The PRWIRE Press Releases https:// 2019-03-21T17:29:43Z WatchGuard Finds Attacks Targeting Leading Web Conference Solution Exploding in Popularity in Q4 2018 2019-03-21T17:29:43Z watchguard-finds-attacks-targeting-leading-web-conference-solution-exploding-in-popularity-in-q4-2018 SEATTLE, WASH – March 21, 2019 – WatchGuard® Technologies, a leader in advanced network security solutions, today issued its quarterly Internet Security Report for Q4 2018. It found that network attacks targeting a vulnerability in the Cisco Webex Chrome extension increased in popularity dramatically, rising to be the second-most common network attack after being almost non-existent in early 2018. Phishing campaigns showed a dangerous increase in sophistication in Q4, with new attacks utilising advanced methods such as threatening to release recordings of users visiting adult content online, customising emails for specific targets and creating fake banking login web pages. Based on data from tens of thousands of active WatchGuard Firebox appliances around the world, the complete report examines the top malware and network attacks targeting mid-market businesses and distributed enterprises today. “There was a noticeable increase in advanced phishing attacks targeting high-value information this quarter,” said Corey Nachreiner, CTO at WatchGuard Technologies. “Now more than ever, it’s vital for businesses to take the layered approach to security, and deploy solutions like WatchGuard’s DNSWatch that offer DNS-level filtering designed to detect and block potentially dangerous connections and automatically refer employees to resources that bolster phishing awareness and prevention. A combination of security controls and human training will help businesses avoid becoming hooked by phishing attacks.” The insights, research and security best practices included in WatchGuard’s quarterly Internet Security Report help organisations of all sizes understand the current cyber security landscape and better protect themselves, their partners and customers from emerging security threats. The top takeaways from the Q4 2018 report include: New network attack targets Cisco Webex Chrome extension – A new network attack targeting a remote code execution vulnerability in the Chrome extension for Cisco Webex exploded in popularity last quarter. This vulnerability was disclosed and patched in 2017, but WatchGuard detected almost no network attacks targeting it until now. Detections grew by 7,016 percent from Q3 to Q4. This spike shows just how important it is to install security patches as soon as they are available. New customised “sextortion” phishing campaign on the rise – A new “sextortion” phishing attack was the second-most common attack that our malware engines detected in Q4 2018, mainly targeting APAC. It accounts for almost half of all of the unique malware hashes detected in Q4 because the email phishing message is tailored to each recipient. The message claims the sender has infected the victim’s computer with a trojan and recorded them visiting adult websites. It threatens to send these compromising images to their email contacts unless they pay a ransom. WatchGuard saw a significant amount of this malware in Q4 and all users should be on the lookout for these fake emails. 16.5 percent of all Fireboxes were targeted by CoinHive cryptominer – The most widespread malware variant in Q4 came from the popular CoinHive cryptominer family, showing that cryptomining remains a popular attack type. Two of the top ten most common pieces of malware detected in Q4 were also cryptominers, carrying over from past quarters. A major phishing attack leverages a fake bank page – Another widespread piece of malware in Q4 sent a phishing email with a fake, but highly realistic Wells Fargo login page to capture victim emails and passwords. Overall, WatchGuard saw a rise in sophisticated phishing attacks targeting banking credentials in Q4. One ISP’s filtering error routed Google traffic through Russia and China for 74 minutes – The report includes a technical analysis of a Border Gateway Protocol (BGP) hijack in November 2018 that inadvertently sent most of Google’s traffic through Russia and China for a short time. WatchGuard found that a Nigerian ISP called MainOne made a mistake in their routing filters, which then spread to Russian and Chinese ISPs and caused much of Google’s traffic to be routed through these ISPs unnecessarily. This accidental hijack highlights how insecure many of the underlying standards that the internet is based on are. A sophisticated attack targeting these flaws could have potentially catastrophic consequences. Network attacks rise after historic lows in mid-2018 – Network attacks rose 46 percent by volume and 167 percent in terms of unique signature hits in Q4 compared to Q3. This follows a trend seen in previous years with attacks ramping up during the holiday season. The Q4 ISR also includes a granular analysis of source code for the Exobot banking trojan. This highly sophisticated malware attempts to steal banking and financial information from Android devices. The WatchGuard Threat Lab’s analysis includes a list of the 150 sites such as Amazon, Facebook Paypal and Western Union that Exobot can automatically target, as well as a detailed look at the UI an attacker using Exobot would use to push commands to infected devices. These finding are based on anonymised Firebox Feed data from over 42,000 active WatchGuard UTM appliances worldwide. In total, these Fireboxes blocked over 16 million malware variants (382 per device) and approximately 1,244,000 network attacks (29 per device) in Q4 2018. For more information, download the full report here: https://www.watchguard.com/wgrd-resource-center/security-report-q4-2018 To access live, real-time threat insights by type, region and date, visit WatchGuard’s Threat Landscape data visualization tool (https://www.secplicity.org/threat-landscape/) today. Subscribe to The 443 – Security Simplified podcast at www.secplicity.orgwherever you find your favourite podcasts. About WatchGuard Technologies, Inc. WatchGuard® Technologies, Inc. is a global leader in network security, secure Wi-Fi, multi-factor authentication, and network intelligence. The company’s award-winning products and services are trusted around the world by nearly 10,000 security resellers and service providers to protect more than 80,000 customers. WatchGuard’s mission is to make enterprise-grade security accessible to companies of all types and sizes through simplicity, making WatchGuard an ideal solution for distributed enterprises and SMBs. The company is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America. To learn more, visit: www.watchguard.com For additional information, promotions and updates, follow WatchGuard on Twitter, @WatchGuard on Facebook (https://www.facebook.com/watchguardtechnologies) or on the Linkedin Company (https://www.linkedin.com/company/watchguard-technologies) page. Also, visit our InfoSec blog, Secplicity, for real-time information about the latest threats and how to cope with them at www.secplicity.org. Avaya Introduces Cloud Transformation Program Making it Easier for Companies to Adopt the Cloud Communications Infrastructure that Best Meets Their Needs 2019-03-21T00:52:07Z avaya-introduces-cloud-transformation-program-making-it-easier-for-companies-to-adopt-the-cloud-communications-infrastructure-that-best-meets-their-needs Enterprise Connect – Orlando, FL– March 21, 2019 – Avaya Holdings Corp. (NYSE: AVYA), a global leader in solutions to enhance and simplify communications and collaboration, has introduced its program to assist organisations considering cloud communications delivery models as part of their digital transformation. Avaya’s cloud transformation program makes it easier and removes uncertainty and risk from the transition. The program provides compelling incentives and the resources of its professional services team to help companies map the most effective and efficient path to implement Avaya OneCloud solutions for public, private or hybrid communications deployments. The Avaya cloud transformation program helps organisations: Define and discover their required outcomes for a cloud communications transition Determine the best cloud models for various applications, based on specific business needs Identify key processes and APIs that work within their existing infrastructure and how best to deploy them to a new cloud ecosystem Begin their cloud transformation with next steps and roadmaps aligned to their specific business goals and based on targeted financial modeling For Avaya customers, the company will provide credits for perpetual licenses and reduced per-seat cloud pricing, as well as remove termination penalties on current support services contracts for those that implement an Avaya OneCloud solution. Avaya customers can also take advantage of Avaya cloud transformation workshops at reduced or even zero cost. These workshops bring Avaya professional services cloud experts together with an organisation’s key decision makers for a working session to understand the breadth and depth of a cloud transformation with the Avaya OneCloud deployment model that best meets their needs, develop an implementation timeline, and define what is required to achieve desired outcomes. “Communications is foundational to digital success, driving improved collaboration and improving the customer experience, and cloud has become the new operating model for digital businesses,” said Zeus Kerravala, Founder & Principal Analyst, ZK Research. “For business leaders digitally transforming their communications via the cloud, it is important they find solutions that fit their workflows and a solution provider that offers a range of options. Avaya OneCloud offers the broadest selection of cloud options across every segment, and Avaya’s cloud transformation program will help organisations find the right solution that fits their unique requirements.” Avaya OneCloud solutions for Unified Communications as a Service (UCaaS) and Contact Center as a Service (CCaaS), provide organisations of all sizes with a fast, convenient and automated path to the benefits of cloud communications. Avaya currently has 3.7 million cloud seats between its public and private offerings, and continues to see increased adoption of its cloud solutions across a wide range of industries. Avaya OneCloud solutions are available in 34 countries. The company will continue to expand its global footprint in the coming months to meet the growing needs of customers worldwide. -Ends- For more information on the Avaya cloud transformation program, visit the dedicated webpage at: https://news.avaya.com/us-cp-cloud-migration-reg The company is showcasing its cloud solutions, and more, at the Avaya booth #1519, Hall D at Enterprise Connect, March 18–21, in Orlando, FL. #EC19, #ExperiencesThatMatter Additional Resources A Buyer’s Guide to Cloud Communications – ZK Research Read about ‘Why the Cloud Might be Right for You’ Check out our whitepaper, CAPEX vs OPEX: The Financial Implications of Going Cloud About Avaya Businesses are built on the experiences they provide, and every day millions of those experiences are built by Avaya (NYSE: AVYA). For over one hundred years, we’ve enabled organisations around the globe to win – by creating intelligent communications experiences for customers and employees. Avaya builds open, converged and innovative solutions to enhance and simplify communications and collaboration – in the cloud, on-premise or a hybrid of both. To grow your business, we’re committed to innovation, partnership, and a relentless focus on what’s next. We’re the technology company you trust to help you deliver Experiences that Matter. Visit us at www.avaya.com. Cautionary Note Regarding Forward-Looking Statements This document contains certain “forward-looking statements.” All statements other than statements of historical fact are “forward-looking” statements for purposes of the U.S. federal and state securities laws. These statements may be identified by the use of forward looking terminology such as "anticipate," "believe," "continue," "could," "estimate," "expect," "intend," "may," "might," “our vision,” "plan," "potential," "preliminary," "predict," "should," "will," or “would” or the negative thereof or other variations thereof or comparable terminology and include, but are not limited to, expected cash savings and statements about growth, exchange listing and improved operational metrics. The Company has based these forward-looking statements on its current expectations, assumptions, estimates and projections. While the Company believes these expectations, assumptions, estimates and projections are reasonable, such forward-looking statements are only predictions and involve known and unknown risks and uncertainties, many of which are beyond its control. The factors are discussed in the Company’s Registration Statement on Form 10 filed with the Securities and Exchange Commission, may cause its actual results, performance or achievements to differ materially from any future results, performance or achievements expressed or implied by these forward-looking statements. For a further list and description of such risks and uncertainties, please refer to the Company’s filings with the SEC that are available at www.sec.gov. The Company cautions you that the list of important factors included in the Company’s SEC filings may not contain all of the material factors that are important to you. In addition, considering these risks and uncertainties, the matters referred to in the forward-looking statements contained in this report may not in fact occur. The Company undertakes no obligation to publicly update or revise any forward-looking statement as a result of new information, future events or otherwise, except as otherwise required by law. Source: Avaya Newsroom BeyondTrust Recognised as a March 2019 Gartner Peer Insights Customers’ Choice for Privileged Access Management Market 2019-03-20T22:09:37Z beyondtrust-recognised-as-a-march-2019-gartner-peer-insights-customers-choice-for-privileged-access-management-market ● The Gartner Peer Insights Customers’ Choice Distinction is based on feedback and ratings from end-user professionals who have experience purchasing, implementing and using BeyondTrust products. ● As of March 19, 2019, BeyondTrust has an end-user review overall rating of 4.5 out of 5 in the Privileged Access Management market, with 86% of reviewers noting a “Willingness to Recommend,” based on 165 verified reviews. SINGAPORE – March 21, 2019 – BeyondTrust, the worldwide leader in Privileged Access Management, today announced it has been named a March 2019 Gartner Peer Insights Customer’s Choice for Privileged Access Management solutions. The Gartner Peer Insights Customers’ Choice is based on recognitions of vendors submitted by verified end-user professionals and considers both the number of customer reviews and the overall user ratings. With an overall rating of 4.5 out of 5 stars, as of March 19, 2019, some of the 165 verified end users from the past year were from CTOs to Network Specialists and had the following to say: ● “The vendor was always willing to help and partnered through the entire experience. They were attentive and warned of pitfalls to allow us to learn from their experience. The implementation was smooth with the hardest part being user acceptance and education.” Senior Manager, IT Security (Industry: Media) ● “BeyondTrust saved our bacon when we migrated from a Windows XP where everyone had local admin privileges to a Windows 7 environment where everyone had regular user privileges. The integration with Active Directory group policy was simple, and the creation of rules of privilege elevation were easy to setup; and we had to setup a lot of rules. Anyone familiar with the administration of group policy in Windows should be able to implement this solution with minimal effort…Beyond our expectations.” Network Specialist (Industry: Energy and Utilities) ● “Easy installation and seamless integration. Overall very satisfied with the product and its features. It performs as mentioned. The installation is easy and product is simple with very good documentation. It was a seamless integration with other products.” CTO (Industry: Services) This news comes after publication of the December 2018 Magic Quadrant for Privileged Access Management where BeyondTrust was named a Leader. The 2018 Magic Quadrant for Privileged Access Management report is an evaluation by Gartner analysts based on a vendor’s completeness of vision and ability to execute in its given market. “We’re honored to receive such strong feedback and validation from our end users in being named a Gartner Peer Insights Customer Choice winner,” said Matt Dircks, CEO, BeyondTrust.  “We are committed to fulfilling our promise to provide the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.” For more information on BeyondTrust’s ranking in the Gartner Peer Insights for Privileged Access Management, visit:  https://www.gartner.com/reviews/market/privileged-access-management/vendor/BeyondTrust About Gartner Peer Insights: Peer Insights is an online platform of ratings and reviews of IT software and services that are written and read by IT professionals and technology decision-makers. The goal is to help IT leaders make more insightful purchase decisions and help technology providers improve their products by receiving objective, unbiased feedback from their customers. Gartner Peer Insights includes more than 70,000 verified reviews in more than 200 markets. For more information, please visit www.gartner.com/reviews/home. Gartner Peer Insights Customers’ Choice constitute the subjective opinions of individual end-user reviews, ratings, and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates. About Gartner Magic Quadrant: Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organisation and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. About BeyondTrust: BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Our extensible platform empowers organisations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralised management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. Our holistic platform stands out for its flexible design that simplifies integrations, enhances user productivity, and maximises IT and security investments. BeyondTrust gives organisations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com. Follow BeyondTrust: Twitter: http://twitter.com/beyondtrust Blog: https://www.beyondtrust.com/blog LinkedIn: http://www.linkedin.com/companies/beyondtrust Facebook: http://www.facebook.com/beyondtrust ### For BeyondTrust: Liz DrysdaleDirector of Marketing - APJ  P: (61) 422 109 704E:  ldrysdale@beyondtrust.com  Silver Peak Appoints Dean Vaughan Vice President of Sales for Asia Pacific and Japan 2019-03-20T21:30:00Z silver-peak-appoints-dean-vaughan-vice-president-of-sales-for-asia-pacific-and-japan Sydney, 21 March 2019 – Silver Peak®, the global SD-WAN leader, delivering the transformational promise of the cloud with a self-driving wide area network™, today announced the appointment of Australian Dean Vaughan as vice president of sales for Asia Pacific and Japan. Based in Singapore, Dean is responsible for accelerating business expansion and customer acquisition through the company’s enterprise and service provider channels across the region, spanning Asia, Japan, Australia and New Zealand. "Our primary goal across Australia and New Zealand is to liberate organisations from the compromises of router-centric and basic SD-WAN approaches to transform their networks into a business accelerant,” said Graham Schultz, regional director for ANZ at Silver Peak. “Dean’s cross-regional executive leadership will be invaluable as we continue to expand and drive our local partner ecosystem and deliver value to our growing base of customers.” Today’s executive appointment dovetails a series of executive leadership and channel partner program announcements that underscore the company’s strategy to recruit the industry’s best talent as it pursues market leadership in the hyper-competitive market for SD-WAN edge infrastructure. “It’s an exciting time to join Silver Peak as geographically distributed enterprises across the Asia Pacific and Japan region turn to SD-WAN as a means to drive cloud and digital transformation initiatives,” said Dean Vaughan, vice president of sales for Asia Pacific and Japan at Silver Peak. “My immediate task is to put in place the best go-to-market strategy and team to lead Silver Peak forward, empowering customers across the region with our business-driven Unity EdgeConnect SD-WAN edge platform.” Dean Vaughan is a 22-year industry veteran with a proven track record in building winning sales teams. Prior to joining Silver Peak, Vaughan served in various enterprise technology sales leadership positions at Oracle since 2009, most recently as senior director of Cloud Platform Solutions for ASEAN. In a short period of time, he significantly expanded the company’s public cloud IaaS and PaaS businesses. During his time at Oracle, Vaughan also established and scaled the Oracle Virtualisation and Linux business units in Australia and New Zealand. In addition, he oversaw the Cloud Infrastructure business unit for Asia Pacific and Japan, delivering consistent double-digit annual growth by expanding the business to India, Korea and Japan and restructuring the business in China, ASEAN, Australia and New Zealand. Prior to Oracle, Vaughan built NCR Corporation’s Cisco Systems Network Integration business across Asia Pacific. “Dean is a strong and seasoned leader who will enable us to capitalise on the unprecedented wave of SD-WAN demand across Asia Pacific and Japan,” said Ken Laversin, chief revenue officer at Silver Peak. “Dean’s demonstrated expertise in growing multiple businesses across the region, and his in-depth knowledge of the enterprise and channel market, will enable Silver Peak to accelerate business expansion and customer acquisition. This will further entrench the business as the global SD-WAN leader delivering the transformational promise of the cloud with the industry’s first self-driving wide area network.” About Silver Peak Silver Peak, the global SD-WAN leader, delivers the transformational promise of the cloud with a business-first networking model. The Unity EdgeConnect™ self-driving wide area network platform liberates enterprises from conventional WAN approaches to transform the network from a constraint to a business accelerant. Thousands of globally distributed enterprises have deployed Silver Peak WAN solutions across 100 countries. Learn more at silver-peak.com. # # # Media Contacts: Einsteinz Communications for Silver Peak Richelle Gillette and Emma Keen +61-2-8905 0995 silverpeak@einsteinz.com.au Dell Boomi helps University of Melbourne to cloud-enable its integrations and transition to Smarter Campuses 2019-03-20T01:39:52Z dell-boomi-helps-university-of-melbourne-to-cloud-enable-its-integrations-and-transition-to-smarter-campuses Sydney, Australia – March 19, 2019 – Dell Boomi™ (Boomi) has announced it has been contracted by the University of Melbourne (UoM) to enable the coexistence of the institute’s 700 applications using the Boomi integration platform. Boomi has helped the university create a centralised data synchronisation hub that provides granular visibility into data quality and has subsequently accelerated the roll-out of new services. The real-time availability of this critical information will help UoM transform its facilities into smart campuses powered by the Internet of Things (IoT). UoM provides education to more than 50,000 students enrolled across its seven campuses. Its vast set of applications – spanning everything from a Financial and Employee System (FES) to Student Management Systems (SMS) and its online Learning Management Systems (LMS), as well as a slew of specialty systems – are part of a hybrid environment. UoM deployed the Boomi integration platform-as-a-service (iPaaS) to link up its IT environment. Boomi is a only truly cloud-based integration provider and was selected for its ability to support a diverse organisation. The university is using the Boomi Master Data Hub (MDH) as the foundation for its data synchronisation. These comprehensive capabilities are managed through Boomi’s easy-to-use interface which provides full visibility over and control of all information flowing through the platform. Having established a modern integration framework, UoM has been able to commence its transition to smart campuses. Critical to this project is space utilisation, and so the university is in the process of installing smart sensors in selected buildings. Boomi will collect the data generated by these sensors and transfer it to the smart campus data repository, along with information from other relevant applications. These insights will allow UoM to determine how and when facilities are being used in order to optimise space and other student services. “Data consistency is a major challenge for organisations investing in digital transformation – especially in an industry like higher education where student attrition and policy issues place constant pressure on Australian universities to demonstrate the outcomes they can deliver,” said Nick Lambrou, Managing Director Australia and New Zealand at Boomi. “With the Boomi platform at the core of its applications tying all data together, UoM has developed the comprehensive scaffolding it needs to drive its digital evolution, allowing it to introduce new services sooner, while preparing its facilities for the next phase of its growth strategy.” About Dell Boomi Boomi, an independent business unit of Dell, quickly and easily unites everything in your digital ecosystem so you can achieve better business outcomes, faster. Boomi’s intelligent, flexible, scalable platform accelerates your business results by linking your data, systems, applications, processes and people. Harnessing the power of the cloud to unify everything inside and outside of a business, Boomi gives more than 8,200 organizations the agility to lead the future. For more information, visit http://www.boomi.com. Special note: Statements in this material that relate to future results, future hiring, and future events or investment are forward-looking statements and are based on Boomi’s current expectations. In some cases, you can identify these statements by such forward-looking words as “anticipate,” “believe,” “could,” “estimate,” “expect,” “intend,” “confidence,” “may,” “plan,” “potential,” “should,” “will” and “would,” or similar expressions. Actual results, hiring, customer trends, and events in future periods may differ materially from those expressed or implied by these forward-looking statements because of a number of risks, uncertainties and other factors, including the challenge of finding and onboarding new personnel, marketplace trends, ongoing management attention to the market, the uncertainties associated with technology changes and the development and release of new technology. Boomi and Dell Technologies assume no obligation to update any such forward-looking statements. Avaya Deepens Integration With Google Cloud To Provide Powerful AI Enhancing Customer Experience 2019-03-19T23:47:15Z avaya-deepens-integration-with-google-cloud-to-provide-powerful-ai-enhancing-customer-experience Sydney, Australia – March 19, 2019 – Avaya Holdings Corp. (NYSE: AVYA), a global leader in solutions to enhance and simplify communications and collaboration, today announced further integration with Google Cloud Contact Centre artificial intelligence (AI) to provide better experiences for customers and a more efficient workforce, taking full advantage of the powerful artificial intelligence capabilities of both companies. Recognised as a Leader in the Gartner Magic Quadrant for Contact Center1, Avaya extends its leadership in leveraging AI to improve customer experience with more personalised, intelligent and insightful interactions. This includes embedding Google’s machine learning within Avaya conversation services powering the contact centre, enabling easy integration of AI capabilities regardless of channel, promoting a consistent and intelligent experience for customers and delivering true omnichannel experiences with AI. Together, Avaya and Google Cloud are providing customers with increased flexibility, efficiency and scalability in deploying powerful and simple communication and collaboration solutions that improve the customer journey. Avaya IX Contact Centre is an AI-enhanced, omnichannel solution including voice, email, chat and mobile communications to make customer engagement a competitive advantage that drives growth and brand preference. Avaya and Google are innovating in a number of key areas, including: Virtual Agents – Human-like automated Bots which seamlessly interact with customers, offloading the live agents’ utilisation until the optimal time and then transferring all context gathered to the agent. Now customers can decide when and how to engage bots throughout the interaction. And the Avaya platform captures the intent, actions and ultimate disposition of each interaction in real-time. Through this rich data, Avaya AI can be applied to decide the next best action in future customer engagement. Agent Assist – Provides superior customer experience by continuously delivering contextually relevant knowledge base to agents based on real time conversational analysis–for BOTH voice and text-based interactions. Avaya AI algorithms can be applied to Google Contact Centre AI to determine the next best action by the agent, delivering the right information and reducing customer friction – while increasing agent satisfaction and contact centre efficiency. Conversational Topic Modelling – An unsupervised learning tool designed to uncover key topic areas that customers have been contacting the contact centre about, and abstracting relevant information relating to how topics are articulated. Google Topic Modelling combined with Avaya AI enables agents to leverage real-time visibility of topics with each conversation turn. Through this valuable insight, recommended responses and best actions can be uniquely tailored to each part of the conversation to drive desired outcomes. Avaya is enhancing the customer experience by strengthening these areas through integration of Google Cloud APIs with key elements of Avaya’s contact centre infrastructure. Additionally, Avaya’s browser-based desktop is designed to easily connect with applications and Google Contact Centre AI is seamlessly incorporated in the agent user experience. “Partnering with Avaya helps us deliver on our goal to make the contact centre experience easier and more efficient,” said Rajen Sheth, Director of Product Management at Google Cloud. “We’re excited to work with Avaya so enterprises can keep customers happy with faster call resolution, and we look forward to building on this partnership as technology and customer’s expectations evolve.” Avaya and Google’s unique collaboration offers a differentiated contact centre solution with a simpler, but more efficient and architecturally superior approach via native gRPC integration for voice. This will enable Avaya IX Contact Centre customers to easily integrate AI providers like Google Cloud and infuse AI capabilities regardless of channel, for consistent omnichannel experiences. Avaya IX Contact Centre solutions are capable of maintaining an awareness of all events, including the sentiment, suggestions and resolution, creating a data lake source for future machine learning processing that generates increasingly impactful results. “We continue to expand our AI-enabled solutions as well as our cloud offerings for customers ranging from small-medium business to the largest global enterprises, and further collaboration with Google is providing additional capabilities to augment the innovation,” said Chris McGugan, Avaya Senior Vice President, Solutions & Technology. “By bringing these innovations to market for Avaya customers and partners, we enable them to make every customer interaction more meaningful and insightful, and more productive for their businesses.” Avaya pioneered the integration of AI capabilities into contact centre communications solutions, and has led development and investment in a number of key areas: Effortless Self-Service: With the power of AI, you can deliver great self-service experiences getting your customer the right information at the right time. Agent Assistance and Productivity: Empower agents with AI-driven guidance, that includes relevant content, suggested next-actions, and real-time coaching to stay ahead of the customer engagement. Smart Matching: Leverage advanced machine learning models to pair the best agent with each customer interaction. Smart Interactions: With powerful AI technologies, you can create smart, conversational interactions that yield improved business results. Empowered Agents: Agents are empowered by AI-driven guidance for content and suggested actions. Summarisation tools help agents expedite after-call processes. Simplified Operations: Reduce complexity for customers and agents alike by using AI models to select a self-service experience, automate a process, or pair with the best possible agent -Ends- The company is showcasing these solutions, and more, at the Avaya booth #1519, Hall D at Enterprise Connect, March 18–21, in Orlando, FL. About Avaya Businesses are built on the experiences they provide, and every day millions of those experiences are built by Avaya (NYSE:AVYA). For over one hundred years, we’ve enabled organisations around the globe to win – by creating intelligent communications experiences for customers and employees. Avaya builds open, converged and innovative solutions to enhance and simplify communications and collaboration – in the cloud, on-premise or a hybrid of both. To grow your business, we’re committed to innovation, partnership, and a relentless focus on what’s next. We’re the technology company you trust to help you deliver Experiences that Matter. Visit us at www.avaya.com. 1 https://www.avaya.com/en/about-avaya/newsroom/pr-us-180522/ Cautionary Note Regarding Forward-Looking Statements This document contains certain “forward-looking statements.” All statements other than statements of historical fact are “forward-looking” statements for purposes of the U.S. federal and state securities laws. These statements may be identified by the use of forward looking terminology such as "anticipate," "believe," "continue," "could," "estimate," "expect," "intend," "may," "might," “our vision,” "plan," "potential," "preliminary," "predict," "should," "will," or “would” or the negative thereof or other variations thereof or comparable terminology and include, but are not limited to, expected cash savings and statements about growth, exchange listing and improved operational metrics. The Company has based these forward-looking statements on its current expectations, assumptions, estimates and projections. While the Company believes these expectations, assumptions, estimates and projections are reasonable, such forward-looking statements are only predictions and involve known and unknown risks and uncertainties, many of which are beyond its control. The factors are discussed in the Company’s Registration Statement on Form 10 filed with the Securities and Exchange Commission, may cause its actual results, performance or achievements to differ materially from any future results, performance or achievements expressed or implied by these forward-looking statements. For a further list and description of such risks and uncertainties, please refer to the Company’s filings with the SEC that are available at www.sec.gov. The Company cautions you that the list of important factors included in the Company’s SEC filings may not contain all of the material factors that are important to you. In addition, considering these risks and uncertainties, the matters referred to in the forward-looking statements contained in this report may not in fact occur. The Company undertakes no obligation to publicly update or revise any forward-looking statement as a result of new information, future events or otherwise, except as otherwise required by law. Source: Avaya Newsroom All trademarks identified by ®, TM, or SM are registered marks, trademarks, and service marks, respectively, of Avaya Inc. All other trademarks are the property of their respective owners Barracuda Intel Exposes the Latest Strategies Cybercriminals Are Using to Get Past Email Security Gateways 2019-03-19T21:00:00Z barracuda-intel-exposes-the-latest-strategies-cybercriminals-are-using-to-get-past-email-security-gateways-1 Sydney, 20 March 2019 – Barracuda, a trusted partner and leading provider for cloud-enabled security solutions, today released key findings from a report with the title Spear Phishing: Top Threats and Trends. Barracuda researchers evaluated more than 360,000 spear phishing emails in a three-month period, identifying and analysing three major types of attacks: brand impersonation, business email compromise and blackmail. Read the full report: https://www.barracuda.com/spear-phishing-report The report takes an in-depth look at how these three types of attacks work, why traditional email security can’t stop them, the latest techniques scammers are using, and how organisations can protect against these attacks. A closer look at evolving threats Barracuda’s research uncovered fresh insights into how these popular attacks are evolving and the tactics they are using to evade detection. Impersonating Microsoft is one of the more common techniques used by hackers trying to take over accounts. Financial institutions are impersonated in nearly 1 in 5 attacks. Finance department employees are heavily targeted, as they are most likely to deal with banks and other financial institutions. The majority of subject lines on sextortion emails contain some form of security alert. Attackers often include the victim’s email address or password in the subject line. Subject lines on more than 70 percent of business email compromise attack emails try to establish rapport or a sense of urgency; many imply the topic has been previously discussed. Scammers use name-spoofing techniques, changing the display name on Gmail and other email accounts to make the email appear to come from a company employee. This tactic can be especially deceiving to those reading the email on a mobile device. “Spear phishing attacks are designed to evade traditional email security solutions, and the threat is constantly evolving as attackers find new ways to avoid detection and trick users,” said Asaf Cidon, VP, Content Security at Barracuda Networks. “Staying ahead of these types of attacks requires the right combination of technology and user training, so it’s critical to have a solution in place that detects and protects against spear-phishing attacks, including business email compromise, brand impersonation and sextortion.” Barracuda Sentinel uses artificial intelligence and deep integration with Office 365 to detect spear phishing attacks and stop them before they reach your mail server. Total Email Protection takes that protection a step further, combining Barracuda Sentinel with Barracuda Essentials, Barracuda PhishLine and Barracuda Forensics and Incident Response for a complete email security, archiving, and data protection solution. Resources: Download the full report: https://www.barracuda.com/spear-phishing-report Read the blog post: http://cuda.co/35206 About Barracuda At Barracuda we strive to make the world a safer place. We believe every business deserves access to cloud-enabled, enterprise-grade security solutions that are easy to buy, deploy, and use. We protect email, networks, data and applications with innovative solutions that grow and adapt with our customers’ journey. More than 150,000 organisations worldwide trust Barracuda to protect them — in ways they may not even know they are at risk — so they can focus on taking their business to the next level. For more information, visit barracuda.com. Barracuda Networks, Barracuda and the Barracuda Networks logo are registered trademarks or trademarks of Barracuda Networks, Inc. in the U.S. and other countries. BeyondTrust Announces 2019 Partner Award Winners in Asia Pacific and Japan 2019-03-17T21:19:28Z beyondtrust-announces-2019-partner-award-winners-in-asia-pacific-and-japan SINGAPORE – March 18, 2019 – BeyondTrust the worldwide leader in Privileged Access Management, today announced the winners of its annual Partner Awards – Asia Pacific and Japan, recognising ten top-performing individuals and businesses that played a pivotal role in elevating BeyondTrust’s operations in the region throughout 2018.   The awards encompass three main categories: the Sub-Regional Awards recognise resellers that achieved operational and sales excellence in one of the three sub-regions–Australia and New Zealand, North Asia, and South East Asia; the Regional Awards recognise resellers and distributors that excelled in their contribution to BeyondTrust’s operations in Asia Pacific and Japan; and the Individual Awards celebrate the top individual achievers in the region. This year BeyondTrust introduced a new award category for “Outstanding Individual Performance of The Year.” This award recognises an individual who has contributed the most to the region’s bottom line, whilst being “the” champion for BeyondTrust, personifying the brand’s mission, vision, and work ethic. “We are honoured to celebrate our most valuable partners in Asia Pacific and Japan,” said Joe Schramm, Vice President for Strategic Alliances at BeyondTrust. “Channel partners are an essential part to BeyondTrust’s success and strategy for growth, especially in such a diverse market like Asia Pacific and Japan. BeyondTrust is on a mission to revolutionise the way the world secures and manages privilege access, and I am confident we will achieve this goal with our great network of passionate and dedicated professionals in this region.” The BeyondTrust Partner Award Winners for 2018 are: SUB-REGIONAL AWARDS - Partner of The Year, Australia & New Zealand – Identity Solutions Australia Pty Ltd - Partner of The Year, North Asia – Kernel ITC Inc - Partner of The Year, South East Asia – British Telecom Global Solutions Pte Ltd   REGIONAL AWARDS - Emerging Reseller of The Year – Impact Business Solutions Sdn Bhd - Reseller of The Year – British Telecom Global Solutions Pte Ltd - Distributor of The Year – BizHub Co Ltd   INDIVIDUAL PERFORMANCE AWARDS - Engineer of The Year – Kelvin Lou, iTrustech Pte Ltd - Sales Person of The Year – John Crawford, Packet Technologies Ltd - Product Manager of The Year – Mark Huang, SecureCraft Pte Ltd - Outstanding Individual Performance of The Year – John Hwang, BizHub Co Ltd About BeyondTrust:  BeyondTrust is the worldwide leader in Privileged Access Management, offering the most seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access. Our extensible platform empowers organisations to easily scale privilege security as threats evolve across endpoint, server, cloud, DevOps, and network device environments. BeyondTrust unifies the industry’s broadest set of privileged access capabilities with centralised management, reporting, and analytics, enabling leaders to take decisive and informed actions to defeat attackers. Our holistic platform stands out for its flexible design that simplifies integrations, enhances user productivity, and maximises IT and security investments. BeyondTrust gives organisations the visibility and control they need to reduce risk, achieve compliance objectives, and boost operational performance. We are trusted by 20,000 customers, including half of the Fortune 100, and a global partner network. Learn more at www.beyondtrust.com. Follow BeyondTrust: Twitter: http://twitter.com/beyondtrust Blog: https://www.beyondtrust.com/blog LinkedIn: http://www.linkedin.com/companies/beyondtrust Facebook: http://www.facebook.com/beyondtrust ### For BeyondTrust: Liz Drysdale Director of Marketing – APJ P: (61) 422 109 704 E: ldrysdale@beyondtrust.com Barracuda Accelerates Growth in MSP Market, Expands MSP Security Offerings 2019-03-14T21:30:00Z barracuda-accelerates-growth-in-msp-market-expands-msp-security-offerings Sydney, 15 March 2019 — Barracuda, a trusted partner and leading provider for cloud-enabled security solutions, today announced growing momentum in the MSP market. Barracuda MSP’s portfolio approach, led by security, has been very successful in the marketplace and is a key growth area for the company. Barracuda grown its international MSP partner base nearly 300 percent over the past two years, and most importantly, the number of MSPs using multiple Barracuda solutions increased 34 percent year-over-year, as of February 2019. Barracuda also recently acquired Managed Workplace, the remote monitoring and management (RMM) product line of Avast. Managed Workplace delivers an RMM platform with included security tools and services, such as site security assessments, Office 365 account management, and integrated third-party antivirus. This addition to the Barracuda portfolio reinforces the company’s investment in the MSP marketplace and builds on the 120 percent year-over-year growth Barracuda MSP has seen for its security solutions. “We have consistently been expanding our portfolio of MSP solutions, and our partners’ response — based on their spend with us — has been very positive,” said BJ Jenkins, CEO of Barracuda Networks. “The acquisition of Managed Workplace continues that portfolio expansion, building on the success we’ve seen with our MSP partners over the past three years.” “Our mission is to empower our MSP partners to create services to sell, deliver profitable offerings, and demonstrate value to their customers,” said Brian Babineau, SVP and general manager of Barracuda MSP. “With Managed Workplace we can offer MSP partners a security-centric RMM solution that incorporates security tasks into a service provider’s daily routine. It complements the security solutions we have introduced via our MSP model, such as email protection, cloud-generation firewalls, and security awareness training.” Barracuda also expanded its MSP security offerings in 2018 by introducing Managed PhishLine, a service that helps MSPs provide sophisticated phishing simulation and security awareness training to their customers without creating added work for their techs. This makes it easy for MSP to create a new service that addresses the growing need for better security awareness training. Building Stronger MSPs Through Education The Barracuda team has also demonstrated its commitment to building up the MSP community through several educational initiatives that have gained more traction over the past year. Ready, Set, Managed!, which is an exclusive, interactive educational and networking program for VARs and MSPs to learn best practices for successfully growing their managed services operations, saw 136 percent growth year over year in the number of channel partners that have requested an invitation to the program. Barracuda’s EMEA team will host the second annual MSP Day on May 23, 2019. The initiative was set up to help create an interactive and connected community with the unified purpose of making managed services more understandable, trustworthy, and significant. More details on MSP Day 2019 will be announced shortly. Why Managed Workplace RMM tools are a foundational platform for the managed services community, and according to research by AMI Partners, the RMM market is expected to reach nearly $800 million by 2022, with more than $400 million of that coming from outside North America. Every MSP, transitioning reseller, or new market participant needs an RMM, and acquiring Managed Workplace gives Barracuda another way to provide MSP partners with the tools they need to run their business and protect their customers. Site security assessments – Managed Workplace includes a built-in site security assessment tool, which MSPs can use to measure the security posture for customers’ sites and identify gaps that need to be addressed. This tool can be used to help generate sales and to demonstrate the MSP’s value by showing progress over time. Office 365 service module – This module in Managed Workplace helps MSPs streamline operations by providing a single place to manage common Office 365 tasks, such as viewing usage across multiple sites, tracking mailbox activity, and resetting passwords, alongside endpoint and other management tasks. Cloud architecture – Managed Workplace is offered as a cloud service, with multiple global instances already running on AWS. It can also be deployed on premises. The API-driven architecture allows for plug-ins to be updated easily and new ones to be added. Business alignment – Managed Workplace extends Barracuda’s opportunity for security innovation and our ability to simplify security for MSPs by connecting RMM with key components, such as email protection, cloud-generation firewalls, security awareness training, data protection, and the Avast Business Security solutions. Current IT trends – Managed Workplace aligns with current IT trends by supporting Windows and Mac endpoints, VMware and Hyper-V servers; integrating with Office 365 Account Management capabilities; monitoring network routers and SNMP-enabled devices; and creating and delivering recurring security assessments. Resources: Read the blog post: What is a security-centric RMM?: http://cuda.co/34697 Get more information: https://barracudamsp.com/product-details/managed-workplace-rmm/ Learn more about Ready, Set, Managed!: https://barracudamsp.com/ready-set-managed/ About Barracuda At Barracuda we strive to make the world a safer place. We believe every business deserves access to cloud-enabled, enterprise-grade security solutions that are easy to buy, deploy, and use. We protect email, networks, data and applications with innovative solutions that grow and adapt with our customers’ journey. More than 150,000 organisations worldwide trust Barracuda to protect them — in ways they may not even know they are at risk — so they can focus on taking their business to the next level. For more information, visit barracuda.com. Barracuda Networks, Barracuda and the Barracuda Networks logo are registered trademarks or trademarks of Barracuda Networks, Inc. in the U.S. and other countries. Other trademarks, including Avast, are the property of their respective owners. Gartner Says Outdated Technology Pushing Australian Workers Out The Door 2019-03-13T02:36:58Z gartner-says-outdated-technology-pushing-australian-workers-out-the-door Organisations must find a way to address the needs of modern workers as employees grow increasingly frustrated with workplaces that expect them to work with outdated, slow and complex technology, according to Gartner, Inc. Technology now ranks in the top 10 reasons Australian employees will leave their current role, according to Gartner’s 4Q18 Global Talent Monitor. The data reveals technology rose eight places from 3Q18 to come in ninth on the list of key attrition drivers for Australian employees. “People have become so used to advanced technology in their day-to-day lives, that they expect the same thing from their workplace. However, businesses are having a hard time matching the speed at which technology is adopted at home,” said Aaron McEwan, HR Advisory Leader at Gartner. “It’s not surprising that employees are becoming frustrated when they find themselves wasting valuable time navigating complicated systems and processes that utilise slow and old technology. It’s unproductive and inefficient for everyone involved,” said Mr. McEwan. Compensation has also become increasingly important for Australian employees, rising four places to the No. 3 reason Australians cite for leaving their jobs. Alternatively, for the first time in five years, compensation is the third driver of attraction for Australian workers when considering a new position. “The combination of expectations over compensation and the tools and tech employees are given to do their job often feel like a representation of an individual’s value or worth to the company. Feeling valued by your employer is intrinsically linked to the employee experience and really impacts how a person feels about their job,” said Mr. McEwan. These factors may have already hit the willingness of Australian employees to go above and beyond at work as discretionary effort levels fell 4.5 per cent year over year – from 21 percent in 4Q17 to 16.5 percent in 4Q18 (see Table 1). Highlights from the 4Q 2018 Global Talent Monitor Talent Monitor Australian International Average High Intent to Stay 38.8% 32.5% High Discretionary Effort 16.5% 14.4% Job Opportunities 49.7 51.1 Drivers of Attraction Work-Life Balance Location Compensation Compensation Work-Life Balance Stability Drivers of Attrition Future Career Opportunity People Management Compensation Future Career Opportunity Compensation People Management Source: Gartner (February 2019) According to Mr. McEwan, businesses can no longer ignore the needs of their employees, and must start thinking of their workers like they do their customers; making it a priority to offer a personalised, seamless and efficient experience. “For organisations, the answer doesn’t lie in allowing staff to bring their own devices or offering more money. It’s recognizing that these are just a part of the broader employee experience,” Mr. McEwan said. “This means understanding and focusing on what employees’ value from their experiences with the company. Rather than waste time implementing policies, systems and processes that have no impact on how employees feel about their company, organisations need to talk to employees to determine how to retain current and attract new employees.” Gartner advises organisations to tailor employee experiences to suit the needs, desires and goals of the individual rather than the collective. By understanding what employees value the most, HR leaders can positively impact the employee experience and lessen the desire for them to seek alternative employment opportunities. Global Talent Monitor data is drawn from the larger Gartner Global Labour Market Survey which is made up of more than 22,000 employees in 40 countries, including 848 in Australia this quarter. The survey is conducted quarterly and is reflective of market conditions during the quarter preceding publication. About Gartner ReimagineHR Conference Gartner experts will provide additional insight into the labour and talent issues at the Gartner ReimagineHR Conference, August 6-7 in Sydney, Australia. Gartner ReimagineHR is the premier event for HR leaders around the world. Join Gartner and senior HR executives to hear key insights and learn actionable strategies necessary to support organisational performance. Gartner ReimagineHR will also be held September 18-19 in London, and October 28-30 in Florida. Follow news and updates from these events on Twitter using #GartnerHR. About Gartner for HR Leaders Gartner for HR Leaders brings together the best, relevant content approaches across Gartner to offer individual decision makers strategic business advice on the mission-critical priorities that cut across the HR function. Additional information is available at www.gartner.com/en/human-resources/human-resources-leaders. ISACA Introduces Accelerated Path to the CSX Cybersecurity Practitioner Certification 2019-03-10T23:01:32Z isaca-introduces-accelerated-path-to-the-csx-cybersecurity-practitioner-certification Sydney, NSW, AUS (11 March 2019) — In response to feedback on the CSX Cybersecurity Practitioner (CSX-P) certification beta exam last year, global technology association ISACA has introduced an accelerated path to earning the CSX-P credential. The Accelerated CSX-P Certification Suite recognises existing certifications and expertise, enabling those who hold one of the following certifications or who have three years of cybersecurity experience to pursue it: CISA CISM CGEIT CRISC Cybersecurity Fundamentals Certificate CEH CISSP CySA+ ECSA GCIH GPEN LPT OSCP The CSX-P exam now takes one hour instead of four, and candidates must receive a passing score on at least three of the five performance assessments. The cost for the Accelerated CSX-P Certification Suite is US $549 for ISACA members and US $599 for nonmembers. It includes the application fee, certification exam and 10 labs (six instructional labs and four challenge labs) to help the candidate prepare. Additionally, CSX-Ps (including those already certified) no longer need to retest every three years in order to recertify. Instead, 50 per cent of the 120 CPE hours required every three years must involve performance-based training to ensure cybersecurity skills are continually honed. A promotional rate of US $429 for members and US $479 for nonmembers is available until 29 March. The CSX-P is the cybersecurity industry’s first performance-based certification. It is a past winner of SC Award’s Best Certification Program. More information is available at www.isaca.org/csxpfast-track. More information on ISACA’s Cybersecurity Nexus, which offers credentials, training, guidance and more, visit https://cybersecurity.isaca.org. About ISACA Now in its 50th anniversary year, ISACA® (isaca.org) is a global association helping individuals and enterprises achieve the positive potential of technology. ISACA equips professionals with the knowledge, credentials, education and community to advance their careers and transform their organisations. ISACA leverages the expertise of its 460,000 engaged professionals—including 140,000 members—in information and cyber security, governance, assurance, risk and innovation, as well as its enterprise performance subsidiary, CMMI® Institute, to help advance innovation through technology. ISACA has a presence in more than 188 countries, including more than 220 chapters worldwide and offices in both the United States and China. Twitter: www.twitter.com/ISACANews LinkedIn: www.linkedin.com/company/isaca Facebook: www.facebook.com/ISACAHQ Instagram: www.instagram.com/isacanews/ Contact: Julie Fenwick, 0468 901 655, jfenwick@daylightagency.com.au Lauren Graham, 0432 614 401, lgraham@daylightagency.com.au ISACA Honored As Most Important Non-Profit Shaping Cybersecurity Industry At SC Media 30th Anniversary Awards 2019-03-07T06:06:09Z isaca-honored-as-most-important-non-profit-shaping-cybersecurity-industry-at-sc-media-30th-anniversary-awards Sydney, NSW, AUS (6 March 2019) — ISACA was recognised among the “Most Important Industry Organisations of the Last 30 Years” today in the SC Media 30th Anniversary Awards at RSA Conference 2019. “As ISACA celebrates its 50th anniversary, we are honored that SC Media recognised ISACA’s impact in advancing the profession, the industry, and helping individuals and enterprises achieve the positive potential of technology,” said Rob Clyde, CISM, ISACA Board Chair. “Every day, the world over, ISACA equips professionals with the knowledge, credentials, learning and community to propel their careers and transform their organisations through business technology. We look forward to the innovations, transformation and opportunities the next 50 years will bring. “And, we believe marking milestones is essential: Congratulations to SC Media for reaching its 30th anniversary, and thank you for your leadership in sharing industry expert guidance and insights,” he added. As part of SC Media’s year-long celebration for its 30th anniversary in the cybersecurity industry, the annual SC Awards were expanded to include special categories honoring those that have shaped the industry. Winners were decided by SC Media’s editorial team with the assistance of the SC Awards co-chairs. “Over the last three decades, the winners of our 30th Anniversary Awards have left an indelible imprint on the cybersecurity industry through their tireless work and visionary leadership,” said Illena Armstrong, VP, editorial, SC Media. “ISACA most assuredly earned this honor for its continued dedication to protecting enterprises from today’s sophisticated threats.” ISACA is celebrating its 50th anniversary in 2019, having evolved from its early focus on electronic data processing audit to now serving a global network of more than 140,000 members in 188 countries in information and cyber security, governance, assurance, risk and innovation. In the past 30 years, ISACA has been especially known for its industry-leading credentialing program, which includes the Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC) and Certified in the Governance of Enterprise IT (CGEIT) certifications, as well as its CSX Cybersecurity Practitioner (CSX-P) certification. More than 200,000 ISACA certifications have been achieved since inception, with a retention rate of between 94-96 per cent. ISACA certifications are consistently ranked among the highest-paying IT certifications in the industry and annually recognised as premier industry certification programs by SC Media and other industry leaders. Over the past three decades, ISACA also launched and frequently refreshed the COBIT framework for customising and right-sizing enterprise governance of information and technology, including the release of COBIT 2019; established the holistic CSX cybersecurity program with the first vendor-neutral, performance-based cybersecurity certification; hosted security, audit and governance events across the globe and virtually; established a global advocacy program to help governments proactively respond to fast-emerging cybersecurity threats; and launched the SheLeadsTech program to empower women in the technology workforce. ISACA has maintained a future-minded approach throughout, and expanded its appeal across industries and enterprises with the 2016 acquisition of the CMMI Institute, headquartered in Pittsburgh, PA, USA, and opening a China operation last year. ISACA continually aims to connect its global professional community with the needed tools and resources to thrive amid a fast-evolving technology landscape. For more on ISACA’s contributions to the profession — and its commitment to help innovate the future — visit ISACA’s 50th anniversary website. ### About SC Media SC Media is cybersecurity. For over 30 years, they have armed information security professionals with in-depth and unbiased information through timely news, comprehensive analysis, cutting-edge features, contributions from thought leaders, and independent product reviews in partnership with and for top-level information security executives and their technical teams. In addition to their comprehensive website, SC Media offers magazines, ebooks, and newsletters. They also host digital and live events such as SC Awards and RiskSec Conference to provide cybersecurity professionals all the information needed to safeguard their organisations and contribute to their longevity and success. About ISACA Now in its 50th anniversary year, ISACA® (isaca.org) is a global association helping individuals and enterprises achieve the positive potential of technology. Today’s world is powered by information and technology, and ISACA equips professionals with the knowledge, credentials, education and community to advance their careers and transform their organisations. ISACA leverages the expertise of its 460,000 engaged professionals—including its 140,000 members—in information and cyber security, governance, assurance, risk and innovation, as well as its enterprise performance subsidiary, CMMI® Institute, to help advance innovation through technology. ISACA has a presence in 188 countries, including more than 220 chapters worldwide and offices in both the United States and China. Twitter: www.twitter.com/ISACANews LinkedIn: www.linkedin.com/company/isaca Facebook: www.facebook.com/ISACAHQ Instagram: www.instagram.com/isacanews/ Contact: Julie Fenwick, +64 68 901 655, jfenwick@daylightagency.com.au Lauren Graham, +64 32 614 401, lgraham@daylightagency.com.au Gartner Identifies the Top Seven Security and Risk Management Trends for 2019 2019-03-06T00:49:20Z gartner-identifies-the-top-seven-security-and-risk-management-trends-for-2019 6 March 2019 — Gartner, Inc. has identified seven emerging security and risk management trends that will impact security, privacy and risk leaders in the longer term. Gartner defines “top” trends as ongoing strategic shifts in the security ecosystem that are not yet widely recognised, but are expected to have broad industry impact and significant potential for disruption. “External factors and security-specific threats are converging to influence the overall security and risk landscape, so leaders in the space must properly prepare to improve resilience and support business objectives,” said Peter Firstbrook, research vice president at Gartner. The top seven security and risk management trends for 2019 and beyond are: Trend No. 1: Risk Appetite Statements Are Becoming Linked to Business Outcomes As IT strategies become more closely aligned with business goals, the ability for security and risk management (SRM) leaders to effectively present security matters to key business decision makers gains importance. “To avoid exclusively focusing on issues related to IT-decision making, create simple, practical and pragmatic risk appetite statements that are linked to business goals and relevant to board-level decisions,” said Mr. Firstbrook. “This leaves no room for business leaders to be confused as to why security leaders were even present at strategic meetings.” Trend No. 2: Security Operations Centres Are Being Implemented With a Focus on Threat Detection and Response The shift in security investments from threat prevention to threat detection requires an investment in security operations centres (SOCs) as the complexity and frequency of security alerts grow. According to Gartner, by 2022, 50 percent of all SOCs will transform into modern SOCs with integrated incident response, threat intelligence and threat-hunting capabilities, up from less than 10 percent in 2015. “The need for SRM leaders to build or outsource a SOC that integrates threat intelligence, consolidates security alerts and automates response cannot be overstated,” said Mr. Firstbrook. Trend No. 3: Data Security Governance Frameworks Will Prioritise Data Security InvestmentsData security is a complex issue that cannot be solved without a strong understanding of the data itself, the context in which the data is created and used, and how it is subject to regulation. Rather than acquiring data protection products and trying to adapt them to suit the business need, leading organisations are starting to address data security through a data security governance framework (DSGF). “DSGF provides a data-centric blueprint that identifies and classifies data assets and defines data security policies. This then is used to select technologies to minimise risk,” said Mr. Firstbrook. “The key in addressing data security is to start from the business risk it addresses, rather than from acquiring technology first, as too many companies do.” Trend No. 4: Passwordless Authentication Is Achieving Market Traction Passwordless authentication, such as Touch ID on smartphones, is starting to achieve real market traction. The technology is being increasingly deployed in enterprise applications for consumers and employees, as there is ample supply and demand for it. “In an effort to combat hackers who target passwords to access cloud-based applications, passwordless methods that associate users to their devices offer increased security and usability, which is a rare win/win for security,” said Mr. Firstbrook. Trend No. 5: Security Product Vendors Are Increasingly Offering Premium Skills and Training Services The number of unfilled cybersecurity roles is expected to grow from 1 million in 2018 to 1.5 million by the end of 2020, according to Gartner. While advancements in artificial intelligence and automation certainly reduce the need for humans to analyse standard security alerts, sensitive and complex alerts require the human eye. “We are starting to see vendors offer solutions that are a fusion of products and operational services to accelerate product adoption. Services range from full management to partial support aimed at improving administrators’ skill levels and reducing the daily workload,” said Mr. Firstbrook. Trend No. 6: Investments Being Made in Cloud Security Competencies as a Mainstream Computing Platform The shift to cloud means stretching security teams thin, as talent may be unavailable and organisations are simply not prepared for it. Gartner estimates that the majority of cloud security failures will be the fault of the customers through 2023. “Public cloud is a secure and viable option for many organisations, but keeping it secure is a shared responsibility,” said Mr. Firstbrook. “Organisations must invest in security skills and governance tools that build the necessary knowledge base to keep up with the rapid pace of cloud development and innovation.” Trend No. 7: Increasing Presence of Gartner’s CARTA in Traditional Security Markets Gartner’s continuous adaptive risk and trust assessment (CARTA) is a strategy for dealing with the ambiguity of digital business trust assessments. “Even though it’s a multiyear journey, the idea behind CARTA is a strategic approach to security that balances security friction with transaction risk. A key component to CARTA is to continuously assess risk and trust even after access is extended,” said Mr. Firstbrook. “Email and network security are two examples of security domains that are moving toward a CARTA approach as solutions increasingly focus on detecting anomalies even after users and devices are authenticated.” Gartner clients can learn more in “Top Security & Risk Management Trends.” Visit the Gartner Digital Risk & Security hub for complimentary research and webinars. About Gartner Security & Risk Management SummitsGartner analysts will provide additional analysis on IT security trends at the Gartner Security & Risk Management Summit 2019 taking place in Sydney. Follow news and updates from the events on Twitter at #GartnerSEC. Upcoming dates and locations for the 2019 Gartner Security & Risk Management Summits include: June 17-20, National Harbour August 13-14, Sao Paulo August 19-20, Sydney August 26-27, Mumbai September 9-11, London About Gartner Gartner, Inc. (NYSE: IT) is the world’s leading research and advisory company and a member of the S&P 500. We equip business leaders with indispensable insights, advice and tools to achieve their mission-critical priorities and build the successful organisations of tomorrow. Our unmatched combination of expert-led, practitioner-sourced and data-driven research steers clients toward the right decisions on the issues that matter most. We are a trusted advisor and objective resource for more than 15,000 organisations in more than 100 countries — across all major functions, in every industry and organisation size. To learn more about how we help decision makers fuel the future of business, visit www.gartner.com. Malwarebytes Rolls Out Offering Enabling MSPs to Provide Leading Endpoint Protection and Response to Customers 2019-03-05T21:29:23Z malwarebytes-rolls-out-offering-enabling-msps-to-provide-leading-endpoint-protection-and-response-to-customers XX ISACA’s State of Cybersecurity 2019 Survey: Retaining Qualified Cybersecurity Professionals Increasingly Challenging for Organisations 2019-03-05T00:56:33Z isacas-state-of-cybersecurity-2019-survey-retaining-qualified-cybersecurity-professionals-increasingly-challenging-for-organisations Sydney, NSW, AUS (5 March 2019) — Organisations are struggling to keep their cybersecurity workforce fully staffed as competitors increasingly pick off employees who are enticed by higher pay and bonuses, according to ISACA’s new cybersecurity workforce research. The short supply of qualified cybersecurity professionals has led to unfilled positions and a widening work skills gap. A whopping 69 per cent of respondents say their cybersecurity teams are understaffed. Part 1 of ISACA’s State of Cybersecurity 2019 report analyses the trends of cybersecurity hiring, retention, gender diversity and budget implications. “Current Trends in Workforce Development” released today at the RSA Conference in San Francisco. The research found: Cybersecurity professionals are still in short supply and hard to find, particularly for roles that require technical proficiency. Retaining cybersecurity professionals is exceptionally difficult, even when enticements such as training and certification are provided. Gender diversity programs are declining and perceived as less effective than in the past. Cybersecurity budget increases are expected to slow slightly. “We’re in a highly fluid environment where organisations are increasingly challenged by competitive forces,” said Rob Clyde, CISM, board chair of ISACA. “Creative and competitive retention efforts are more important than ever in the current environment, and organisations should make it a priority to identify ways to boost their cybersecurity teams.” While 57 per cent of respondents say their organisations offer increased training as incentives to keep people within an organisation, an overwhelming 82 per cent indicate that most individuals leave their companies for another because of financial and career incentives, such as higher salaries, bonuses and promotions. However, Frank Downs, director of cybersecurity practices at ISACA, points out that such incentives are not necessarily what cybersecurity professionals need to advance in their careers. Business acumen is key. “The most prized hire within a cybersecurity organisation is a skilled professional, who not only understands the business operation and how cybersecurity fits into the greater needs of the organisation, but also knows how to communicate well,” said Downs. In the survey, 58 per cent of respondents note that their organisations have unfilled cybersecurity positions. The results also show that there is a 6 percentage-point increase, year over year, of organisations languishing at least six months before they are able to fill open cybersecurity positions—increasing from 26 per cent in 2017 to 32 per cent in 2018. Gender Diversity Programs in Decline Only 45 per cent of the survey’s female respondents believe that both men and women have equal opportunity for career advancement. This represents a downward trend from 51 per cent the previous year. The survey also finds that less than half of cybersecurity organisations have a gender diversity program, and the perception of their effectiveness, when compared to previous years, is declining. “Attempts to diversify the workforce and create gender inclusion are either not happening enough or are failing to meet employee expectations,” said Clyde. “Respondents do not believe their organisations prioritise increasing the number of women in cybersecurity roles or advancing them within the organisation.” “Organisations need to communicate a clear career path for all cybersecurity staff in order to retain staff and tackle ongoing threats to the enterprise,” said Jo Stewart-Rattray, Global Lead for ISACA’s SheLeadsTech advocacy program. “But this is especially important for women, who can feel isolated being the only female in the room, if we are going to close the gender diversity gap.” “Providing role models and mentors both within and outside an organisation greatly increases the chance for women to remain in the profession and move into leadership roles,” adds Stewart-Rattray. “Organisations also need to provide flexible working opportunities.” Cybersecurity Budget Increases Are Expected to Slow Most respondents still expect an increase in cybersecurity budget, but not as much as in the previous year; 55 per cent report they expect an increase in cybersecurity budgets, a decrease of nine points from last year’s 64 per cent. When asked about funding, 60 per cent of respondents indicate that they consider their cybersecurity budget to be underfunded, with nearly 20 per cent believing that their budgets are significantly underfunded. State of Cybersecurity 2019 can be downloaded free at https://cybersecurity.isaca.org/state-of-cybersecurity. The report is the latest research from ISACA’s Cybersecurity Nexus, which offers credentials, training, guidance and research for security professionals. ### About the State of Cybersecurity Study More than 1,500 cybersecurity professionals who hold ISACA’s Certified Information Security Manager (CISM) and/or CSX Cybersecurity Practitioner (CSXP) designations and positions in information in security participated in the online survey. The findings will be issued in two white papers in 2019. To see the first white paper, visit https://cybersecurity.isaca.org/state-of-cybersecurity. About ISACA Now in its 50th anniversary year, ISACA (isaca.org) is a global association helping individuals and enterprises achieve the positive potential of technology. Today’s world is powered by information and technology, and ISACA equips professionals with the knowledge, credentials, education and community to advance their careers and transform their organisations. ISACA leverages the expertise of its 460,000 engaged professionals—including its 140,000 members—in information and cyber security, governance, assurance, risk and innovation, as well as its enterprise performance subsidiary, CMMI Institute, to help advance innovation through technology. ISACA has a presence in 188 countries, including more than 220 chapters worldwide and offices in both the United States and China. Twitter: https://twitter.com/ISACANews LinkedIn: https://www.linkedin.com/company/isaca Facebook: www.facebook.com/ISACAHQ Instagram: https://www.instagram.com/isacanews Press Contacts: Julie Fenwick, 0468 901 655, jfenwick@daylightagency.com.au Lauren Graham, 0432 614 401, lgraham@daylightagency.com.au