follow Attivo Networks: Twitter and Linked In

Attivo Networks and BOTsink are registered trademarks of Attivo Networks in the United States and other countries. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.

Intel the Intel logo, McAfee and the McAfee logo are trademarks of Intel Corporation in the U.S. and/or other countries.

No computer system can be absolutely secure.

OXFORD, UNITED KINGDOM– Sophos (LSE: SOPH), a global leader in network and endpoint security, today announced the acquisition of SurfRight, an innovator in signature-less next-generation endpoint threat detection and response (ETDR) and advanced threat prevention.

Based in Hengelo, the Netherlands, SurfRight has developed a portfolio of technologies that prevent, detect and remediate zero-day and sophisticated attacks by interrupting malware and advanced persistent threat (APT) vectors. SurfRight's real time anti-exploit technology focuses on detecting and preventing the memory manipulations and abuses that allow malicious code to run in the first place. Generic prevention of exploits at this early stage in the attack chain is a key enhancement to endpoint security mechanisms and can help thwart malicious code in the processor and memory. The portfolio also includes anti-espionage technology and enhanced protection against ransomware attacks such as CryptoLocker.

Sophos is recognized as a leader in endpoint protection today, with a growing set of next-generation technologies such as behavior-based analytics, Malicious Traffic Detection that monitors attempted outbound connections to known bad URLs, and Application Reputation which leverages a crowd-sourced big data warehouse managed by SophosLabs to determine whether a downloaded file is known to be good or bad and prompts the user to take appropriate action. This acquisition will further strengthen Sophos' leading endpoint protection technology, by adding complementary new defense tactics, delivered either on premise or in the cloud. 

"SurfRight is a growing, profitable business with an established customer base and proven security capabilities. The team has engineered powerful, innovative next generation endpoint technologies that provide multiple advanced protection and mitigation elements, and yet are simple to use," commented Kris Hagerman, CEO at Sophos. "SurfRight's products embody the same product vision we have at Sophos -- that even the most advanced IT security products should be simple to deploy and manage by organizations of any size. We are excited to welcome SurfRight to Sophos and look forward to introducing the benefits of this leading-edge technology to our global customer and partner base."

Sophos will immediately work to integrate the SurfRight technology into its line of endpoint security solutions. Once the integration work has been completed, Sophos will make the technology acquired from SurfRight available via its global network of more than 15,000 channel partners.

"Sophos offers SurfRight the opportunity to be part of a high-growth industry leader with a world-class channel and specialized product development teams to accelerate the delivery of our technology into IT organizations of all sizes," said Mark Loman, CEO at SurfRight. "We built this new technology from the ground up to address every vector of an APT attack in an auto-responding, coordinated manner, thus enhancing the speed of detection and response. SurfRight's unique next generation endpoint security software complements Sophos' offerings and delivers advanced security capabilities to better protect businesses worldwide."

SurfRight's technology will also further enhance the effectiveness of Sophos' synchronized security strategy, in which multiple components of security protection, including network security and endpoint security, actively and continuously communicate with each other. This innovative approach leads to faster threat detection and a dramatic reduction in the time and resources required to investigate and address security incidents.

"The team at SurfRight has developed cutting-edge technology that interrupts and mitigates even custom-made malware and exploits unknown to traditional antivirus or network-based intrusion detection systems," commented Dan Schiappa, senior vice president of Enduser Security at Sophos. "We recently announced the first delivery of our synchronized security strategy with the next generation XG Series Firewall, and this enhancement to our next generation endpoint solutions further strengthens the 'better together' approach as a key advantage for our customers."

Sophos will continue development and support for SurfRight's existing product line including its popular HitmanPro malware scanning and removal tools, used by more than 20 million users worldwide. Sophos acquired SurfRight for a cash consideration of $31.8 million and will retain all SurfRight employees and the company's office in Hengelo. SurfRight CEO Mark Loman will join the Sophos Enduser Security Group, reporting to Dan Schiappa.

About Sophos
More than 100 million users in 150 countries rely on Sophos' complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage and use, Sophos' award-winning encryption, endpoint security, Web, email, mobile and network security solutions are backed by SophosLabs -- a global network of threat intelligence centers. Sophos is headquartered in Oxford, UK, and is publicly traded on the London Stock Exchange under the symbol "SOPH." More information is available at www.sophos.com.

TORONTO, Canada – A recent survey sponsored by ioFABRIC Inc. revealed dark times for IT budgets in midsized companies, including reduced or stagnant spending, salaries, and services. 

More than 70 percent of respondents said their annual IT budget has stayed the same or even decreased over the past three years, and fewer than 15 percent expect to see any increase in the next three years. More than half said that their lack of budget to accomplish desired upgrades is a major challenge.

The belt-tightening these companies are doing extends to spending less in nearly every category: reduced hardware spending (71 percent), reduced software spending (42 percent), cutting back on outsourcing and professional services (42 percent), and reduced human resources spending including salaries and training (29 percent). 

“Based on this data, concerns about controlling capital expenses and operating expenses cannot be underestimated, and the market needs to send a message of delivering business value and optimizing costs,” said Steven Lamb, co-founder and CEO at ioFABRIC. “While it’s tempting to see this as troubling news for vendors, it’s also an opportunity for companies like ours to educate and help customers better understand how to get the most out of existing systems, how to support their workloads efficiently, and how to drive more value out of existing storage systems and scale in the future with less cost.”

While the survey revealed other general issues with managing storage, some of these challenges are also related to budget constraints. 

Seventy-eight percent of respondents reported reducing downtime is very important to them, and 64 percent said improving performance levels for critical applications is very important. “Downtime and performance problems are frequently the result of aging infrastructures, and also the inability to adapt to infrastructure and application workload changes,” said Rayan Zachariassen, Co-Founder and CTO at ioFABRIC.

Not surprisingly, only 35 percent of respondents said “yes” when asked whether there is enough time in the day for them to effectively manage their storage systems. 

“Eliminating manual chores like provisioning and migration, complexity, or constraints on future growth are easy problems to solve – if there is an adequate budget,” said Lamb. “Without the budget, companies need to look for solutions that let them do more with theirr existing infrastructure. This is a key focus at ioFABRIC. We created Vicinity in direct response to the market need for extending hardware life to meet budget constraints. What this survey tells us is doing more with less, or doing more with the same amount of resources for years on end, is the new reality for a broad segment of users.”

ioFABRIC Vicinity transforms your storage infrastructure, using existing systems and media to reach new levels of service. Vicinity will discover more life in your existing storage while scaling performance and capacity. With a single pane of glass, Vicinity unifies diverse vendors storage while automatically responding to changing workloads and resource uses. Vicnity’s QoS-driven storage automation can be deployed as distributed storage or hyperconverged. ioFABRIC channel partners sell Vicinity as a licensed software and support solution or by white-labeling it with additional hardware and/or software.

About ioFABRIC
ioFABRIC Inc. is a software-defined storage company delivering QoS-based automation across existing and future storage investments.  Its flagship product, ioFABRIC Vicinity, creates a dynamic platform that delivers Storage-as-a-Service through an organization’s entire infrastructure to drive efficiency, minimize complexity, and save management cost and time. Vicinity provides immediate ROI, reducing CAPEX and OPEX by utilizing existing systems and media to reach new levels of service. Vicinity will be sold through ioFABRIC’s reseller and distribution channel on a price-for-capacity basis as an annual software subscription. Founded in 2013 by an executive team that has worked together for more than 20 years, the company is funded by private investors and Real Ventures. For more information, a free trial of Vicinity, or partnership opportunities, visit www.iofabric.com.

95% report challenges with channel data accuracy or quality

READING, UKZyme, the market leader in the rapidly growing discipline of Channel Data Management (CDM), has today highlighted the growing issue that UK hardware companies are making sales decisions based on inaccurate data from channel partners.

According to an independent research report commissioned by Zyme, entitled “The UK Channel Data Management Barometer”, just 25% of respondents cited that they were extremely confident in the accuracy of data received from channel partners, whilst a shocking 66% claimed that their understanding of channel performance is held back by the accuracy of the data delivered by partners.


A number of critical operational issues have also been identified by UK hardware companies as a result of the challenges of ensuring channel data accuracy. In the last 12 months the most common concerns that have been realised are dealing with duplicate sales opportunities (53%), unreported wins (36%), overstated deal sizes (36%) and delayed order fulfilment (31%). In other areas, that require administrative time and resource to resolve, 13% cited that they have struggled to identify the product names and descriptions given.


“These businesses are aware that they are dealing with over-payments to partners but equally they also feel that they face a number of barriers when it comes to deploying a CDM solution,” said Nick Andrews, General Manager, EMEA & India at Zyme. “Concerns include lack of analytics skills and a lack of time, alongside the more usual budget constraints. However, it is also realised that they are hindered by legacy data management processes and procedures. Sales just cannot continue to be missed, and partners cannot continue to be over-paid.”


In parallel, the respondents cited that they also struggle with dealing with disparate data sources (90%) and different formats (67%), alongside timeliness of getting data from partners (70%). In turn, these problems then also lead to challenges with compliance and/or regulation (83%), as well as preventing the business from gaining a single, strategic, view across all channels (74%). Scalability issues (73%) and challenges with creating actionable insights from channel data (72%) were also mentioned as hurdles that needed to be overcome.


Zyme believes that a fundamental shift in how businesses approach the issue is needed. The research suggests that it is time for companies to move away from spreadsheets and data-management systems that have been developed in-house but even more critical to success is an urgent cultural change in what is deemed to be ‘acceptable’. This new way of thinking will build momentum within the business to secure the investment in resourcing and technology that is necessary.


“No organisation can justify the expense of running disparate systems that inevitably fail to deliver value back. Inaccurate data is misleading sales opportunities and too much time and resource is focused on rectifying problems around data entry that were totally avoidable in the first place,” continued Andrews. “The end result is reduced confidence in channel partners, often unfairly, and compromised channel revenue growth. Ensuring accurate and up to date channel data is critical for financial transparency and companies need to address this urgently before the data load increases further, both in volume and in complexity.”


About the research

Zyme commissioned an independent study among UK hardware companies in September 2015. The study was conducted by Loudhouse, an independent research agency in London. A total of 100 decision makers responsible for channel data management were surveyed from companies with an annual turnover of at least £65m. Respondents were sourced across a variety of sectors, including industrial automation, enterprise networking and consumer technology/hardware.


About Zyme

Zyme is the global leader in the emerging channel data management (CDM) space, empowering the New Smart Channel™, a proven approach to creating visibility to actionable knowledge that manufacturers need to accelerate partner sales and optimize marketing program ROI. Zyme’s flexible, cloud-based offerings facilitate enterprise-grade decisions by responding to real-time, granular channel intelligence. Benefits include better-targeted MDF, co-op, and rebate programs, plus improved segmentation. Zyme replaces outdated, ad-hoc systems with a state-of-the-art, cloud-based platform, data steward services, and a worldwide channel directory of more than one million partners for guaranteed database quality, support for a wider range of formats, and best practices that enhance reporting compliance.


Industry leaders like Dell, Microsoft, VMware, Fujitsu, Plantronics, Honeywell, Xerox, Symantec, Lenovo, GoPro, Armstrong World Industries, and Seagate rely on Zyme.


Headquartered in Redwood Shores, CA, Zyme has offices in Texas, China, India, and the UK.


For more information, visit www.Zyme.com