Spring World 2017

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 29, Issue 4

Full Contents Now Available!

Jon Seals

HyTrust DataControl provides advanced zero downtime encryption and key management for VMware workloads

BARCELONA, Spain – Today, HyTrust Inc., a leading workload security provider, announced encryption and key management support for VMware vSphere VM Encryption, announced as part of VMware vSphere 6.5. This support through HyTrust DataControl provides organizations with a virtual machine encryption option using the VMware platform that allows them to encrypt workloads with HyTrust’s robust key management policies for their virtual machines.

“We are excited to expand our data encryption and key management solutions for VMware with new KMIP-based key management for VMware’s new vSphere VM encryption solution.”

Tweet this

HyTrust DataControl is a complete cloud and virtualization encryption solution that includes both encryption and key management and is available for Windows and Linux. With the addition of support for VMware vSphere VM Encryption, admins will be able to leverage DataControl’s powerful, policy-based key management capabilities to help secure their vSphere environments via the industry-leading Key Management Interoperability Protocol (KMIP) standard.

VMware is a longtime HyTrust partner and became a strategic investor in 2012. HyTrust first delivered security for VMware ESXi in 2009 with HyTrust CloudControl, winning both the security and overall best of show awards at VMworld 2009 and in 2015 announced HyTrust CloudControl for NSX, winning best of show for security and compliance at VMworld 2015. To meet customer needs for data security, VMware has been a partner with HyTrust for years, reselling HyTrust DataControl to its vCloud Air, VSAN and vSphere customers. Through its long-standing partnership, HyTrust once again has added critical security capabilities to VMware infrastructure.

“Data security is a top concern across most organizations and we are seeing tremendous growth in HyTrust DataControl to enable VMware workload encryption,” said Eric Chiu, co-founder and president of HyTrust. “We are excited to expand our data encryption and key management solutions for VMware with new KMIP-based key management for VMware’s new vSphere VM encryption solution.”

Unfortunately today, data remains at risk in many organizations. A recent HyTrust Cloud Adoption survey found that 28% of organizations did not have encryption in place for cloud workloads. HyTrust’s newly added support takes encryption and key management one-step further. When used with VMware’s vSphere VM Encryption, HyTrust’s encryption key management for VMware will allow organizations to pursue a robust key management strategy that is aligned with their need to meet compliance and meet industry best practices for encryption policy management.

According to a new IDC report, worldwide spending in cyber-security is expected to reach $101.6 billion by 2020, which underscores the need and importance of having a strong security and encryption strategy in place. For organizations looking to adopt multi-cloud data encryption across their private and public cloud infrastructure, HyTrust DataControl not only provides the critical key management required but also provides data encryption that supports VMware Cross-Cloud Architecture and other multi-cloud deployments. It protects portable workloads that may move across different vSphere installations and also span multi-vendor private and public cloud infrastructure. With its zero downtime encryption, DataControl eases operational disruptions that often arise from initial encryption or subsequent rekeying operations, the latter not only a best practice but also often required to meet regulatory mandates.

To learn more please visit: www.hytrust.com and https://www.hytrust.com/products/datacontrol/

About HyTrust

HyTrust’s mission is to make private, public and hybrid cloud infrastructure more trustworthy for enterprises, service providers and government agencies. HyTrust provides solutions that automate security controls for software-defined computing, networking and storage workloads to achieve the highest levels of visibility, granular policy control and data protection. HyTrust customers benefit from being able to accelerate cloud and virtualization cost savings while improving their security posture by automating and enforcing security policies in real time, adapting quickly to compliance requirements, and preventing unplanned outages.

Headquartered in Mountain View, CA, HyTrust is backed by the leading providers of strategic IT infrastructure including VMwareCiscoIntel and Fortinet; by the vanguard of innovative solutions for the intelligence community, In-Q-Tel; and by a world class group of financial investors including AIT VenturesGranite VenturesTrident Capital and Vanedge Capital. HyTrust was recently named one of CRN’s “20 Coolest Cloud Security Vendors”, a recipient of VMworld’s 2015 Gold Award for Security/Compliance and Virtualization, and the Most Innovative Cloud Company at Intel Security Focus 2015.

WOBURN, Mass.--()--Fulfilling its mission to share cybersecurity knowledge, Kaspersky Lab launched today the Industrial Control Systems Computer Emergency Response Team (also known as Kaspersky Lab ICS-CERT) – a global CERT entity that welcomes collaboration with critical infrastructure operators, vendors and government institutions.

“Today’s approach to cybersecurity highlights the importance of accumulating intelligence on the latest threats, in order to develop protection technologies”

Tweet this

Modern cybersecurity requires not only the best technology, but also the best and the latest intelligence about threats, especially when cybercriminals are targeting critical infrastructure facilities. Through the Kaspersky Lab ICS-CERT, the company will share its years of knowledge and experience in securing industrial systems, as well as coordinate the exchange of expertise on cyberthreats and protection methods between all interested parties.

The Industrial Control Systems Emergency Response Team is a special Kaspersky Lab project that will offer a wide range of information services – from intelligence on the latest threats, security incidents and mitigation strategies, to incident response, investigation consultancy and services. In addition to the latest intelligence about threats and vulnerabilities, the Kaspersky Lab ICS-CERT will also share expertise on compliance. As a non-commercial project, the Kaspersky Lab ICS-CERT will share information and expertise to its members free of charge.

“Today’s approach to cybersecurity highlights the importance of accumulating intelligence on the latest threats, in order to develop protection technologies,” said Andrey Doukhvalov, head of future technologies and chief security architect, Kaspersky Lab. “This is especially true for industrial infrastructure, which has specific threats, highly customized hardware and software, and strict requirements for reliability. As a security vendor, we have years of experience analyzing threats and helping industrial operators with threat prevention and detection, incident response, staff training, and the prediction of future attack vectors. We are confident that sharing intelligence, or, in a broader way, exchanging knowledge between vendors and operators, is an important step towards more secure critical infrastructure. By establishing ICS-CERT we are expanding the availability of the industry’s expertise in a way that no other private security vendor has done before.”

“As a provider of specialized security solutions for industrial control systems, the way we work with our customers is similar to the operation of a typical CERT entity,” said Andrey Suvorov, head of critical infrastructure protection business development, Kaspersky Lab. “True security comes with sharing information on the latest threats and security vulnerabilities, offering services like incident response, penetration testing and staff training. For several years we have also been involved in the strategic development of new cybersecurity methods, working with private and government institutions to optimize protection levels. Establishing ICS-CERT is a logical move for us to expand the availability of our intelligence, sharing our knowledge and expertise with the wider industry, as well as learning from the industry as the threat landscape continues to evolve.”

Kaspersky Lab’s ICS-CERT welcomes new members and all interested parties from around the world to collaborate and work together toward a more secure ICS environment. Information about membership, terms and conditions and our approach to intelligence sharing is available at the official website of the Kaspersky Lab ICS-CERT.

About Kaspersky Lab
Kaspersky Lab is a global cybersecurity company founded in 1997. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them.
Learn more at www.kaspersky.com.

For the latest in-depth information on security threat issues and trends, please visit:
Securelist | Information about Viruses, Hackers and Spam
Follow @Securelist on Twitter

Threatpost | The First Stop for Security News
Follow @Threatpost on Twitter

The Heart of the European Fiat Chrysler Automobiles Group Adopts CA Project & Portfolio Management SaaS to Increase Business Agility and IT Savings

NEW YORK--()--CA Technologies (NASDAQ:CA) today announced that FCA Italy, a company of the Fiat Chrysler Automobiles (FCA) Group, has implemented CA Project & Portfolio Management SaaS (CA PPM SaaS) to plan and control its IT spending, and increase the company’s agility and responsiveness to the changing IT needs of the company.

“We needed a solution that would improve efficiency and reduce processing times, while boosting our ICT staff’s productivity”

Tweet this

“We needed a solution that would improve efficiency and reduce processing times, while boosting our ICT staff’s productivity,” says Andrea Pomettini, ICT Planning and Control Manager at FCA Italy. “CA Project & Portfolio Management SaaS turned out to be a perfect fit for our needs. The SaaS option gives us a lot of flexibility, and the improved transparency and collaboration has taken the responsiveness of the FCA IT budgeting process to new heights.”

CA PPM SaaS provides FCA Italy with a single system of record to help collect, maintain and compare ICT spending figures over time, both general and administrative. With intuitive tools to deliver a view into the entire landscape, CA PPM SaaS offers FCA Italy ICT the ability to optimize resource allocations quickly, helping core business functions to adapt with market and business changes.

After evaluating several PPM tools, FCA Italy selected the cloud-based CA PPM SaaS to reduce project risks by enabling simpler and cheaper implementation. The modular structure of CA PPM SaaS allowed FCA Italy to implement the tool gradually, thereby reducing its configuration effort and – along with CA Productivity Accelerator – facilitating user adoption.

“The SaaS option provides greater insight into infrastructure and updates to the platform. Now we can easily share data on CA PPM SaaS with our colleagues across the globe,” says Pomettini.

“Customers are aiming to improve their IT budgeting efficiencies and enable their IT teams to be more responsive to the changing IT needs of the business,” said Michele Lamartina, Country Manager Italy, CA Technologies. “CA PPM enables customers like FCA Italy to make more informed, strategic investments, so they can optimize their enterprise IT, service and product portfolios.”

Learn more at CA World, November 14-18 in Las Vegas, NV.

About CA Technologies

CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate – across mobile, private and public cloud, distributed and mainframe environments. Learn more at http://www.ca.com.

Follow CA Technologies


Social Media Page

Press Releases


Legal Notices

Copyright © 2016 CA, Inc. All Rights Reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.

Elo I-Series to Connect Directly to KORE Network Right Out of the Box for Quicker Set Up


ALPHARETTA, Ga.--()--KORE, the people powering IoT innovations and opportunities, today announced a partnership with Elo, a global supplier of digital touchscreen solutions, to power its new I-Series line for the Android platform. The partnership allows all Elo I-Series devices to be set up right out of the box on KORE’s seamless, global network.

“KORE is excited to partner with Elo to power IoT innovation in touchscreen-based products for industries such as consumer electronics, healthcare, transportation systems and more. KORE provides the seamless connectivity and customer-centric usability that are vital Elo’s customers”

Tweet this

Simply by contacting KORE and providing the SIM card number included with the Elo device, customers are able to activate the devices instantly. The addition of cellular connectivity on the I-Series allows dynamic advertising by merchandising teams, creative agencies, PoP display and fixture companies where access to other networks is difficult. Two versions with KORE-powered cellular connectivity are available out of the box — through Vodafone for Europe and with AT&T for the U.S. market. If needed, customers can choose other carriers through a Bring Your Own Carrier option.

“Our customers look to us to deliver the best interactive experiences,” said Neeraj Pendse, director of product management, Elo. “Our devices are now ready for instant activation with the help of KORE’s seamless network; bringing these experiences to the end-user faster and more effectively.”

“KORE is excited to partner with Elo to power IoT innovation in touchscreen-based products for industries such as consumer electronics, healthcare, transportation systems and more. KORE provides the seamless connectivity and customer-centric usability that are vital Elo’s customers,” said Alex Brisbourne, CEO, KORE.

About KORE
KORE provides the connectivity and services that make the Internet of Things possible. Founded in 2003, KORE is the world’s largest managed network services provider specializing in Internet of Things (IoT) and Machine to Machine (M2M) markets. KORE provides the critical wireless connectivity empowering application, hardware and wireless operator partners to rapidly bring new IoT and M2M innovations to market, with millions of active on-network units in more than 180 countries. KORE delivers choice, reliability and global native coverage through multi-carrier and Tier 1 carrier cellular and satellite network services – including LTE, GSM and CDMA - as well as advanced applications to easily manage IoT connected devices. KORE Position Logic software provides seamless location-based services (LBS) for businesses. KORE’s recent acquisition of Wyless makes the company one of the six largest providers of M2M/IoT services globally, inclusive of carriers. For more information, visit www.koretelematics.com, read the KORE blog and connect with KORE on LinkedIn, Google+, Facebook, Twitter, YouTube and Vimeo.

About Elo
Elo is a global leader in touchscreen solutions including point-of-sale systems and interactive signage displays from 10 to 70 inches. The inventor of the touchscreen, Elo now has 20+ million retail and hospitality installations in 80+ countries with products designed in California and built to last with a 3-year standard warranty. The Elo touchscreen experience has consistently stood for quality, reliability and innovation. Elo intellectual property is protected by global patent, trademark and design registrations. Learn more about Elo at EloTouch.com.

All products/services and trademarks mentioned in this release are the properties of their respective companies.

First to add high-fidelity machine learning to a blend of cross-generational threat defense techniques

DALLAS--()--Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced the availability of XGen™ endpoint security. This new offering is powered by the XGen™ blend of cross-generational threat defense techniques that intelligently applies the right technology at the right time, resulting in more effective and efficient protection against a full range of threats. Trend Micro’s unique approach uses proven methods to quickly identify benign data and known threats, freeing its advanced techniques, such as application control, exploit prevention, behavioral analysis and machine learning, to more quickly and accurately identify unknown threats. Trend Micro is the first to infuse ‘high-fidelity’ machine learning into its approach – uniquely analyzing files both before execution and at runtime, using ‘noise cancellation’ features like census checking and whitelisting to reduce false positives.

“What comes next should embody a design that is multi-generational, based on an architecture that can transcend technology, threats and end-user computing behaviors. It’s exciting to see that Trend Micro is addressing this challenge with the introduction of XGen endpoint security.”

Tweet this

Endpoint security has evolved dramatically over the past 25 years. In the early days, nuisance malware or spam was the only concern. However, the booming underground hacker economy, ever-changing IT landscape and risky user behavior have given rise to an exponential growth in sophisticated threats like phishing, targeted attacks, mobile malware and now ransomware. Recently, a single ransomware variant compromised an estimated 100,000 computers per day1. These dynamic challenges, combined with the cumulative volume of attacks – made worse with more than 500,000 new threats identified daily2 – have made it harder than ever for organizations to stay protected. Despite promises by some security providers, time has shown that there is no silver bullet when it comes to defeating the myriad of cyber threats – each new class of threat requires purpose-built protection techniques.

“The name XGen was carefully chosen to indicate the cross-generational technology fueling our approach, which is built on years of experience and provides customers with better protection against the evolving range of threats they face,” said Eva Chen, chief executive officer for Trend Micro. “We’ve been using machine learning for years as part of our global threat intelligence, the Trend Micro Smart Protection Network™. Now, we’re raising the bar by infusing ‘high-fidelity’ machine learning into our blend of protection techniques to specifically tackle more advanced threats like ransomware, while other vendors, including relatively new ‘next-gen’ endpoint security companies, only offer one or two ‘one-size-fits-all’ protection techniques.”

“The use of Trend Micro XGen endpoint security has redefined our security posture, allowing for both complete protection and ease-of-use in securing our most valuable enterprise data,” said William Crank, chief information security officer for MEDHOST. “When evaluating solutions from other security providers, it became apparent they did not provide the breadth of protection we need. To achieve the best security posture, we require seamless integration of capabilities, not a bolt-on endpoint product that doesn’t share threat intelligence and only addresses part of the problem.”

XGen™ endpoint security is available today as part of the Trend Micro Smart Protection Suites. The suites include a range of integrated endpoint, email and web gateway security capabilities designed to protect users in their daily activities, with centralized visibility and control to speed time to response for IT. With 28 years of experience and more than 155 million endpoints protected, Trend Micro continues to demonstrate its unwavering commitment to innovation in the area of endpoint security.

“New threats are appearing as rapidly as technology changes, but old threats continue to circulate and plague enterprises,” said Doug Cahill, Senior Analyst for ESG. “What comes next should embody a design that is multi-generational, based on an architecture that can transcend technology, threats and end-user computing behaviors. It’s exciting to see that Trend Micro is addressing this challenge with the introduction of XGen endpoint security.”

Trend Micro has been named a leader in Gartner’s Magic Quadrant for Endpoint Protection Platforms since 20023. In 2016, Trend Micro placed furthest to the right in the quadrant for Completeness of Vision.

For more information on the Trend Micro XGen™ endpoint security, please visit: www.trendmicro.com/xgen.

About Trend Micro

Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses and governments provide layered security for data centers, cloud environments, networks and endpoints. All our products work together to seamlessly share threat intelligence and provide a connected threat defense with centralized visibility and control, enabling better, faster protection. With over 5,000 employees in over 50 countries and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud. For more information, visit www.trendmicro.com.

1 Ransomware Victims Urged To Report Infections To Federal Law Enforcement, September 15, 2016 https://www.ic3.gov/media/2016/160915.aspx

2 500,000 new threats identified daily as part of the Trend Micro Smart Protection Network http://cloudsecurity.trendmicro.com/us/technology-innovation/our-technology/smart-protection-network/index.html

3 Trend Micro positioned in Leaders Quadrant under the names Magic Quadrant for Endpoint Protection and Magic Quadrant for Enterprise Antivirus

CEO Gary Wojtaszek States There Are No Strategic, Economic, or Operational Reasons to Build and Own An In-house Data Center

DALLAS--()--Global colocation solutions provider CyrusOne (NASDAQ: CONE) today released an executive report entitled “Yes, You’d Have to Be Crazy to Build Your Own Data Center.” CyrusOne CEO Gary Wojtaszek challenges a common belief among many cloud, social media, and enterprise company leaders and then methodically explains why outsourced built-to-suit data centers are a more efficient and effective use of resources than the in-house equivalent.

“Yes, You’d Have to Be Crazy to Build Your Own Data Center.”

Tweet this

“I regularly hear seemingly rational explanations for adopting a proprietary approach to data center construction and maintenance, but these reasons are outdated and misinformed,” said Gary Wojtaszek, President and CEO, CyrusOne. “A more effective, efficient option exists in built-to-suit data centers, which are custom facilities designed and constructed to meet the unique demands of individual companies. The shift from in-house to built-to-suit data centers is proving to be like America’s transition from small, family farms to large-scale farming operations: gradual, but necessary.”

To help expedite this transition, Wojtaszek outlines seven critical reasons why in-house data centers are not the best option for any company needing additional data center capacity.

Additionally, in the report, Wojtaszek debunks the perceived benefits of in-house data center solutions, noting the irony in the fact that many modern, disruptive companies are clinging to the status quo when it comes to data centers.

“This part of the data center revolution is just beginning,” added Wojtaszek. “As evolving technologies and exponential data growth continue to force business leaders to reassess their IT infrastructure and rationalize capital spending, a boom in built-to-suit data center construction is starting to gain momentum. CyrusOne is excited to stand at the forefront of that revolution with our hyper-scale build-to-suit solutions.”

CyrusOne operates more than 30 carrier-neutral data center facilities across the United States, Europe, and Asia to provide customers with the flexibility and scale to match their specific IT growth needs. CyrusOne facilities are engineered to include the power-density infrastructure required to deliver excellent availability, including an architecture with the highest available power redundancy (2N).

Renowned for exceptional service, building enduring customer relationships, and high customer satisfaction levels, CyrusOne serves nine of the Fortune 20 and more than 175 of the Fortune 1000 among its more than 950 customers.

For more information about CyrusOne, call 1-855-908-3662 or visit www.cyrusone.com. Connect with us on Google Plus, LinkedIn, Twitter, and Facebook.

About CyrusOne

CyrusOne (NASDAQ: CONE) specializes in highly reliable enterprise-class, carrier-neutral data center properties. The company provides mission-critical data center facilities that protect and ensure the continued operation of IT infrastructure for more than 950 customers, including nine of the Fortune 20 and more than 175 of the Fortune 1000 or equivalent-sized companies.

CyrusOne’s data center offerings provide the flexibility, reliability, and security that enterprise customers require, and are delivered through a tailored, customer-service-focused platform designed to foster long-term relationships. CyrusOne’s National IX platform provides robust connectivity options to drive revenue, reduce expenses, and improve service quality for enterprises, content, and telecommunications companies. CyrusOne is committed to full transparency in communication, management, and service delivery throughout its more than 30 data centers worldwide. Additional information about CyrusOne can be found at www.CyrusOne.com.

Veeam dramatically expands its capabilities and total addressable market with New Veeam Availability Platform for the Hybrid Cloud, a comprehensive Availability solution for virtual, physical, and cloud-based workloads; names Paul Mattes as Veeam’s new Vice President of Global Cloud Group

BAAR, Switzerland--()--Veeam® Software, the innovative provider of solutions that deliver Availability for the Always-On Enterprise™, today announced a 31 percent year-over-year (YoY) growth in total bookings revenue for Q3 2016. With 71 percent of Fortune 500 and 51 percent of the Global 2000 now Veeam customers, the company reported a 49 percent YoY increase in new license bookings from large enterprise deals, solidifying the increasing demand for 24.7.365 Availability as enterprises embrace digital transformation.

Veeam announces Q3 results: 49% YoY Growth in Enterprise Deals

Tweet this

Exponential growth in applications and data, and advances in cloud and mobile technologies are all propelling enterprises to transform from organizations that simply use digital technology, to full-fledged digital organizations. IDC has predicted that digital transformation initiatives will more than double by 2020, and will act as a primary driver for IT spending worldwide.

“Digital transformation isn’t just a trend. It’s a do-or-die business reality to transform the customer experience and unlock new levels of enterprise productivity which is now at the top of the agenda for CIOs and IT decision-makers,” said Peter McKay, President and COO at Veeam. “Veeam is playing a key role in this transformation, as our strong Q3 results demonstrate. Without 24.7.365 Availability, all the advantages received by digital transformation are lost. Enterprises are rapidly embracing our Availability solutions and abandoning legacy technologies that cannot provide an always-on environment.”

Veeam has also appointed Paul Mattes, most recently General Manager of Cloud and Enterprise Sales, Americas with Microsoft, as its Vice President of Global Cloud Group. Enterprise adoption of cloud technologies continues to accelerate as businesses capitalize on the costs savings, flexibilty and scale that it offers. To further meet the demands of customers, Veeam recently introduced the next generation of comprehensive Availability: Veeam Availability Platform for the Hybrid Cloud. This solutionenables businesses and enterprises of all sizes to ensure Availability for virtual, physical, and cloud-based workloads in the Hybrid Cloud. Mattes will further develop Veeam’s rapidly growing presence in the Cloud market and support its position as the leading vendor of Backup as a Service (BaaS) and Disaster Recovery as a Service (DRaaS) solutions for Cloud and Service Providers.

“A hybrid cloud infrastructure offers organizations the best of both on-premises and cloud, enabling IT to choose the best platform to meet the needs of each workload,” Mattes said. “Veeam recognizes, however, that these advantages are of little use if the hybrid cloud infrastructure is not Always-On. In today’s fast-paced environment, nothing less than 24.7.365 access to data is acceptable, and Veeam is enabling organizations to meet that challenge. Our goal is to define the BaaS and DRaaS markets by offering the best solutions our customers are requesting. With a 100 percent channel focused strategy, we’ll provide Veeam Cloud and Service Providers (VCSPs) and our channel partners with the technology platform to build and deliver those services to our joint customers.”

Additional highlights from Q3 2016 include:

  • Impressive growth in the cloud, especially as the demand for Disaster Recovery as a Service (DRaaS) intensifies. The Veeam Cloud & Service Provider (VCSP) program, which offers ready-made opportunities for service providers to acquire new customers and grow recurring revenue, reported an increase of 63 percent in the number of transactions year-over-year. The VCSP program has grown to more than 13,200 service and cloud providers worldwide, with more than 2,300 of those partners licensed to provide services for Veeam Cloud Connect.
  • Increased commitments by Veeam Strategic Alliance Partners. Veeam and Cisco launched the Veeam Availability Solution for Cisco UCS; VMware elevated Veeam to a Global Partner in the VMware Technology Alliance Program (TAP); and Veeam was recently named an IBM ecosystem partner for IBM Cloud.
  • 216,500 customers worldwide: Veeam added 11,500 total paid customers in Q3 2016, keeping pace with the historical average of approximately 3,500 new customers each month. Veeam also announced the winners of its weightless ZERO-G Experience® flight to celebrate 200,000 customers. While the Hard Rock Hotel & Casino Las Vegas was given the honor, three other customers were also named winners: Shearman and Sterling LLP (U.S.A.), Societe Generale (France) and University Of Queensland (Australia).
  • 12.5 Million Virtual Machines are protected with Veeam Availability Solutions.
  • Expansion to 43,000 ProPartners worldwide: Veeam’s commitment to the channel continues to attract new resellers and VARs to availability solutions.
  • Microsoft Hyper-V new license bookings: 37 percent growth over the same period during the previous year.

Veeam recently announced VeeamON 2017, the world’s Premier Data Center Availability Event, taking place May 16 – 18, 2017 in New Orleans, LA. Register now to Experience Availability. For more information, please visit https://www.veeam.com/veeamon.

Customer and Analyst Support

“Veeam is a ‘born in the virtual world’ vendor and has designed its solutions with five key design criteria,” said Roy Illsley, Principal Analyst at Ovum, a leading global technology research and advisory firm. “Firstly, the ability to rapidly recover data is critical for end users and Veeam has designed its solution to allow entire VMs, individual files and application items to be recovered from image backups. Secondly, recovery of data fast is of no use if that data is corrupt; Veeam's solution performs a verification of the protected data to ensure all data is recoverable. Thirdly, the virtual lab functionality in Veeam's solution provides a risk mitigation approach to change management by enabling regression testing to be performed on a copy of the production environment. Fourthly, Veeam's Cloud Connect solution provides a comprehensive ability to protect data irrespective of where the data is stored in the cloud. Finally, reliability is critical to end customers and Veeam provides this through its data loss avoidance capability, effectively the encapsulation of the entire solution.”

“Veeam saves a great deal of time. We save more than 25 hours per week (or 1,300 hours per year) with Veeam which lets our teams fine-tune our infrastructure,” said Greg Johnson, Manager of I/S Systems Engineering at Greenville Health System, South Carolina’s (U.S.A) largest non-for-profit healthcare system and academic medical center. “Veeam was less than half of the cost of our old solution and still gives us more features – monitoring, reporting, and capacity planning. What we spend over a three year period with Veeam would equal twice as much the cost as our previous solution.”

“Veeam has played and will continue to play a “golden glove” role in the IDC Infrastructure,” said Gert Prinsloo, Infrastructure Manager at Industrial Development Corporation (IDC) in South Africa. “Veeam has the vision and the ability to lead from the front and ensure continuous availability to organizations that are serious about staying relevant. The flexibility that Veeam brings to the market is just phenomenal – Availability for virtual, physical, and cloud-based workloads. Once again this allows the IDC infrastructure team the option to be innovative with business critical applications, data protection, and data life cycle management. I know the IDC data is safe, whether it resides in the cloud, on premises or hybrid. Veeam will provide protection, availability and visibility.”

About Veeam Software

Veeam® recognizes the new challenges companies across the globe face in enabling the Always-On Enterprise™, a business that must operate 24.7.365. To address this, Veeam has pioneered a new market of Availability for the Always-On Enterprise™ by helping organizations meet recovery time and point objectives (RTPO™) of less than 15 minutes for all applications and data, through a fundamentally new kind of solution that delivers high-speed recovery, data loss avoidance, verified recoverability, leveraged data and complete visibility. Veeam Availability Suite™, which includes Veeam Backup & Replication™, leverages virtualization, storage, and cloud technologies that enable the modern data center to help organizations save time, mitigate risks, and dramatically reduce capital and operational costs, while always supporting the current and future business goals of Veeam customers.

Founded in 2006, Veeam currently has 43,000 ProPartners and more than 216,500 customers worldwide. Veeam's global headquarters are located in Baar, Switzerland, and the company has offices throughout the world. To learn more, visit https://www.veeam.com.

MILLIS, Mass.--()--When it comes to securing sensitive data, locally-stored AES hardware encryption is by far the best way to lock down delicate information from hacking, cybercrime, and data breach. However, in order to ensure that a global workforce using company-owned encrypted devices follow the organization’s specific IT security policies, a centralized remote management command center is equally crucial to maintaining strong data protection and compliance.

“Our goal at Kanguru has always been to make the security of data storage and the centralized management of those assets as seamless as possible for our customers.”

Tweet this

Kanguru Remote Management Console (KRMC™) by Kanguru is the remote management of choice for IT administrators around the world looking to manage their organization’s secure data assets. Kanguru, a U.S.-based company, offers clients a seamless integration of AES encryption with Kanguru Defender® AES hardware encrypted flash drives, hard drives and SSDs, along with the option to manage secure drives using fully-integrated remote management.

Since Imation sold off their Ironkey assets to multiple companies back in February of 2016, Ironkey has split up their secure hardware and software offerings. As a result, Kanguru stands as the single most trusted source for AES hardware encryption with fully-integrated remote management capabilities. Having a single source for secure storage devices and remote management is a common sense choice when it comes to ensuring dynamic data protection.

“The current separation of our competitor’s security software and hardware offerings into multiple companies can make integration and support difficult and confusing for their customers,” says Nate Cote, Executive VP of Product Management. “Our goal at Kanguru has always been to make the security of data storage and the centralized management of those assets as seamless as possible for our customers.”

Going with Kanguru offers great benefits to your organization:

  • Seamless integration
  • Easily-accessible customer support
  • Long-term, trusted client/vendor relationships
  • Knowledgeable and helpful technical support staff
  • Flexible and scalable solutions
  • Robust security options

Enterprise, SMBs and organizations around the world trust Kangurubecause of their solid 24+ year history, innovative, quality security products, and individualized attention. Kanguru values the long-term client/vendor relationships they’ve developed over the years.

Consider how Kanguru Remote Management Console (KRMC) and Kanguru Defender AES hardware encrypted USB drives could work for your organization. Call Kanguru at (1) 888-KANGURU (1-888-526-4878) to talk with a helpful representative, or visit the Kanguru website at kanguru.com.

Kanguru is the global leader in providing the very best in FIPS 140-2 Certified, TAA compliant, hardware encrypted flash drives, hard drives and solid state drives, as well as fully-integrated remote management security applications, Endpoint Security, and Duplicator products. For more information, visit kanguru.com.

The Business Continuity Institute - Oct 19, 2016 15:06 BST

When it comes to business continuity planning in Alberta, Canada, even though 78% of small to medium sized enterprises believe a continuity plan is important, less than half (47%) have actually developed one. Of those SMEs that do not have a plan, 62% said that it simply wasn’t a priority. This is according to a report published by ATB Financial.

The Business Beat survey discovered that nearly a quarter (23%) of Alberta-based SMEs had experienced a significant disruption in their business. Perhaps that figure is no surprise considering the Fort McMurray wildfire that the province endured earlier in 2016, which brought disruption to people's lives and businesses. It was the third time in the last five years that a natural disaster caused the evacuation of entire communities. Homes and businesses were destroyed, and a massive clean-up and rebuild effort was required. Despite this, 46% of businesses surveyed said they did not carry disruption insurance.

Of course it’s not just wildfires that cause disruption. The Business Continuity Institute’s latest Horizon Scan Report revealed all kinds of concerns that business continuity and resilience professionals have about the threats their organizations are exposed to.

Disasters, both natural and personal, happen. And by nature of the definition, they strike quickly and without warning,” said Teresa Clouston, ATB’s Executive Vice-President, Business & Agriculture. “So a plan that contemplates how to deal with disruption can allow business owners to respond from a position of strength and thoughtfulness versus panic. We recommend building a recovery plan into your business plan and revisiting that plan yearly.

(TNS) — As the federal government continues its disaster relief efforts after Hurricane Matthew and catastrophic flooding in Louisiana and other states, lawmakers and the Obama administration are considering how to limit the government’s liability for increasingly severe natural disasters — and the solutions could include designating more places as flood-prone and encouraging residents to move out of harm’s way.

At issue: The effects of climate change — more frequent flooding from torrential rains, hurricanes and other phenomena — are straining the federal flood insurance program, exposing U.S. taxpayers to a potentially growing price tag of flood relief payouts.
In the past five years, the National Flood Insurance Program, operated by the Federal Emergency Management Agency (FEMA), has taken in between $3.2 billion and $3.5 billion in premiums from its policyholders, and in most years that’s more than enough to cover claims. In fiscal 2014, for example, it paid out about $372 million for claims, and its 2015 payout was approximately $839 million.
Page 5 of 1149