Category Archives: Technology

Hacking and IT Incidents Account for Nearly Half of All Healthcare Data Breaches

Bitglass’ fifth annual Healthcare Breach Report revealed that the total number of records exposed reached 11.5 Million in 2018, more than twice that of 2017. Each year, Bitglass analyses data from the U.S. Department of Health and Human Services’ “Wall of Shame,” a database containing information about breaches of protected health information (PHI) that affected 500 or more individuals. In 2019’s report, the latest data is compared to that of previous years, revealing key trends and cybersecurity challenges facing the healthcare industry.

Breaches recorded in the HHS database are categorised into one of the following groups:

  • Hacking or IT incidents: Breaches related to malicious hackers and improper IT security
  • Unauthorised access or disclosure: All unauthorised access and sharing of protected health information
  • Loss or theft: Breaches enabled by the loss or theft of endpoint devices
  • Other: Miscellaneous breaches and leaks related to items such as improper disposal of data

According to the study’s findings, the number of breaches in 2018 was lower than that of the previous year. Interestingly, however, the total number of records breached has more than doubled since 2017.

Additionally, of the 11.5 million individuals who were affected by healthcare breaches in 2018, 67 per cent had their information exposed by hacking and IT incidents. The steady rise of this type of breach suggests that healthcare IT systems are increasingly being targeted by malicious actors who recognise that said systems house massive amounts of sensitive data.

“Healthcare firms have made progress in bolstering their security and reducing the number of breaches over the last few years,” said Rich Campagna, CMO of Bitglass. “However, the growth in hacking and IT incidents does deserve special attention. As such, healthcare organisations must employ the appropriate technologies and cybersecurity best practices if they want to secure the patient data within their IT systems.”

The Reports Key Findings included:

  • The number of reported healthcare breaches reached a three-year low of 290 in 2018
  • At 46 per cent, hacking and IT incidents were the biggest causes of breaches, with unauthorised access and disclosure coming in second place at 36 per cent
  • The average number of individuals affected per breach was 39,739 in 2018 – more than twice the average of 2017
  • The number of breaches caused by lost and stolen devices has decreased by almost 70 per cent since 2014

You can read the full report here: https://pages.bitglass.com/HealthcareBreachReport_LP.html

Data virtualisation: the key to unlocking your data lake’s potential

Alberto Pan, Chief Technical Officer at Denodo, discusses why data virtualisation makes sound business sense

In today’s digital economy, data is the new currency. Every organisation – regardless of location, size or sector – is reliant on it. It drives operations and enables businesses to function effectively by increasing productivity, improving decision making capabilities and reducing financial cost.

A huge volume of data is being produced each day. Every action, every reaction and every interaction feeds into an ever-growing digital footprint. With IDC predicting that worldwide data levels will increase by 61% to 175 zettabytes by 2025, it’s not surprising that data lakes have become a principal data management architecture.

With infinite storage capabilities, data lakes enable organisations to keep all data – whether structured or unstructured – in one central repository. This makes discovery easier and reduces the time spent by data scientists on selection and integration. After all, it’s easier to see what you’ve got if it’s all in one place.

Data lakes also provide massive computing power, enabling the data that is held within them to be transformed and combined to meet the needs of any processes that require it. What’s more, organisations can use machine learning within a data lake in order to analyse historical data and forecast likely outcomes. This information can then be used to increase overall productivity and improve business processes, which is arguably one of the main advantages of using a data lake model – this was illustrated in the findings of a recent analyst report, which saw those organisations employing a data lake outperform their peers by nine percent in organic revenue growth.

 

Drowning in data

But it’s not as simple as it sounds.

Many businesses- in fact, the majority of businesses – still struggle with certain aspects of data delivery and integration. Indeed, a recent study indicated that data scientists can spend up to 80 percent of their time finding, cleaning and reorganising data. This means that only 20% of their time is being spent analysing any data produced and using it to make meaningful decisions. Instead of being able to unlock the data’s potential, data scientists often find themselves drowning in information and unable to apply analytics as a means of gleaning insight and intelligence.

So, why are they struggling?

Quite simply, storing all your data in one physical place doesn’t necessarily make it any easier to discover certain data sets. It can be like trying to find a needle in a haystack. To add to this, many companies have hundreds of repositories of data across a number of different cloud providers and on-premise databases. Replicating data from these systems of origin can be slow and costly, meaning that only a small subset of relevant data will be stored in the lake.

Furthermore, storing data in its original form still requires it to be adapted later on for machine learning processes. Despite vast improvements over the last few years, integration tools are limited and cannot yet help data scientists with the more complex tasks that require a more advanced skillset.

With all this in mind, how can organisations overcome these challenges and unlock the benefits of a data lake?

 

Data virtualisation – a life jacket for businesses

Data virtualisation essentially provides a single access point to all data, regardless of its location and without the need to first replicate it in a single repository. It stitches together data abstracted from various underlying sources and delivers it to consuming applications in real time so that even data that has not been copied into the lake is available for data scientists to use and analyse.

This ultimately helps data scientists with the discovery processes, enabling them to access all data in real time. And data virtualisation isn’t just flexible, it’s selective too. Best of breed tools will offer searchable catalogues of all available data sets, including extensive metadata on each data set.

Data virtualisation also offers clarity and simplicity to the data integration processes. With this tool, all data is organised according to a consistent data representation and query model, regardless of whether it is stored in a relational database a Hadoop cluster, a SaaS application or a NoSQL system meaning that data scientists are able to view it as if it were stored in the same place. As a result of this, data scientists are able to create reusable logical data sets which can be adapted to meet the needs of each individual machine learning process.

 

Looking forward

With data playing an ever-increasing role in operations and processes, it’s no wonder organisations are looking to modern analytics to drive meaningful insight and improve efficiency. Although currently in its relative infancy, the machine learning market is expected to grow by 44% over the next four years.  As adoption continues to grow and data lakes become more prevalent, data virtualisation will become increasingly essential to improving the productivity of data scientists.

By simplifying data discovery and integration, data virtualisation is set to play an important role in reducing the burden of data management and enabling data scientists to focus on their core skills. And, ultimately, data virtualisation will be key in helping organisations make the most of their data.

The post Data virtualisation: the key to unlocking your data lake’s potential appeared first on UK Tech News.

Why 5G will require next-generation security to combat real-time cyber threats

Gunter Reiss, VP Strategy, A10 Networks, explains why 5G operators will need to rethink their cyber security strategy

Rest assured, 5G is coming and it promises to be faster with less latency and better support for applications such as IoT than any of its predecessors.  It will be strikingly faster than 4G, and this will be particularly obvious when downloading or streaming media. On average, 4G has a maximum download speed of 300Mbps, though this fluctuates depending on location and network.

To this point, more than 50 mobile operators will have launched 5G commercial services by the end of 2019 and the Koreans have been the 5G trailblazers over the past eighteen months. SKT, KT and LGU+ have rolled out more than 82,000 5G radio base stations across Korea and the availability of new 5G handsets allowed them to see 5G adoption grow to 1 million subscribers within less than three months.

In terms of latency, 4G networks currently run at around 50 milliseconds, while 5G will have a latency of only one millisecond. That’s around 50 times more than current 4G networks.

In a recent study, ‘Securing the Future of a Smart World’, that we conducted in partnership with the Business Performance Innovation (BPI) Network, which surveyed mobile service providers’ views on 5G, 67 per cent of respondents said that they will deploy their first commercial 5G network within 18 months and another 20 per cent within two years. Nearly all (94 per cent) expect growth in network traffic, connected devices and mission-critical IoT use cases to significantly increase security and reliability concerns for 5G networks. Around four in five (79 per cent) organisations said 5G is a consideration in current security investments.

The industry recognises that 5G will dramatically raise the stakes for ensuring the security and reliability of these networks.

 

5G uptake depends on fast security

So, the key to the uptake of the technology will be security. As with all new technologies, hackers will be looking to use it to carry out attacks. With the advent of 5G, there are going to be more attacks and bigger ones at that. These will most likely come from IoT devices or smartphones. The economics of DDoS mitigation and attacks are very much geared towards the attackers now, so there is a need for more efficient tools and advanced technologies to combat attacks at a more economic level.

A lot of extra security has been put into 5G, but as the bandwidth has increased and the latency has decreased, it is down to the industry to provide protection to these networks to prevent attacks such as DDoS from taking place. These are the main security concerns for the industry. In our survey 63 per cent thought that advanced DDoS protection is the most important security capability needed for 5G networks, while 98 per cent of respondents said core network security was either very important (72 per cent) or important (26 per cent) in 5G build-outs.

To better protect these ultra-fast networks, artificial intelligence and machine learning are necessary to make those quick decisions that make the difference to whether or not a cyber-attack is successful. Current solutions are static, reactive and require significant operator intervention, resulting in a slow response time.

 

Lower latency requires AI-Driven Security

In the light of 5G latencies that are measured in milliseconds, the only way to realistically deal with an attack is by applying artificial intelligence machine learning capabilities and using algorithms that can learn very quickly.

We recently launched Zero-day Automated Protection (ZAP) in our Thunder® TPS DDoS mitigation solution that automatically recognises the characteristics of DDoS attacks and applies mitigation filters without advanced configuration or an operator’s manual intervention.  It solves many of today’s DDoS defenders’ challenges by re-balancing the economics of the DDoS attacker and the defenders’ efforts through intelligent automated defences.

Working in conjunction with A10 Networks’ actionable DDoS weapons intelligence and the five-level adaptive policy mitigation engines, ZAP effectively blocks attackers while protecting the users from indiscriminate collateral damage commonly found with traditional systems.

Without AI to combat ever more complex and speedier cyberattacks, it will be difficult, if not impossible, to safely deploy technologies such as autonomous cars and remote surgery. Real-time application use cases will not happen without a network that is properly secured in real-time.

Over the next five years, we will see tremendous growth in 5G adoption on a global basis. In fact, according to a recent forecast by the GSMA, more than 1.4 billion connections will be on 5G by 2025. The majority of commercial 5G networks will be deployed as non-standalone 5G and a smaller percentage will leverage the standalone 5G architecture and services in the coming years.

We will also see a massive build-out of millions of mobile-edge clouds, essential to achieving less than three milliseconds of latency, and the roll-out of autonomous-driven cars and other ultra-reliable low-latency use cases more broadly. We will see continuous enhancements of the 3GPP 5G standard and focus on delivering vehicle-to-everything (V2X) application-layer services, 5G satellite access, LAN support in 5G, improved network automation, network slicing solutions and new IoT services. In summary, 5G has a tremendous opportunity to disrupt every single vertical industry in the next 5 to 10 years.

The post Why 5G will require next-generation security to combat real-time cyber threats appeared first on UK Tech News.

The double-edged sword of IoT

Ian Shearman, Director, Channel Sales at Kcom, discusses why the internet of things is fast becoming a double edged sword

The Internet of Things (IoT) is set to bring revolutionary changes to the way we live, work and play. Billions of devices will have the ability not just to communicate with each other, but also to react to the world around them seamlessly, ultimately improving human experience. Think smart fridges that can tell when milk needs replenishing, and autonomous cars that seemingly just ‘know’ the best route to take. It’s predicted that within the next year, 90% of cars will be connected and global spending on IoT will hit $1.7 trillion. There’s no denying that the more embedded the IoT becomes in our lives, the higher our expectations of technology will be.

The potential of IoT for businesses

IoT is opening up unprecedented possibilities in the business world.With the advent of cloud computing, combined with IoT-enabled smart devices and applications, the standard 9-5 workplace set-up is becoming a thing of the past. Businesses now have the opportunity to create a holistic network infrastructure with all technology embedded into the same solution, employing cloud and SD-WAN or hybrid WAN capabilities to optimise their operations and service delivery. With network configurations and updates mostly automated, this more streamlined, seamless approach will enable businesses to enhance relationships with ever more demanding customers and employees.

The pace of change has never been faster. By 2020, it’s predicted there will be 50 billion connected devices and five million new applications built to support them, all generating data. IoT means greater insight into customer behaviour, giving savvy businesses the opportunity to respond with targeted strategies from branding to shop layouts, new products and services.

IoT also has the potential to drive significant operational efficiencies. Intelligent smart devices will interact with our surroundings and save time on numerous standard interactions such as coffee and stationery orders, along with practical, location-specific activities such as monitoring fridge temperatures in clinical environments. Sensors and tracking devices mean services like heating and lighting can be controlled remotely and automatically. Not only that, but energy will become cheaper as a result of smart grid coordination optimising its delivery to connected workplaces. The data collected from day-to-day operations will then be fed back to the grid, promising a more cost-effective and sustainable model for any business.

What are the pitfalls of IoT for businesses?

While the benefits of a new connected world are clear, what’s less well understood are the risks of this astronomical volume of data. Arguably, the biggest challenge of the IoT will be the risk to security and privacy – already there are concerns about ease of hacking and the potentially disastrous consequences this could have on businesses.

At its heart, IoT is concerned with collecting, analysing and using data.It offers the potential for a global view across the whole of an organisation, with unprecedented insight into customer behaviours, business operations, individual working habits and more. While it’s easy to see why businesses are excited at the potential to gain valuable data-driven insights, access to data on this scale can also present major risks.

Infinite new connections between devices are potentially leaving the back door open in terms of security. As well as an increased chance of security breaches, growing reliance on a rising number of applications also means an increased potential for damage in the event of a breach.

Combining new technology with legacy infrastructures can be a tall order and – without the right strategy in place – can create problems that are difficult to repair. Cyberattacks have become so sophisticated that no business is immune, regardless of its size. Data hacking is a very real threat and businesses that ignore the idea must open their eyes to reality.

How to protect your most valuable data

As the IoT revolution gathers pace, organisations need to think carefully about data protection policies that will meet their own and their customers’ needs. Maintaining a solid IT security posture is an ongoing task requiring continuous action and review. Businesses must adopt a less passive attitude to security and become more active and preventative. It is no longer sufficient to retrofit cybersecurity; it must be planned up front in order to be effective. This is a time where taking a ‘security by design’ approach rather than ‘by addition’ is crucial.

It’s impossible to prevent hackers getting in, but organising data using encryption is the best way to protect sensitive or private files. Creating an impossible maze of navigation distracts and confuses potential hackers and creates a challenging and time consuming process, impeding them in their tracks.

A robust security strategy must be at the core of every network. With an ever-increasing reliance on data, it is critical that protection and security surrounding confidential personal data is a fundamental part of any business model and that it is monitored constantly to minimise the effects of potentially devastating security breaches.

Why workplace culture is critical to security

Although essential, technology-led data security solutions are only one piece of the jigsaw. An organisation’s security culture is the foundation of its data security programme. The reality is that humans are the weakest links in any organisation; while computers will do as we programme them to, humans do not, which makes the need for a security framework even more crucial. According to Verizon, human error is the root cause of close to one in five data breaches and, while almost three-quarters of attacks are perpetrated from outside an organisation, more than a quarter involve insiders.

It is critical to embed security values into an institution’s culture, and for action to replace rhetoric – an engaged workforce is more likely to feel accountable and take responsibility for security issues. Employees are often pinpointed as targets to obtain data, which makes the need to educate colleagues on cybersecurity all the more important. Awareness of what an early “phishing” attempt looks like, for example, could prevent a fatal business attack.

An organisation’s security culture requires ongoing care and maintenance. When this security culture is sustainable, it will transform security from a one-time event into a way of working that will forever generate a return to a business. For employees, there must be a focus on continued awareness. Security training should not be treated in isolation; instead companies should commit to regular sessions for their people across all areas of the business to boost confidence and performance.

Businesses are set to benefit from the IoT in a myriad of ways and, while it is encouraging to see some embracing all that technology has to offer, the risks that IoT pose shouldn’t be ignored. Only when a robust security strategy is in place can organisations truly capitalise on new technology, safe in the knowledge that they have taken steps to protect their ongoing operations against the potential threats that the new connected world brings.

The post The double-edged sword of IoT appeared first on UK Tech News.

Annual Security Professionals Survey Reveals Budgets Grow Slower than Rising Threat Levels

A lack of resources is the single biggest challenge for the IT security market, followed by a lack of experience and skills, according to “The Security Profession in 2018/19” report from the Chartered Institute of Information Security (previously known as the IISP) – the independent not-for-profit organisation responsible for promoting professionalism and skills in the IT profession.  At least 45 percent of respondents chose a lack of resources as the biggest challenge: compared to 37 percent for a lack of experience, and 31 percent for a lack of skills. Ultimately, security professionals feel their budgets are not giving them what they need – only 11 percent said security budgets were rising in line with, or ahead of, the cyber security threat level, while the majority (52 percent) said budgets were rising, but not fast enough.

Professionals were also clear about where threats originate. Overwhelmingly, 75 percent perceived people are the biggest challenge they face in cyber security – with processes and technology near-equal on 12 and 13 percent respectively. This may explain the need for more resources even as budgets increase: people are a far more complex issue to deal with. Yet at the same time, there are signs of improvement. More than 60 percent of IT professionals say that the profession is getting better – or much better – at dealing with security incidents when they occur, with only 7 percent saying the profession is getting worse. Conversely, less than half (48 percent) of respondents felt the industry is getting better at defending systems from attack and protecting data, with 14 percent saying the profession is getting worse. This suggests an ongoing move in the industry – from focusing on prevention, to an all-encompassing approach to security.

“IT security is a constant war of attrition between security teams and attackers, and attackers have more luxury to innovate and try new approaches,” said Amanda Finch, CEO, Chartered Institute of Information Security. “As a result, the industry’s focus on dealing with breaches after they occur, rather than active prevention, isn’t a great surprise – the former is where IT teams have much more control. Yet in order to deal with breaches effectively, security teams still need the right resources and to increase those in line with the threat. Otherwise they will inevitably have to make compromises.”

Other relevant statistics from the research included:

  • Asked to identify the worst or most notable security events or breaches of the last year, more than one third of respondents pointed to Facebook, both for its own breaches and for its relationship with Cambridge Analytica.
  • British Airways was second, with almost a quarter of responses. All the incidents highlighted by the most respondents were as notable for the aftermath of the breach as for the breach itself.
  • The innovation predicted to have the greatest effect on security in general was AI and machine learning technology – suggesting this is an area for organisations and individuals to target their skills development.

The focus on a lack of resources, experience and skills suggests that IT security teams are feeling the effect of the IT skills shortage. Yet this is also an opportunity for individuals. The majority of IT security professionals surveyed believe this is a good time to join the profession – 86 percent say the industry will grow over the next three years and 13 percent say it will “boom”. There is also an opportunity, and need, for women in the industry – 89 percent of respondents identified as male, and 9 percent as female. More than 37 percent say they have better prospects than a year ago, and the factors attracting people to take security jobs are the same as then – remuneration, followed by scope for progression and variety of work. Insufficient money, or a lack of opportunity, also cause people to leave security positions – yet the top factor causing people to leave their jobs is bad or ineffectual management.

“In the middle of a skills shortage, organisations need to treat their workers carefully. Losing them through a lack of investment, through failing to help develop skills, or simple poor management, cannot be allowed,” continued Amanda Finch. “At the same time, they cannot simply hire anyone to fill the skills gap – bringing the wrong person into a role can be a greater risk than an empty seat. Instead, organisations must understand what roles they need to fill; what skills those roles demand; and what skills applicants have. Armed with this, businesses can fill roles and support workers throughout their careers with the development, opportunities and training they need. This doesn’t only mean developing technical skills, but the social, organisational and strategic skills that are essential to put security at the heart of the business.” 

The survey covered a range of IT security professionals from a variety of backgrounds, both members and non-members. The full 24-page report can be read on the Institute’s website.

The post Annual Security Professionals Survey Reveals Budgets Grow Slower than Rising Threat Levels appeared first on UK Tech News.

Six Degrees Expands Public Sector Service Offerings through Network Services 2 Framework

UK-based managed service provider, Six Degrees, has today announced that public sector organisations will be able to benefit from a comprehensive range of networks and telecommunications services offered via the Crown Commercial Service (CCS) Network Services 2 framework. This follows the company’s recent announcement that it will be delivering a total of 80 cloud and security services through the CCS G-Cloud 11 framework. Joining these frameworks reinforces Six Degrees’ commitment to continuing to deliver large-scale, transformational services to the UK public sector.

Six Degrees has a demonstrable heritage in achieving digital transformation for public sector clients through a series of acquisitions, including prominent cloud provider Carrenza in 2016 and cybersecurity provider CNS Group in 2018, and more recently under the combined streamlined structure of Six Degrees Technology Group. All services delivered through the Network Services 2 framework are aligned to the objectives of UK public sector organisations, whether it’s achieving cost savings whilst benefiting from industry-leading managed networks, or improving internal or citizen user experience through secure, agile voice and productivity tools.

Six Degrees delivers large-scale, quality IT services to prominent public sector organisations including the Ministry of Justice and the Crown Prosecution Service, enabling them to achieve cost savings whilst enhancing citizen services. A recent case study published on the gov.uk website explains how Six Degrees helped the Government Digital Service achieve a significant annual cost saving in Public Services Network connection costs.

Six Degrees’ robust networks and telecommunications services are utilised widely throughout both the public and private sectors, connecting large scale, multi-site, enterprise clients over a Next-Generation-Network, enabling Local Authorities to deliver exceptional services to their residents, and providing the voice services that drive many of the UK’s most prominent financial institutions. Delivered through fully owned infrastructures, Six Degrees’ networks and telecommunications services have a track record of providing the stable foundations that allow organisations throughout the public and private sectors to be the very best at what they do.

Thomas Konopka, Industry Director – Public Sector, said:

“To bring services closer to citizens, today’s public sector organisations must continually grow and evolve through digitally transforming in new and incremental ways. At Six Degrees, we are proud of our on-going relationship with the UK public sector and are focused on ensuring their networks and telecommunications services are delivered over the most secure, scalable, and future-proofed infrastructures. We give public sector organisations the agility they need to deliver brilliant citizen services, and our focus on client experience ensures their networks and telecommunications services are always in the safest hands.”

Six Degrees will deliver services through the Network Services 2 framework under the following lots:
Lot 1 – Data Access Services. Connecting organisations, delivering access to key systems and internet services whilst improving security and reducing complexity.
Lot 3 – Traditional Telephony Services. Robust traditional voice services that connect public sector organisations to citizens.
Lot 4 – Inbound Telephony Services. Call management services that enable contact centre functionality, streamlining citizen services.

Six Degrees have also bid for places on Lot 5, 10 and 13, which CCS expects to award in due course.

Konopka concluded:

“Public sector organisations that purchase networks and telecommunications services from Six Degrees will benefit from a seamless end-to-end experience, with core infrastructure connectivity services integrating closely with transformational voice services such as unified communications and contact centre. Six Degrees, through the Network Services 2 framework, is here to help our public sector clients on every step of their digital transition journeys.”

The post Six Degrees Expands Public Sector Service Offerings through Network Services 2 Framework appeared first on UK Tech News.

Crown Commercial Services awards IPI a place on £5bn Network Services 2 framework contract

IPI, the digital contact centre specialist, today announced that it has been awarded a place on the Crown Commercial Service (CCS) coveted Network Services 2 (NS2) Framework. IPI was one of a selection of SMEs to be chosen to deliver data access services (Lot 1). IPI also bid for places on lots for IP Telephony and Contact Centre Services, which CCS expects to award in due course.

The new £5 billion framework will go live for customer use in August 2019 and is expected to last four years. NS2 (RM3808) replaces the existing Network Services (RM1045) framework and will provide public sector organisations with access to specialist contractors for telecommunications and network services across 13 lots.

“IPI is proud to be one of the selected specialists chosen to be part of this pivotal framework,” said Mike Ing, Managing Director at IPI.

“Our proven track record in delivering next-generation technology, coupled with our unrivalled consultancy services, makes us the ideal partner for government and public sector organisations as they migrate to NS2. We look forward to the next stage of the process, and working with organisations as they embark on a journey of digital transformation.”

It will now be even easier for the public sector to access IPI’s services. Under the terms of the contract, IPI will be able to supply data access across the whole of the UK public sector and its associated bodies & agencies, the voluntary sector, charities, and/or other private organisations, acting as managing agents or procuring on behalf of the public sector delivering services of a public nature.

This latest contract builds on IPI’s success in the sector – previously being part of the G-Cloud 8 framework with its cloud-based two-factor authentication solution, Ascend ID. IPI has also worked with a range of public sector organisations, including central & local government and the NHS to supply contact centres solutions, as well as associated service and technology including security, IT, networking and unified communications.

The post Crown Commercial Services awards IPI a place on £5bn Network Services 2 framework contract appeared first on UK Tech News.

Digital Guardian Releases ‘DG Wingman’ – a Free Forensic Tool for Security Professionals

Digital Guardian announced the immediate availability of DG Wingman, its new free forensic artifact collection tool for security professionals. During a security incident, it’s critical to collect all necessary forensic data to properly investigate and scope endpoint intrusions. Digital Guardian makes it easier for incident responders via DG Wingman, a utility for Windows which they can leverage alongside their existing tools.

With DG Wingman, security professionals can instantly extract key forensic artifacts such as the Master File Table ($MFT), Windows registry, and Windows event logs for further analysis. Additionally, they have the option to execute custom commands as SYSTEM, or run a full scan of the endpoint and collect metadata from portable executable files such as hashes, certificates, strings and more. The no-cost tool was developed by the Digital Guardian Advanced Threat & Analysis Center (ATAC) team that delivers Digital Guardian’s Managed Detection & Response service to hundreds of customers around the world.

“DG Wingman is highly versatile and can be used in many scenarios by incident responders while out in the field,” said Tim Bandos, VP of Cybersecurity, Digital Guardian.

“Forensic artifact collection needs to be conducted quickly and efficiently. We’re providing a free tool that combines many forensic collection capabilities into one to accelerate intrusion investigations.”

The post Digital Guardian Releases ‘DG Wingman’ – a Free Forensic Tool for Security Professionals appeared first on UK Tech News.

Zerto Continues Dedication to 2019 Channel Strategy with Two New Hires

Zerto has today announced it has hired Emily Weeks as the Director of Sales for East Americas and Eric Barnhart as the Director of Channel Sales in the Americas. These hirings represent Zerto’s deep commitment to its channel strategy in 2019, as the company also appointed Jim Ortbals, Vice President of Worldwide Channel and Cloud Sales, and Amber Johanson, Vice President of Global Pre-sales Engineering, earlier this year.

Weeks brings more than 20 years of channel sales experience to her team at Zerto. The majority of that time was spent at Cisco, where she held several positions within the US and Global channel organisation. While at Cisco, Weeks learned how to manage and support various types of channel partners in the sales ecosystem and help them grow their business through Cisco’s technology. Upon leaving Cisco, Weeks joined Microsoft, where she worked with global hosting providers as a Business Development manager and a Global Partner Account Manager. Post-Microsoft, Emily joined Veeam software, where she held a Business Development role and later became the Director of Sales for Aggregation Business for Veeam Software.

With this experience, Weeks will help guide her team at Zerto on how to not only sell to channel partners, but also how to become trusted advisors to their partners.

Zerto is the leader in the market space in which they compete, and I felt like now was the perfect opportunity to join Zerto, considering their life cycle and where they are today and where they want to go,” Weeks said.

“My goal is to use my channel experience to help influence Zerto’s cloud channel strategy moving forward. I am looking forward to working with the Zerto cloud service providers (CSPs) and creating strong relationships to accelerate and optimise how customers manage disaster recovery, data protection and cloud.”

As Director of Channel Sales in the Americas, Barnhart will be responsible for tying the VAR community into the sales process and organisation. With 17 years of technology sales experience, his aim is to empower his team’s effectiveness in their local market for both Zerto and the channel community. Barnhart believes in Zerto’s value proposition and will leverage next generation consumption models to help partners transform their own businesses.

“I’m thrilled to be joining Zerto because of the strong channel foundation that’s been laid,” Barnhart said.

“The IT Resilience platform is everything a next generation channel partner is looking for when driving positive business outcomes for their customers. It’s a software, cloud, services and security play that drives improved valuations for the partner. My vision for this channel team is that we further evangelise the value of a very capable channel ecosystem internally and that our partners bring scale and lift to our sales efforts.”

Before joining Zerto, Barnhart worked in channel sales for several companies including Avnet Technology Solutions where he rounded out his tenure there as the Vice President, Enterprise Sales.

The post Zerto Continues Dedication to 2019 Channel Strategy with Two New Hires appeared first on UK Tech News.

Scale Computing Showcases MSP Program at XChange 2019

Scale Computing, a market leader in edge computing, virtualisation, and hyperconverged solutions, today announced the continued momentum of its global Scale Computing MSP Program. The news comes as Scale Computing joins a collection of the IT channel’s premier solution providers and technology vendors as a Platinum Sponsor at XChange 2019.

Scale Computing’s channel program was awarded a 5-Star rating earlier this year by CRN. The MSP program includes managed service offerings covering Disaster recovery as a Service (DRaaS), Remote Monitoring and Management (RMM) and Infrastructure as a Service (IaaS). Each option is highly available and scalable and delivers reliable, low-latency compute systems that are accessible for nearly any size implementation. Partners also have the option to further boost their productivity by selling additional vital services to meet evolving customer requirements.

“Scale Computing’s sales team is among the most efficient I’ve worked with. They’re committed to growing our business, and we’ve seen that from the day we engaged with them. When paired with their competitive pricing, it’s a win-win relationship,” explains Perry Carfagna, President-Technology Division, PERRY proTECH.

The Scale Computing MSP Program is dedicated to simplifying channel enablement and to meeting the needs of the Scale Computing’s 100 percent channel delivery model. It includes a flexible pricing model that reduces CapEx through a price per-node, per-month, OpEx subscription. Since its launch, Scale Computing’s MSP program has onboarded hundreds of partners around the world.

Jeff Ready, CEO and co-founder, Scale Computing, concludes,

“We built Scale Computing’s global business model on creating and selling hardware infrastructure, including our award-winning Scale Computing HC3 platform, through close partner cooperation. Today, at XChange 2019, we are actively looking to engage with MSPs and to provide them with solutions and services that will transform and future-proof their customers’ businesses.”

The HE500 series, Scale Computing’s latest addition to the HC3 range, is particularly well suited for MSPs where space is often at a premium and IT team resources are not always available in remote locations. Its small form factor means that it takes only a fraction of the space of a traditional IT infrastructure and is simple to manage during day-to-day operations or if data has to be recovered for any reason.

Watch a full video on the Scale Computing MSP Program here: https://www.youtube.com/watch?v=2CLbfqn6cbU

 

The post Scale Computing Showcases MSP Program at XChange 2019 appeared first on UK Tech News.