The PRWIRE Press Releases http:// 2017-04-27T22:31:23Z Windows 10 Adoption is Quickly Accelerating, but Plagued with Concerns, Reports New Ivanti State of Windows 10 Adoption Survey 2017-04-27T22:31:23Z windows-10-adoption-is-quickly-accelerating-but-plagued-with-concerns-reports-new-ivanti-state-of-windows-10-adoption-survey The vast majority of IT organisations (91%) have installed Windows 10, but there is still great variation in the current level of Windows 10 adoption. Although a third of IT organisations (34%) have Windows 10 in production to some extent, only 10% are in full production while the majority (56%) are in the early stages, using Windows 10 in IT trial or other limited environments. These are among the findings of the 2017 State of Windows 10 Adoption Survey conducted by Dimensional Research for Ivanti, a leader in integrating and automating critical IT tasks such as Windows desktop migrations.   Factors Impacting Adoption Nearly nine in ten (87%) have concerns about moving to Windows 10 including application compatibility (65%), the need for user training (43%), manual effort required to migrate (31%), the performance of applications (24%) and the increased complexity of image management (23%). The cost of licensing (21%), desktop security (18%), training cost (17%) and the performance of desktop tasks (16%) were lesser concerns.    Adoption concerns have been validated by those who have begun their migration, but the actual impact appears less than their expectation. Those that have begun their migration have faced issues including application compatibility (50%), support from application vendors (34%), users confused by the Windows 10 interface (29%), user resistance (21%), lack of hardware support (19%) and difficulty migrating user files and settings (18%).   Migration Approaches Abound Even though organisations are grappling with multiple Windows 10 concerns, adoption is expected to accelerate. In 2015, just 7% had Windows 10 installed outside of IT; in 2017 that grew to 51%. Further, more than three in four (77%) expect to be fully migrated to Windows 10 within the next two years.   Interestingly, no single approach to Windows migration has become the standard. The approaches being used for Windows 10 migration include reimaging (52%), hardware migration (49%), centrally managed in-place migration (44%) and user-initiated in-place migration (14%). Windows 10 implementations are also being done virtually, with a quarter (25%) delivering Windows 10 via virtual desktop infrastructure (VDI) and 9% using published desktops delivering the Windows 10 experience from Windows Server 2016.    Selection of the preferred Windows 10 branch is also a divisive factor in migration strategy. More than half (51%) of IT organisations report that they haven’t decided yet on whether they will use the Current Branch for Business (CBB) or Long-Term Service Branch (LTSB). Of the remaining 49%, 29% have selected CBB and 20% have selected LTSB. This branch selection indecision is impacting adoption, with a quarter (26%) of IT organisations reporting a delay in their Windows 10 adoption due to confusion over which branch to select.  Enhancing User Experience and Windows 10 Migration Go Hand-in-Hand To overcome user confusion and resistance to change, 83% of IT organisations plan to migrate their users’ desktop personalisation during their Windows 10 migration. Ensuring that these profile changes and customisation follow users as part of the migration process also enhances user productivity and satisfaction with the project.   The most common user personalisation info that IT organisations want to transition during their Windows 10 migration include user profile information (63%), printer assignments (49%), file server connections (43%), drive letters (42%), unmanaged or decentralised files and folders (32%) and regional settings (29%). A substantial percentage of IT organizations (28%) even plan to migrate users’ personal files, like photos and music.   Other user-impacting objectives are top of mind for the majority of IT organisations, with 86% planning to implement desktop management capabilities to enhance desktop customisation, security and regulatory compliance as part of their migration. Desktop management objectives IT organisations plan for their new Windows 10 environments include: Remove full administrative rights from users (41%) Achieve faster logon times (38%) Seamlessly migrate user file data (33%) Migrate personal application and OS settings (29%) Prevent user-introduce apps from running or being installed (28%) Track user logon times, application usage and admin privileges (21%)   “Windows 10 adoption is unavoidable, so every organisation needs to brace themselves with the tools and strategies that will make their migration a success,” said Jon Rolls, Vice President of Product Management, Ivanti. “By implementing a unified approach to endpoint management and adopting user workspace management solutions to ensure a great user experience, enhanced productivity and minimised retraining, companies can realise Windows 10 migration success, and smooth the constant updates and upgrades that come with Windows as a Service.”  About the Ivanti 2017 State of Windows 10 Adoption Survey The Ivanti 2017 State of Windows 10 Adoption Survey is a global study performed online by Dimensional Research and includes responses from 1,825 IT professionals in more than 23 countries. A webinar which will reveal detailed findings will be held on Wednesday, May 31. To attend, please register here.   About Ivanti Ivanti is IT evolved. By integrating and automating critical IT tasks, Ivanti helps IT organisations secure the digital workplace. For more than three decades, Ivanti has helped IT professionals address security threats, manage devices and optimise their user experience. From traditional PCs, to mobile devices, virtual machines and the data centre, Ivanti helps discover and manage your IT assets wherever they are located, improving IT service delivery and reducing risk. Ivanti also ensures that supply chain and warehouse teams are effectively leveraging the most up-to-date technology to improve productivity throughout their operation. Ivanti is headquartered in Salt Lake City, Utah, and has offices all over the world. For more information, visit www.ivanti.com.    Copyright © 2017, Ivanti.  All rights reserved.  Cyberespionage and ransomware attacks are on the increase warns the Verizon 2017 Data Breach Investigations Report 2017-04-27T06:52:23Z cyberespionage-and-ransomware-attacks-are-on-the-increase-warns-the-verizon-2017-data-breach-investigations-report Cyberespionage hits manufacturing, public sector and education hard: 21 percent of cases analysed Ransomware attacks gain greater popularity: now fifth most common specific malware variety Tenth anniversary edition: includes data from 65 contributing organisations; 42,068 incidents; 1,935 breaches from 84 countries  SYDNEY, Australia – 27 April 2017 – Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report.  Much of this is due to the high proliferation of propriety research, prototypes and confidential personal data, which are hot-ticket items for cybercriminals. Nearly 2,000 breaches were analysed in this year’s report and more than 300 were espionage-related many of which started life as phishing emails.   In addition, organised criminal groups escalated their use of ransomware to extort money from victims: this year’s report sees a 50 percent increase in ransomware attacks compared to last year.  Despite this increase and the related media coverage surrounding the use of ransomware, many organisations still rely on out-of-date security solutions and aren’t investing in security precautions.  In essence, they’re opting to pay a ransom demand rather than to invest in security services that could mitigate against a cyberattack.   “Insights provided in the DBIR are levelling the cybersecurity playing field,” said George Fischer, president of Verizon Enterprise Solutions. “Our data is giving governments and organisations the information they need to anticipate cyberattacks and more effectively mitigate cyber-risk. By analysing data from our own security team and that of other leading security practitioners from around the world, we’re able to offer valuable intelligence that can be used to transform an organisation’s risk profile”.   This year’s DBIR – the keystone report’s 10th anniversary edition – combines up-to-date analysis of the biggest issues in cybersecurity with key industry-specific insights, putting security squarely on the business agenda. Major findings include:   Malware is big business: Fifty-one (51) percent of data breaches analysed involved malware. Ransomware rose to the fifth most common specific malware variety. Ransomware – using technology to extort money from victims – saw a 50 percent increase from last year’s report, and a huge jump from the 2014 DBIR where it ranked 22 in the types of malware used. Phishing is still a go-to technique: In the 2016 DBIR, Verizon flagged the growing use of phishing techniques linked to software installation on a user’s device. In this year’s report, 95 percent of phishing attacks follow this process. Forty-three percent of data breaches utilised phishing, and the method is used in both cyber-espionage and financially motivated attacks. Pretexting is on the rise: Pretexting is another tactic on the increase, and the 2017 DBIR showed that it is predominantly targeted at financial department employees – the ones who hold the keys to money transfers. Email was the top communication vector, accounting for 88 percent of financial pretexting incidents, with phone communications in second place with just under 10 percent. Smaller organisations are also a target: Sixty-one (61) percent of victims analysed were businesses with fewer than 1,000 employees.   “Cyber-attacks targeting the human factor are still a major issue,” says Bryan Sartin, executive director, Global Security Services, Verizon Enterprise Solutions. “Cybercriminals concentrate on four key drivers of human behaviour to encourage individuals to disclose information: eagerness, distraction, curiosity and uncertainty. And as our report shows, it is working, with a significant increase in both phishing and pretexting this year.”  Business sector insights give real-life customer intelligence   This year’s report provides tailored insights for key business sectors, revealing specific challenges faced by different verticals, and also answering the “who? what? why? and how?” for each. Key sector-specific findings include: The top three industries for data breaches are financial services (24 percent); healthcare (15 percent) and the public sector (12 percent). Companies in the manufacturing industry are the most common targets for email-based malware. Sixty-eight (68) percent of healthcare threat actors are internal to the organisation.   “The cybercrime data for each industry varies dramatically,” comments Sartin. “It is only by understanding the fundamental workings of each vertical that you can appreciate the cybersecurity challenges they face and recommend appropriate actions.”  The most authoritative data-driven cybersecurity report around   Now in its tenth year, the “Verizon 2017 Data Breach Investigations Report” leverages the collective data from 65 organisations across the world. This year’s report includes analysis on 42,068 incidents and 1,935 breaches from 84 countries. The DBIR series continues to be the most data-driven security publication with the largest amount of data sources combining towards a common goal – slicing through the fear, uncertainty and doubt around cybercrime.   “We started the DBIR series with one main contributor – ourselves”, comments Sartin. “Our vision is to unite industries with the end goal of confronting cybercrime head-on– and we are achieving this. The success of the DBIR series is thanks to our contributors who support us year after year. Together we have broken down the barriers that used to surround cybercrime – developing trust and credibility. No organisation has to stand in silence against cybercrime – the knowledge is out there to be shared.”  Get the basics in place   With 81 percent of hacking-related breaches leveraging either stolen passwords and/or weak or guessable passwords, getting the basics right is as important as ever before. Some recommendations for organisations and individuals alike include:   Stay vigilant – log files and change management systems can give you early warning of a breach. Make people your first line of defense – train staff to spot the warning signs. Keep data on a “need to know” basis – only employees that need access to systems to do their jobs should have it. Patch promptly – this could guard against many attacks. Encrypt sensitive data – make your data next to useless if it is stolen. Use two-factor authentication – this can limit the damage that can be done with lost or stolen credentials. Don’t forget physical security – not all data theft happens online.   “Our report demonstrates that there is no such thing as an impenetrable system, but doing the basics well makes a real difference. Often, even a basic defense will deter cybercriminals who will move on to look for an easier target," concludes Sartin.  Verizon delivers unparalleled managed security services   Verizon is a leader in delivering global managed security solutions to enterprises in the financial services, retail, government, technology, healthcare, manufacturing, and energy and transportation sectors. Verizon combines powerful intelligence and analytics with an expansive breadth of professional and managed services, including customisable advanced security operations and managed threat protection services, next-generation commercial technology monitoring and analytics, threat intel and response service and forensics investigations and identity management. Verizon brings the strength and expert knowledge of more than 550 consultants across the globe to proactively reduce security threats and lower information risks to organisations.    About Verizon   Verizon Communications Inc. (NYSE, Nasdaq: VZ), headquartered in New York City, has a diverse workforce of 161,000 and generated nearly $126 billion in 2016 revenues. Verizon operates America’s most reliable wireless network, with 113.9 million retail connections nationwide. The company also provides communications and entertainment services over mobile broadband and the nation’s premier all-fiber network, and delivers integrated business solutions to customers worldwide.   ####   VERIZON’S ONLINE NEWS CENTER: News releases, feature stories, executive biographies and media contacts are available at Verizon’s online News Center at www.verizon.com/news/. News releases are also available through an RSS feed. To subscribe, visit www.verizon.com/about/rss-feeds/.    Media contacts Amanda Conroy or Gloria Lee Espresso Communications on behalf of Verizon Enterprise Solutions Phone: +61 2 8016 2200 Email: Verizon@espressocomms.com.au Brocade Global Study Reveals More Than Half of IT Teams Will Struggle Due to a Lack of the “Right” Skills That Business Demands in Next 12 Months 2017-04-26T23:51:04Z brocade-global-study-reveals-more-than-half-of-it-teams-will-struggle-due-to-a-lack-of-the-right-skills-that-business-demands-in-next-12-months-2 Sydney, Australia — 27 April 2017 — Brocade (NASDAQ: BRCD) today announced a new Global Digital Transformation Skills Study, which aims to uncover how prepared global IT leaders are to meet current and future business demands. Of the six markets surveyed, Germany was found to be the best prepared to meet its digital transformation goals, closely followed by the U.S.; while Australia and Singapore lagged well behind their counterparts.   The research, which surveyed 630 IT leaders in the U.S., UK, France, Germany, Australia and Singapore, indicates that many organisations are at a tipping point, as new technology demands are set to outstrip the skills supply. Organisations that address this now through additional skills training will be in the strongest position to ensure business growth and competitive advantage.   Overall, an encouraging 91 percent of global IT leaders acknowledge that IT departments are currently recognised as very important or critical to innovation and business growth. However, over half (54 percent) predict they will struggle with a lack of IT talent in 12 months. Contributing factors identified from the research include skills shortages, prevalence of outdated skills, lack of commitment to training at the corporate board level and the rapidly changing technology environment.   “Businesses are approaching the peak of IT strategic influence,” said Phillip Coates, systems engineering manager, Australia and New Zealand for Brocade. “Now is the moment that IT teams feel they have the strongest opportunity to influence the transformation of their organisations. However, with a rapidly changing technology landscape and potential impact on international labour markets, it’s critical that IT receives the right training to further develop their skills and business relevance.”   The research also found that skills planning had to be aligned with other areas of business planning to avoid the risk of a technology skills deficit, where IT teams are expected to deliver the benefits of technologies that they are ill-equipped to implement.  Staff shortages and outdated skills preventing IT decision makers from delivering on current business demands Organisations are attempting to move their IT departments away from their traditional roles, but lack of skills and time required to learn those skills have held them back. IT decision makers believe this could be a major contributor to their inability to meet business demands, putting organisations at risk of falling behind their competitors and losing customers. Approximately one in four respondents in Australia, France, Germany, Singapore and the U.S. claim that they cannot deliver on current business demand due to staff shortages. This number rises to 42 percent in the UK. Respondents claim that the lack of access to talent will prevent them from implementing new technologies efficiently, lead to a decrease in employee satisfaction and result in the loss of market share. IT skills gap is likely to get worse and organisations need to act now The political landscape is also a contributing factor in the widening skills gap. As market uncertainty intensifies in the next few years, it is more important than ever for IT departments to remain agile and take advantage of new technologies. Ninety-two percent of those questioned had some level of concern about future hiring of IT staff, while 54 percent were concerned about a lack of skilled talent to choose from. Forty-three percent of global respondents agreed or strongly agreed that the current political climate makes it difficult to hire employees with the right skills. In the U.S. and Australia, the numbers were 52 percent and 54 percent respectively. Training time and investment will prove to be business-critical Training continues to be an issue as day-to-day IT maintenance tasks take priority. For organisations to address the technical skills deficit, they first need to invest time and money — or face the consequences. There is consistent demand globally to spend more time on increasing skills — from 15 percent of time that is currently spent on this to 22 percent. Respondents reported that insufficient budget (45 percent) and training time (45 percent) are constraining IT departments’ attempts to develop skills more than any other factors. These factors rise to 60 percent and 50 percent respectively in Australia, but drop to 37 percent and 30 percent in Germany. Currently, only three hours are allocated per week for learning and skills development. Respondents in Singapore average four hours of skills development per week. Sixty-seven percent of respondents agree that the key to closing the skills gap would be to spend more money on training. IT professionals need to take control of their professional future The research also showed that IT professionals at all levels must take increased responsibility for their own professional destiny, embracing the opportunities delivered by new technologies such as artificial intelligence (AI) and all areas of IoT from device management to security. Thirty-five percent of global respondents agreed or strongly agreed that their organisation’s IT team does not have the right skills to protect their jobs in the future. When asked to identify the one skill that they see as critical to their future career progression, cybersecurity was the most frequently cited, by 22 percent of respondents globally. AI and IoT security tied for second as the most critical skill at 18 percent. While AI was the most critical skill in France and Australia, IoT security was the most valued skill in Germany. AI could be a friend or foe AI could revolutionise the IT skills that are required and the way that we work. AI is likely to replace a number of IT roles and tasks, but this doesn’t mean the end for the IT department. Employees need to have the right skills to be in a position to work alongside AI and embrace its future impact, so that organisations can unleash its full potential. When asked which current roles were already being replaced by AI, desktop support (23 percent), data analyst (20 percent), software testers (17 percent), system architects (14 percent) and network engineers (11 percent) topped the list. Within the next 10 years, these numbers are expected to increase: desktop support (37 percent), data analyst (34 percent), software testers (33 percent), system architects (31 percent) and network engineers (31 percent). AI will also impact the role of the CIO, with almost half of the global respondents claiming increased focus from the business. Fifty-six percent of respondents believe that developing AI-related skills is key to securing a role in the future. Vital role of the board in ensuring long-term IT skills development Organisations’ boards will often dictate whether employees have the time and empowerment to develop their skills, but this is common at organisations that do not have the right support. The boards also have to ensure that skills and training improvements are aligned with other areas of business planning. Forty-four percent of respondents think that new skills acquisition is not seen as being as valuable as it should be by the board. This rises to 59 percent in Australia and 50 percent in the UK. The U.S. (42 percent), Germany (41 percent), Singapore (40 percent) and France (34 percent) had slightly more positive results. Almost a fifth of global respondents think their boards view gaining knowledge and skills as a cost to the business, rather than an asset. This rises to 35 percent in Australia. However, the majority of respondents in France (63 percent) and Germany (62 percent) see knowledge and skills growth as an asset. Despite respondents claiming that they plan approximately two years in advance for most areas of the business, staffing and recruitment is still on average only planned for a maximum of a year. This is creating a disconnect where organisations are attempting to address key IT challenges with teams not as well equipped in terms of skills and experience as they could be. Additional Resources Data in the study also revealed four main personas of global IT leaders, all with different levels of effectiveness when it comes to pioneering digital transformation projects and managing the skills of their teams. Supplementary Paper: “From Laggard to Leader – The Changing Personas of IT Leaders’ (Laggards, Evaluators, Adopters and Leaders)” Global and regional analysis of each persona in each of the countries surveyed (country breakdowns) Executive summary The study was conducted by independent research house Vanson Bourne in March 2017. 630 IT decision-makers in organisations with more than 500 employees in the U.S., U.K., France, Germany, Singapore and Australia were surveyed.  About Brocade Brocade® (NASDAQ:BRCD) networking solutions help the world's leading organisations turn their networks into platforms for business innovation. With solutions spanning public and private data centres to the network edge, Brocade is leading the industry in its transition to the New IP network infrastructures required for today's era of digital business. (www.brocade.com) # # #  © 2017 Brocade Communications Systems, Inc. All Rights Reserved.  Brocade, the B-wing symbol, and MyBrocade are registered trademarks of Brocade Communications Systems, Inc., in the United States and in other countries. Other brands, product names, or service names mentioned of Brocade Communications Systems, Inc. are listed at www.brocade.com/en/legal/brocade-Legal-intellectual-property/brocade-legal-trademarks.html. Other marks may belong to third parties.  BROCADE MEDIA CONTACT Brocade APAC Corp Communications Wendy Lang Tel: +65 6317 2464wlang@brocade.comPR AGENCY CONTACT Einsteinz Communications Carlotta Vittori or Emma Keen Tel: +61 2 8905 0995brocade@einsteinz.com.au   Independent Lab MRG Effitas Confirms Acronis True Image Leads Competition on Ransomware Protection, Performance and Usability 2017-04-26T04:18:43Z independent-lab-mrg-effitas-confirms-acronis-true-image-leads-competition-on-ransomware-protection-performance-and-usability Sydney, Australia – 26 April 2017 — Acronis, a global leader in hybrid cloud data protection and storage today announced the latest product comparison report from MRG Effitas, a UK-based independent IT security research company that provides a range of efficacy assessment and assurance services. The report conclusively demonstrated that Acronis True Image 2017 New Generation is the most advanced consumer backup solution as measured by ransomware protection, performance, usability, and feature set.   MRG Effitas compared Acronis True Image 2017 New Generation, CrashPlan Home 4.8.0, EaseUS TODO Backup Home 10.0, Genie Timeline Home 2016, IDrive 6.5.1.23, Macrium Reflect Home 6.3.1655, NovaBACKUP 18.5 Build 926, and Paragon Backup and Recovery 16. The result was a comprehensive 2017 report entitled “MRG Effitas Comparative Assessment of Data Protection/Backup Products on Protection, Performance, and Usability.”   The report singled out Acronis True Image as the only solution that protected data against every assessed ransomware threat, thanks to the innovative Acronis Active Protection™ technology released earlier this year.   “Among all the products we tested, only Acronis True Image 2017 New Generation was able to protect the backups from every ransomware family,” states the report’s final conclusion. “The other solutions have basically zero backup protection when it comes to ransomware… Based on the tests, only Acronis’s backup file is protected against ransomware.”   “Ransomware currently represents a significant risk to end users, businesses and government institutions. Anti-malware technologies can’t provide 100 percent protection against this class of threat. What this test shows is that anyone relying on a backup solution to mitigate against the risks imposed by ransomware if their anti-malware technology fails should not just assume that it will be effective without independent, third party verification.” Chris Pickard, CEO of MRG Effitas.   That’s not the only finding that pointed to the Acronis solution as the optimal choice. According to MRG Effitas, Acronis True Image also came first in 18 of 24 performance test and when it didn’t win, it finished second.   “These results confirm our internal testing,” said John Zanni, CMO of Acronis. “Acronis True Image is the fastest home backup on the market and the only product that is able to protect itself, and the data, from ransomware. The same anti-ransomware technology is currently being rolled out across the full range of our business products and we’ll continue to invest in R&D, making data protection fast, easy, complete — for everybody.”​ Malwarebytes Integrates with ForeScout to Deliver Real-Time Threat Visibility and Remediation 2017-04-20T23:58:58Z malwarebytes-integrates-with-forescout-to-deliver-real-time-threat-visibility-and-remediation Malwarebytes™, the leading advanced malware prevention and remediation solution, today announced an integration with ForeScout Technologies, Inc., a leading Internet of Things (IoT) security company, to provide joint customers real-time threat visibility and remediation for both managed and unmanaged devices. The vast majority of today’s attacks occur in just minutes, with the bulk of subsequent data theft beginning within seconds following a breach. Malicious attackers have dozens of tools, techniques and attack vectors available to them for compromising business endpoints and devices. Couple this with a constantly evolving enterprise IT infrastructure to defend and it’s clear the risks are greater than ever. Security teams must proactively understand and react to the threat landscape faster than ever before. The Malwarebytes integration with ForeScout helps businesses accelerate their incident response, stop zero-day exploits and reduce their exposure to emerging security threats. With the integrated solution, customers benefit from a reduction in attack surface through the capability to proactively prevent compromise, sweep the network for latent threats, assess the enterprise-wide exposure to and impact of an active threat, and automate real-time threat response directly from the ForeScout CounterACT® console. This integration employs the following Malwarebytes enterprise offerings which communicate bi-directionally with the ForeScout CounterACT console: Malwarebytes Breach Remediation which provides advanced threat sweeping, confirmation, investigation and thorough removal via an extensible and agentless application. Malwarebytes Endpoint Security which provides next-generation protection from advanced zero-hour threats using six unified defense layers to proactively block an attack before it begins. As ForeScout CounterACT detects and profiles devices that connect to a network, Malwarebytes Breach Remediation or Malwarebytes Endpoint Security solutions are silently deployed onto discovered endpoints. Active endpoints then report their real-time health status back to ForeScout CounterACT, and discovered threats will trigger an automated hygiene policy and incident response. The Malwarebytes integration with ForeScout provides customers with: Visibility into emerging threats: Discover threats and exploit attempts across the enterprise. Rapid threat detection and remediation: Assess risk at the endpoint, remediate threats instantly and remove unwanted applications that might lead to latent infection. Automated threat response: Share contextual insights into discovered threats and automate the incident response workflow. “Today’s threats are more destructive than ever, hitting organisations at an unprecedented velocity and sophistication – easily overwhelming and evading perimeter security defenses,” said Monty Venkersammy, VP of Business Development, Malwarebytes. “Automatically identifying devices appearing on the network and understanding their contribution to the enterprise attack surface is vital to preventing malicious activity in a breach. This integration between Malwarebytes and ForeScout not only provides critical threat visibility but additionally the power to respond, delivering thorough investigation and remediation in real-time.”  “As businesses continuously seek to improve their overall security, they unfortunately lack visibility into what is connecting to their network to truly know what’s happening across their environment, and how to swiftly remediate the threat,” said Pedro Abreu, Chief Strategy Officer, ForeScout Technologies, Inc. “ForeScout is proud to help solve these security challenges for our end-customers by integrating ForeScout CounterACT with Malwarebytes Breach Remediation and Endpoint Security solutions.”About Malwarebytes Malwarebytes is the next-gen cybersecurity company that millions worldwide trust. Malwarebytes proactively protects people and businesses against dangerous threats such as malware, ransomware, and exploits that escape detection by traditional antivirus solutions. The company’s flagship product combines advanced heuristic threat detection with signature-less technologies to detect and stop a cyberattack before damage occurs. More than 10,000 businesses worldwide use, trust, and recommend Malwarebytes. Founded in 2008, the company is headquartered in California, with offices in Europe and Asia, and a global team of threat researchers and security experts. For more information, please visit us at: http://www.malwarebytes.com/. Malwarebytes founder and CEO Marcin Kleczynski started the company to create the best disinfection and protection solutions to combat the world’s most harmful Internet threats. Marcin was recently named “CEO of the Year” in the Global Excellence awards and has been named to the Forbes 30 Under 30 Rising Stars of Enterprise Technology list and the Silicon Valley Business Journal’s 40 Under 40 award, adding those to an Ernst & Young Entrepreneur of the Year Award. ### Follow us on Facebook: https://www.facebook.com/Malwarebytes Follow us on Twitter: @malwarebytes https://twitter.com/malwarebytes Follow us on LinkedIn: https://www.linkedin.com/company/malwarebytes See us on YouTube: http://www.youtube.com/malwarebytes Read our latest Malwarebytes Labs blog: https://blog.malwarebytes.com/ Ivanti Completes SOC 2 Type II Certification 2017-04-20T00:37:46Z ivanti-completes-soc-2-type-ii-certification Ivanti, a leader in integrating and automating critical IT tasks, today announced that it has successfully completed the Service Organization Control (SOC) 2 Type II audit for its world-class ITSM cloud offering. Conducted by Armanino, one of the top ten fastest-growing large accounting firms in the nation, this comprehensive audit and certification verifies Ivanti’s strong security protocol and validates the company as a leading cloud provider.   SOC 2 keeps a company’s information security measures in line with today’s specific cloud requirements. As companies increasingly use the cloud to store sensitive data, SOC 2 compliance is vital to organisations in a wide array of industries.   Ivanti is well-positioned in on-premise, cloud and hybrid ITSM delivery, and is continuing to produce forward-thinking, innovative cloud offerings. The SOC 2 Type II certification exhibits Ivanti’s ability to constantly mature its cloud delivery, a feat not all vendors have been able to demonstrate. The audit also certifies that Ivanti’s cloud security practices, policies and procedures meet SOC 2’s high standards for security, availability and confidentiality. As a one-stop-shop for companies in any industry seeking robust cloud capabilities, Ivanti achieved this certification using entirely its own cloud technologies.   “Primary barriers for companies to adopt the cloud are concerns surrounding security and data privacy,” said Tom Davis, CTO of Ivanti. “SOC 2 Type II certification helps assure our customers that, with Ivanti, their data is secured and with an established vendor who has implemented data privacy and security controls. Receiving this confirmation from an independent source further solidifies us as the leader in ITSM cloud delivery.”   SOC 2 certification is part of Ivanti’s multipronged cloud security plan. As a true SaaS company, Ivanti employs a cloud-first strategy, optimising all web design, leveraging secure data centers that are scalable and guaranteeing all its cloud offerings have high availability, full redundancy and are completely secured. This better cloud design provides companies with the ability to use Ivanti’s ITSM cloud solutions as part of their core business operations and strategy, with the added assurance that the cloud service is safe.    "We count on Ivanti to deliver secure and reliable ITSM services and ensure their integrity. By achieving the SOC2 compliance the team demonstrates its commitment to ensuring the security of our data," said Wendell Bobst, assistant vice president of information technology customer services at Adventist Health.   Specifically geared toward SaaS and other technology companies with a focus on security, availability, processing integrity, confidentiality and privacy, the SOC 2 standard best meets the demands of the information security and SaaS marketplace. This extensive reporting standard provides independent validation that Ivanti’s internal control environment operates in accordance with the selected American Institute of Certified Public Accountants (AICPA) trust services principles and criteria.    The SOC 2 certification comes at the same time that TRUSTe has certified HEAT Software USA Inc. privacy practices and statement for EU-US Privacy Shield. The EU-U.S. Privacy Shield Frameworks were designed by the U.S. Department of Commerce and the European Commission to offer companies a way in which to comply with data protection requirements when transferring personal data from the European Union to the United States in support of transatlantic commerce. HEAT Software USA Inc., a company that recently merged with LANDESK into Ivanti, is an active participant in the Privacy Shield list <https://www.privacyshield.gov/list> . This certification further positions Ivanti as a global player in all things security.    For more information on Ivanti’s cloud capabilities, please visit: http://www.ivanti.com/en-USAbout Ivanti Ivanti is IT evolved. By integrating and automating critical IT tasks, Ivanti is helping IT organisations secure the digital workplace. For more than three decades, Ivanti has helped IT professionals address security threats, manage devices and optimise their user experience. From traditional PCs, to mobile devices, virtual machines and the data centre, Ivanti helps discover and manage your IT assets wherever they are located, improving IT service delivery and reducing risk. Ivanti also ensures that supply chain and warehouse teams are effectively leveraging the most up-to-date technology to improve productivity throughout their operation. Ivanti is headquartered in Salt Lake City, Utah, and has offices all over the world. For more information, visit www.ivanti.com ISACA Launches Real-time, Real-world Cyber Security Training Platform and Assessment Tool 2017-04-19T11:22:17Z isaca-launches-real-time-real-world-cyber-security-training-platform-and-assessment-tool Sydney, Australia (19 April 2017) – ISACA is changing how cyber security training is delivered with the latest additions to its Cybersecurity Nexus (CSX) portfolio of resources—the CSX Training Platform and Assessment Tool. The CSX Training Platform offers learners an easily accessible, constantly updated education environment that gives administrators clear insights into employee performance so organisations can ensure that they hire and retain the best talent on the front lines of cyber security defenses. The on-demand, performance-based training and assessment tool, conducted in live environments using real-world threat scenarios, is the first of its kind. Historically, organisations have had to rely on training mechanisms that are costly, inaccessible and quickly out-of-date due to the ever-changing threat environment. According to a recent ISACA survey, 52 per cent of respondents said they believe traditional cyber security training options leave staff only moderately to not-at-all prepared. With the growing skills gap, cyber security team leaders are looking to formally diagnose specific areas where they need to bolster skills, according to 62% of respondents. Real-time Skills Assessment The CSX Training Platform addresses those pain points with the first-of-its kind cloud-hosted assessment feature, which lets HR professionals evaluate the hands-on skills of cyber security job candidates and enables cyber security team leaders to assess the skills of their current staff. The CSX Assessment Tool gives hiring managers a critical resource when it comes to evaluating candidates and ultimately filling positions. Human resource departments and supervisors can use the tool to determine if applicants, or current employees, have the necessary hands-on skills for positions or promotions. Candidates respond to real-world threats in a live lab environment, and HR professionals will receive an immediate assessment of their skills, giving them a clear picture of what the candidate can and can’t do. “With its hands-on approach to cyber defense, the CSX Training Platform is an important learning solution for enterprises that want their front-line IT teams to be cyber-hardened, cyber-prepared and cyber-tested,” said Christos Dimitriadis, ISACA board chair and group director of information security at INTRALOT, “The ability to test and build skills will help enterprises address the significant skills gap problem they’re facing.” Performance-Based Training in a Live Network Environment The CSX Training Platform currently includes up to 100 hours of performance-based learning, divided among beginner, intermediate and advanced levels. It also features virtual versions of ISACA’s three CSX Practitioner courses, the CSX Practitioner Bootcamp, and the Cybersecurity Fundamentals course. The CSX Labs and courses will be updated continuously, and new ones will be added in response to evolving needs of cyber security teams and the threat landscape. “We consistently hear from CISOs around the world that cost and accessibility are significant barriers to getting their employees the hands-on training they need to be effective and advance their capabilities,” said Matt Loeb, ISACA CEO. “As part of our mission to narrow the skills gap and help enterprises develop their cyber workforce, ISACA developed the CSX Training Platform as an affordable solution that gives cyber security professionals complex scenarios to handle and live incidents to detect and mitigate.” The CSX Training Platform isn’t built as a one-size-fits-all for learners. With modules for all levels of practitioners, learners can be sure they are receiving flexible training that is appropriate for their skill level and helps them advance their capabilities in the areas that are most relevant to their work. Enterprises of all sizes can choose to have full access or modify the options to fit their needs. Additionally, with its cloud-based model, training can be accessed by employees on demand and without the expense of travel. Organisations are no longer forced to pull their IT staff away from their job to participate in off-site training. “Each organisation faces a unique set of threats, and the CSX Training Platform is designed to address those threats and test related skills. Our experts will constantly add to the platform, so we are able to build a training curriculum that supports the immediate and future needs of cyber security teams,” said Frank Schettini, Chief Innovation Officer for ISACA. “A cybercriminal builds an attack based on his or her domain of expertise. So why wouldn’t organisations enable security professionals to build defenses the same way?” Why Today? Though cyber security threats are growing in number and complexity, the professionals on the front lines of defense are not keeping pace, according to ISACA’s State of Cyber Security 2017 report. Hiring managers are having a hard time finding the right talent, citing issues such as: Nearly 1 in 3 organisations say it takes six months or more to fill open cyber security positions 37% of organisations say fewer than 1 in 4 candidates are qualified 1 in 5 organisations gets fewer than five applicants for open cyber security positions Additionally, cyber security leaders have a critical need to build the skills of their existing staff. The same survey found that fewer than half are confident in their team’s skills to detect and respond to complex cyber incidents. The CSX Training Platform is currently available for enterprise use. An individual version will be available later in 2017. For more information, visit www.isaca.org/CSXCyberTrainingPlatform. About ISACA ISACA® (isaca.org) helps professionals around the globe realise the positive potential of technology in an evolving digital world. By offering industry-leading knowledge, standards, credentialing and education, ISACA enables professionals to apply technology in ways that instill confidence, address threats, drive innovation and create positive momentum for their organisations. Established in 1969, ISACA is a global association serving more than 500,000 engaged professionals in 188 countries. ISACA is the creator of the COBIT® framework, which helps organisations effectively govern and manage their information and technology. Through its Cybersecurity Nexus™ (CSX), ISACA helps organisations develop skilled cyber workforces and enables individuals to grow and advance their cyber careers. Twitter: https://twitter.com/ISACANews LinkedIn: https://www.linkedin.com/company/isaca Facebook: www.facebook.com/ISACAHQ Instagram: https://www.instagram.com/isacanews/ Contacts: Julie Fenwick, 0468 901 655, jfenwick@iconinternational.com.au Growing appetite for risk and compliance solutions fuels SAI Global’s investment in Singapore 2017-04-19T09:39:37Z growing-appetite-for-risk-and-compliance-solutions-fuels-sai-global-s-investment-in-singapore SAI Global is one of the world’s leading assurance, compliance and learning businesses and is owned by Hong Kong-based Baring Asia Private Equity Fund VI (Baring Asia).    The opening of SAI Global’s Singapore office coincides with what has been identified as a renewed commitment from government and regulatory bodies and signals an increased focus on ensuring companies improve cybersecurity management, governance, risk and compliance (GRC) programmes and operational excellence.   SAI Global’s suite of market-leading risk management solutions ideally positions the company to support this focus; particularly given the addition of five-star IT Risk Manager (formerly Modulo International) which significantly bolsters the cybersecurity capability they offer.    Tasked with driving the company’s Asian market expansion, Steve Thurley is looking forward to the opportunity the new Singapore office provides.  Steve has spent the last 24 years working across the Asian Pacific region for a number of GRC and environment, health and safety vendor companies.    “I’m excited to join SAI Global at this stage of the company’s journey.  During my time in the industry, expansion into Asia has been a growing focus for many international businesses.  With expansion comes increased risk and, to be successful companies must manage this risk intelligently.  I believe SAI Global’s suite of risk management products are far superior to others in the market, empowering companies to take an intelligent approach, mitigating any downside and optimising the upside of risk for growth” said Steve Thurley, SAI Global’s Head of Risk Sales for Asia.   Mr Thurley predicts that demand from the region will be highest for SAI Global’s GRC software Compliance 360 and IT risk software IT Risk Manager.   “Increased pressure to improve corporate behaviour from both customers and regulators coupled with the rising value of intangible assets is causing enterprise risk to skyrocket. The flow on effect of this is an increased amount of interest in GRC solutions.  SAI Global’s suite of market-leading risk and compliance software will help service Singapore’s growing demand for GRC solutions” said Mr Thurley.   “Prime Minister Lee’s launch of the Singapore Cybersecurity Strategy last year signals the country’s strong commitment to improving cybersecurity for all which bodes well for uptake of SAI Global’s IT Risk Manager software which is recognised as one of the best available products on the market.” Big Switch Networks extends support for vSphere Integrated Containers with SDN-based Big Cloud Fabric 2017-04-19T00:00:00Z big-switch-networks-extends-support-for-vsphere-integrated-containers-with-sdn-based-big-cloud-fabric Austin, TX -- DockerCon -- April 18, 2017 -- Big Switch Networks®, The Next-Generation Data Centre Networking Company, today announced it has extended Big Cloud Fabric™ (BCF) container networking support to vSphere Integrated Containers. Earlier this year, Big Switch announced multi-container networking support for Mesosphere DC/OS and Kubernetes container orchestration platforms, including Red Hat OpenShift Container Platform with Big Cloud Fabric.   As the demand for container technology accelerates in enterprise and service provider data centres, a next-generation networking architecture is required to keep up with the rapid lifecycle of container instantiation, elasticity and retirement. BCF leverages software-defined networking (SDN) to provide one big “logical switch” governed by a centralised controller. This solution delivers simplified network operations, visibility and telemetry of containers and their hosts, and network automation for rapid application and micro-services deployment.   "Integrating containers with VMware vSphere provides the best of both worlds for production IT deployments, the agility and portability of containers along with proven security and operations-friendly workflows," said Prashant Gandhi, Chief Product Officer, Big Switch Networks. "When Big Cloud Fabric is deployed as the physical network in this environment, customers can operate the network at the speed of containers due to BCF’s built-in automation and zero-touch operations, while gaining enhanced container-level visibility and rapid container-to-container troubleshooting across the fabric."   With vSphere Integrated Containers, organisations can leverage existing infrastructure to run containerised apps along with traditional applications on the same infrastructure, as well as tools, policies and processes to manage containerised applications in production. With BCF, customers can achieve the same operational benefits for their networking infrastructure hosting a mix of both traditional VM and containerised workloads. In container environments, the BCF controller enables physical network automation as well as deeper visibility of container-to-container traffic across the network, via integration with vSphere Integrated Containers.   Big Cloud Fabric is the optimal networking fabric for multiple VMware solutions via a single point of integration for the entire fabric. In VMware environments, BCF connects with the VMware vCenter® API to provide physical network automation and end-to-end network visibility for VMware vSphere®. The Big Cloud Fabric controller directly integrates into VMware vCenter™ to simplify and automate application deployments on its physical SDN fabric and physical networks. The following aspects of the network are automated, requiring zero intervention from VM or network admin: Automatic ESXi host connectivity with fabric using LAG/MLAG Automatic Layer 2 network configuration Automatic network policy migration for vMotion The integrated VMware visibility provided by Big Cloud Fabric enables network and virtualisation administrators to rapidly resolve cross-domain issues, while vSphere Integrated Containers provide critical enterprise container infrastructure to help IT Ops run both traditional and containerised applications side-by-side on a common platform. With vSphere Integrated Containers, IT teams can avoid expensive and time-consuming re-architecture of infrastructure that results in silos. When coupled with BCF, the same physical infrastructure can be logically provisioned to be orchestrated under different VMware environments for different workloads, including vSphere, vSphere + NSX, vSphere + vSAN, VMware Integrated OpenStack, and now vSphere Integrated Containers. The networking infrastructure can be scaled-out on demand and newer workload types can be added dynamically.   The scale-out architecture of BCF accommodates future-growth in east-west traffic, caused by an increase in deployment of micro-services. Benefits of running vSphere Integrated Containers on top of Big Cloud Fabric include: Automated provisioning of physical network in tandem with virtual networking used by vSphere Integrated Containers Network admin visibility into container workload VMs, Virtual Container Host (VCH) infrastructure VMs, resource pools and vApps Container-container fabric tracing for both network and vSphere admins Analytics of VIC events for network admin for historical replay Support for multi-tenant environments with vSphere Integrated Containers and Big Cloud Fabric Seamless interoperability with Docker tools that are used to deploy VMware Integrated Containers. Supporting containers in their virtualised environments provides a number of benefits: IT teams get the security, isolation and management of VMs, while developers enjoy the speed and agility of containers - all within vSphere. vSphere Integrated Containers are run as VMs to leverage vSphere’s core capabilities: security, networking and resource management for a production environment. BCF as the physical network infrastructure brings the same automation and visibility benefits for the container VMs as for the traditional VMs by leveraging the integration of BCF with vSphere.  About Big Switch Networks Big Switch Networks is the Next-Generation Data Centre Networking Company. We disrupt the status quo of networking by designing intelligent, automated and flexible networks for our customers around the world. We do so by leveraging the principles of software-defined networking (SDN), coupled with a choice of industry-standard hardware. Big Switch Networks has two solutions: Big Monitoring Fabric, a Next-Generation Network Packet Broker, which enables pervasive security and monitoring of data centre and cloud traffic for inline or out-of-band deployments and Big Cloud Fabric, the industry's first Next-Generation switching fabric that allows for choice of switching hardware for OpenStack, VMware, Container and Big Data use cases. Big Switch Networks is headquartered in Santa Clara, CA, with offices located in Tokyo, Sydney, London and Istanbul. For additional information, email info@bigswitch.com, follow @bigswitch, or visit www.bigswitch.com.   Big Switch Networks, Big Cloud Fabric, Big Monitoring Fabric, BigSecure, Big Chain, Switch Light OS, and Switch Light VX are trademarks or registered trademarks of Big Switch Networks, Inc. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners.  Media contacts Espresso Communications for Big Switch Networks Biana Chamlet/Amy Rathbonebigswitch@espressocomms.com.au Ph. +61 2 8016 2200 Ivanti Releases Best Practice Guides for Hosting DesktopNow, powered by AppSense, in Microsoft Azure and Amazon Web Services 2017-04-18T22:17:15Z ivanti-releases-best-practice-guides-for-hosting-desktopnow-powered-by-appsense-in-microsoft-azure-and-amazon-web-services Ivanti, a leader in integrating and automating critical IT tasks, today announced new Cloud Best Practice Guides which outline the architecture and support of Ivanti DesktopNow, powered by AppSense, for hosting in Microsoft Azure and Amazon Web Services (AWS). The new resources showcase how to move on-premises DesktopNow server infrastructure into the cloud for optimising and securing Windows desktops of all types: physical, virtual and Desktop-as-a-Service (DaaS).    According to Gartner, by 2019 50% of new Virtual Desktop Infrastructure (VDI) users will be deployed on DaaS platforms.[1].  To support this active move to the cloud, Ivanti DesktopNow uniquely provides desktop management in the cloud while also automating migration to cloud infrastructure and supporting hybrid models. With the ability to move users between on-premises and cloud environments at will, DesktopNow gives IT control and optimisation of Windows desktops everywhere, using the most cost-effective and secure deployment model.    “Ivanti DesktopNow, powered by AppSense, is already a proven cloud-era technology architected using web services that has delivered scalable, enterprise-ready solutions for many years. It’s a natural extension to support our customers and partners as they move this infrastructure to the cloud,” said Jon Rolls, Vice President of Product Management, Ivanti. “With these Best Practice Guides, IT can provide a controlled and optimised experience to desktop users without additional on-premises infrastructure.”   Ivanti DesktopNow supports the following desktop models: ·      DaaS and Virtual Desktops in the Cloud – Supporting both virtual desktops (VDI) and published desktops in the cloud, DesktopNow services can be hosted in the same cloud infrastructure to smooth onboarding and maximse user acceptance.  ·      IaaS for Hybrid Desktops – With the DesktopNow infrastructure hosted in Azure or AWS, all desktops securely communicate with a scalable, highly available cloud service that protects and optimizes the user on physical and virtual desktops, no matter where they are.  ·      Citrix Cloud Implementations – DesktopNow also supports Citrix Cloud and Citrix Lifecycle Manager (CLM). A launch partner for Citrix Cloud CLM, Ivanti technology allows automated creation and deployment of best practice blueprints for Citrix Cloud CLM.   Ivanti DesktopNow Plus (http://www.ivanti.com/en-US/products/desktopnow) is a workspace management solution that simplifies desktop deployments and administration, increasing productivity to reduce IT costs and secure endpoints. With DesktopNow Plus, IT organisations can deliver a personalised, compliant desktop regardless of user location or device. The solution also eases Windows 10 migrations and enables secure file sync, sharing and data access.    The DesktopNow Cloud Best Practice Guide for Microsoft Azure can be  downloaded here: http://rs.ivanti.com/white-papers/IVI-1805-hosting-desktopnow-in-microsoft-azure.pdf. The DesktopNow Cloud Best Practices Guide for AWS can be downloaded here: http://rs.ivanti.com/white-papers/IVI-1804-hosting-desktopnow-in-amazon.pdf. The DesktopNow Citrix CLM (Smart Tools) Blueprint is available to Citrix customers using Smart Tools to automate deployment.   About Ivanti Ivanti is IT evolved. By integrating and automating critical IT tasks, Ivanti helps IT organisations secure the digital workplace. For more than three decades, Ivanti has helped IT professionals address security threats, manage devices and optimise their user experience. From traditional PCs, to mobile devices, virtual machines and the data centre, Ivanti helps discover and manage your IT assets wherever they are located, improving IT service delivery and reducing risk. Ivanti also ensures that supply chain and warehouse teams are effectively leveraging the most up-to-date technology to improve productivity throughout their operation. Ivanti is headquartered in Salt Lake City, Utah, and has offices all over the world. For more information, visit www.ivanti.com.   Copyright © 2017, Ivanti.  All rights reserved.Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organisation and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. [1] 2016 Gartner Market Guide for Desktop as a Service (DaaS): https://www.gartner.com/doc/3396917/market-guide-desktop-service> , August 2016  ENDS   Carbon Black named a Leader in IDC MarketScape: worldwide endpoint specialised threat analysis and protection vendor assessment 2017-04-18T04:11:39Z carbon-black-named-a-leader-in-idc-marketscape-worldwide-endpoint-specialised-threat-analysis-and-protection-vendor-assessment SYDNEY—April 18, 2017—Carbon Black, the leader in next-generation endpoint security, today announced it has been named a leader in the IDC MarketScape: Worldwide Endpoint Specialized Threat Analysis and Protection (STAP) 2017 Vendor Assessment (doc #US42385717, April 2017). Carbon Black occupies the upper right portion of the IDC MarketScape industry chart, which combines ‘capabilities’, ‘strategies’ and ‘market share’.  (See MarketScape graphic.) Highlights from the report include: “Customers interviewed by IDC highly praised Cb Response, choosing it over competitive solutions to improve their triage, threat hunting, incident response and remediation processes.” Cb Response was heralded for the rich contextual information it uses to support alerts and the ability to set up custom rules to isolate hosts, block custom malware, and automatically trigger an action in third-party products. Cb Response was recommended for its ability to gather continuous behavioural and contextual data on millions of endpoints to investigate and rapidly respond to new threats and scale to support up to 150,000 endpoints per server cluster. Cb Response’s ‘Live Response’ was noted as a differentiator against competitor products for its ability to empower responders with the ability to conduct remote remediation. Customers praised Cb Response for its extensive default functionality and the ability to run remediation scripts, collect memory and process information, and issue system-level calls. Cb Defense was noted as a cloud-delivered antivirus alternative for enterprises lacking IT security resources or seeking an alternative to traditional antivirus. The report called out Carbon Black’s strategic plan to fully integrate Cb Defense and leverage its cloud-based architecture to create a unified platform with a single agent and integrated back-end infrastructure. “This report validates Carbon Black’s leadership position at the forefront of the highly competitive endpoint security market,” said Patrick Morley, Carbon Black’s president and chief executive officer. “The most important validation we can get is from our customers, many of whom lauded Carbon Black as part of this report. Today, Carbon Black protects more than 9 million endpoints for 3,000 customers worldwide. We are proud to deliver a market-leading solution in Cb Response, which empowers organizations to hunt for the most advanced threats and scales to the largest of enterprises.” The leader designation from the IDC MarketScape on Endpoint STAP is the latest honour for the company. Carbon Black was recently named ‘Best Endpoint Detection and Response Solution’ by security professionals in the SANS Institute Awards (2016); a ‘Leader’ in the Forrester Research Inc. report, The Forrester Wave™: Endpoint Security Suites, Q4 2016; and a “Visionary” in the Gartner Magic Quadrant for Endpoint Protection Platforms (EPP) (2016). Additionally, Carbon Black was the only vendor to secure a perfect prevention score in NSS Labs’ Advanced Endpoint Protection (AEP) test (2016).About IDC MarketScape IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of ICT (information and communications technology) suppliers in a given market. The research methodology utilises a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each vendor’s position within a given market. IDC MarketScape provides a clear framework in which the product and service offerings, capabilities and strategies, and current and future market success factors of IT and telecommunications vendors can be meaningfully compared. The framework also provides technology buyers with a 360-degree assessment of the strengths and weaknesses of current and prospective vendors.About Carbon Black Carbon Black is the leading provider of next-generation endpoint security. With more than 9 million endpoints under management, Carbon Black has more than 3,000 customers, including 30 of the Fortune 100. These customers use Carbon Black to replace legacy antivirus, lock down critical systems, hunt threats, and protect their endpoints from the most advanced cyberattacks, including non-malware attacks.Contact: Marie Evans, Carbon Black.marie.evans@carbonblack.com 61 (0) 412 044 072       Dell Boomi Partners with CRM Online to Automate Data Integration for Field Services Firms 2017-04-18T00:37:33Z dell-boomi-partners-with-crm-online-to-automate-data-integration-for-field-services-firms Sydney, Australia – Apr. 18, 2017 – Leading cloud-based integration platform provider, Dell Boomi, has partnered with Australian field service software provider, CRM Online, to provide local enterprises and mid-market organisations with a simple integration solution for critical business systems and applications. As part of the agreement, CRM Online will combine Boomi’s integration platform-as-a-service (iPaaS) with its Fieldmagic field service solution. This will provide to joint customers a simple means of integrating field services data – such as customer information, invoicing, purchase orders and payment data – with their on-premises and cloud enterprise resource planning (ERP) systems. “A major challenge with implementing field services software is integration into accounting or ERP platforms – particularly for larger on-premises deployments,” said Glenn Richmond, Founder and CEO, CRM Online. “Without a dedicated integration solution, field services organisations rely on manual processes which give way to human error, duplication, and risk to data integrity. Boomi enhances our Fieldmagic solution by providing a drag-and-drop, cloud-based mechanism that enables automated enterprise integration with a wide range of best-of-breed systems.” Unlike competing platforms that often require complex on-premises software installations even prior to designing integrations, Boomi’s architecture provides out-of-the-box connectors for major ERP solutions, and allows organisations to scale based on their unique business requirements. Dell Boomi significantly accelerates delivery, increases the robustness and lowers cost of implementation of any ERP integration with Fieldmagic. “The combination of CRM Online’s Fieldmagic and our iPaaS solution provides joint customers with a ‘quick and easy’ yet comprehensive way to centralise critical systems and applications,” said Michael Evans, Managing Director Asia-Pacific and Japan, Dell Boomi. “This means organisations can use the best-of-breed technologies they want while also ensuring the wider business is properly aligned. This is particularly important for large and diverse organisations which don’t want to be held hostage by inflexible and rigid environments.” About Fieldmagic Fieldmagic is a leading field services platform that combines the flexibility of CRM with quoting, job management, scheduling, maintenance and asset management to provide a leading end to end solution for field service organisations. Visit http://www.fieldmagic.co for more information. About Dell Boomi Dell Boomi (Boomi), an independent business unit of Dell, accelerates business agility by integrating the information organizations need whenever and however they need it. The Boomi integration platform dramatically transforms the way organizations connect, create, manage and govern all their applications and data. As a result, more than 5,300 organizations of all sizes use the Boomi platform to run smarter, faster, and better. Boomi also helps customers drastically reduce implementation times and offers substantial cost savings over traditional integration, MDM, API management and workflow automation solutions. Visit http://www.boomi.com for more information. © 2017 Boomi Inc. Dell and Dell Boomi are trademarks of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others. Ivanti Acquires Software Optimisation Expert Concorde Solutions, Extends IT Asset Management Capabilities 2017-04-13T03:28:33Z ivanti-acquires-software-optimisation-expert-concorde-solutions-extends-it-asset-management-capabilities SALT LAKE CITY – April 12, 2017 – Today, Ivanti (backed by Clearlake Capital) announced that it has acquired Concorde Solutions (“Concorde”), a leading provider of SaaS software asset management (SAM) solutions, specialising in managing software licensing complexity in the data centre across hybrid IT environments. This acquisition, Ivanti’s ninth in five years, extends the company’s IT Asset Management (ITAM) offerings, providing customers with additional insights and control to help organisations model and improve their effective software license position. Concorde’s license optimisation technology allows customers to manage and optimise software licensing for both client-side applications, as well as complex, server-based enterprise products like those offered by Oracle, Microsoft, VMware and IBM. Operating at the heart of software asset management, Concorde’s Core Control addresses license compliance, purchasing efficiency, change management and service management. Through its SaaS platform, Concorde provides enhanced entitlement management and decision modeling to help customers gain better visibility and control to maximise their software investments.   “With this acquisition, Ivanti is advancing its lead in SAM by filling a critical unmet need within the greater ITAM ecosystem,” said Ivanti CEO Steve Daly. “By bringing together Concorde’s software licensing expertise and Ivanti’s asset intelligence and endpoint management capabilities, we’re providing customers total asset management from a single point of control. Due to our close collaboration over the past year, we will be able to offer customers immediate access to the enhanced portfolio of solutions.” According to Gartner’s latest global IT spending forecast update, organisations will spend US $332 billion on software in 2016. Many organisations can cut spending on software by as much as 30 percent by implementing three software license optimisation best practices. The report explains: “a SAM tool can automate, accelerate and improve manual processes. It can pay dividends over manual alternatives, and can often pay for itself.”* “Software asset management is a critical discipline for any enterprise today and the team at Concorde has done an extraordinary job of addressing increasingly complex areas of IT governance, control and operational efficiency,” said Andy Burton, chairman of Concorde. “We look forward to seeing the combined business having an even greater impact in providing much-needed solutions for complicated asset decision-making processes in the enterprise IT estate.” A former Ivanti One partner, Concorde’s participation in the technical alliance program provided Ivanti with the opportunity to vet the technology and determine its value to the Ivanti customer base before acquiring the company.  With the help of the Concorde team, based in Reading, U.K., Ivanti plans to invest in ongoing development and integration to further leverage Concorde’s technology and expertise to help organisations optimise spend across client and data centre applications, minimise the cost and time of completing audits and make budget cycles more predictable.  The terms of the acquisition are not being disclosed. *Gartner Press Release, Gartner Says Organizations Can Cut Software Costs by 30 Percent Using Three Best Practices, Australia, July 19, 2016 For more information, visit www.ivanti.com <http://www.ivanti.com> /licenseoptimizerAbout Ivanti Ivanti is IT evolved. By integrating and automating critical IT tasks, Ivanti is helping IT organisations successfully automate and secure the digital workplace. For more than three decades, Ivanti has helped IT professionals address security threats, manage devices and optimise their user experience. From traditional PCs, to mobile devices, virtual machines and the data centre, Ivanti helps discover and manage IT assets wherever they are located, improving IT service delivery and reducing risk. Ivanti also ensures that supply chain and warehouse teams are effectively leveraging the most up-to-date technology to improve productivity throughout their operation. Ivanti is headquartered in Salt Lake City, Utah, and has offices all over the world. For more information, visit: www.ivanti.comAbout Concorde Established in 2007, Concorde is a specialist in dealing with the complexity of software licensing across Hybrid IT. With the combination of the market’s most powerful Software Asset Management (SAM) platform, Core Control, deep analytics and market-leading licensing expertise, we enable organisations to take control, reduce risk, save money and successfully adopt transformational technologies – see more at www.concordesolutions.com About Clearlake Capital Clearlake Capital Group, L.P. is a leading private investment firm founded in 2006. With a sector-focused approach, the firm seeks to partner with world-class management teams by providing patient, long-term capital to dynamic businesses that can benefit from Clearlake’s operational improvement approach, O.P.S.SM. The firm’s core target sectors are software and technology-enabled services; industrials and energy; and consumer. Clearlake currently has over $4 billion of assets under management and its senior investment principals have led or co-led 90 investments. More information is available at www.clearlake.comCopyright © 2017, Ivanti.  All rights reserved.Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. Teachers Mutual Bank Integrates Major Digital Transformation Strategy with Dell Boomi 2017-04-11T01:00:00Z teachers-mutual-bank-integrates-major-digital-transformation-strategy-with-dell-boomi Sydney, Australia – Apr 11, 2017 – Dell Boomi™ (Boomi), the number one integration cloud provider, announced that Teachers Mutual Bank (TMB) is using the Boomi integration platform as part of its multi-year, multi-million-dollar digital transformation strategy. With Boomi’s integration platform-as-a-service (iPaaS), TMB has created a flexible, enterprise-wide data environment that links its core customer management system and extensible services layer with its internal processes. This has boosted TMB’s competitiveness against Tier 1 banks by connecting multiple capabilities, and enabled it to quickly and easily capitalise on new technologies, including innovations in fintech. Boomi has also provided TMB the critical capability to connect to the latest third party fintech developments. The Bank has already engaged with Spriggy (a prepaid Visa card for children controlled through a mobile app) and is considering personal financial management applications that will deliver additional secure, customer service capabilities to its members. These powerful automation capabilities within the Boomi platform have resulted in reduced operating costs for the Bank, and cost savings are expected to increase significantly as Boomi is integrates further to the core banking systems and processes, including planned integration of Business Process Management toolsets to streamline all banking operations. The Boomi project is the final piece of TMB’s wider digital strategy through which it overhauled its customer service capabilities. Recognising the need to provide an omni-channel, mobile-first experience, the Bank developed a digital roadmap in 2013; since commencement, the initiative has encompassed multiple deployments supported by significant investment budgets. This included connectivity to manage third party management campaigns, EDW inbound data feeds from cloud based data sources and SMS integration with webforms for new brand opportunities, among other initiatives. As well as allowing TMB to maximise value from existing investment, the Boomi platform supports merger activity and expansion objectives by providing a means to quickly plug new businesses into existing operations. “When we kicked off our long-term digital project, it was clear that mobile platforms were going to be the prominent platform-of-choice for our members’ interactions with the Bank,” said David Chapman, Chief Information Officer at TMB. “In particular, we correctly anticipated that integration best-of-breed apps from third party developers would provide the best platform to deliver omni-channel experiences on customers’ terms.” “Once we modernised our environment through the introduction of these best-of-breed apps, we needed the critical component to tie all that data together on an ongoing basis. We selected Boomi for its powerful cloud-based and user-friendly integration software so that we can ensure that all data is accurate and up-to-date no matter where it is accessed.” “The financial services sector is hotly contested, with banks under pressure to meet increasingly-demanding customer expectations,” said Michael Evans, Managing Director Asia-Pacific and Japan at Dell Boomi. “By leveraging the cloud to connect its customer services platform with leading apps which customers rely on a day-to-day basis, Teachers Mutual Bank can continue to create uniquely tailored and flexible customer experiences.” About Dell Boomi Dell Boomi (Boomi), an independent business unit of Dell, accelerates business agility by integrating the information organizations need whenever and however they need it. The Boomi integration platform dramatically transforms the way organizations connect, create, manage and govern all their applications and data. As a result, more than 5,300 organizations of all sizes use the Boomi platform to run smarter, faster, better. Boomi also helps customers drastically reduce implementation times and offers substantial cost savings over traditional integration, MDM, API management and workflow automation solutions. Visit http://www.boomi.com for more information. © Dell and Dell Boomi are trademarks of Dell Inc. Dell disclaims any proprietary interest in the marks and names of others. How StorageCraft allows IntegrateIT to give REAL customer service 2017-04-10T01:40:10Z how-storagecraft-allows-integrateit-to-give-real-customer-service When Michael White and Matthew Dean founded IntegrateIT Australia in 2012 after experiencing IT providers that were sales driven rather than focused on customer care, they determined to provide a personalised business class service underpinned by quality. Initially they used the high profile Veritas Backup Executive and Symantec System Recovery solutions to protect customers’ systems and data, but after careful evaluation found StorageCraft technology to be more innovative, simple, flexible, easier to use and more affordable.The Challenge Although customers’ infrastructure varies and every site is unique, most have Windows Servers, SQL Servers, Terminal/CTX Servers and workstations. “StorageCraft’s range of ShadowProtect solutions are the only fit that is suitable. There is no substitute for the advanced feature set that StorageCraft brings to backup and full disaster recovery,” said Michael. He said that while IntegrateIT had found Backup Executive’s recovery times to be long and tedious, in contrast ShadowProtect presents a set of features that allow restore of files and/or folders, as well as full recovery of the operating system, on different hardware. It also allows physical-to-virtual, virtual-to-physical, virtual-to-virtual and physical-to-physical restores. “ShadowProtect’s Virtual Boot of images and Headstart Restore work well and give us a proven and reliable way to reduce downtime should something untoward happen to a customer’s infrastructure.” According to IntegrateIT, the challenges of using Veritas Backup Executive included: large backup windows, system restores that would take days; the data recovery point was last night’s backup; testing data recoverability is not an option; and there is no cloud DR option. In addition, licensing is not flexible, with too many add-on options; and the technology is expensive and complex to manage. Michael describes reliable backups and restores as being utterly essential: “We look after so many networks and all of them, no matter what their size, would suffer some form of financial loss with downtime and / or data loss.”  The Solution To date, ShadowProtect has come to the rescue just once in a serious situation, when a server’s main board failed.  “We ran ShadowProtect Virtual Boot using Oracle VM to recover the server to a high level workstation to allow business continuity,” said Michael. “The client was extremely happy to have this feature available.” Keenly aware how essential it is to continually test server restores and data integrity,  IntegrateIT Australia does so with ShadowProtect. Routine restores of lost files are much faster with StorageCraft technology.  It takes from 2 to 5 minutes now, compared to more than 10 minutes waiting for a tape to read and move to where it needed to go to restore a single file. Depending on the client, and the restore setting, a customer’s maximum data loss in the event of disaster is between 15 and 59 minutes. For some customers, IntegrateIT takes advantage of ShadowProtect’s virtualisation capabilities by initiating physical to virtual restores. For others, they perform restores to the cloud. “Whatever the restore format might be, we are 100 per cent confident that ShadowProtect will work reliably to deliver timely restores,” says Michael White. “StorageCraft’s technology is backed by the sort of support we endeavour to give to our own customers – it’s a great service and we have never had an issue. Our plans for the future?  Keep using StorageCraft’s solutions!”About IntegrateIT Australia IntegrateIT Australia was founded by Michael White and Matthew Dean in 2012 with the determination to create a difference in the quality of service that all clients expect and deserve. Their combined IT experience exceeds 30 years. In working in many different companies and industries they found a common theme of poor support. The companies were sales driven, with no real care for customers. In contrast, Michael and Matthew strive to provide a personalised, true business class IT service focused on providing quality service to every client. IntegrateIT is based in both South-east Queensland and Northern NSW, with clients in Rockhampton, Lismore and other areas along the eastern seaboard. Their full IT Services include: hardware and software support and sales; monthly maintenance services; full backup and restore services for all business types; management, planning, design, implementation and support for entire infrastructures; site audits; in fact absolutely everything a customer might need.Contact: IntegrateIT.  Phone 1300 79 69 33.  http://integrate-it.com.au