Spring World 2017

Conference & Exhibit

Attend The #1 BC/DR Event!

Fall Journal

Volume 29, Issue 4

Full Contents Now Available!

Jon Seals

Disaster recovery and DRaaS solutions are intended as a method to keep a constant, or near-constant copy of your IT infrastructure in the cloud, ready to turn on a moment’s notice in the case of downtime at your primary data center site. But DR tools can also be used for your initial cloud migration, providing an on-ramp to the cloud that is cost-effective and relatively fast. You also get the bonus of a ready-to-go DR plan, if you continue to maintain the DR environment after your production servers turn on.

You generally have a few options when migrating to the cloud. One is to set up totally new servers, with new versions of your applications, new server OS licensing, and so on. Sometimes this makes sense as you don’t need to adjust or re-architect any applications for the cloud platform. Existing data can be transferred via network (slow and often expensive for large amounts of information) or by shipping hard drives – a process that many administrators find a bit harrowing. If you’re already virtualized, however, you can migrate workloads more directly.

At Green House Data, we’ve had a number of customers start with disaster recovery before moving more and more applications onto cloud servers. If you already have an investment in DR, it makes an initial migration fairly simple.



ASHBURN, Va. – Today, USA FIBER which engineers, builds, and operates mission critical underground conduit and dark fiber networks for clients, jointly announced with Sabey Data Centers, a privately held real estate development and investment company specializing in mission critical data center space, that USA FIBER’s Ashburn Ring would be made available within Sabey’s new state of the art, 900,000-square-foot data center campus now under construction called Intergate.Ashburn.

“Not only is USA FIBER bringing the Ashburn Ring directly to the Sabey Data Center, we are making our Peering Ring available, which enables leading companies to connect between any of the Ashburn data centers across their own dedicated buffer tube. Customers can pick and choose which locations to interconnect, and have the flexibility to move without penalty. This scale and architecture allows for simple, cost effective and secure connectivity across the key service providers located in the market, including IP services, CDN, and Cloud infrastructure,” said John Schmitt, Chief Revenue Officer.

Rob Rockwood, Senior Vice President, Eastern Region, Sabey Data Centers, said, “Getting access to competitive fiber is one of the most important aspects of our data center infrastructure offering. In USA FIBER, we found an infrastructure owner that is willing to provide open access infrastructure on our clients’ terms. Flexible, scalable and engineered for performance.”

Daniel Meltzer, Sabey Data Centers Vice President of Sales & Leasing, said, “USA Fiber’s Ashburn Ring links the key data centers, cloud computing platforms and high technology companies in the market. Their Ashburn Express route will connect Ashburn directly with Baltimore, MD, bypassing Washington, D.C. and its inherent latency and network risks. At present, all other major carriers’ routes cross into Washington, D.C. USA FIBER will see significant customer adoption on this unique route given the requirements for performance, diversity and uptime being pushed in the market by government, enterprise and service providers.”

At Intergate.Ashburn, carriers will use three separate and discrete paths from the street; ensuring customers ultimate protection. Within the data center there will be two separate communications equipment rooms and two separate meet me rooms for carrier interconnectivity.

USA FIBER’s dark fiber service is more than 10 times larger than most of the existing networks in service in Ashburn, which average around 432 fibers. At present in Ashburn, a full buffer tube for dark fiber is rarely available, and enabling customers with the flexibility of a cross connect to move when and where they want is almost unheard of. USA FIBER, in partnership with Sabey Data Centers and Integrate.Ashburn, is looking to change all that.

About Sabey Data Centers
With a portfolio of more than three million square feet of mission critical space, Sabey Data Center Properties is one of the most experienced and largest privately owned multi-tenant data center owner/developer/operators in the United States. Sabey specializes in scalable, custom-built solutions including data center ready shell space and fully turnkey data centers managed by Sabey’s award-winning critical environment staff. Consistently recognized for its reputation for operational excellence through its world-class data centers and sustained uptime, Sabey is proud to provide data center services to many of the world’s top financial, technology and healthcare companies. www.sabey.com

USA FIBER is a purpose built, high capacity, dark fiber network provider. USA FIBER engineers, builds and maintains application and carrier neutral dark fiber networks designed for mission critical customers. This strategy allows clients to connect with their applications and customers, on their own terms. Founded by Ken Goff and Judd Carothers, USA FIBER has deep expertise on staff in the most stringent of dark fiber networks, encompassing over 10,000 route miles and 50 years of excellence. USA FIBER owns and operates dark fiber routes, focusing on purpose built new routes that add diversity, performance and scalability for client’s coast to coast.


@usafiber #darkfiber #datacenter #cloud #telecom #fiber @usafibersales #AshburnExpress

NEW YORK – QBE North America, an operating division of global insurer QBE Insurance Group Limited, released a new white paper about the risks of supply chain management, focusing on the effects of globalization. Titled "Does Your Supply Chain Harbor Hidden Risks?", the paper provides an overview of key areas of risk that tend to impact multinational and domestic companies – both the companies themselves, as well as their many suppliers.

Since the 1980s, globalization – the increased interdependence of large multinational and smaller domestic companies on international labor, raw materials, production, warehousing, distribution and commercial sales – has amplified supply chain risk in ways both predictable and surprising.

Moving raw materials and finished products long distances creates an expected increase in risks. Given that the multitude and variety of risks are becoming more predictable, the leadership of multinational and domestic companies can benefit from taking a closer look at how global interdependence affects each link of their supply chain.

"Supply chain risks are legion, especially given the backdrop of globalization. Further, there are any number of elements within each industry that can prove problematic under the right conditions – or, for that matter, under normal conditions," said Victor Sordillo, QBE Senior Vice President, Global Risk Solutions.

Mr. Sordillo outlines seven vital areas of supply chain management for multinational and domestic organizations to consider, ranging from manufacturing site safety and labor conditions to quality control and cyber security. He closes by examining strategies to address supply chain risks and key insurance coverages to mitigate these risks.

"A proactive response by industry leaders can mitigate many production and distribution risks, and help them prepare judiciously for less-likely risks that may, one day, occur," he explained.

The "Does Your Supply Chain Harbor Hidden Risks?" white paper is available on QBE North America's Manufacturing Microsite: QBEsolutions.com/manufacturing

QBE's Commercial Insurance business offers a suite of products for midsized business customers. These products include a variety of options to address supply chain risks including contingent business interruption, business interruption, transit, inland marine, product liability, product recall, errors and omissions and cyber liability.

To learn more about our specific target classes and QBE's commitment to providing unique and comprehensive risk management solutions tailored to the manufacturing industry, please visit QBEsolutions.com/manufacturing or contact your local underwriter today.

About QBE  
QBE North America is part of QBE Insurance Group Limited, one of the largest insurers and reinsurers worldwide. QBE NA reported Gross Written Premiums in 2015 of $4.6 billion. QBE Insurance Group's 2015 results can be found at www.qbena.com. Headquartered in Sydney, Australia, QBE operates out of 37 countries around the globe, with a presence in every key insurance market. The North America division, headquartered in New York, conducts business through its property and casualty insurance subsidiaries. QBE insurance companies are rated "A" (Excellent) by A.M. Best and "A+" by Standard & Poor's. Additional information can be found at www.qbena.com, or follow QBE North America on Twitter.

As Halloween approaches, clowns aren’t the only unwelcome guests making headlines this holiday season. In the world of IT, malware is sinking its teeth into business data everywhere. Ransomware continues to hold business data hostage until companies pay up. Often, hackers demand payment within 72 hours or data will be deleted. Spooky.

So how can we defend the data from a ransomware encryption? In Q2 2016, Datto conducted a survey of 1,100 managed service providers (MSPs) to uncover the trends behind this creepy software. Below, I’ve highlighted some of the current hacker tricks that have been wildly successful when it comes to infecting systems.



Aligned Energy claims it has achieved a breakthrough in reusing waste heat exhausted by servers in the data center – a concept that is not new but difficult to implement in data centers effectively.

The Danbury, Connecticut-based company says the combination of its data center cooling system and a system by the Swedish company Climeon, which converts low-grade waste heat into electricity, can serve as an effective energy source for a data center.

The solution addresses two fundamental problems in data center waste-heat reuse: low-temperature heat produced by servers and the difficulty of transporting heat efficiently. Climeon’s technology is able to put low-grade heat to use efficiently, while using energy produced by a data center to power the same data center means heat doesn’t have to be moved over long distances.



TALLAHASSEE, Fla. – Florida residents returning to or repairing homes damaged by Hurricane Matthew should keep in mind that safety should always be their first consideration when inspecting and cleaning up buildings damaged by flood waters.

Below are a few simple guidelines to follow that will make the clean-up and salvage process safer and easier:

  • Always wear protective clothing including long-sleeved shirts, long pants, rubber or plastic gloves and waterproof boots or shoes.

  • Before entering your home, look outside for damaged power lines, gas lines and other exterior damage.

  • Take photos of your damage before you begin clean up and save repair receipts.

  • Your home may be contaminated with mold, which raises the health risk for those with asthma, allergies and breathing conditions. Refer to the Center for Disease Control for more info on mold: www.cdc.gov/disasters/hurricanes/pdf/flyer-get-rid-of-mold.pdf.

  • Open doors and windows so your house can air out before spending any length of time inside.

  • Turn off main electrical power and water systems and don’t use gas appliances until a professional can ensure they are safe.

  • Check all ceilings and floors for signs of sagging or other potentially dangerous structural damage.

  • Throw out all foods, beverages and medicines exposed to flood waters or mud including canned goods and containers with food or liquid.

  • Also, throw out any items that absorb water and cannot be cleaned or disinfected (mattresses, carpeting, stuffed animals, etc.).

  • Beware of snakes, insects, alligators and other animals that may be on your property or in your home.

  • Remove all drywall and insulation that has been in contact with flood waters.

  • Clean all hard surfaces (flooring, countertops, appliances, sinks, etc.) thoroughly with hot water and soap or detergent.

Before returning to your home, make sure you have the following items among your clean-up and salvage supplies: government-issued photo ID (driver’s license, etc.) and proof of address; bottled water and non-perishable foods; first aid kit; cleanser or hand cleaning gel; hygiene products and toilet paper; insect repellent and sunscreen; flashlights and extra batteries; camera or cell phone to document damage; a list of important phone numbers; and plenty of cash (ATMs may not work).

It’s also smart to create a back-up communication plan with family and friends in case you’re unable to call from your home or other areas affected by the hurricane.

If you haven’t done so already, report your damage from the hurricane to your insurance company and local emergency manager.

For more information on Florida’s disaster recovery visit fema.gov/disaster/4280, twitter.com/FEMA, facebook.com/FEMA, and fema.gov/blog. For imagery, video, graphics and releases, see www.fema.gov/hurricane-Matthew.

With the cost of a breach up 29 percent from 2013 -- and continuing to rise -- according to a recent Ponemon report, enterprise leaders are under mounting pressure to implement security solutions that are effective in detecting threats in this evolving cybersecurity landscape. While organizations generally accept that prevention alone is not enough, data breaches often still go undetected for weeks, months and even years.

Organizations need to know which alarms matter to their organization in order to effectively conduct incident response. Signature-based systems and network management tools are often seen as the traditional approach to organizational security, but these solutions can no longer be the only means for detecting a breach and stopping it before it causes significant harm.

Anomaly detection, which is about enabling proactive incident response by giving security teams the ability to track down potential risks before a simple breach or unusual behavior escalates into a devastating event, is growing in popularity.



Publishes Sixth Annual Study of Cyber Claim Payouts

PHILADELPHIA, Oct. – NetDiligence®, a leading cyber risk assessment and data breach services company, announced today it has published its sixth annual Cyber Claims Study, a study of actual losses for data breach events covered by leading cyber liability insurance carriers.

This year's report summarizes NetDiligence's findings for a sampling of 176 cyber liability insurance claims, 163 of which involved the exposure of sensitive data. The study examines the type of data exposed, the cause of loss, the business sector in which the incident occurred and the size of the affected organization. The study includes analyses on claims due to third-party breaches and claims due to insider involvement, both accidental and malicious. This year's study also includes new analyses on cloud involvement, cyber extortion/ransomware, phishing and POS-related claims.

The primary focus of the study is the costs incurred by underwriters due to cyber claim events, including Crisis Services (forensics, notification, credit/ID monitoring and legal counsel/Breach Coach®), Legal (class action lawsuit defense and settlement), Regulatory (defense and settlement) and PCI (fines).

This year's study finds the average total breach cost was $665K, with an average payout for Crisis Services of $357K. The average claim for a large company was almost $6 million. The average claim in the Financial Services sector was $1.3 million, while the average claim in the Healthcare sector was $726K.

"As an independent and trusted partner to the cyber liability insurance industry, NetDiligence is uniquely positioned to combine data from multiple insurers so that the pool of claims is large enough to ascertain real costs, project future trends and better educate concerned Risk Managers and CFOs," said Mark Greisiger, president of NetDiligence. "We are honored that our cyber liability insurance carrier and broker partners share a sampling of their loss data with NetDiligence. Without them, the valuable insights this educational study provides would not be possible."

Sponsoring this year's NetDiligence Cyber Claims Study are AllClear ID, RSM US LLP, Cipriani & Werner, P.C., and Symantec Cyber Insurance.

AllClear ID is a platinum sponsor of this important industry study for the third straight year. According to Bo Holland, founder and CEO, "The cyber threat landscape today is constantly evolving, and businesses need to be ready to respond in advance of a data breach if they want to have a successful response. To do this, understanding the costs associated with breach events is critical. The insight into claims costs this study provides will enable businesses and industry partners to plan for breaches more effectively and better mitigate financial risk."  

The NetDiligence® 2016 Cyber Claims Study is available for download at the NetDiligence website (http://netdiligence.com/portfolio/cyber-claims-study/). eRiskHub® licensors and their clients have exclusive access to an expanded version of the study in the eRiskHub (https://eriskhub.com/).

About NetDiligence®
NetDiligence® is a cyber risk assessment and data breach services company. Since 2001, NetDiligence has conducted enterprise-level cyber risk assessments for a broad variety of organizations, including public entities, financial services, retailers, software developers, medical providers and universities. NetDiligence services are used by leading cyber liability insurers to support loss-control and education objectives. The NetDiligence eRiskHub® (https://eriskhub.com) is licensed by a majority of cyber liability insurers to provide educational and loss-control services to their policyholders. NetDiligence also publishes an annual Cyber Claims Study and hosts annual Cyber Liability Conferences in Philadelphia, Santa Monica and Toronto. For more information, visit http://netdiligence.com/.

About AllClear ID
AllClear ID is the leader in customer security, providing data breach response services to businesses that aim to protect their greatest asset: customers. As an industry leader and trusted partner with more than 10 years of specialized experience in data breach response, AllClear ID has helped thousands of businesses prepare for, respond to, and recover from data breaches, including successfully managing three of the four largest and most complex breach responses in history. The award-winning AllClear ID team is recognized for its expertise, customer service, and innovative solutions. Learn more: www.allclearid.com/business.

About RSM
RSM US LLP (formerly McGladrey LLP) is the leading provider of audit, tax and consulting services focused on the middle market, with 9,000 people in 86 offices nationwide. It is a licensed CPA firm and the U.S. member of RSM International, a global network of independent audit, tax and consulting firms with more than 38,300 people in over 120 countries. RSM uses its deep understanding of the needs and aspirations of clients to help them succeed. For more information, visit rsmus.com.

About Cipriani & Werner
Cipriani & Werner, P.C. delivers an end-to-end, integrated approach to its clients' privacy and data security needs.  Clients of this Mid-Atlantic litigation defense firm benefit from our team of professionals that includes experienced litigators, leaders in crisis communications, forensic IT assessment and mitigation, regulatory compliance and government relations offering services including corporate and IT audits and risk assessments, development of breach response plans, our breach response team and litigation defense.  Our clients appreciate the simplicity and certainty of having a single point of contact with a trusted team that has served the insurance industry for more than three decades. For more information, visit www.c-wlaw.com.

About Symantec Cyber Insurance
Symantec Cyber Insurance (https://www.symantec.com/solutions/insurance) provides a robust analytics platform for underwriters, portfolio managers, risk analysts and actuaries to measure cyber risk leveraging the power of Symantec's cyber security intelligence and enable their customers to improve resiliency against emerging cyber attacks. Symantec's cyber security intelligence is being used by global insurance leaders to optimize their portfolios and accurately quantify as well as price cyber risk. Symantec Corporation is the global leader in cyber security. Operating one of the world's largest cyber intelligence networks, we see more threats and protect more customers from the next generation of attacks. We help companies, governments and individuals secure their most important data wherever it lives.

Enables UC Within the Applications and Browsers on the Devices People Use Every Day

SANTA CLARA, Calif. – Avaya today announced a new platform for business communications that fulfills the long-sought promise of unified communications. Avaya Equinox delivers streamlined, mobile-first communications within the applications and browsers employees "live in" for their work. Customizable through the Avaya Breeze Client SDK by vertical industry or worker requirements, Avaya Equinox is supported on desktop or mobile devices, and available out-of-the box on the elegant, all-glass Avaya Vantage device.

By consolidating various applications and interfaces into one experience, Avaya Equinox liberates employees and IT departments from disjointed communications that hinder productivity and increase stress. The multitude of real-time and non-real-time communications methods used by workers typically requires a disruptive two- to three-step process of leaving a business application to communicate.

Read the blog: 1-Click Collaboration - A Promise Fulfilled

While the vision of UC was to merge methods and simplify access, vendors today still struggle to fully merge all the communication application infrastructure and cloud-based services into a single platform that offers the simplified user experience of Avaya Equinox. Key elements of Avaya Equinox include:

  • Mobile First Experience, Action Oriented Workflow for Immediate Response - Workers can quickly see all scheduled meetings, messaging updates, and communications history in one place and take immediate action with a single touch. Optimized to the device -- mobile, tablet, desktop, browser and Avaya Vantage -- the experience maintains mobile simplicity while embracing the benefits inherent in a wide range of devices.
  • Skip the Download: Collaborate from a Browser - Avaya Equinox enables robust collaboration from within HTML5 browsers with no downloads or plugins needed, thanks to WebRTC technology. This best- in- class browser experience with full collaboration capabilities eliminates migration challenges for organizations in the process of transitioning desktop business applications to the web and/or shifting applications to the cloud.
  • Drive Performance and Differentiate with Smart Digital Solutions - Embed Avaya Equinox communication and collaboration capabilities within business processes or context, or into any business application to create and integrate unique solutions for vertical needs and competitive differentiation. Extend and accelerate smart digital solution creation with the single solution-wide Avaya Breeze Client SDK, workflow automation and Avaya Snapp Store ecosystem. Avaya Vantage runs Equinox right out of the box, but is also infinitely customizable through the Client SDK.
  • Simply Access True Enterprise Class HD Video and Voice Anywhere, Anytime - Provides reliable, secure, high-quality HD voice and video for communication anywhere on any device, with easy, remote access including VPN-less connectivity. One number reach for all devices accelerates enterprise workflows and deployments; workers even can simultaneously use multiple devices.
  • Message with Continuity and Always-On Effectiveness - Persistent, multimedia messaging for text, audio, video, images and files allows employees to access and send team messages in real time -- or anytime. A conversation initiated on the desktop in the morning can be picked back up on the mobile device at lunchtime, for example. Workers can even message those who are offline for more efficient team interaction. One click from the messaging function escalates the session to a call or conference.
  • Reduce the Complexity and Expense of Multiple 'UC' Solutions - Avaya Equinox provides a single platform that supports all the different modes of conferencing. High scale audio conferencing, extensive web collaboration, rich multi-vendor HD video, even event streaming to 100,000 users in an all-in-one software solution. Users have one login and one easy solution to learn, and IT has one solution to support with one set of statistics, single provisioning, and a smaller footprint with higher efficiency and lower costs.

Avaya Equinox is generally available globally this calendar quarter, with the advance conferencing capability coming in the first quarter of 2017. The platform is sold on a per-user, suite licensing basis with subscription or perpetual pricing models, along with a traditional concurrent user pricing option for conferencing.


"The vision for unified communications has always been a streamlined, user and IT-friendly experience that enables work to proceed without disruption. Integrating the wide variety of forms and methods of communication into a single flow has been an unmet challenge -- until now. Avaya Equinox has conquered that challenge for the good of end users, IT departments and businesses worldwide, delivered by a company with the vision, focus and expertise to define the future of UC."

Gary E. Barnett, SVP and GM, Avaya Engagement Solutions

"As North America's first fully digital hospital, Humber River Hospital continually seeks to enhance patient care and provide positive outcomes. Enabling physicians, nurses and caregivers with real-time secure messaging and communication is one way we can move the needle in that direction. We're excited to be live on the beta of Avaya Equinox as it seamlessly integrates with our tailored workflows, allowing us to revolutionize and transform healthcare."

Kevin Fernandes, Chief Technology Officer, Humber River Hospital

"With Avaya Breeze, it's easy to embed and orchestrate communication flows within Arrow's Internet of Things software platform, Arrow Connect. Avaya Aura and Avaya Equinox enable us to create solutions that connect people together with context from IoT applications and drive higher business performance across a number of industries such as healthcare, manufacturing, Smart Cities and retail."

Dr. Jeff Reed, Chief Technology Officer, Arrow Electronics Systems Integration

"The continuing dislocation of the workplace demands solutions that are inherently mobile, secure and accessible from virtually any device. Avaya Equinox delivers on this and more with a total communications solution that can be embedded in browsers and business applications. The Avaya Breeze Client SDK is not your everyday API - you have all the tools you need in a single solution that can be customized by vertical industry and workgroup needs, just what UC was intended to be."

Rich Costello, Senior Research Analyst for Unified Communications and Collaboration program, IDC

Additional Resources:

Video: A First Look at Avaya Equinox

Infographic: 5 Ways to Get Work Done Faster

About Avaya

Avaya enables the mission critical, real-time communication applications of the world's most important operations. As the global leader in delivering superior communications experiences, Avaya provides the most complete portfolio of software and services for contact center and unified communications with integrated, secure networking -- offered on premises, in the cloud, or a hybrid. Today's digital world requires some form of communications enablement, and no other company is better positioned to do this than Avaya. For more information, please visit www.avaya.com.

Certain statements contained in this press release may be forward-looking statements. These statements may be identified by the use of forward-looking terminology such as "anticipate," "believe," "continue," "could," "estimate," "expect," "intend," "may," "might," "plan," "potential," "predict," "should" or "will" or other similar terminology. We have based these forward-looking statements on our current expectations, assumptions, estimates and projections. While we believe these are reasonable, such forward looking statements involve known and unknown risks and uncertainties, many of which are beyond our control. These and other important factors may cause our actual results to differ materially from any future results expressed or implied by these forward-looking statements. For a list and description of such risks and uncertainties, please refer to Avaya's filings with the SEC that are available at www.sec.gov. Avaya disclaims any intention or obligation to update or revise any forward-looking statements.

All trademarks identified by ®, TM, or SM are registered marks, trademarks, and service marks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners

Follow Avaya on Twitter, Facebook, YouTube, and LinkedIn.

Monday, 17 October 2016 00:00

LANDESK Expands Ransomware Protection

Latest release extends multi-layered endpoint protection, strengthens organisation’s core areas of defense


BRACKNELL, UK – Building on a multi-layered approach to defend against ransomware, LANDESK today announced new capabilities to its LANDESK® Security Suite. With a growing number of ransomware threats menacing enterprises, the latest additions aid in closing security gaps across the entire organisation-a strategy that’s recognized as the best way to battle ransomware.


Ransomware is an imminent threat to organisations and shows no signs of slowing down. According to the FBI, criminals have already collected $209 million in revenue in the first quarter of 2016, and that number could exceed $1 billion by year-end. And while the average ransom is still relatively small - between $200 and $5000 - the price is going up.


“The good news is, accepting the inevitable doesn’t mean accepting defeat,” said LANDESK Chief Security Officer Philip Richards. “While ransomware poses a very real threat to organisations and their systems, by taking a sophisticated, multi-dimensional defense to protect against it, organisations can mitigate the negative effects.” Cyber watchdogs like US-CERT and the Center for Internet Security (CIS) agree.


LANDESK Security Suite offers the recommended multi-layered endpoint protection, without disrupting productivity or business operations. With this latest release, LANDESK has expanded its suite in all three critical areas of defense: detection, prevention and remediation. “The LANDESK Security Suite provides a much needed solution that tackles how to respond to ransomware attacks, protect data and devices, and in the worse-case scenario, minimise impact should a security breach occur,” continued Richards.


Detection. No organisation wants to fall victim to malware threats its AV vendor identified and tagged. Still, even with strong protection, it’s important to account for today’s highly dynamic malware, which can transform itself before or after an attack. The Verizon 2015 Data Breach Investigations Report found that 70 to 90 percent of malware samples are unique to a single organisation. That’s why LANDESK Security Suite enhances AV detection with active and passive discovery technologies, visibility across the network and actionable data. In this new release, IT can display information about the applications on each endpoint and act instantly on suspicious and malicious apps.


Prevention. Realistically, ransomware will get in. When that happens, the goal is to minimize the chances it can execute. LANDESK Security Suite offers a range of industry-recommended preventive measures, including, but not limited to, application, device, and connection control and automated application and OS patching.

With compromised websites regularly exploiting known vulnerabilities in software, patching internet-facing applications is particularly critical. That said, it can be time-consuming and applied inconsistently, and may break critical business applications as it seeks to repair others. Even seasoned experts like US-CERT sometimes fail to apply patches as necessary. With that in mind, Security Suite simplifies patch management with best practices, automated processes, fast deployment and no impact on users. In this release, the new Installed Patch Report provides an additional tool for timely, effective patching-offering easy access to data on installed patches and those that still must be applied.


Additionally, Security Suite can now help keep ransomware and other malware from modifying the master boot record and rendering the system useless.


Remediation. Detection and prevention are crucial, and in many cases highly effective, but organisations still need a plan in case ransomware executes on the network. Realistically, all it takes is one user who clicks the wrong link or downloads a malicious attachment in email to fall victim to an attack. Luckily, LANDESK Security Suite adds to the final piece of the protection puzzle. This latest release tackles the most widespread form of ransomware, which encrypts files and hides the critical decryption key before demanding ransom. Security Suite detects any attempt to encrypt files on the local machine, stops the encryption process, and notifies all other computers on the network so the ransomware cannot be unleashed on other users-effectively thwarting the attack.


For more information regarding LANDESK Security Suite, visit http://www.landesk.com/products/security-suite/



LANDESK is the global authority on user-centered IT. By integrating and automating IT tasks, LANDESK helps organisations balance rapidly evolving user requirements with the need to secure critical assets and data. LANDESK is headquartered in Salt Lake City, UT, and has offices all over the world. To learn more, visit www.landesk.com.

Copyright © 2016, LANDESK. All rights reserved.