The PRWIRE Press Releases http:// 2017-06-26T23:02:00Z Media release: Datto named a Visionary in Gartner’s 2017 Magic Quadrant for DRaaS 2017-06-26T23:02:00Z media-release-datto-named-a-visionary-in-gartner-s-2017-magic-quadrant-for-draas Norwalk, Conn -- June 26, 2017 –  Datto, Inc. a provider of backup and DRaaS appliances, SaaS data protection, and managed networking products, today announced that the company has been included in Gartner’s annual Magic Quadrant for Disaster Recovery as a Service. Datto was recognized for the second consecutive year in the “Visionaries” quadrant. The Magic Quadrant is recognized as one of the leading resources used by companies evaluating DRaaS providers in the market.1   Providing data protection and business continuity solutions for more than 50,000 companies around the world, Datto ensures business data and infrastructure is continuously secure and accessible no matter where that data is stored, whether it’s on-site or in the cloud.   Datto’s flagship product line is the market leading SIRIS 3, the only complete DRaaS solution available as a physical, software or virtual appliance protecting Windows, Mac, and Linux workloads. Business data can be backed up to a local device and synchronized to the secure 320+ petabyte Datto Cloud to provide robust recovery options from any type of disaster. This provides failover to a virtual machine and restoration in as little as 6 seconds to return to normal business operations.   Additionally, Datto offers the SaaS Protection product suite securing G Suite and Microsoft Office 365 data to protect against data loss in these popular SaaS applications. Datto Networking, Datto’s latest solution built for Managed Service Providers, complements DRaaS with network continuity for small and medium businesses through access points, switches and the networking appliance with integrated 4G LTE failover.   “Disaster recovery is becoming increasingly important as businesses continue to face evolving threats, especially cyberattacks, that threaten to shut down their operations,” said Austin McChord, CEO of Datto, Inc. “We believe being named a visionary in this space could only be achieved by our focus on keeping businesses running, no matter the circumstance. We are continuously building on our market leading business continuity offerings and released compelling new services at our recent DattoCon 2017 conference.”   Releases at DattoCon 2017 included new features such as robust Hyper-V support and Fast Failback enabling rapid restoration, an expansion of the SIRIS 3X all-flash line to include rack mounted units, and a refresh of Datto’s most popular BDR device, the ALTO 3, which is designed to support smaller environments.   Additional announcements highlighted a next generation architecture for Datto SaaS Protection to enable lightning fast performance, upgrades to the Datto Networking line, and enhancements to the Partner Portal featuring new dashboards for real-time, mobile visibility into the status of Datto products and services. All in, the DattoCon product announcements further Datto’s MSP led strategy of protecting business data on-site, in transit, and in the cloud.  Gartner Disclaimer: Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.   1 Gartner “Magic Quadrant for Disaster Recovery as a Service” by Ron Blair, Mark Thomas Jaggers; June 19, 2017.  About Datto: Datto protects business data and provides secure connectivity for tens of thousands of the world's fastest growing companies. Datto's Total Data Protection solutions deliver uninterrupted access to business data on-site, in transit and in the cloud. Thousands of IT service providers globally rely on Datto's combination of pioneering technology and dedicated services to ensure businesses are always on, no matter what. Datto is headquartered in Norwalk, Connecticut and has offices in Rochester, Boston, Portland, Toronto, London, Singapore, and Sydney.  Media Contacts Amanda Conroy/India Bednall Espresso Communications on behalf of Dattodatto@espressocomms.com.au +61 2 8016 2200 WatchGuard Technologies Named a Visionary in Gartner’s Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls) 2017-06-23T04:36:41Z watchguard-technologies-named-a-visionary-in-gartner-s-magic-quadrant-for-unified-threat-management-smb-multifunction-firewalls WatchGuard® Technologies, a leader in advanced network security solutions, today announced that for the third consecutive year, it has been positioned as the only company in the Visionaries quadrant of Gartner’s Magic Quadrant for the Unified Threat Management (SMB Multifunction Firewalls) market.    “We consider our consistent Visionary position within the UTM Magic Quadrant a reflection of WatchGuard’s fundamental determination to understand, anticipate and address the network security challenges facing SMBs and distributed enterprises today,” said Prakash Panjwani, CEO of WatchGuard Technologies. “With the addition of offerings like APT Blocker and Threat Detection and Response, we’ve accelerated key security services to market faster than competitors, which is vital as we work to continually expand the definition of unified threat management.”         WatchGuard believes that placement as the only Visionary in the UTM Magic Quadrant for the past three years validates its mission to deliver a comprehensive set of enterprise-grade security solutions that are easily deployed and managed for mid-market customers. WatchGuard’s security appliances run on the Fireware® platform, which is designed to operate leading security engines in every category. Some of the company’s most notable strengths include WatchGuard Total Security Suite,  its all-in-one bundle of security services that offers protection for both the network and the endpoint, and WatchGuard’s Dimension’s data analytics and reporting capabilities. WatchGuard can rapidly address customers’ latest security challenges without being stalled by lengthy development cycles by quickly incorporating new security services into its existing products.    Download the full text of the June 2017 Magic Quadrant for the Unified Threat Management (SMB Multifunction Firewalls) market at: https://www.watchguard.com/wgrd-resource-center/gartner-magic-quadrant-utm-2017  About the Magic Quadrant: Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organisation and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.About WatchGuard Technologies, Inc. WatchGuard® Technologies, Inc. is a global leader in network security, secure Wi-Fi, and network intelligence products and services to more than 75,000 customers worldwide. The company’s mission is to make enterprise-grade security accessible to companies of all types and sizes through simplicity, making WatchGuard an ideal solution for distributed enterprises and SMBs. WatchGuard is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit : https://www.watchguard.com For additional information, promotions and updates, follow WatchGuard on Twitter: @WatchGuard, on Facebook (https://www.facebook.com/watchguardtechnologies), or on the LinkedIn Company (http://www.linkedin.com/company/watchguard-technologies) page. Also, visit our InfoSec blog, Secplicity, for real-time information about the latest threats and how to cope with them at www.secplicity.org.   CA Technologies named a leader in Gartner Magic Quadrant for Project Portfolio Management, Worldwide 2017-06-22T08:42:13Z ca-technologies-named-a-leader-in-gartner-magic-quadrant-for-project-portfolio-management-worldwide Sydney – 22 June, 2017 -- CA Technologies (NASDAQ:CA) today announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the "Magic Quadrant for Project Portfolio Management, Worldwide."* The report evaluated CA Project & Portfolio Management (CA PPM), and positioned CA Technologies highest in the Leaders quadrant for Ability to Execute. According to the report, "Leaders can provide comprehensive, resilient and high-performance PPM functionality to the project-execution-level customer as well as to the portfolio-level customer. Additionally, leaders recognise the market need for different types of PPM products matching well with the proliferation of different project and work environments of their prospective customers. As such, leaders are acquiring and building out a thoughtful inventory of different PPM products supporting the varied types of customers looking for software in the PPM space.” “In order to lead, companies must anticipate their customer’s needs and deliver on those needs faster than the competition,” said Angela Tucci, general manager, Agile Management, CA Technologies. “CA Project & Portfolio Management provides our customers the ability to quickly correlate financial and business investments with value delivery, giving them the ability to anticipate, react and invest faster than their competition to meet market needs.” With CA PPM, companies can track and prioritise market and customer needs and make better decisions on how to invest limited resources to better optimise enterprise, IT, service and product portfolios. Available via the cloud, on-premises, and hosted delivery models, CA PPM improves business leaders' ability to prioritise strategic initiatives and resources. CA Technologies was one of three vendors placed in the Leaders quadrant. A recognised leader in PPM, in November 2016 CA Technologies was named as a Leader in Gartner's "Magic Quadrant for Integrated IT Portfolio Analysis Applications."** CA’s Agile Management solutions are being demonstrated at the Gartner PPM & IT Governance Summit 2017, June 5-7 in Orlando, Florida and June 12-13 in London, England. For more information on CA Project and Portfolio solutions, visit: www.ca.com/us/products/ca-project-portfolio-management.html or visit CA at Booth #30 in Orlando, and Booth #P2 in London. To receive a complimentary copy of the report, visit Magic Quadrant for Project Portfolio Management, Worldwide. *Gartner, Inc., “Magic Quadrant for Project Portfolio Management, Worldwide,” Daniel B. Stang, Matt Light, Teresa Jones, May 25, 2017. **Gartner, Inc., "Magic Quadrant for Integrated IT Portfolio Analysis Applications," Daniel B. Stang, Stefan Van Der Zijden, November 22, 2016. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organisation and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. About CA Technologies CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate - across mobile, private and public cloud, distributed and mainframe environments. Learn more at www.ca.com. Follow CA Technologies Twitter Social Media Page Press Releases Blogs Legal notices Copyright © 2017 CA, Inc. All Rights Reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Dell Boomi’s Latest Release Builds on Cloud Integration Platform to Drive Digitally Connected Experiences with Customers, Partners and Suppliers 2017-06-21T04:31:56Z dell-boomi-s-latest-release-builds-on-cloud-integration-platform-to-drive-digitally-connected-experiences-with-customers-partners-and-suppliers ROUND ROCK, Texas, June 20, 2017 – Dell Boomi™ (Boomi) announced the availability of the Spring 2017 release of the industry’s most robust and comprehensive cloud-native, enterprise integration platform to move, manage, govern and orchestrate data across hybrid IT architectures. The latest release enables Boomi customers to more efficiently connect everything and enable everywhere, with new, no code application integration accelerators, new features to fortify DevOps at enterprise scale, and improve data governance and security. “Today’s enterprise organization needs to create digitally connected experiences with customers, partners, and suppliers in order to stay ahead of the competition and remain relevant,” said Chris McNabb, CEO of Boomi. “Integration teams are under ever increasing pressure to make this happen at an accelerated pace. With this release, our platform provides organizations with the industry’s most comprehensive and robust integration foundation for rapidly building a digital business that’s smarter, better and faster.” Boomi’s Spring 2017 release includes more than 150 features that have been added to the market-leading Boomi integration platform as a service (iPaaS) over several months and are now generally available. Highlights include the following. Low and No Code Integration Accelerators Boomi accelerates implementations by providing a drag-and-drop data integration and application development environment, pre-built tools and reusable components, including: Workflow Automation - In March 2017, Boomi acquired ManyWho, a low-code development platform for building and deploying workflow applications, making Boomi the most comprehensive cloud-native integration and application development platform to accelerate digital transformation. The latest release allows an application developer to easily invoke a Boomi integration process within a workflow. No Code, Pre-built Integration Templates - Boomi offers citizen integrator support with 12 additional processes for the Boomi Process Library. The Boomi Process Library provides proven examples created by Boomi experts that any Boomi user can choose as a starting point to build their integration. Support for PaaS Integration - Boomi easily integrates with leading PaaS vendors and provides comprehensive support for PaaS solution integration. This release offers new connectors for Azure, AWS and Google. B2B Trading Partner Common Components - Three new types of EDI components provide increased reusability of common data among Trading Partners. Re-using common components increases flexibility, reduces duplication and simplifies updates. This saves time and development effort, especially for organizations with varied businesses, organizations growing through acquisition, as well as conglomerates and organizations with semi-autonomous business units. Fortified DevOps Features DevOps teams are looking for the ability to simplify and automate the delivery and deployment of applications and integrations, allowing organizations to focus more of their resources on innovation. Boomi’s fortified DevOps features provide new, robust enterprise capabilities, while reducing the complexity associated with IT operations, including: Docker Container Deployment - Easily create pre-configured containers. Docker containers simplify and provide flexibility to spin up and down instances of Boomi with pre-defined configurations to increase developer productivity and speed up application integration. Programmatic Onboarding for Trading Partners - Simplifies and speeds up onboarding, dramatically reducing the time required from weeks and days to hours and making the setup error-free. Data Stewardship Independence - Four new platform Quarantine API endpoints enable resolution actions outside of Boomi Master Data Management (MDM). This means data stewards can work in other applications, including cloud applications like Slack, to streamline governance tasks and approvals. Dynamic Integration Processes - With Boomi’s Process Route Shape feature, users can break down multi-step processes into smaller, independent functional groups and dynamically execute sub-processes. This independence between the main process, sub-process, and routing rules enables reusability of repeated logic and actions, and facilitates seamlessly updating and testing integrations. Data Governance and Security Organizations need technologies that provide ease of use to accelerate digital initiatives, while offering appropriate controls for the business units they support. Customers need to enforce the right data governance and security models that ensure compliance with business policies, contracts and regulations. Boomi’s latest release includes: Automated Data Governance - Data source rankings ensure that each Boomi MDM golden record is from the most trusted source system and propagated across all systems. Data stewards can easily enforce governance policies with automatic updates to all golden records when the data model and associated business rules are changed. Identity Management - With Boomi API Management developers can now leverage third party Authentication Sources to support OAuth 2.0 and SAML authentication use cases. API Policy Management - With an unlimited number of API calls, an organization can be vulnerable to Denial of Service (DoS) attacks and potentially overwhelm or tax the infrastructure. Boomi API Management allows for the configuration of policies to define a Contract. These Contracts can be coupled with entitlement tiers (i.e. Gold, Silver, or Bronze) as a mechanism for API providers to define expected service levels across their customer base. Additionally, with Quota, Rate Limit and Throttling functionality, the API Provider can limit the number of API calls for a specific time period. To learn more about the Boomi Spring release or see a demonstration, please visit: https://boomi.com/blog/boomi-advances-speed-efficiency-application-integration About Dell Boomi Dell Boomi (Boomi), an independent business unit of Dell, accelerates business agility by integrating the information organizations need whenever and however they need it. The Boomi integration platform dramatically transforms the way organizations connect, create, manage and govern all their applications and data. As a result, more than 5,800 organizations of all sizes use the Boomi platform to run smarter, faster, and better. Boomi also helps customers drastically reduce implementation times over traditional integration, MDM, API management and workflow automation solutions. Visit http://www.boomi.com for more information. © 2017 Boomi Inc. Dell, Dell Boomi, ManyWho, and Boomi iPaaS are trademarks of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others. # # # NETGEAR NIGHTHAWK X10 VOTED BEST WIFI ROUTER IN EUROPE 2017-06-21T04:27:22Z netgear-nighthawk-x10-voted-best-wifi-router-in-europe-1 SYDNEY, Australia — June 21, 2017 — For the second consecutive year, NETGEAR®, Inc. (NASDAQ: NTGR), the leading provider of networking devices that power today’s smart home, has secured the top spot for routers in the 2017 European Hardware Awards. The Nighthawk X10 AD7200 Smart WiFi Router (R9000) was named Best Router in this annual competition to honour exceptional hardware sold in the European Union. Nighthawk X10 debuted on the market last spring as the industry’s first —and fastest— router for media streaming and instant backup. The European Hardware Awards is created by the European Hardware Association (EHA). Votes were tallied from more than 100 experienced editors from EHA member publications representing the largest technology news and reviews sites in Europe: Hardware.Info (Benelux region), CowCotLand (France), Hardwareluxx (Germany), Hardware Upgrade (Italy), PurePC (Poland), Lab 501 (Romania), Geeknetic (Spain), SweClockers (Nordic countries) and KitGuru (United Kingdom). Today’s video files are getting larger with 4K and VR video. Offloading from capture devices and moving these large files within a network often becomes a time-consuming and challenging task. The NETGEAR Nighthawk X10 Smart WiFi Router is powerful enough to move these files at unprecedented speed and provides easy access once the file is stored on the network. It offers ultra-smooth 4K streaming, even to remote devices, and is the industry’s first router to run Plex Media Server without the need for a computer. Nighthawk X10 combines a powerful 1.7GHz Quad Core processor — the fastest processor in a home router — and Quad-Stream Wave 2 WiFi architecture plus next-generation high speed 802.11ad WiFi, so you can enjoy blazing-fast combined wireless speeds up to a furious 7.2Gbps*. The latest MU-MIMO technology supports simultaneous streaming, while 160MHz doubles WiFi speeds to mobile devices. Nighthawk X10 is also the industry’s first router designed for the home market that includes a 10Gigabit port for supporting a fiber connection. “We are honoured to have a Nighthawk router selected as the Best Router in the European market two years in a row! Last year it was Nighthawk X6 and now Nighthawk X10,” said David Henry, senior vice president of Connected Home for NETGEAR. “We design all NETGEAR products not only to meet but to surpass the highest performance standards, and we strive to deliver the newest technology innovations. We know Nighthawk X10 to be the industry’s best, so it’s extremely rewarding to have it confirmed by technology experts in continent-wide voting.” Key Features of the Award-Winning Nighthawk X10: AD7200 Quad Stream Wave2 WiFi supports wireless speeds up to 4600+1733+800Mbps* Fastest 60GHz 802.11ad WiFi technology for instant downloads, backup and minimal latency during online game play Plex Media Server for all your media – anytime, anywhere Powerful 1.7GHz Quad Core Processor boosts performance for 4K streaming or VR gaming 4 high-performance Active Antennas for better WiFi coverage and faster speeds 6 Gigabit Ethernet LAN ports with dual ports that can be operated in link aggregation mode for faster file transfers (up to 2Gbps wired speeds) 2 SuperSpeed USB 3.0 ports for faster streaming, backup and easy access to stored media Automatic backup to the cloud with Amazon Drive NETGEAR® ReadyCLOUD® provides easy, private and secure remote access to USB connected storage 10Gigabit fiber port for lightning-fast backup and media streaming to/from a NETGEAR ReadyNAS® storage device or other NAS MU-MIMO capable for simultaneous streaming of data to multiple devices Dynamic QoS prioritises network traffic for uninterrupted video streaming for applications like YouTube®, Netflix® & others’ NETGEAR® Up app has your router up, running and configured from the convenience of any Android or iOS mobile device NETGEAR genie® app for a personal dashboard to monitor, control and repair your home network, even when you’re away from home Watch this video to learn more about how the revolutionary Nighthawk X10 will support your most intense gaming needs and offer you the best possible WiFi for your other activities. Pricing and Availability Nighthawk X10 AD7200 Smart WiFi Router (R9000) is available from major retailers in stores and online at an RRP of $799 (AUD). About NETGEAR, Inc. NETGEAR (NASDAQ: NTGR) is a global networking company that delivers innovative products to consumers, businesses and service providers. The Company's products are built on a variety of proven technologies such as wireless (WiFi and LTE), Ethernet and powerline, with a focus on reliability and ease-of-use. The product line consists of wired and wireless devices that enable networking, broadband access and network connectivity. These products are available in multiple configurations to address the needs of the end-users in each geographic region in which the Company's products are sold. NETGEAR products are sold in approximately 31,000 retail locations around the globe, and through approximately 28,000 value-added resellers, as well as multiple major cable, mobile and wireline service providers around the world. The company's headquarters are in San Jose, Calif., with additional offices in approximately 25 countries. More information is available from the NETGEAR investor page or by calling (408) 907-8000. Connect with NETGEAR on Twitter, Facebook and our blog. ©2017 NETGEAR, Inc. NETGEAR, the NETGEAR logo, NETGEAR genie, Nighthawk, ReadyCLOUD, ReadyNAS and ReadySHARE are trademarks and/or registered trademarks of NETGEAR, Inc. and/or its affiliates in the United States and/or other countries. Other brand and product names are for identification purposes only and may be trademarks or registered trademarks of their respective holder(s). The information contained herein is subject to change without notice. NETGEAR shall not be liable for technical or editorial errors or omissions contained herein. All rights reserved. *Maximum wireless signal rate derived from IEEE standard 802.11 specifications. AC7200 equals 800Mbps at 2.4GHz 802.11ac with 256 QAM support + 1733Mbps at 5GHz 802.11ac + 4600Mbps at 60GHz 802.11ad. Actual data throughput and wireless coverage will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead, lower actual data throughput rate and wireless coverage. NETGEAR makes no express or implied representations or warranties about this product’s compatibility with any future standards. Safe Harbor Statement under the Private Securities Litigation Reform Act of 1995 for NETGEAR, Inc.: This press release contains forward-looking statements within the meaning of the U.S. Private Securities Litigation Reform Act of 1995. Specifically, statements concerning NETGEAR's business and the expected performance characteristics, specifications, reliability, market acceptance, market growth, specific uses, user feedback and market position of NETGEAR's products and technology are forward-looking statements within the meaning of the Safe Harbor. These statements are based on management's current expectations and are subject to certain risks and uncertainties, including, without limitation, the following: the actual price, performance and ease-of-use of NETGEAR's products may not meet the price, performance and ease-of-use requirements of customers; product performance may be adversely affected by real world operating conditions; failure of products may under certain circumstances cause permanent loss of end user data; new viruses or Internet threats may develop that challenge the effectiveness of security features in NETGEAR's products; the ability of NETGEAR to market and sell its products and technology; the impact and pricing of competing products; and the introduction of alternative technological solutions. Further information on potential risk factors that could affect NETGEAR and its business are detailed in the Company's periodic filings with the Securities and Exchange Commission. NETGEAR undertakes no obligation to release publicly any revisions to any forward-looking statements contained herein to reflect events or circumstances after the date hereof or to reflect the occurrence of unanticipated events. Source: NETGEAR-G Media Contact Emma, Elizabeth, Jennifer or Ashleigh at DEC PR (02) 8014 5033 / netgear@decpr.com.au NETGEAR NIGHTHAWK X10 VOTED BEST WIFI ROUTER IN EUROPE 2017-06-21T04:26:02Z netgear-nighthawk-x10-voted-best-wifi-router-in-europe SYDNEY, Australia — June 21, 2017 — For the second consecutive year, NETGEAR®, Inc. (NASDAQ: NTGR), the leading provider of networking devices that power today’s smart home, has secured the top spot for routers in the 2017 European Hardware Awards. The Nighthawk X10 AD7200 Smart WiFi Router (R9000) was named Best Router in this annual competition to honour exceptional hardware sold in the European Union. Nighthawk X10 debuted on the market last spring as the industry’s first —and fastest— router for media streaming and instant backup. The European Hardware Awards is created by the European Hardware Association (EHA). Votes were tallied from more than 100 experienced editors from EHA member publications representing the largest technology news and reviews sites in Europe: Hardware.Info (Benelux region), CowCotLand (France), Hardwareluxx (Germany), Hardware Upgrade (Italy), PurePC (Poland), Lab 501 (Romania), Geeknetic (Spain), SweClockers (Nordic countries) and KitGuru (United Kingdom). Today’s video files are getting larger with 4K and VR video. Offloading from capture devices and moving these large files within a network often becomes a time-consuming and challenging task. The NETGEAR Nighthawk X10 Smart WiFi Router is powerful enough to move these files at unprecedented speed and provides easy access once the file is stored on the network. It offers ultra-smooth 4K streaming, even to remote devices, and is the industry’s first router to run Plex Media Server without the need for a computer. Nighthawk X10 combines a powerful 1.7GHz Quad Core processor — the fastest processor in a home router — and Quad-Stream Wave 2 WiFi architecture plus next-generation high speed 802.11ad WiFi, so you can enjoy blazing-fast combined wireless speeds up to a furious 7.2Gbps*. The latest MU-MIMO technology supports simultaneous streaming, while 160MHz doubles WiFi speeds to mobile devices. Nighthawk X10 is also the industry’s first router designed for the home market that includes a 10Gigabit port for supporting a fiber connection. “We are honoured to have a Nighthawk router selected as the Best Router in the European market two years in a row! Last year it was Nighthawk X6 and now Nighthawk X10,” said David Henry, senior vice president of Connected Home for NETGEAR. “We design all NETGEAR products not only to meet but to surpass the highest performance standards, and we strive to deliver the newest technology innovations. We know Nighthawk X10 to be the industry’s best, so it’s extremely rewarding to have it confirmed by technology experts in continent-wide voting.” Key Features of the Award-Winning Nighthawk X10: AD7200 Quad Stream Wave2 WiFi supports wireless speeds up to 4600+1733+800Mbps* Fastest 60GHz 802.11ad WiFi technology for instant downloads, backup and minimal latency during online game play Plex Media Server for all your media – anytime, anywhere Powerful 1.7GHz Quad Core Processor boosts performance for 4K streaming or VR gaming 4 high-performance Active Antennas for better WiFi coverage and faster speeds 6 Gigabit Ethernet LAN ports with dual ports that can be operated in link aggregation mode for faster file transfers (up to 2Gbps wired speeds) 2 SuperSpeed USB 3.0 ports for faster streaming, backup and easy access to stored media Automatic backup to the cloud with Amazon Drive NETGEAR® ReadyCLOUD® provides easy, private and secure remote access to USB connected storage 10Gigabit fiber port for lightning-fast backup and media streaming to/from a NETGEAR ReadyNAS® storage device or other NAS MU-MIMO capable for simultaneous streaming of data to multiple devices Dynamic QoS prioritises network traffic for uninterrupted video streaming for applications like YouTube®, Netflix® & others’ NETGEAR® Up app has your router up, running and configured from the convenience of any Android or iOS mobile device NETGEAR genie® app for a personal dashboard to monitor, control and repair your home network, even when you’re away from home Watch this video to learn more about how the revolutionary Nighthawk X10 will support your most intense gaming needs and offer you the best possible WiFi for your other activities. Pricing and Availability Nighthawk X10 AD7200 Smart WiFi Router (R9000) is available from major retailers in stores and online at an RRP of $849 (NZD). About NETGEAR, Inc. NETGEAR (NASDAQ: NTGR) is a global networking company that delivers innovative products to consumers, businesses and service providers. The Company's products are built on a variety of proven technologies such as wireless (WiFi and LTE), Ethernet and powerline, with a focus on reliability and ease-of-use. The product line consists of wired and wireless devices that enable networking, broadband access and network connectivity. These products are available in multiple configurations to address the needs of the end-users in each geographic region in which the Company's products are sold. NETGEAR products are sold in approximately 31,000 retail locations around the globe, and through approximately 28,000 value-added resellers, as well as multiple major cable, mobile and wireline service providers around the world. The company's headquarters are in San Jose, Calif., with additional offices in approximately 25 countries. More information is available from the NETGEAR investor page or by calling (408) 907-8000. Connect with NETGEAR on Twitter, Facebook and our blog. ©2017 NETGEAR, Inc. NETGEAR, the NETGEAR logo, NETGEAR genie, Nighthawk, ReadyCLOUD, ReadyNAS and ReadySHARE are trademarks and/or registered trademarks of NETGEAR, Inc. and/or its affiliates in the United States and/or other countries. Other brand and product names are for identification purposes only and may be trademarks or registered trademarks of their respective holder(s). The information contained herein is subject to change without notice. NETGEAR shall not be liable for technical or editorial errors or omissions contained herein. All rights reserved. *Maximum wireless signal rate derived from IEEE standard 802.11 specifications. AC7200 equals 800Mbps at 2.4GHz 802.11ac with 256 QAM support + 1733Mbps at 5GHz 802.11ac + 4600Mbps at 60GHz 802.11ad. Actual data throughput and wireless coverage will vary. Network conditions and environmental factors, including volume of network traffic, building materials and construction, and network overhead, lower actual data throughput rate and wireless coverage. NETGEAR makes no express or implied representations or warranties about this product’s compatibility with any future standards. Safe Harbor Statement under the Private Securities Litigation Reform Act of 1995 for NETGEAR, Inc.: This press release contains forward-looking statements within the meaning of the U.S. Private Securities Litigation Reform Act of 1995. Specifically, statements concerning NETGEAR's business and the expected performance characteristics, specifications, reliability, market acceptance, market growth, specific uses, user feedback and market position of NETGEAR's products and technology are forward-looking statements within the meaning of the Safe Harbor. These statements are based on management's current expectations and are subject to certain risks and uncertainties, including, without limitation, the following: the actual price, performance and ease-of-use of NETGEAR's products may not meet the price, performance and ease-of-use requirements of customers; product performance may be adversely affected by real world operating conditions; failure of products may under certain circumstances cause permanent loss of end user data; new viruses or Internet threats may develop that challenge the effectiveness of security features in NETGEAR's products; the ability of NETGEAR to market and sell its products and technology; the impact and pricing of competing products; and the introduction of alternative technological solutions. Further information on potential risk factors that could affect NETGEAR and its business are detailed in the Company's periodic filings with the Securities and Exchange Commission. NETGEAR undertakes no obligation to release publicly any revisions to any forward-looking statements contained herein to reflect events or circumstances after the date hereof or to reflect the occurrence of unanticipated events. Source: NETGEAR-G Media Contact Emma, Elizabeth, Jennifer or Ashleigh at DEC PR (02) 8014 5033 / netgear@decpr.com.au Tenable Wins Frost & Sullivan’s 2017 Visionary Innovation Leadership Award 2017-06-21T00:59:57Z tenable-wins-frost-sullivan-s-2017-visionary-innovation-leadership-award Tenable Network Security®, Inc., a global leader in cybersecurity, has been recognised by Frost & Sullivan as the recipient of this year’s Visionary Innovation Leadership Award for the company’s market-defining continuous network monitoring solution, SecurityCenter Continuous View®, and its ongoing commitment to product innovation and development.   Frost & Sullivan annually recognises security vendors that are industry leaders in their ability to scout and detect unmet customer needs and proactively address them with disruptive solutions. Tenable™ is challenging the world’s IT leaders to change the way they think about cyber posture through a combination of the company’s continuous monitoring technology, steady market growth and channel expansion and recently launched cloud-based vulnerability management platform, Tenable.io™.   “We are honored to be selected for such a prestigious award,” said Gary Jackson, vice president APAC, Tenable. “For over a decade, Tenable has been the leader in the continuous monitoring marketplace and our top priority has always been to serve our customers. With Tenable.io, we’re giving customers the tools they need to address the security challenges of today’s modern computing assets and delivering on our promise to help them continue to understand and reduce their cyber risk posture.”    For the 2017 Visionary Innovation Leadership Award, Frost & Sullivan’s global team of analysts and consultants evaluated companies across a wide range of markets in multiple sectors and geographies to identify the top candidate that has consistently developed new growth strategies to address the IT challenges of the future.    “There are a few major areas that differentiate Tenable from competitors,” said Chris Kissel, lead analyst, network security, Frost & Sullivan. “Tenable has bolstered its modern cloud-based vulnerability management platform to cover the full range of traditional and modern assets, and also extended continuous monitoring to DevOps environments by adding support for container security. Together, these technology investments are going to transform the way organisations do security and enable them to improve overall business performance in today’s complex and dynamic IT landscape.”   For more information about SecurityCenter Continuous View, or to schedule a demo, visit the SecurityCenter Continuous View product page: http://www.tenable.com/products/securitycenter-continuous-view   To learn more about Tenable.io products, capabilities, pricing, or to sign up for a demo, visit: www.tenable.com/io   About Tenable Network Security Tenable™ transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organisation. Tenable eliminates blind spots, prioritises threats, and reduces exposure and loss. With more than one million users and more than 21,000 customers worldwide, organisations trust Tenable for proven security innovation. Tenable customers range from Fortune Global 500 companies, to the global public sector, to mid-sized enterprises in all sectors, including finance, government, healthcare, higher education, retail and energy. Transform security with Tenable, the creators of Nessus® and leaders in continuous monitoring, by visiting www.tenable.com   # # #   Big Switch Networks appoints Claudio Perugini as VP Worldwide Channels 2017-06-21T00:00:00Z big-switch-networks-appoints-claudio-perugini-as-vp-worldwide-channels MELBOURNE, Australia – 21 June 2017 – Big Switch Networks, the Next-Generation Data Centre Networking Company, today announced it has appointed Claudio Perugini as Vice President, Worldwide Channels.   “I’m thrilled to welcome Claudio to the Big Switch team to drive the expansion of our worldwide channel program,” said Mike Hoffman, VP of Worldwide Sales and Chief Revenue Officer. “He brings channel expertise, leadership experience and a proven track record in sales and channel strategy and I look forward to partnering with him as we continue to scale our global GTM efforts.”   Perugini has extensive channel and sales experience in the networking industry, which spans more than 30 years. Most recently Perugini was EVP, Worldwide Sales at LightCyber (acquired by Palo Alto Networks, February 2017). Prior to LightCyber, Perugini spent nearly five years at Gigamon, as VP of Sales, Americas. Perugini began his career as a founding member at Fluke Networks, a division of Danaher, where he spent more than 25 years.   “Claudio is uniquely qualified to expand our global channel program to support continued growth at Big Switch,” said Susheel Chitre, VP of Business Development, Big Switch Networks. “He will play a meaningful role at Big Switch as we expand our programs to further support our global customer base with differentiated technology and choice that will enable transformation of legacy data centres.”   At LightCyber, Perugini significantly contributed to the company’s overall growth and resulting acquisition, evidenced by a 2.5x increase in bookings as well as a 2x increase in customer logo count. Perugini was also responsible for the build-out of LightCyber’s worldwide sales and engineering teams to support growing demand.   During his tenure at Gigamon, the company’s revenue increased from $30M to $180M, and under his leadership, the Americas sales team contributed more than 80% of total company revenue per quarter and had the highest producing region per sales person for four consecutive years. At Gigamon, Perugini grew the Americas sales organisation from a 6 person to an 85 person, multi-tier leadership team, which had a 98% retention rate.   “As a veteran of the networking industry I was incredibly impressed with the technology offerings in Big Switch’s portfolio, which enable customers to experience benefits that are not delivered via other solutions currently in the market,” said Claudio Perugini, VP of Worldwide Channel Sales, Big Switch Networks. “Given my 30-plus years in sales and sales management, my success has always been in working with the channel and partners. I look forward to growing the BSN channel program so that partners and end-users around the world can experience the flexibility, agility and intelligence of Big Switch’s next-gen products.”  About Big Switch Networks Big Switch Networks is the Next-Generation Data Centre Networking Company. We disrupt the status quo of networking by designing intelligent, automated and flexible networks for our customers around the world. We do so by leveraging the principles of software-defined networking (SDN), coupled with a choice of industry-standard hardware. Big Switch Networks has two solutions: Big Monitoring Fabric, a Next-Generation Network Packet Broker, which enables pervasive security and monitoring of data centre and cloud traffic for inline or out-of-band deployments and Big Cloud Fabric, the industry's first Next-Generation switching fabric that allows for choice of switching hardware for OpenStack, VMware, Container and Big Data use cases. Big Switch Networks is headquartered in Santa Clara, CA, with offices located in Tokyo, Melbourne, London and Istanbul. For additional information, email info@bigswitch.com, follow Big Switch on LinkedIn and Twitter, or visit www.bigswitch.com.   Big Switch Networks, Big Cloud Fabric, Big Monitoring Fabric, BigSecure, Big Chain, Switch Light OS, and Switch Light VX are trademarks or registered trademarks of Big Switch Networks, Inc. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners.Media contacts Espresso Communications for Big Switch Networks Amy Rathbone/India Bednallbigswitch@espressocomms.com.au Ph. +61 2 8016 2200 CA Technologies helps create agile businesses with faster time-to-market by connecting strategy, execution and delivery 2017-06-20T03:39:38Z ca-technologies-helps-create-agile-businesses-with-faster-time-to-market-by-connecting-strategy-execution-and-delivery SYDNEY, 20 June, 2017 – CA Technologies (NASDAQ:CA) today announced new capabilities across its Agile Management portfolio for a clear and connected view of work in progress and available resources to align and execute on strategy. The solutions help fuel business agility with: The latest release of CA’s market-leading Project & Portfolio solution (CA PPM) gives greater insights into current and future resource planning as well as increased functionality for team collaboration. New features for teams in CA Agile Central that ensure team work is clearly aligned to company objectives to allow employees to see how they contribute to top line growth. And additional integrations across CA’s vast product portfolio that allow organizations to leverage the funding, investment and planning capabilities of CA PPM with visibility into what is being delivered via CA Agile Central, so that companies can make better, fact-based decisions. CA PPM offers ability to anticipate and plan team resources with industry-first telescoping A recognised PPM solutions provider, CA was named a leader in the 2017 Magic Quadrant for Project Portfolio Management, Worldwide.* The latest CA PPM solution offers the industry’s first telescoping capability to more easily manage time scales within a single view. Resource managers can better anticipate and plan for future demand of resources while project coordinators have more visibility to better manage and staff current projects. Additionally, new functionality includes built-in conversations to encourage collaboration, while pinning and filtering capabilities make it easy for users to isolate specific resource allocation problems and staffing conflicts. CA Agile Central Team Board gives autonomy to teams, and visibility to the business CA Agile Central’s unique capability, Team Board, bridges the gap between team-level autonomy and company strategy with an unprecedented level of process flexibility, supporting Scrum and Kanban at the team level, while ensuring visibility and alignment to business strategy. “Success in today’s fast-paced and quickly changing market requires empowered teams that can easily align their work with overall business strategy. For success at scale, the solutions and tools teams use need to be intuitive, flexible and powerful – and need to support modern ways of working, not slow them down,” said Ken Martin, vice president, Agile Management, CA Technologies, Asia Pacific & Japan. “To help companies adapt and win, CA’s Agile Management solutions give business stakeholders clear visibility into the execution and delivery of business plans and financial investments, while also supporting the practices used by today’s teams.” Identify, define and prioritise the most important work with agile + PPM Driving increased visibility into strategic business decisions and work in process, CA PPM has expanded integrations with CA Agile Central to offer customers a 360 degree view of all work being delivered from agile and traditional teams across the enterprise. These new integrations enable: Unified portfolio funding approval: Integrate all work into a unified funding portfolio. Gain visibility into spend on all activities across traditional and agile teams. Flexible backlog management: Maintain feature backlog in Agile for internal teams or in PPM for customer scope controlled contracts. Unified people planning: Add new team members from CA Agile Central to the project staffing to provide enterprise visibility into all work. Simplified cost management: Single time management solution for Agile Central and CA PPM. Combined with a unique time template for finance to classify work without burdening teams with complex rules or audit requirements. CA continues to help companies build applications faster by providing integrated solutions across its Agile Management and Continuous Delivery portfolios. The PPM and CA Agile Central enhancements released today, when combined with the existing CA Agile Central and Continuous Delivery integrated solutions, ensure that customers are able to plan, manage, build and deliver the right products at the right time, tying strategy to delivery, accelerating time to market and allowing rapid response to market changes. Additional links: BLOG: The new CA PPM: convenient, collaborative and powerful DATA SHEET: Integrated solution overview: CA PPM and CA Agile Central PRODUCT TOUR: CA Agile Central product tour *Gartner, Inc., “Magic Quadrant for Project Portfolio Management, Worldwide,” Daniel B. Stang, Matt Light, Teresa Jones, May 25, 2017. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. About CA Technologies CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate - across mobile, private and public cloud, distributed and mainframe environments. Learn more at www.ca.com. Follow CA Technologies Twitter Social Media Page Press Releases Blogs Legal notices Copyright © 2017 CA, Inc. All Rights Reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Australian organisations not setup to predict the risk of security breaches before they occur 2017-06-19T06:01:41Z australian-organisations-not-setup-to-predict-the-risk-of-security-breaches-before-they-occur SYDNEY, 19 June, 2017 – Australian organisations are lagging behind their regional counterparts when it comes to having security controls that are adaptive based on risk, with few able to anticipate the risk of a breach before it occurs. This highlights a significant disconnect with the fact that more than half of Australian organisations believe that the number of security breaches has increased in the last 12 months. In a global study by CA Technologies; The Security Imperative: Driving Business Growth in the App Economy, a low 37 per cent of Australian organisations reported employing proactive or predictive processes to detect data breaches; a stark comparison to our regional counterparts in Singapore, (75 per cent) and Korea (60 per cent). Further, 21 per cent of Australian organisations say that their approach to detecting data breaches only includes an ‘occasional review of activity reporting’. “There’s no doubt that good identity-centric security strategy helps a business to accelerate its digital transformation journey. With data breaches becoming more frequent and more mature, identity-centric security needs to be incorporated right from day one, as a core technology enabler rather than bolted on as an IT afterthought,” said Teng Sherng Lim, vice president, Security, CA Technologies, Asia Pacific and Japan. When it comes to identity and access management (IAM), none of the Australian organisations surveyed said their controls are adaptive based on risk, with the majority of controls being centralised or automated (67 per cent) and the remaining 33 per cent employing manual controls. A correlation can be drawn between these figures and the impact of IT security efforts on business KPIs with Australia’s results again, by-and-large below the regional average. In particular, the areas of employee productivity (37 per cent), customer satisfaction (40 per cent), operational efficiency (35 per cent) and importantly business growth (41 per cent) paint a picture of little improvements. “Disruptions – and in this case security breaches – are coming to every industry. For Australian organisations to succeed and in fact last, they need to be built it to change. This means not only keeping up, but constantly innovating and continuously improving. Employing advanced identity-centric security isn’t optional, it’s imperative,” said Lim. The number of compliance audit failures was also reported to have improved by only 35 per cent based on IT security efforts, which compares starkly to Thailand at 57 per cent. On a regional level, those with advanced identity-centric security reported a 35 per cent decrease in breaches, compared to only 12 per cent of basic users. Additionally, advanced users of identity-centric security that have seen a decline in breaches have been much more proactive in preventing breaches through increased investment and focusing on mobile devices and apps. The study polled 1,770 senior business and IT executives worldwide, of which more than 100 are chief security officers and chief information security officers. 799 of the respondents were from countries in the APJ region. -ENDS- Resources The Security Imperative: Driving Business Growth in the App Economy The Security Imperative Infographic About the Research/Coleman Parkes Conducted by Coleman Parkes, the study included 1,770 senior business and IT executives, including more than 100 CSOs and CISOs, from large enterprises across 21 countries and 10 industry sectors. The study and data analysis was done from May – September 2016. Coleman Parkes Research Ltd, formed in 2000, provides action-focused marketing research on a global scale. The company offers a full research and consultancy service across all markets, while specialising in business-to-business research with a focus on IT, technology and communications research. For more information, please visit www.coleman-parkes.co.uk. About CA Technologies CA Technologies (NASDAQ:CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business in every industry. From planning, to development, to management and security, CA is working with companies worldwide to change the way we live, transact, and communicate – across mobile, private and public cloud, distributed and mainframe environments. Learn more at www.ca.com. Follow CA Technologies Twitter Social Media Page Press Releases Blogs Legal notices Copyright © 2017 CA, Inc. All Rights Reserved. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Malwarebytes Introduces Enterprise Cloud Platform for Next-Gen Endpoint Protection, Announces Validation as Replacement for Antivirus 2017-06-15T23:28:37Z malwarebytes-introduces-enterprise-cloud-platform-for-next-gen-endpoint-protection-announces-validation-as-replacement-for-antivirus Malwarebytes®. the leading advanced malware prevention and remediation solution, today announced the release of its new single endpoint agent cloud platform for business, featuring Malwarebytes Incident Response, Malwarebytes Endpoint Protection, and a new cloud-based management console. Malwarebytes Endpoint Protection, now delivered as a service by the platform, features a signature-less Anomaly Detection Engine powered by machine learning. Combining seven protection layers, this new Malwarebytes solution is a more effective and efficient replacement for antivirus.    “Malware infections mean lost revenue and potentially devastating consequences, particularly for smaller and mid-sized businesses who have limited internal IT staff,” said Tony Massimini, Senior Industry Analyst, Frost & Sullivan. “For true protection, businesses require a solution that provides a layered defense approach to security beyond the limitations of traditional antivirus products. Malwarebytes' Anomaly Detection Engine is an innovative technique for identifying malware. An easily deployed and managed cloud solution with machine learning capabilities gives businesses scalable endpoint protection against today’s growing threats.”    Malwarebytes Cloud Platform The new Malwarebytes cloud platform makes deployment and ongoing management of Malwarebytes solutions easy. Administrators benefit from broader visibility into endpoints that exist within their environment. Additionally, the solutions do not require a constant connection to the cloud platform, meaning users are still protected when they are not connected.   Malwarebytes Endpoint Protection Malwarebytes Endpoint Protection, built on the Malwarebytes platform, is an endpoint security solution featuring layers of detection technologies with a unified endpoint agent. The new Anomaly Detection Engine has been integrated into Malwarebytes’ layered approach to security. Most security vendors have taken a traditional approach to identifying malware using known malware samples. With the threat landscape evolving at such a furious pace, these models need constant retraining, resulting in a process strongly resembling signature-based approaches to threat detection. Malwarebytes’ machine learning approach, powered by the new anomaly detection layer, provides real-time, signature-less detection against new and unknown threats by modeling known trusted files rather than attempting to model historical malware samples. Integrated into the layered approach of detection techniques for both pre- and post-execution, Malwarebytes Endpoint Protection provides the most effective security solution for endpoints.   Malwarebytes Incident Response  Malwarebytes Incident Response is a threat detection and remediation tool also built on the highly scalable, cloud-based management platform. Powered by the company’s proprietary Linking Engine, the solution provides the most complete and thorough remediation possible, improves threat detection for businesses of all sizes and minimizes the time it takes to respond to an attack, with the added benefits of scalability, flexibility and automation.  PCI DSS-Validated AV Replacement  Malwarebytes is now a validated, next-generation replacement for traditional antivirus (AV) solutions. Coalfire Systems, Inc, a leading provider of cybersecurity, risk management and compliance services, certified by the PCI Security Standards Council as a Qualified Security Assessor (QSA), conducted an independent assessment of Malwarebytes. The company validated Malwarebytes as exceeding the technical conditions for antivirus software outlined within the requirements of Payment Card Industry Data Security Standard (PCI DSS) version 3.2, including requirements 5.1, 5.2 and 5.3.    In its report, Coalfire says Malwarebytes, "is effective in providing significant and substantial support for the key requirements and controls of PCI DSS and can assist in a comprehensive program of cybersecurity for merchants, issuing banks, processors, services providers and other entities required to comply with PCI DSS 3.2."   “Malwarebytes' new platform is exactly what our customers have been asking for,” said Michael Destefani, CEO, DSolution. “We are extremely impressed with the enhancements. Being able to offer the solution will serve as a significant and impactful part of our growth strategy.” “The threat landscape is changing every second with new malware variants arising every day,” said Marcin Kleczynski, CEO, Malwarebytes. “As security professionals, it is our responsibility to protect businesses from these threats, but most competitive offerings take a singular approach to the problem that cannot keep up with how fast malware is evolving. That is why we are now equipping businesses with seven different layers for stopping and remediating today’s and tomorrow’s threats.” This new proactive, multi-layered approach to security from Malwarebytes ensures that these rapidly evolving, new and dangerous cyberthreats are caught and remediated before they can negatively impact businesses.    For further details on these new Malwarebytes solutions, click here: https://www.malwarebytes.com/business/endpointprotectionAbout Malwarebytes Malwarebytes is the next-gen cybersecurity company that millions worldwide trust. Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware and exploits that escape detection by traditional antivirus solutions. The company’s flagship product combines advanced heuristic threat detection with signature-less technologies to detect and stop a cyberattack before damage occurs. More than 10,000 businesses worldwide use, trust and recommend Malwarebytes. Founded in 2008, the company is headquartered in California, with offices in Europe and Asia and a global team of threat researchers and security experts. For more information, please visit us at: http://www.malwarebytes.com Malwarebytes founder and CEO Marcin Kleczynski started the company to create the best disinfection and protection solutions to combat the world’s most harmful Internet threats. Marcin was recently named “CEO of the Year” in the Global Excellence awards and has been named to the Forbes 30 Under 30 Rising Stars of Enterprise Technology list and the Silicon Valley Business Journal’s 40 Under 40 award, adding those to an Ernst & Young Entrepreneur of the Year Award.   ### Follow us on Facebook: https://www.facebook.com/Malwarebytes Follow us on Twitter: @malwarebytes  Follow us on LinkedIn: https://www.linkedin.com/company/malwarebytes  See us on YouTube: http://www.youtube.com/malwarebytes Read our latest Malwarebytes Labs blog: https://blog.malwarebytes.com  Gartner Identifies Top Technologies for Security in 2017 2017-06-14T23:59:37Z gartner-identifies-top-technologies-for-security-in-2017 15 June 2017 — Gartner, Inc. today highlighted the top technologies for information security and their implications for security organisations in 2017. "In 2017, the threat level to enterprise IT continues to be at very high levels, with daily accounts in the media of large breaches and attacks. As attackers improve their capabilities, enterprises must also improve their ability to protect access and protect from attacks," said Neil MacDonald, vice president, distinguished analyst and Gartner Fellow Emeritus. "Security and risk leaders must evaluate and engage with the latest technologies to protect against advanced attacks, better enable digital business transformation and embrace new computing styles such as cloud, mobile and DevOps." The top technologies for information security are: Cloud Workload Protection Platforms Modern data centres support workloads that run in physical machines, virtual machines (VMs), containers, private cloud infrastructure and almost always include some workloads running in one or more public cloud infrastructure as a service (IaaS) providers. Hybrid cloud workload protection platforms (CWPP) provide information security leaders with an integrated way to protect these workloads using a single management console and a single way to express security policy, regardless of where the workload runs. Remote Browser Almost all successful attacks originate from the public internet, and browser-based attacks are the leading source of attacks on users. Information security architects can't stop attacks, but can contain damage by isolating end-user internet browsing sessions from enterprise endpoints and networks. By isolating the browsing function, malware is kept off of the end-user's system and the enterprise has significantly reduced the surface area for attack by shifting the risk of attack to the server sessions, which can be reset to a known good state on every new browsing session, tab opened or URL accessed. Deception Deception technologies are defined by the use of deceits, decoys and/or tricks designed to thwart, or throw off, an attacker's cognitive processes, disrupt an attacker's automation tools, delay an attacker's activities or detect an attack. By using deception technology behind the enterprise firewall, enterprises can better detect attackers that have penetrated their defenses with a high level of confidence in the events detected. Deception technology implementations now span multiple layers within the stack, including endpoint, network, application and data. Endpoint Detection and Response Endpoint detection and response (EDR) solutions augment traditional endpoint preventative controls such as an antivirus by monitoring endpoints for indications of unusual behaviour and activities indicative of malicious intent. Gartner predicts that by 2020, 80 percent of large enterprises, 25 percent of midsize organisations and 10 percent of small organisations will have invested in EDR capabilities. Network Traffic Analysis Network traffic analysis (NTA) solutions monitor network traffic, flows, connections and objects for behaviours indicative of malicious intent. Enterprises looking for a network-based approach to identify advanced attacks that have bypassed perimeter security should consider NTA as a way to help identify, manage and triage these events. Managed Detection and Response Managed detection and response (MDR) providers deliver services for buyers looking to improve their threat detection, incident response and continuous-monitoring capabilities, but don't have the expertise or resources to do it on their own. Demand from the small or midsize business (SMB) and small-enterprise space has been particularly strong, as MDR services hit a "sweet spot" with these organisations, due to their lack of investment in threat detection capabilities. Microsegmentation Once attackers have gained a foothold in enterprise systems, they typically can move unimpeded laterally ("east/west") to other systems. Microsegmentation is the process of implementing isolation and segmentation for security purposes within the virtual data centre. Like bulkheads in a submarine, microsegmentation helps to limit the damage from a breach when it occurs. Microsegmentation has been used to describe mostly the east-west or lateral communication between servers in the same tier or zone, but it has evolved to be used now for most of communication in virtual data centres. Software-Defined Perimeters A software-defined perimeter (SDP) defines a logical set of disparate, network-connected participants within a secure computing enclave. The resources are typically hidden from public discovery, and access is restricted via a trust broker to the specified participants of the enclave, removing the assets from public visibility and reducing the surface area for attack. Gartner predicts that through the end of 2017, at least 10 percent of enterprise organisations will leverage software-defined perimeter (SDP) technology to isolate sensitive environments. Cloud Access Security Brokers Cloud access security brokers (CASBs) address gaps in security resulting from the significant increase in cloud service and mobile usage. CASBs provide information security professionals with a single point of control over multiple cloud service concurrently, for any user or device. The continued and growing significance of SaaS, combined with persistent concerns about security, privacy and compliance, continues to increase the urgency for control and visibility of cloud services. OSS Security Scanning and Software Composition Analysis for DevSecOps Information security architects must be able to automatically incorporate security controls without manual configuration throughout a DevSecOps cycle in a way that is as transparent as possible to DevOps teams and doesn't impede DevOps agility, but fulfills legal and regulatory compliance requirements as well as manages risk. Security controls must be capable of automation within DevOps toolchains in order to enable this objective. Software composition analysis (SCA) tools specifically analyse the source code, modules, frameworks and libraries that a developer is using to identify and inventory OSS components and to identify any known security vulnerabilities or licensing issues before the application is released into production. Container Security Containers use a shared operating system (OS) model. An attack on a vulnerability in the host OS could lead to a compromise of all containers. Containers are not inherently unsecure, but they are being deployed in an unsecure manner by developers, with little or no involvement from security teams and little guidance from security architects. Traditional network and host-based security solutions are blind to containers. Container security solutions protect the entire life cycle of containers from creation into production and most of the container security solutions provide preproduction scanning combined with runtime monitoring and protection. Gartner analysts will provide additional analysis on IT security trends at the Gartner Security & Risk Management Summits 2017 taking place in Tokyo; Mumbai; Sao Paulo; Sydney; London; and Dubai. Follow news and updates from the events on Twitter at #GartnerSEC. Visit the Gartner Digital Risk & Security hub for complimentary research and webinars. Gartner clients can learn more about security & risk in the Gartner Trend Insight Report "Digital Trust — Redefining Trust for the Digital Era." About Gartner Gartner, Inc. (NYSE: IT) is the world's leading research and advisory company. The company helps business leaders across all major functions in every industry and enterprise size with the objective insights they need to make the right decisions. Gartner's comprehensive suite of services delivers strategic advice and proven best practices to help clients succeed in their mission-critical priorities. Gartner is headquartered in Stamford, Connecticut, USA, and has more than 13,000 associates serving clients in 11,000 enterprises in 100 countries. For more information, visit gartner.com. Carbon Black named winner of Endpoint & Mobile Data Protection Award by NetworkWorld Asia 2017-06-13T23:35:45Z carbon-black-named-winner-of-endpoint-mobile-data-protection-award-by-networkworld-asia SYDNEY — June 14, 2017 — Carbon Black, the leader in next-generation endpoint security, has been named a joint winner in NetworkWorld Asia’s (NWA) Endpoint & Mobile Data Protection category at the Information Management Awards 2017. Carbon Black was also named a winner of the Top 8 Asia Pacific Security Vendors To Look Out For. Inaugurated in 2012, the NWA awards recognise Asia’s leaders and their technological advancements in information, security, storage and data management. Guided by a team of experienced editors and a panel of more than 100 CIO advisers with domain expertise and deep insights in information management, finalists are judged on reputation, acceptance of technology, features and USPs of the solution, as well as end-user feedback. The awards reflect Carbon Black’s growth in the Asia Pacific region, where the company established business operations in 2015. Working with key partners across the Asia Pacific region, Carbon Black enables companies and governments to protect their endpoints and equips them to handle today’s advanced cyber threats. With the acquisition of Confer in 2016, Carbon Black has further built capabilities for organisations of all sizes to enhance their cyber defense and response mechanisms. Carbon Black has also pioneered a next-generation technology known as ‘streaming prevention’. Powering Cb Defense, streaming prevention was designed to prevent both malware and non-malware attacks by leveraging event stream processing, the same technology that revolutionised algorithmic day-trading. “Cyber security has gained a lot of traction in APAC in the past year. Global cyberattacks such as the WannaCry incident served as a wake-up call to organisations and security vendors, emphasising the importance of a solution that protects against both malware and non-malware threats,” said Kane Lightowler, Managing Director APJ for Carbon Black. “At Carbon Black, we are continuously analysing the sophistication and evolution of cyber threats, enabling us to provide a prevention, detection and response solution that protects the most critical and vulnerable parts of an organization – their endpoints.” Earlier this year, Carbon Black was named a leader in the IDC MarketScape, Worldwide Endpoint Specialized Threat Analysis and Protection (STAP) 2017 Vendor Assessment. “Within less than three years since its entrance into the Asia Pacific market, Carbon Black has made a significant mark with its endpoint and mobile data protection solutions among end-user organisations,” said Victor Ng, Editor-in-Chief of NetworkWorld Asia and Enterprise Group Editorial Director at Questex Asia. “This award is testimony to Carbon Black’s efficacy in addressing the ever-increasing sophistication of cyber threats especially in the increasingly mobile business world of today.”About Carbon Black Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, streaming prevention, to instantly see and stop cyberattacks. Cb Defense uniquely combines breakthrough prevention with market-leading detection and response into a single, lightweight agent delivered through the cloud. With more than 9 million endpoints under management, Carbon Black has more than 3,000 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.Contact Marie Evans, Carbon Black. marie.evans@carbonblack.com 61 (0) 412 044 072         emt Distribution Takes Thycotic’s Leading Enterprise Password Management Solution to the Channel 2017-06-12T22:02:37Z emt-distribution-takes-thycotic-s-leading-enterprise-password-management-solution-to-the-channel Adelaide, Australia – 13 June 2017: emt Distribution today announced it has been appointed the Asia Pacific master distributor for Washington, D.C. based security vendor, Thycotic, a provider of privileged account management (PAM) solutions for more than 7,500 organisations worldwide. With Forrester estimating that 80 percent of data breaches involve privileged accounts that have been compromised or abused, Thycotic’s Secret Server was developed as a comprehensive privileged account management solution that protects organisations’ system user credentials and privileged accounts. emt’s range of cyber security solutions mitigate the vast majority of cyberattack vectors. They address the Australian Signals Directorate’s (ASD’s) Top 4 Strategies to mitigate targeted cyber intrusions – application whitelisting, patching applications, patching operating systems, and privileged account management. These mitigate more than 85 percent of intrusion techniques that the Australian Cyber Security Centre responds to. “Privileged account management is one of the top four mitigation strategies used to meet the needs of the Australian Signals Directorate. It is a perfect opportunity for our channel partners in the region to be seen as trusted advisors,” said Simon Azzopardi, VP, International at Thycotic. “emt Distribution plays an important role in empowering and connecting with the channel and we’re delighted with the role they play on the impact of our success in the region.” emt’s distribution agreement with Thycotic will make its privileged account management solution exclusively available through resellers, managed service providers (MSPs), systems integrators, security and compliance consultants, and outsourcing companies. According to Scott Hagenus, Chief Marketing Officer for emt, demand for privileged account management solutions is growing rapidly among government and enterprise organisations, with SMBs and mid-tier enterprises not far behind. emt has already added five new staff members dedicated to Thycotic to meet that demand, he said. “Organisations are waking up to the fact that traditional cyber security defences like firewalls and anti-malware are struggling to combat the rising tide of targeted attacks,” said Hagenus. “Privileged accounts are the keys to the kingdom. Organisations need to know how many human and non-human privileged accounts they have, who has access to them, restrict that access and lock down the passwords that protect them. Putting in it plain terms, you can have the best locks in the world, but they won’t help if you leave the keys under the doormat.” Thycotic Secret Server protects privileged accounts while being the fastest to deploy, easiest to use, enterprise-class solution that is highly scalable and competitively priced. The company is 100 percent channel focused in the Asia Pacific, with an outstanding channel program. The Thycotic Certified Partners program offers deal registration, rewards incentives and a margin protection program. Its Deal Registration Program let channel partners protect their opportunities and maximise available discounts. Thycotic Rewards is a flexible program that helps partners get started with Thycotic, get trained and close business. As master distributor, emt Distribution has hired five dedicated Thycotic sales and support staff on the ground in Australia, including pre-sales engineers and customer success personnel to help channel partners ensure their customers are getting the most out of Thycotic products. emt Distribution will also attend onsite sales meetings alongside partners, run walk-throughs and tailored demonstrations with partners for end-user customers, and help partners manage the Thycotic deal registration process. About Thycotic Thycotic prevents cyberattacks by securing passwords, protecting endpoints and controlling application access. Thycotic is one of the world’s fastest growing IT security companies because we provide customers with the freedom to choose cloud or on premise software solutions that are the easiest to implement and use in the industry. Thycotic has grown to serve more than 7,500 customers and over 180,000 IT admins. About emt Distribution emt believes every organisation deserves the best defences possible to mitigate the risk of cyber security incidents. Seeking out the most effective and innovative security vendors, and working exclusively through reseller partners, it delivers on-premise, cloud and MSP solutions that cover the vast majority of attack vectors. EMT’s solutions address the Australian Signals Directorate’s Top 4 and many of the ISM’s 37 major strategies to help mitigate cyber security incidents. Its solutions offer great value to partners and their clients and are backed up by outstanding support. LogMeIn makes digital customer service smarter; takes aim at CRM market with introduction of Bold360 2017-06-09T00:00:00Z logmein-makes-digital-customer-service-smarter-takes-aim-at-crm-market-with-introduction-of-bold360 SYDNEY, AUSTRALIA – 9 June 2017 – LogMeIn, Inc. (NASDAQ:LOGM) today introduced Bold360, an intelligent customer engagement platform that provides a modern, flexible way for companies to interact with customers and get a real-time 360-degree view of all touchpoints and contextual data in a single solution.  Through a powerful combination of popular digital engagement channels, support tools, and a unified interface, Bold360 is taking on the traditional customer service market by bridging the gap between the customer and vital business information; helping companies deliver the immediate and personalised experience today’s consumers expect.   “The rise of digital, artificial intelligence and mobile-first lifestyles has changed how customers want to interact with their favourite brands,” said Mary Wardley, Program Vice President, Loyalty and Customer Care, IDC.  “As a result, companies need to rethink how they approach customer service to stay competitive.  Offering a variety of engagement channels is just the beginning.  The experience – whether automated or agent-assisted – needs to be seamless and the information contextual, to deliver the type of experience that will create long-term brand loyalty.”   According to a recent report from Gartner entitled The Eight Building Blocks of CRM: Data and Information (July 2016), there are a handful of key challenges when it comes to an organisation’s CRM strategy.  Specifically, they cite that “creating, maintaining and leveraging a single view of the customer is hard to achieve internally and the required capabilities are not provided by many CRM vendors. Many solutions fail to consider the myriad of channels used by customers to interact with organisations”.   Legacy customer service and CRM systems house only a small portion of customer data across various disparate systems, making it hard for companies to ever get a full picture of their customers.  Bold360 is addressing this challenge by combining the rich customer profiles and actionable data agents need with the fast, frictionless service customers have come to expect.  Intelligent automation also empowers customers with self-service tools, thereby eliminating routine tasks from the agent workflow to improve contact centre efficiencies and deliver the type of customer experiences that build loyalty.   “The future of customer service lies in being able to create a truly exceptional and meaningful experience for customers”, said Michael Blaine, Senior Director, Customer Service at VF Corporation.  “Utilising technology to understand your customers while providing easily accessible and real-time information to your agents can help deliver a truly unique and personalised experience.  Bold360 is an exciting first step toward this vision and we are excited to see where LogMeIn takes it in the future.”   With today’s release Bold360 includes: An intuitive interface - Empowers agents with the information needed to resolve issues quickly by consolidating data from different systems and presenting a unified view of all customer interactions. Agents can work across different channels while seeing a complete history of all interactions for the customer they are assisting.   No code integrations – Easily integrate popular business systems including Salesforce and Zendesk, to provide that information directly into the Bold360 agent interface, without needing to toggle between applications. World-class omni-channel engagement – Seamlessly engage with customers across a variety of channels including live chat, Facebook Messenger, email and more.  Bold360 offers the right engagement for the level of support needed without clunky handoffs and preserves the context of conversations across channels to help agents address issues quickly.  Intelligent automation -- Helps agents respond to commonly asked questions with the ability to create, curate and manage answers.  The system gets smarter over time and can be applied to self-service interactions or to inform agents in an assisted interaction.  Remote support – With features including remote control, file transfer and co-browsing, agents can seamlessly escalate visitors to remote support all in one interface to drive efficiency and quickly resolve customer issues.  “There is a significant white space when it comes to engagement capabilities of traditional CRM tools,” said Paddy Srinivasan, General Manager, Customer Engagement and Support Solutions.  “As customer expectations change, the old way of managing customer interactions will no longer suffice.  Bold360 not only helps businesses interact with their customers, but also builds intelligent & actionable profiles that help brands offer the right recommendation at the right time based on all the information about that customer – not just a small subset based on past interactions.  As Bold360 continues to evolve and capabilities expand, those customer profiles will continue to get richer and will serve as an essential tool for customer service organisations everywhere.”  Pricing and availability Bold360 is available today.  Pricing depends on deployment size and use case.  Additional resources: Website Blog: Introducing Bold360: Making Digital Customer Service Smarter Demo Video ###  LogMeIn’s customer engagement & support portfolio LogMeIn delivers industry leading solutions designed to empower knowledge workers to deliver more human, personalised and intelligent customer engagement and support across all digital channels and devices that drives increased satisfaction, engagement and productivity.  More than 50,000 companies rely on LogMeIn’s customer engagement portfolio to support 200 million customer interactions every year.  About LogMeIn, Inc. LogMeIn, Inc. (NASDAQ:LOGM) simplifies how people connect with each other and the world around them to drive meaningful interactions, deepen relationships, and create better outcomes for individuals and businesses. One of the world’s top 10 public SaaS companies, and a market leader in communication & conferencing, identity & access, and customer engagement & support solutions, LogMeIn has millions of customers spanning virtually every country across the globe. LogMeIn is headquartered in Boston with additional locations in North America, Europe, Asia and Australia.  Media contacts Amanda Conroy / India Bednall Espresso Communications on behalf of LogMeIn P: +61 28016 2200 E: logmein@espressocomms.com.au