High Availability Offers Failover Protection for any Environment

Businesses demand zero downtime, which is why so many companies are choosing DoubleTake from Carbonite. By keeping a continually updating shadow copy on standby, DoubleTake gives you the option to fail over to the backup at a moment’s notice, with virtually no interruption in service. Failing back is just as easy. DoubleTake works equally well […]

Sophos Against WannaCry Ransomware

Outbreak updates Four days since WannaCry hijacked 200,000 computers in 150 countries, SophosLabs have determined that this probably didn’t start the way a typical Ransomware attack does – as a phising email carrying a malicious attachment or link that the user is tricked into opening. It also appears the first infections were in south-east Asia. Researchers assumed early on that the outbreak […]

WannaCry from the RSA NetWitness Suite’s Perspective

In this post, I will quickly go through some aspects of the WannaCry ransomware from the perspective of RSA NetWitness Endpoint and Packets. This would allow to help detect, investigate and analyze such compromises. If we first look at the modules dropped by the malware, we can see 5 main modules. 4 of the modules […]

Quest Rapid Recovery Wins People’s Choice STEVIE® Award in 2017 American Business Awards

Quest Software, a global systems management and security software provider, announced it has won a People’s Choice Stevie® Award for Favorite New Products in The 15th Annual American Business Awards. Quest Rapid Recovery was recognized as the People’s Choice for best Cloud Backup and Storage Software solution. Additionally, Rapid Recovery won a silver Stevie® Award in the same category. The American Business Awards […]

Huawei Receives Prestigious SAP HANA® Innovation Award

Huawei received an Honorable Mention in the Special Award category of the SAP HANA® Innovation Awards 2017 at SAPPHIRE NOW®, the world’s premier business technology event and largest SAP customer-run conference held from May 16 to 18. Huawei was honored with the prestigious award in recognition of its leadership and contribution toward the SAP HANA […]

WannaCry? How IT Asset Management Will Help You Avoid Ransomware Attacks

Prior to installing a home security system, a discovery process must take place to evaluate all vulnerabilities around the property. No matter how good a home security system is, it is worthless if you do not secure every window and door.  When securing IT assets, a discovery process must be performed to find and identify […]

The World is Changing

The world is changing; it always has but the world is changing faster now than it ever has before. This general change is translating into even bigger changes in the cyber world. Some of the key areas that are evolving aren’t new, like availability or security. Others like automation are maturing quickly, and then there […]

PETYA : RANSOMWARE, OR SOMETHING WORSE?

Petya: Ransomware, or Something Worse? If your organization has not been hit by Petya malware, you could be next. Petya, originally identified as ransomware, which locks organizations out of their own files and data with the aim of extorting a ransom, now appears to be either a disruptive attack on infrastructure or an attack that […]

Easy Step To Protect Against the Ransomware Attack

With the recent WannaCry ransomware attacks, endpoint security is at the top of everyone’s mind. Soon enough, there will be another malware variant with another catchy name. These attacks are not limited to large corporations; every computer on the web is vulnerable. How can you protect your organization? Here are three simple ways to help […]

Carbonite DoubleTake Move

The risk and downtime of server migration have locked many IT teams into platforms that are no longer ideal. Migrations are often delayed or avoided—whether it’s moving data to the cloud or back on premises, or upgrading the hardware of the database software. This results in lost opportunities, unnecessary costs, and a lack of agility that […]