Cyber Ransom Blooms in the Spring

Abstract In 2016, ransom was the #1 motivation behind cyber-attacks; half of organizations were subject to this extortion threat (according to Radware 2016-2017 Global Application Network Security Report). In parallel to the ransomware plague, Radware witnessed an emerging trend of hackers (and copycats) who extort organizations by posing an imminent threat of a DDoS attack […]

Everything faster, Backup and Recovery

More than 70,000 customers worldwide depend on Quest DP to protect their applications and data with an always-on, easy-to-manage infrastructure. Count on us for a Zero Impact, full-system, instant-recovery solution that gets you back online in as little as 15 minutes. Our backup and recovery solutions help you transform your IT infrastructure. Do not settle […]

Reinventing Business in The Digital Age

Innovation has reached new heights on the corporate radar in recent years. After all, multiple revolutions are happening at the same time, reinforcing each another: accelerated multi-sided globalization in a world that is becoming flat, financiarization that augments business fluidity, sustainability constraints exacerbated by demographic upheavals and, above all, the digital revolution. However, Reinventing the […]

Hyper-Converged Infrastructure Advancements and Cloud-Like Consumption Model Ease Adoption

The DELL EMC VxRail Appliance family is the industry’s only HCI appliances powered by VMware vSAN™ and jointly engineered with VMware. According to analyst firm IDC, sequential revenue growth from VxRail Appliances was four times higher than the entire HCI market during the fourth quarter of 2016, demonstrating more than 70 percent quarter over quarter […]

High Availability Offers Failover Protection for any Environment

Businesses demand zero downtime, which is why so many companies are choosing DoubleTake from Carbonite. By keeping a continually updating shadow copy on standby, DoubleTake gives you the option to fail over to the backup at a moment’s notice, with virtually no interruption in service. Failing back is just as easy. DoubleTake works equally well […]

Sophos Against WannaCry Ransomware

Outbreak updates Four days since WannaCry hijacked 200,000 computers in 150 countries, SophosLabs have determined that this probably didn’t start the way a typical Ransomware attack does – as a phising email carrying a malicious attachment or link that the user is tricked into opening. It also appears the first infections were in south-east Asia. Researchers assumed early on that the outbreak […]

WannaCry from the RSA NetWitness Suite’s Perspective

In this post, I will quickly go through some aspects of the WannaCry ransomware from the perspective of RSA NetWitness Endpoint and Packets. This would allow to help detect, investigate and analyze such compromises. If we first look at the modules dropped by the malware, we can see 5 main modules. 4 of the modules […]

Quest Rapid Recovery Wins People’s Choice STEVIE® Award in 2017 American Business Awards

Quest Software, a global systems management and security software provider, announced it has won a People’s Choice Stevie® Award for Favorite New Products in The 15th Annual American Business Awards. Quest Rapid Recovery was recognized as the People’s Choice for best Cloud Backup and Storage Software solution. Additionally, Rapid Recovery won a silver Stevie® Award in the same category. The American Business Awards […]

Huawei Receives Prestigious SAP HANA® Innovation Award

Huawei received an Honorable Mention in the Special Award category of the SAP HANA® Innovation Awards 2017 at SAPPHIRE NOW®, the world’s premier business technology event and largest SAP customer-run conference held from May 16 to 18. Huawei was honored with the prestigious award in recognition of its leadership and contribution toward the SAP HANA […]

PETYA : RANSOMWARE, OR SOMETHING WORSE?

Petya: Ransomware, or Something Worse? If your organization has not been hit by Petya malware, you could be next. Petya, originally identified as ransomware, which locks organizations out of their own files and data with the aim of extorting a ransom, now appears to be either a disruptive attack on infrastructure or an attack that […]