Spring World 2015

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 27, Issue 3

Full Contents Now Available!

Press Releases

Press Releases (1337)

BASINGSTOKE – Thales has been awarded a 10-year contract to support computerised control system services at all but two of EDF Energy’s nuclear power stations in the United Kingdom. The Long Term Support contract, worth over £30m, was awarded by EDF Energy as part of their continuing commitment to securing the UK’s future energy generation requirements.

The extended safe operation of the nuclear generation fleet is an essential part of securing the UK’s energy future until the next generation of nuclear power stations comes on line.

The power stations’ Data Processing and Control Systems are high capital value assets that are technologically complex and critical to operations. Thales was selected by EDF Energy in part because of its 30 years’ experience of developing, managing and delivering data process and control systems into the nuclear industry. Thales is well known in the nuclear industry for its integration of holistic security systems and for its industrial cyber-security expertise.

Nigel Houlton, Head of Lifetime Programmes at EDF Energy, said: “EDF Energy's strategy is to extend the life of our existing nuclear powers stations where it is safe and economically viable to do so. The existing nuclear stations supply nearly 9GW of safe, reliable and low carbon electricity to the national grid and therefore have a vital role to play in maintaining the security of our electricity supply.”

Phil Naybour, Vice President, Secure Communications and Information Systems, Thales UK, said: “This long-term support contract will help to secure the immediate future of the UK’s energy requirements, by allowing EDF Energy to deliver on its plans to extend the safe operation of its nuclear power stations. This positive development is a result of a strong long-term partnership between Thales and EDF Energy. Together with the recent award of a separate contract to deliver new Deployable Communications and Information Systems, this demonstrates the confidence that EDF Energy has in Thales as a leading provider of support, communications and security services to the UK’s nuclear industry.”

Change and configuration auditing is essential for organisations that need PCI DSS says Netwrix

With recent PCI DSS (Payment Card Industry Data Security Standard) compliance incidents costing companies millions of pounds in fines and losses and inflicting damage to valuable brand reputations, Netwrix is urging organisations processing payment cards to follow six best practices to safeguard against a security incident.

Netwrix points to the recent eBay breach that forced the company to advise 145 million active users to change their passwords to avoid financial information loss, while the breach at US retailer Target resulted in 40 million stolen credit card numbers and compromised the personal information of more than 70 million customers.

To help organisations avoid such data breaches and their consequences, Netwrix recommends six essential rules around change and configuration auditing:

1) Separate Environments - Minimise your risks by reducing PCI scope within your systems and enforce separation of environments by continuously auditing access and changes to the systems where cardholder data is stored.

2) Audit Access Control - Ensure that permissions are adequate and access to sensitive data is limited only to people who need it. Change and configuration auditing can help by giving you precise information about the state of access rights and all changes to it, alerting you to critical issues and helping with investigation in the event of unauthorised access.

3) Audit Provisioning and De-Provisioning of Users - Organisations should establish control over user creations and removals. A comprehensive change and configuration auditing solution will provide daily and on-demand reports as well as real-time alerts on these critical modifications.

4) Audit of Privileged Users' Activities - A particular emphasis should be placed on changes made by administrative accounts: changes to user access rights, elevation of privileges, mistakenly changed permissions and other security related events. Daily and on-demand reports and real-time alerts provided by change auditing solutions will help organisations to stay secure.

5) Document Everything - You never know what part of your system activities or during what period you will be required to demonstrate to the auditor, so keep it all. In addition to a complete audit trail, some of the more advanced change and configuration auditing solutions allow you to record video of user activities on critical systems, along with metadata, and provide search and replay capabilities. A regular review of audit trails may also assist in preventing breaches before they occur.

6) Monitor and Test - Change and configuration auditing solutions will provide a complete audit trail with detailed information on access and changes with ‘who, what, where, and when' details, including after and before values for each event. This will simplify root-cause analysis and allow proactive prevention of malicious activities.

"Recent examples show that it is not enough to align your processes and policies with PCI DSS guidance," said Alex Vovk, President of Netwrix. "You must also establish mechanisms to verify these processes actually work and be able to prove that to all stakeholders: IT management, executives, and auditors. Essentially, change auditing is what makes your compliance efforts provable."

About Netwrix Corporation
Netwrix Corporation, the #1 provider of change and configuration auditing solutions, delivers complete visibility into who did what, when and where across the entire IT infrastructure. This streamlines compliance, strengthens security and simplifies root cause analysis.  Founded in 2006, Netwrix is ranked in the Top 100 US software companies in the Inc. 5000 and Deloitte Technology Fast 500. Netwrix software is used by 160,000 users worldwide. For more information, visit www.netwrix.com.

Etherios taps into the power of salesforce.com’s social, mobile and connected cloud technologies to help accelerate business transformation for companies using Service Cloud

Etherios, a division of Digi International and a Platinum Cloud Alliance Partner of salesforce.com, announced it is an inaugural member of the Salesforce Fullforce Masters Program which recognises partners with proven expertise delivering industry and cloud-specific services and solutions for customers.

                                                                          

Etherios was selected to join this elite program based on its proven expertise with Salesforce1 Service Cloud and history of delivering overwhelming success to its Salesforce customers coupled with its differentiated and comprehensive Internet of Things (IoT) solution offering. This combined offering enables organisations of all sizes to realise tangible business value by connecting their products, people and processes with the Salesforce1 Platform. The Fullforce Master Program recognises partners who have demonstrated the strongest capabilities so as to jointly provide customers with unparalleled success.

Comments on the News

  • “Becoming part of the Fullforce Master Program is a testament to our consultants’ knowledge and relentless focus on driving customer success,” said Mike Dannenfeldt, senior vice president of Etherios Solutions.
  • “Etherios is a leading partner in the Salesforce Cloud Alliance Program and I am very pleased to recognise it as holding a Fullforce Masters in Service Cloud,” said Dan Streetman, SVP of worldwide alliances and channels, salesforce.com.
  • “Etherios didn’t just help us deploy Service Cloud, it helped us transform our business,” said David Espindola, CIO Flexera Software.
  • Learn more about Salesforce Fullforce: http://blogs.salesforce.com/company/2014/02/salesforce-fullforce-program.html
  • Become a fan of Etherios :
  • Follow Etherios on Twitter:
  • Follow us on LinkedIn:

Using the Internet of Things to Deliver Effortless Customer Service with Service Cloud

Today’s customers are social, mobile and connected. The result is an unprecedented opportunity to engage customers 24/7 in a personalised way on every channel and on every device. And in today’s world, customers expect every service experience with a company to be one thing: effortless.

Enter the Internet of Things (IoT), a connected world, where companies are connecting their products with the people, processes and technology within their organisations. It’s about proactively identifying issues, resolving issues remotely when possible, and optimising field service technician deployments. By turning device and machine data into actionable intelligence in the Service Cloud you are able to deliver effortless service for customers.

 

About Etherios:

Etherios is a division of Digi International (DGII), a publicly traded company with over 600 employees in locations across North America, Europe and Asia serving a global customer base. Etherios is leading the Internet of Things (IoT) revolution by helping organisations connect products, people and processes. We are uniquely positioned as the only company providing a comprehensive connected solution encompassing advisory, wireless design and CRM services combined with Device Cloud, our award-winning platform-as-a-service. Our employees deliver unmatched business results and value as evidenced by a 9.9/10 customer satisfaction rating. Etherios is a strategic partner with some of the most recognised firms in the world and is a Platinum Cloud Alliance Partner of salesforce.com

For more information about Etherios, visit: www.etherios.com.

HEREFORD – Xytron Ltd, a leading data recovery services company, reports today that many consumers and businesses are attempting DIY retrieval of their data to failed media and physically opening the disk enclosure in non clean room conditions, thus compounding any potential recovery. Further to this it has been noted that the PCBs (Printed Circuit Board) are also being replaced in an attempt to gain access to data.

All magnetic storage media are manufactured in clean room conditions and to exacting tolerances, often less than 1 Micron tolerances. Opening the disk in standard room conditions will introduce airborne particulate into the drive. If the HDD is powered back up following the non clean room opening it will cause the heads to crash, that is scrape or damage the drive surface (platter(s)) and head stack assembly, which in extreme cases could render the data unrecoverable.

The PCB holds very specific information relating to the disk it is controlling, and so swapping or exchanging this will not help; in fact in some instances this could destroy any chances of data recovery completely, as the NV_RAM and or adaptive data could be written to the hard drive.

Why risk it?

The internet is a huge resource and a wonderful place for information and knowledge, however there has to be a caveat applied here, where or how can you qualify, what information is correct and from a trustworthy source? Anecdotal evidence should not be applied, here are just a few dangerous suggestions found online that should NOT be applied;

  1. Open hard disk up
  2. Replace PCB
  3. Bang or knock drive
  4. Format or system restore
  5. Place in freezer
  6. Download software from the internet
  7. Let friends or colleagues investigate

With 10 years and thousands of procedures carried out, Xytron has the skills and the engineers to attempt the very complex work of data retrieval which includes physical work inside the clean room, electronic failure, firmware failure and logical failure; in all instances the firm has the equipment and knowledge to tackle data failures professionally.

“The process at Xytron is; diagnosis, this establishes whether the media has logical, firmware, physical and or electronic failure”, comments Richard Cuthbertson head technician at Xytron, “from here the device is moved to the relevant department for the next stage, such as the clean room if the HSA (head stack assembly) has failed and the disk has physical issues, the hot air station for electronic work, and a recovery station for firmware and logical issues, following this work a write blocking full bit by bit clone is made of the device, it is this image that the engineers work with to retrieve the data”.

The final part of the process is to email the client our IntegriCheck software which is a folder and file listing of recovered data; this allows the client to check all information has been retrieved.

Here are a few key points from Xytron services;

1. 10 years successful trading

2. Tens of thousands of cases handled

3. In house clean room

4. No outsourcing of any cases

5. Free to join partner programme

6. Huge inventory of parts stock

7. Satisfied testimonial database

8. Have seen your issue and dealt with it successfully

9. Data held securely and promptly erased securely following the case

About Xytron Ltd.

Xytron data recovery is a provider of professional IT services, servicing consumers, organizations, SOHO and corporate retrieving inaccessible data from a variety of media such as disks, drives, USB pen, SSD and all backup devices, established in 2004 with an in house clean room facility, further information can be found here: http://www.xytron.co.uk

Further Contacts:

https://twitter.com/WeAreXytron

https://www.facebook.com/XytronDataRecovery

COLORADO SPRINGS, Colo.While there are many options for backing up and recovering data, an increasing number of businesses are turning to backup appliances as opposed to implementing a “bundle,” or a collection of software and hardware. With so many options, STORServer®, a leading provider of proven data backup solutions, is offering expert insight into the five features enterprise backup appliance users cannot go without.

In its new guide, “How to choose an enterprise backup appliance,” STORServer dives into the backup appliance selection process, offering insight on hardware and software considerations, key features, manufacturer support criteria and more.

“Not all backup appliances—enterprise or small office—are the same,” said John Pearring, vice president of STORServer. “Customers must choose wisely based on the parameters we’ve shared in order to get the best cost, solution and protection for their data.”

Features explored in the guide include:

  1. Source and target deduplication
  2. Disaster recovery replication
  3. Virtualization
  4. Console views
  5. Cloud support

Powered now by CommVault® Simpana, along with IBM® Tivoli® Storage Manager, STORServer Appliances offer a scalable range of enterprise backup appliances, smooth transition to the latest backup software versions and upgrade or consulting services that solve today’s data protection, discovery and content access challenges.

STORServer Backup Appliances are proven solutions developed, built and tested by industry experts. STORServer staff and resellers specialize in automated and simplified technology appliances around everything in the data protection arena.

STORServer provides every customer the opportunity to try out a backup appliance risk-free with its 30-day money back guarantee.

For more information on STORServer’s line of data backup solutions, visithttp://www.storserver.com. To access the guide, visit http://www.storserver.com/choose-enterprise-backup-appliance-infographic/.

Infographic-1

BURLINGTON, Wash. – RSA has now completed The Complete Guide to Cleaning and Restoration, a comprehensive textbook for its restoration, cleaning and remediation classroom courses.

A successor to the New Guide to Restorative Drying published in 2006, the new 600-page full-color book covers all courses offered by RSA. This includes courses in trauma scene cleanup, water restoration and applied structural drying, upholstery cleaning, fire and smoke restoration, odor control, microbial remediation, and carpet cleaning.

Extensively peer-reviewed by industry experts before publication, the book will be provided to all paid class participants, a valuable bonus. Participants in the July 31 Trauma Class will be the first to use it, then it will be rolled out to all other RSA classroom courses over the next couple of months.

“The Complete Guide is a summary of everything we’ve learned in the past 40 years about cleaning, restoring and remediation,” notes Kevin Fisher, Legend Brands Technical Education Manager. “We decided to make the entire book available to every class to show our commitment to the professionalism and growth of our industry.”

The original restorative drying book, first published by Dri-Eaz in the 1980s, was written by Dri-Eaz Founder Claude Blackburn and Dri-Eaz education staff. In 2006 the book was updated and expanded quickly became the standard reference for the restorative drying industry. In 2009, Purdue University selected the New Guide to Restorative Drying to be one of the textbooks for its newly established disaster restoration and reconstruction program.

“The Complete Guide is the definitive collection of RSA expertise,” says John Ormsby, president of Dri-Eaz Products. “It stands alone as the premier guide for today’s restoration, remediation and cleaning challenges.”

For more information about The Complete Guide and RSA’s course offerings, visit www.restorationsciencesacademy.com

About RSA

Restoration Sciences Academy provides real-world restoration training in dynamic and engaging learning environments taught by industry experts. RSA offers both classroom-based training courses and online courses. RSA courses teach proven techniques that help restorers work more efficiently and grow their businesses.

Pioneering technology services company, telent Technology Services Ltd, has increased its IT security capability by acquiring a 25% stake in CNS Group, the London-based information assurance and cyber security specialists.

IT Security is an increasingly critical component of services provided across the telent portfolio of service solutions, including Blue Light, Rail, Business and Traffic.

CNS will continue to be run and managed as a separate entity but the two organisations will work closely together.

"This deal is strategically beneficial to both telent and CNS, and enables us to build solutions bringing together telent's scale and ability to deliver end-to-end ICT solutions with CNS's specialist IT security and information assurance capabilities. In addition, this also provides new opportunities for both parties across our combined customer markets, some of which have already been identified and are being jointly developed together," said Chris Metcalfe, Managing Director of telent Technology Solutions.

CNS was established in 1999 and its customers range from FTSE 100 and larger public sector organisations to the SME sector.

CEO of CNS Group, Kevin Dowd, commented: "We are an ambitious firm and we're keen to put this strategic investment to good use, enhancing our customer offering, growing CNS and taking the company to the next level. We'll be looking at better ways of delivering our services, investing in our delivery platform and developing more offerings to sit alongside our existing proprietary technology."

Dowd continued: "Our association with telent will also mean that we can target bigger deals and we're aiming to improve our market share in this sector."

For more information, please visit: www.telent.com.

Company surpasses $60M in run-rate revenue and 2,700 customers

HOUSTON – Alert Logic (www.alertlogic.com), the leading provider of Security-as-a-Service solutions for the cloud, today announced GAAP revenues for the quarter ending June 30, 2014 of $13.8 million, up 36 percent from the second quarter of 2013. Alert Logic’s annualized revenue under contract in the month of June 2014 exceeded $60 million, and is tracking ahead of the company’s plan to reach a $70 million run-rate by the end of 2014. Alert Logic currently has more than 2,700 customers using its Security-as-a-Service solutions to protect their networks and data across cloud, hosted and on-premises environments.

“At the outset of 2014, we felt we had the opportunity to build our business to $60 million in revenue by mid-year, and break through $70 million by year-end,” said Gray Hall, Alert Logic’s CEO. “Our ongoing progress is a testament to strong customer demand for modern security tools and services designed from the ground up to protect cloud-based applications.”

Alert Logic’s notable highlights for Q2 2014 include:

·       Product Updates: Alert Logic released new security solutions for the Microsoft Azure platform, making Alert Logic Threat Manager and Alert Logic Web Security Manager available on the Microsoft Azure cloud platform.

·       Recognition: Alert Logic was recognized for its innovative approach to cloud security by receiving a Silver Award in the Cloud Security category as part of Network Products Guide’s 9th Annual 2014 Hot Companies and Best Products Awards. Additionally, TMCnet recognized Alert Logic Threat Manager with ActiveWatch as part of its 2014 Cloud Computing Excellence Awards.

·       International Expansion: Alert Logic announced its international expansion into EMEA, which will include a UK-based datacenter and Security Operations Center, as well as expanded sales, marketing and support teams. The EMEA presence will address the growing demand for security and compliance solutions from European customers by providing local support for the needs of those businesses and industries.

A privately held company, Alert Logic publicly reports its Generally Accepted Accounting Principles (GAAP) revenue results and growth rates quarterly, in addition to its annualized recurring revenue under contract. Alert Logic’s financial statements have been audited in accordance with GAAP since 2005. All Alert Logic revenue is derived through long-term subscription contracts, consistent with the company’s Security-as-a-Service business model. Alert Logic’s solutions are sold directly to enterprise customers and through a diversified channel of resellers and cloud service provider partners.

   Alert Logic specializes in providing a portfolio of Security-as-a-Service solutions for customers of hosting and cloud service providers. More than half of the largest managed hosting and cloud service providers use Alert Logic to secure their customer environments, making Alert Logic the de facto standard for securing infrastructure in hosted and cloud environments. Alert Logic’s Security-as-a-Service solutions provide customers four distinct advantages: market-leading security tools, a fully outsourced and managed Security-as-a-Service delivery model, integrated 24×7 Security Operations Center (SOC) services to monitor and provide expert guidance, and the ability to deploy wherever a customer has IT infrastructure, including the cloud.

 

Additional Resources Available:

Blog

@alertlogic on Twitter

LinkedIn

 

About Alert Logic

Alert Logic provides security and compliance for cloud, hybrid, and on-premises infrastructure, allowing customers to benefit from deep security insight and continuous protection at a lower cost than legacy security offerings.  Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure is deployed.  Alert Logic partners with the leading cloud platforms and hosting providers to protect over 2,700 organizations worldwide.  Built for cloud scale, our patented platform manages Petabytes of data, analyzes 255 million security events monthly, and identifies 40,000 incidents a month that are managed by our security operations team. Alert Logic is based in Houston, Texas, and was founded in 2002.  Alert Logic recently expanded internationally by establishing UK offices in London and Cardiff.  For more information, please visit www.alertlogic.com.

New York Academy of Medicine Report Emphasizes Community Approach

NEW YORK — Drawing on the lessons of Superstorm Sandy, a new report from TheNew York Academy of Medicine (NYAM), “Resilient Communities: Empowering Older Adults in Disasters and Daily Life,” presents an innovative set of recommendations to strengthen and connect formal and informal support systems to keep older adults safe during future disasters. 

Following the 2012 superstorm, tens of thousands of older adults were isolated in high-rise buildings and private homes, in need of food, water, heat, medical attention, and medication. This unprecedented report looks at not just the vulnerabilities of older adults, but at the role many can play in leading and supporting their communities during disasters. Its findings are especially important for policymakers; city, state, and federal agencies; community and faith-based organizations; health care and housing providers; and emergencymanagement personnel. While the report looks at the experience of older adults in New York City, it has implications for communities across the U.S.

“Older adults have unique needs during disasters, but also unique strengths to offer in supporting their communities,” said Jo Ivey Boufford, MD, NYAM President. “With extreme weather projected to increase, a new strategy is required to keep older adults, who are often among New YorkCity’s most long-term, civically engaged residents, safe. Older people are also effective first responders, and should be seen as problem solvers in disasters rather than problems to be solved.”

New York City’s 1.4 million people age 60 and over constitute 17 percent of the city’s total population. This number is projected to increase by 50 percent over the next 20 years. Efforts to increase individual preparedness among older people through the creation of “go-bags” and the stockpiling of supplies have been repeatedly undertaken, but this approach is not enough. Vulnerable populations face significant barriers in attempting to prepare, including lack of funds, transportation, and storage space, as well as difficulty reading maps and other preparedness content.

“Individual preparedness is important, but it doesn’t connect older adults with the resources and support they need in disaster situations,” said Lindsay Goldman, report author and Project Manager at NYAM. “We are calling for a paradigm shift towards a community preparedness model of disaster recovery from one of primary emphasis on individual preparedness. Resources are needed for enhancing communities’ social networks, connectedness, and integration of assets long before disaster strikes.”

The report draws on data collected immediately after Superstorm Sandy, and interviews with older adults, experts, and leaders of community-based organizations in affected neighborhoods. It presents four key findings about the experience of older adults post-Sandy:

  • Formal and informal social networks influenced older adults’ decisions and facilitated their access to information and assistance.
  • Because older people had not been engaged in emergency planning, emergency services were often inadequate, inappropriate, or inaccessible, and basic and health     care needs went unmet.
  • Older adults actively supported their communities before, during, and after Superstorm Sandy.
  • The local neighborhood infrastructure was a critical factor in meeting the needs of older people within affected communities.

The report recommends 12 action steps toward community preparedness, including establishing community planning hubs in each neighborhood, supporting landlords with large concentrations of older adults, enacting a pharmacy law for disasters, and consulting with home health care and hospice providers on emergency plans.

Funded by the New York Community Trust and the Altman Foundation, the report builds on the platform of Age-friendly New York City, a public-private partnership led by NYAM to enhance city life for older adults.

Download the report summary and full report.

About The New York Academy of Medicine

The New York Academy of Medicine advances the health of people in cities.

An independent organization since 1847, NYAM addresses the health challenges facing the world’s urban populations through interdisciplinary approaches to policy leadership, innovative research, evaluation, education, and community engagement. Drawing on the expertise of diverse partners worldwide and morethan 2,000 elected Fellows from across the professions, our current priorities are to create environments in cities that support healthy aging; to strengthen systems that prevent disease and promote the public’s health; to eliminate health disparities; and to preserve and promote the heritage of medicine and public health. For more information, visit www.nyam.org

 

Investment into Telehouse North Two in London Docklands Data Center Campus to enable hybrid services to realize growth for global business

NEW YORK – Telehouse, the global leader for data centers, international Internet exchanges and managed IT services, along with its parent company KDDI, announces that Telehouse Europe is investing $231 million in the first of a new generation of mission-critical data centers in the London’s Docklands. The investment in the new data center ‘North Two,’ will enable businesses to take advantage of evolving global technologies, such as the Internet of Things and the IT industry shift towards Hybrid Cloud, and encourage innovation, growth and new jobs.

North Two will be built next to Europe’s original data center, Telehouse North. The new facility will extend Telehouse’s Docklands data center campus and represents a continued commitment by Japan’s second largest carrier, KDDI. Over the last 25 years, KDDI has invested over $445 million, with $188 million being invested over the last five years alone. This new investment represents the continued diversification and expansion plans of KDDI outside of Japan and provides the high-tech infrastructure that will drive further investment in the UK’s technology sector at a crucial time of growth.

“Today’s announcement speaks volumes to Telehouse’s commitment to ensuring our vital network ecosystems throughout the UK, the US, and around the world are consistently expanding and thriving to service the needs of our entire global digital economy,” comments Satoru Manabe, President and CEO of Telehouse America.

“The $231 million investment in North Two is crucial to the expansion of one of the world’s most critical Internet hubs marks a new dawn for data centers,” adds Hiroyuki Soshi, Managing Director of Telehouse Europe. “We believe that as the Internet continues to develop at such a dramatic pace, the underlying infrastructure in the Docklands must stay ahead to meet the needs of the future.”

UK Business Secretary Vince Cable adds, “It is good news that Japanese ICT company KDDI has decided to invest further into its global data center at the Docklands. Britain’s economy is growing thanks to Japanese investment and in 2013 and 2014, KDDI was the second biggest investor into the UK starting over 100 new projects and creating 3,000 new jobs.”

Telehouse’s Docklands data center campus facilitates the majority of the London Internet Exchange’s (LINX’s) capacity, which has a huge, continuously growing proportion of all UK internet traffic flowing through it.

To learn more about TELEHOUSE America and KDDI visit http://www.telehouse.com and http://www.kddi.com.

For more information on Telehouse UK, go to www.telehouse.net