Category Archives: Cloud Storage

Linux malware strengthens links between Lazarus and the 3CX … – We Live Security

Similarities with newly discovered Linux malware used in Operation DreamJob corroborate the theory that the infamous North Korea-aligned group is behind the 3CX supply-chain attack

ESET researchers have discovered a new Lazarus Operation DreamJob campaign targeting Linux users. Operation DreamJob is the name for a series of campaigns where the group uses social engineering techniques to compromise its targets, with fake job offers as the lure. In this case, we were able to reconstruct the full chain, from the ZIP file that delivers a fake HSBC job offer as a decoy, up until the final payload: the SimplexTea Linux backdoor distributed through an OpenDrive cloud storage account. To our knowledge, this is the first public mention of this major North Korea-aligned threat actor using Linux malware as part of this operation.

Additionally, this discovery helped us confirm with a high level of confidence that the recent 3CX supply-chain attack was in fact conducted by Lazarus a link that was suspected from the very beginning and demonstrated by several security researchers since. In this blogpost, we corroborate these findings and provide additional evidence about the connection between Lazarus and the 3CX supply-chain attack.

3CX is an international VoIP software developer and distributor that provides phone system services to many organizations. According to its website, 3CX has more than 600,000 customers and 12,000,000 users in various sectors including aerospace, healthcare, and hospitality. It provides client software to use its systems via a web browser, mobile app, or a desktop application. Late in March 2023, it was discovered that the desktop application for both Windows and macOS contained malicious code that enabled a group of attackers to download and run arbitrary code on all machines where the application was installed. Rapidly, it was determined that this malicious code was not something that 3CX added themselves, but that 3CX was compromised and that its software was used in a supply-chain attack driven by external threat actors to distribute additional malware to specific 3CX customers.

This cyber-incident has made headlines in recent days. Initially reported on March 29th, 2023 in a Reddit thread by a CrowdStrike engineer, followed by an official report by CrowdStrike, stating with high confidence that LABIRINTH CHOLLIMA, the companys codename for Lazarus, was behind the attack (but omitting any evidence backing up the claim). Because of the seriousness of the incident, multiple security companies started to contribute their summaries of the events, namely Sophos, Check Point, Broadcom, Trend Micro, and more.

Further, the part of the attack affecting systems running macOS was covered in detail in a Twitter thread and a blogpost by Patrick Wardle.

Figure 1. Timeline of events related to the preparation and distribution of 3CX trojanized applications

The timeline shows that the perpetrators had planned the attacks long before execution; as early as December 2022. This suggests they already had a foothold inside 3CXs network late last year.

While the trojanized 3CX macOS application shows it was signed in late January, we did not see the bad application in our telemetry until February 14th, 2023. It is unclear whether the malicious update for macOS was distributed prior to that date.

Although ESET telemetry shows the existence of the macOS second-stage payload as early as February, we did not have the sample itself, nor metadata to tip us off about its maliciousness. We include this information to help defenders determine how far back systems might have been compromised.

Several days before the attack was publicly revealed, a mysterious Linux downloader was submitted to VirusTotal. It downloads a new Lazarus malicious payload for Linux and we explain its relationship to the attack later in the text.

There is one domain that plays a significant role in our attribution reasoning: journalide[.]org. It is mentioned in some of the vendor reports linked above, but its presence is never explained. Interestingly, articles by SentinelOne and ObjectiveSee do not mention this domain. Neither does a blogpost by Volexity, which even refrained from providing attribution, stating Volexity cannot currently map the disclosed activity to any threat actor. Its analysts were among the first to investigate the attack in depth and they created a tool to extract a list of C&C servers from encrypted icons on GitHub. This tool is useful, as the attackers did not embed the C&C servers directly in the intermediate stages, but rather used GitHub as a dead drop resolver. The intermediate stages are downloaders for Windows and macOS that we denote as IconicLoaders, and the payloads they get as IconicStealer and UpdateAgent, respectively.

On March 30th, Joe Desimone, a security researcher from Elastic Security, was among the first to provide, in a Twitter thread, substantial clues that the 3CX-driven compromises are probably linked to Lazarus. He observed that a shellcode stub prepended to the payload from d3dcompiler_47.dll is similar to AppleJeus loader stubs attributed to Lazarus by CISA back in April 2021.

On March 31st it was being reported that 3CX had retained Mandiant to provide incident response services relating to the supply-chain attack.

On April 3rd, Kaspersky, through its telemetry, showed a direct relationship between the 3CX supply-chain victims and the deployment of a backdoor dubbed Gopuram, both involving payloads with a common name, guard64.dll. Kaspersky data shows that Gopuram is connected to Lazarus because it coexisted on victim machines alongside AppleJeus, malware that was already attributed to Lazarus. Both Gopuram and AppleJeus were observed in attacks against a cryptocurrency company.

Then, on April 11th, the CISO of 3CX summarized Mandiants interim findings in a blogpost. According to that report, two Windows malware samples, a shellcode loader called TAXHAUL and a complex downloader named COLDCAT, were involved in the compromise of 3CX. No hashes were provided, but Mandiants YARA rule, named TAXHAUL, also triggers on other samples already on VirusTotal:

The filenames, but not MD5s, of these samples coincide with those from Kasperskys blogpost. However, 3CX explicitly states that COLDCAT differs from Gopuram.

The next section contains a technical description of the new Lazarus malicious Linux payload we recently analyzed, as well as how it helped us strengthen the existing link between Lazarus and the 3CX compromise.

The Lazarus groups Operation DreamJob involves approaching targets through LinkedIn and tempting them with job offers from industry leaders. The name was coined by ClearSky in a paper published in August 2020. That paper describes a Lazarus cyberespionage campaign targeting defense and aerospace companies. The activity has overlap with what we call Operation In(ter)ception, a series of cyberespionage attacks that have been ongoing since at least September 2019. It targets aerospace, military, and defense companies and uses specific malicious, initially Windows-only, tools. During July and August 2022, we found two instances of Operation In(ter)ception targeting macOS. One malware sample was submitted to VirusTotal from Brazil, and another attack targeted an ESET user in Argentina. A few weeks ago, a native Linux payload was found on VirusTotal with an HSBC-themed PDF lure. This completes Lazaruss ability to target all major desktop operating systems.

On March 20th, a user in the country of Georgia submitted to VirusTotal a ZIP archive called HSBC job offer.pdf.zip. Given other DreamJob campaigns by Lazarus, this payload was probably distributed through spearphishing or direct messages on LinkedIn. The archive contains a single file: a native 64-bit Intel Linux binary written in Go and named HSBC job offerpdf.

Interestingly, the file extension is not .pdf. This is because the apparent dot character in the filename is a leader dot represented by the U+2024 Unicode character. The use of the leader dot in the filename was probably an attempt to trick the file manager into treating the file as an executable instead of a PDF. This could cause the file to run when double-clicked instead of opening it with a PDF viewer. On execution, a decoy PDF is displayed to the user using xdg-open, which will open the document using the users preferred PDF viewer (see Figure 3). We decided to call this ELF downloader OdicLoader, as it has a similar role as the IconicLoaders on other platforms and the payload is fetched from OpenDrive.

OdicLoader drops a decoy PDF document, displays it using the systems default PDF viewer (see Figure 2), and then downloads a second-stage backdoor from the OpenDrive cloud service. The downloaded file is stored in ~/.config/guiconfigd (SHA-1: 0CA1723AFE261CD85B05C9EF424FC50290DCE7DF). We call this second-stage backdoor SimplexTea.

As the last step of its execution, the OdicLoader modifies ~/.bash_profile, so SimplexTea is launched with Bash and its output is muted (~/.config/guiconfigd >/dev/null 2>&1).

Figure 2. Illustration of the probable chain of compromise

Figure 3. An HSBC-themed lure in the Linux DreamJob campaign

SimplexTea is a Linux backdoor written in C++. As highlighted in Table 1, its class names are very similar to function names found in a sample, with filename sysnetd, submitted to VirusTotal from Romania (SHA-1: F6760FB1F8B019AF2304EA6410001B63A1809F1D). Because of the similarities in class names and function names between SimplexTea and sysnetd, we believe SimplexTea is an updated version, rewritten from C to C++.

Table 1. Comparison of the original symbol names from two Linux backdoors submitted to VirusTotal

guiconfigd(SimplexTea for Linux, from Georgia)

sysnetd(BADCALL for Linux, from Romania)

How is sysnetd related to Lazarus? The following section shows similarities with Lazaruss Windows backdoor called BADCALL.

We attribute sysnetd to Lazarus because of its similarities with the following two files (and we believe thatsysnetd is a Linux variant of the groups backdoor for Windows called BADCALL):

Figure 4. Similarities between a Windows and a Linux variant of BADCALL (a list of domains used as a front for a fake TLS connection)

Figure 5. Similarities between AppleJeus for macOS and the Linux variant of BADCALL (the key for the A5/1 stream cipher)

This Linux version of the BADCALL backdoor, sysnetd, loads its configuration from a file named /tmp/vgauthsvclog. Since Lazarus operators have previously disguised their payloads, the use of this name, which is used by the VMware Guest Authentication service, suggests that the targeted system may be a Linux VMware virtual machine. Interestingly, the XOR key in this case is the same as one used in SIMPLESEA from the 3CX investigation.

Figure 6. Loading a configuration file by BADCALL for Linux, cf. Figure 8

Taking a look at the three 32-bit integers, 0xC2B45678, 0x90ABCDEF, and 0xFE268455 from Figure 5, which represent a key for a custom implementation of the A5/1 cipher, we realized that the same algorithm and the identical keys were used in Windows malware that dates back to the end of 2014 and was involved in one of the most notorious Lazarus cases: the cybersabotage of Sony Pictures Entertainment (SHA-1: 1C66E67A8531E3FF1C64AE57E6EDFDE7BEF2352D).

Figure 7. The decryption routine shared between the BADCALL for Linux and targeted destructive malware for Windows from 2014

To recap what weve covered so far, we attribute the 3CX supply-chain attack to the Lazarus group with a high level of confidence. This is based on the following factors:

Figure 8. Loading a configuration file by SimplexTea for Linux, cf. Figure 6

Figure 9. A hardcoded URL in SimplexTea for Linux

The 3CX compromise has gained a lot of attention from the security community since its disclosure on March 29th. This compromised software, deployed on various IT infrastructures, which allows the download and execution of any kind of payload, can have devastating impacts. Unfortunately, no software publisher is immune to being compromised and inadvertently distributing trojanized versions of their applications.

The stealthiness of a supply-chain attack makes this method of distributing malware very appealing from an attackers perspective. Lazarus has already used this technique in the past, targeting South Korean users of WIZVERA VeraPort software in 2020. Similarities with existing malware from the Lazarus toolset and with the groups typical techniques strongly suggest the recent 3CX compromise is the work of Lazarus as well.

It is also interesting to note that Lazarus can produce and use malware for all major desktop operating systems: Windows, macOS, and Linux. Both Windows and macOS systems were targeted during the 3CX incident, with 3CXs VoIP software for both operating systems being trojanized to include malicious code to fetch arbitrary payloads. In the case of 3CX, both Windows and macOS second-stage malware versions exist. This article demonstrates the existence of a Linux backdoor that probably corresponds to the SIMPLESEA macOS malware seen in the 3CX incident. We named this Linux component SimplexTea and showed that it is part of Operation DreamJob, Lazaruss flagship campaign using job offers to lure and compromise unsuspecting victims.

For any inquiries about our research published on WeLiveSecurity, please contact us atthreatintel@eset.com.

ESET Research offers private APT intelligence reports and data feeds. For any inquiries about this service, visit theESET Threat Intelligencepage.

This YARA rule flags the cluster containing both IconicLoader and IconicStealer, as well as the payloads deployed in the cryptocurrency campaigns from December 2022.

/*The following rule will only work with YARA version >= 3.11.0*/import "pe"rule RichHeaders_Lazarus_NukeSped_IconicPayloads_3CX_Q12023{meta:description = " Rich Headers-based rule covering the IconicLoader and IconicStealer from the 3CX supply chain incident, and also payloads from the cryptocurrency campaigns from 2022-12"author = "ESET Research"date = "2023-03-31"hash = "3B88CDA62CDD918B62EF5AA8C5A73A46F176D18B"hash = "CAD1120D91B812ACAFEF7175F949DD1B09C6C21A"hash = "5B03294B72C0CAA5FB20E7817002C600645EB475"hash = "7491BD61ED15298CE5EE5FFD01C8C82A2CDB40EC"condition:pe.rich_signature.toolid(259, 30818) == 9 andpe.rich_signature.toolid(256, 31329) == 1 andpe.rich_signature.toolid(261, 30818) >= 30 and pe.rich_signature.toolid(261, 30818) <= 38 andpe.rich_signature.toolid(261, 29395) >= 134 and pe.rich_signature.toolid(261, 29395) <= 164 andpe.rich_signature.toolid(257, 29395) >= 6 and pe.rich_signature.toolid(257, 29395) <= 14}

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

/*

The following rule will only work with YARA version >= 3.11.0

*/

import "pe"

rule RichHeaders_Lazarus_NukeSped_IconicPayloads_3CX_Q12023

{

meta:

description = " Rich Headers-based rule covering the IconicLoader and IconicStealer from the 3CX supply chain incident, and also payloads from the cryptocurrency campaigns from 2022-12"

author = "ESET Research"

date = "2023-03-31"

hash = "3B88CDA62CDD918B62EF5AA8C5A73A46F176D18B"

hash = "CAD1120D91B812ACAFEF7175F949DD1B09C6C21A"

hash = "5B03294B72C0CAA5FB20E7817002C600645EB475"

hash = "7491BD61ED15298CE5EE5FFD01C8C82A2CDB40EC"

condition:

pe.rich_signature.toolid(259, 30818) == 9 and

pe.rich_signature.toolid(256, 31329) == 1 and

pe.rich_signature.toolid(261, 30818) >= 30 and pe.rich_signature.toolid(261, 30818) <= 38 and

pe.rich_signature.toolid(261, 29395) >= 134 and pe.rich_signature.toolid(261, 29395) <= 164 and

pe.rich_signature.toolid(257, 29395) >= 6 and pe.rich_signature.toolid(257, 29395) <= 14

}

Read the original post:
Linux malware strengthens links between Lazarus and the 3CX ... - We Live Security

IBM looks to M&As after pancake-flat Q1 Blocks and Files – Blocks and Files

IBM revenues grew just 0.4 percent year-on-year in Q1 2023, held back by its Infrastructure business unit but with storage hardware a bright spot. It sees M&A possibilities ahead and wants to boost its growth with acquisitions.

The legacy player reports revenues from four business units: Software, Consulting, Infrastructure, and Finance. Overall revenues were $14.3 billion with a profit of $927 million, an increase of 26.5 percent on a year ago.

CEO and chairman Arvind Krishna said: Our first quarter results demonstrate that clients continue turning to IBM for our unique combination of an open hybrid cloud platform, enterprise-focused AI, and business expertise to unlock productivity and drive efficiency in their operations. This gives us confidence in our current growth expectations for revenue and free cash flow for the year.

Performance was led by software and consulting as clients continue to accelerate their digital transformations, modernize their applications, automate their workflows and create flexible and secure hybrid cloud environments.

IBM is seeing customers focus on digital transformation slanted towards cost takeout and a quick ROI.

CFO and SVP James Kavanaugh explained: In the quarter, we remained focused on the fundamentals of our business, increasing productivity and generating operating leverage. As a result, we again expanded our gross profit margin, improved our underlying profit performance and increased our cash generation. We are well-positioned to continue investing for growth and returning value to shareholders through dividends.

The four segment results were:

Storage products are sold as hardware in the Infrastructure BU and also in the Software BU. The Infrastructure unit sells hybrid infrastructure products and recorded revenues of $1.7 billion. Within that, zSystem mainframe revenues were up a solid 7 percent annually but distributed infrastructure was down 3 percent. Infrastructure support revenues went down 9 percent.

IBM said distributed infrastructure performance was helped by storage growth but hindered by the larger Power10 component,wherethe high-end Power10 system launch is complete. The actual storage revenue number wasnt revealed.

The Software BUs results were sprightlier, with Hybrid Platforms and Solutions up 2 percent at $4.2 billion. This includes the main driver, Red Hat, with products up 8 percent,and three also-rans. Automation and security software were both down 1 percent while Data and AI revenues rose 1 percent. The transaction processing part of the Software BU saw revenues rise 3 percent to $1.7 billion.

In the Red Hat area, IBM is now seeing OpenShift annual recurring revenue (ARR) reach $1 billion, which helped the overall Hybrid Platforms and Solutions ARR hit $13.5 billion. Storage software revenues within the Software BU were not disclosed. Kavanaugh said that the DB2 product was included in the data and AI segment, where it serves as the underpinnings for modern AI and mission-critical workloads.

Financial summary:

On an earnings call Krisha said: Our focus remains on revenue growth and free cash flow, with Kavanaugh adding that, for the full 2023 year: [We] expect free cash flow of about $10.5 billion, which is up over $1 billion year-to-year.

And Kavanaugh mentioned: Software and consulting are our growth vectors and now represent about three quarters of our annual revenue. As the z16 mainframe cycle winds down: We expect 2023 infrastructure revenue to decline. [This] should impact IBMs overall revenue growth by over 1 point.

IBM is very pleased with its Red Hat acquisition, with Kavanaugh saying: Were four years into this acquisition. We have quadrupled the Red Hat revenue from pre-acquisition in three and half years.

That positive background was there when Krishna answered a question about IBMs merger and acquisitions activity, saying: M&A is a very definite part of our model.

He explained: As asset prices adjust, this could be quite an opportunistic time Were going to be judicious. Were going to wait for the right time. And it is going to be in the areas that we want. Those areas are going to be in our higher-value software and in areas where consulting can accelerate. We expect to remain 60 percent, maybe 75 percent of our total spend will be in software. The remaining will be in consulting. In software, were going to stick to our areas: hybrid cloud, artificial intelligence and data, cyber, automation.

Read more:
IBM looks to M&As after pancake-flat Q1 Blocks and Files - Blocks and Files

The Global Digital Evidence Management Market size is expected to … – GlobeNewswire

New York, April 20, 2023 (GLOBE NEWSWIRE) -- Reportlinker.com announces the release of the report "Global Digital Evidence Management Market Size, Share & Industry Trends Analysis Report By Component, By Deployment Type, By End User, By Regional Outlook and Forecast, 2022 - 2028" - https://www.reportlinker.com/p06449929/?utm_source=GNW The discovery of vast evidence data is being migrated from spreadsheets to a centralized repository, where the chain of custody is maintained and evidence management alerts are configured.

Worldwide, law enforcement agencies have begun adopting body-worn cameras as a viable approach for enhancing evidentiary outcomes, increasing officer safety, and strengthening officer-community interactions. The cameras have also proven to be a crucial resource for problem-solving, broader law enforcement, and community involvement methods inside jurisdictions.

With millions of vehicles on the road every day, accidents are inevitable. Due to a spike in the frequency of accidents and car thefts, the government has mandated the installation of dashboard cameras, resulting in a considerable increase in dashcam usage over the past few years.

If hackers manage to gain access to the system, collected data may be compromised. Even a single piece of missing or manipulated data could provide difficulty for law enforcement. As data is created from many sources, such as e-mails, transactions, text messages, online accounts, photographs, and browsing histories, the digital evidence management system must be tamper-resistant.

COVID-19 Impact Analysis

Cybercriminals have begun targeting employees who work from home to stop the deadly virus from spreading. Several government agencies have also warned about the Internet security risks related to virtual private networks (VPN), home Wi-Fi networks, and other hardware and software infrastructure installed at residences. Yet, digital forensics businesses play a crucial part in overcoming and resolving these difficulties by providing incident response and digital forensics solutions to fight against and prevent cyberattacks. In light of these elements, the digital evidence management market has witnessed long-term growth prospects due to the pandemic.

Market Growth Factors

Growing volume of digital evidence

Digital evidence is frequently used in crimes in the contemporary world. The amount of digital evidence has multiplied due to the widespread use of cameras, cell phones, laptops, tablets, and huge volumes of email, texts, social media posts, images, and other digital content. Systems for managing digital evidence have evolved into indispensable tools for forensic analysts, supporting the complete lifecycle of the evidence. Due to this increased volume of digital evidence, the digital evidence management market is predicted to witness a significant upsurge in the upcoming years.

Surge usage of emerging technologies in digital evidence management

One of the most common applications of artificial intelligence in video analysis is allocating a zone in the video frame in which any movement triggers an alert. This capability is utilized by retail loss prevention officers to draw attention to activity near high-priced products or to check archived film to establish when an item was removed from a shelf. When provided with descriptive parameters or an example, AI can locate things within a video frame. In a simpler application, AI can analyze a large volume of footage for the presence of a specific car model if it is provided with the vehicles dimensions, shape, and even color.

Market Restraining Factors

Hesitancy over sharing digital evidence

Despite the fact that digital evidence management aids law enforcement agencies in conducting investigations more efficiently, there remains a considerable gap that has law enforcement agencies concerned. These gaps comprise data tampering and manipulation, which can still be overcome with the assistance of market offerings. Still, the issue of data interchange security has not yet been handled. Due to these concerns, the legal officer hesitates to release digital evidence, which may result in lower adoption of digital evidence management solutions, thereby hindering market expansion.

Component Outlook

Based on component, the digital evidence management market is segmented into hardware, software and services. The software segment held the highest revenue share in the digital evidence management market in 2021. Police officers or criminal investigators utilize digital evidence management software to organize digital photos, body camera footage, video surveillance footage, filmed interviews, voice recordings, and physical evidence & property. Moreover, standard solutions incorporate police records, forensics or lab reports, CAD narratives, and more.

Deployment Outlook

On the basis of deployment, the digital evidence management market is divided into on-premise and cloud. The on-premise segment garnered a significant revenue share in the digital evidence management market in 2021. Users do not need an internet connection to access data, which is one of the key benefits of on-premises storage. On-premises servers are inaccessible outside the network since they do not save data online. On-premise digital evidence management firms do not need to request an upgrade to their storage plan or the addition of new capabilities from a cloud storage provider; rather, they can perform the changes themselves.

End User Outlook

By end user, the digital evidence management market is classified into law enforcement agencies and criminal justice agencies. In 2021, the law enforcement agencies segment registered the maximum revenue share in the digital evidence management market. Public safety & law enforcement agencies can use digital evidence management solutions to manage, store, analyze, and exchange a growing amount of digital evidence. It can be deployed on-premises or in the cloud. Many sources may provide the evidence, including dashcams, body-worn cameras, CCTV cameras, and phone records. The system keeps the degree of compliance at its highest.

Regional Outlook

Region-wise, the digital evidence management market is analyzed across North America, Europe, Asia Pacific, and LAMEA. In 2021, the North America region led the digital evidence management market by generating maximum revenue share. The regional market for digital evidence management has developed significantly. Since 2014, when government financing initiatives for law enforcement body-worn cameras were announced in the United States, the use of body-worn cameras has developed significantly.

The major strategies followed by the market participants are Partnerships. Based on the Analysis presented in the Cardinal matrix; IBM Corporation is the forerunners in the Digital Evidence Management Market. Companies such as Panasonic Holdings Corporation, Motorola Solutions, Inc., and OpenText Corporation are some of the key innovators in Digital Evidence Management Market.

The market research report covers the analysis of key stake holders of the market. Key companies profiled in the report include Panasonic Holdings Corporation, Motorola Solutions, Inc., NICE Ltd., OpenText Corporation, Axon Enterprise, Inc., Genetec, Inc., IBM Corporation, VIDIZMO LLC, Safe Fleet Acquisition Corp., and Cellebrite DI Ltd.

Recent Strategies Deployed in Digital Evidence Management Market

Partnerships, Collaborations and Agreements:

Feb-2023: Safe announced a multi-year licensing agreement with Rekor Systems, an AI technology company for offering insights that make cities smarter, safer, and more efficient, for Rekors AI-powered vehicle identification and LPR technology for the next-generation violation detection platform for Law Enforcement in-car Automated License Plate Recognition (ALPR), Transit Automated Bus Lane Enforcement (ABLE), and School Bus Stop Arm Violation Detection. With this integration, the company aims to empower customers with new tools for accelerating roadway safety, protecting communities, and improving transit operations.

Jul-2022: Cellebrite DI Ltd. partnered with Chainalysis, the blockchain data platform, for helping customers in recognizing and assessing criminal activity involving cryptocurrency easily at the time of digital investigations for expediting their resolution.

May-2022: Axon announced a partnership with F?sus, a company focused on real-time crime centers for public safety agencies in the U.S., for expanding F?sus Real Time Crime Center in the Cloud (RTC3) and Axon Respond solutions capabilities for offering better real-time operations situational awareness to agencies. Through the agreement, organizations will be able to more easily and affordably combine live video feeds from linked drones, closed-circuit television (CCTV) cameras, public and private cameras, and other sources to give first responders a uniform operating picture.

Mar-2022: VIDIZMO announced a partnership with Hexagons Safety, Infrastructure & Geospatial division, for offering improved video content management and evidence to public safety agencies throughout the world. The partnership helped the agencies in better collecting, processing, and analyzing digital evidence for improving the investigation process and increasing case clearance.

Jan-2022: NICE signed a partnership with Magnet Forensics, a company that provides innovative tools to investigate cyberattacks and digital crimes. The partnership streamlines investigators operations, increases productivity, and makes it easier to review more forms of digital evidence. Additionally, police departments can review all the evidence combined in one place, for facilitating case building and reach the truth faster.

Nov-2021: Axon partnered with Skydio, a leading manufacturer of drones and provider of world-leading autonomous flight technology. With this partnership, the user would be able to automatically upload videos and photos, captured through Skydio drones to Axon Evidence with an early access program. This integration will facilitate easy managing and sharing of drone-captured imagery for different agencies, alongside corresponding body camera video. This will provide a more complete picture of the situation.

Apr-2021: Panasonic I-Pro came into partnership with Genetec, Inc., a provider of unified security solutions. The partnership was aimed to provide Cloude powered by Genetec, a cloud-based digital evidence management system (DEMS) to law enforcement clients. Cloude works in direct connection with Panasonic I-Pros in-vehicle camera systems (MK3 and VPU4000) and body-worn cameras (MK3 and BWC4000). Moreover, it enables law enforcement organizations to keep complete ownership of metadata and evidence.

Feb-2021: Axon partnered with Cellebrite, a company focused on digital intelligence, for streamlining investigative workflows for investigators. Following the partnership, Axon Evidence, Axons digital Evidence Management solution integrated with the digital data gathered, reviewed and analyzed by Cellebrites platform, for delivering law enforcement with one place to control, review, and protect, all the digital evidence. Additionally, the partnership would provide investigators and agencies with a range of innovative solutions for getting a comprehensive picture to solve and close the cases fastly.

Aug-2020: Axon came into partnership with Fotokite, a provider of public safety software tools and actively tethered Unmanned Aerial System (UAS) solutions. The partnership focuses on delivering their products and services as the part of Axon Air Program. Additionally, the partnership would allow the former companys law enforcement customer to see live-streamed footage in Axon Evidence, Axons digital evidence management solution. The Fotokite Sigma UAS, situational awareness software tools, and the tools required to monitor, store, and distribute video evidence are all included in the Axon Air program.

Mergers and Acquisitions:

Sep-2022: Safe Fleet took over Kerr Industries with its subsidiaries including Crown North America. The acquisition extended companys uplift capabilities to the law enforcement sector. In addition, Kerr and Crown broadened Safe Fleets trained field installers and commercial vehicle service centers network, to better fulfilling the needs of the law enforcement industry.

Oct-2021: Cellebrite took over Digital Clues, a provider of omnichannel intelligence tools and Digital Detective services. The acquisition reinforced the companys leading Digital Intelligence platform and strengthened its position as the end-to-end technology partner that can digitize the complete investigative workflow. In addition, this acquisition would aid the companys foothold law enforcement investigation unit and intelligence throughout the world.

Aug-2020: Motorola Solutions completed the acquisition of Callyo, a provider of cloud-based mobile applications for law enforcement. The acquisition complemented the companys existing command center software suite critical mobile technology capabilities that allow information to flow seamlessly from field to command center. Moreover, with the addition of Callyos technology, organizations can expand their evidence-collection process and can improve collaboration for building stronger cases efficiently.

Product Launches and Expansions:

Oct-2022: Cellebrite made an enhancement to its investigation and evidence management solution, Cellebrite Guardian, with the addition of new features, focused on the ethical treatment of digital evidence. Cellebrite Guardian is a SaaS-based solution that can be deployed right away, is extremely secure, breaks through organizational silos, and links all stakeholders. For unrestricted evidence access and sharing as well as quick evidence sharing and evaluation for intra- and inter-agency real-time collaboration, turn to Cellebrite Guardian. Cellebrite Guardians new feature, the additional level of the visual cue, makes sure that every content is handled with the highest care.

Dec-2021: Axon unveiled Axon Attorney Premier, the first digital evidence management system created for defense and prosecutors attorneys especially. This system is the addition to the companys Justice Line, a network of interconnected systems developed for simplifying evidence-sharing workflow from prosecutors to law enforcement and defense attorneys. Axon Attorney Premier enables the defense and prosecutor attorneys to manage different forms of digital evidence easily, comprising interview room video, body-worn video, CCTV Video, in-car video, etc.

Nov-2021: OpenText released the Digital Evidence Center, a solution for solving the evidence management challenges for criminal justice and law enforcement. This solution integrates a complete evidence custody chain with evidence storage, ingestion, analysis, search, and reporting capabilities, for providing collaborative case management of forensic evidence, rich-media evidence, and document evidence.

Oct-2020: NICE announced the launch of Evidencentral Marketplace, the first open digital evidence management ecosystem for enhancing digital transformation for criminal justice and law enforcement. This is a technology vendors ecosystem developed for making it fast, simple, and cost-effective for bringing evidence together for expanding case building, addressing evidence disclosure, and unearthing hidden evidence challenges.

Scope of the Study

Market Segments covered in the Report:

By Component

Software

o Evidence Collection, Storage & Sharing

o Evidence Analytics & Visualization

o Evidence Security

Hardware

Services

By Deployment Type

Cloud

On-premise

By End User

Law Enforcement Agencies

Criminal Justice Agencies

By Geography

North America

o US

o Canada

o Mexico

o Rest of North America

Europe

o Germany

o UK

o France

o Russia

o Spain

o Italy

o Rest of Europe

Asia Pacific

o China

o Japan

o India

o South Korea

o Singapore

o Malaysia

o Rest of Asia Pacific

LAMEA

o Brazil

o Argentina

o UAE

o Saudi Arabia

o South Africa

o Nigeria

o Rest of LAMEA

Companies Profiled

Panasonic Holdings Corporation

Motorola Solutions, Inc.

NICE Ltd.

OpenText Corporation

Axon Enterprise, Inc.

Genetec, Inc.

IBM Corporation

VIDIZMO LLC

Safe Fleet Acquisition Corp.

Cellebrite DI Ltd.

Read the original:
The Global Digital Evidence Management Market size is expected to ... - GlobeNewswire

Why multi-cloud visibility is more vital than ever – TechRadar

Todays enterprises are increasingly multi-cloud, harnessing an average of three different cloud (opens in new tab) service providers (CSPs) to achieve flexibility, efficiency, and scalability. Alongside the growing use of containerization with technologies such as Kubernetes (opens in new tab), these expanding cloud environments are delivering huge benefits. However, this also leads to greater, more complex issues around visibility, security (opens in new tab), and cost.

If data (opens in new tab) is the new gold, enterprises need to have full visibility and full control over this precious resource. The question is, how can businesses take responsibility for their cloud-based data if they lack visibility into what or where it is? Here we explore why visibility is more important than ever in todays multi-cloud world, and why a single-view approach is needed to ensure a return on cloud strategies.

Visibility is at the core of robust data management strategies. If you cannot see data, how can you control, protect, and utilize it?

In harnessing the benefits of the cloud, enterprises want to reduce the operational complexity and costs associated with managing multi-cloud environments, while also ensuring that they own and control their data no matter where it resides. Where visibility and control are lacking, enterprises cannot realize the value of their data. They may incur unnecessary costs such as redundant storage and face greater compliance challenges. Not only that, but cloud-based data blind spots undermine data and application (opens in new tab) resiliency and cybersecurity (opens in new tab).

However, as uncovered in our latest research, four in ten organizations confess they dont have full visibility into data stored in cloud environments, and 92% said they needed to improve their ability to track their entire data footprint.

With a view and control of the entire data estateacross edge, data center, and cloudfrom a single pane of glass, organizations can realize the benefits of multi-cloud without losing control and authority over their data.

Social Links Navigation

Ian Wood is the Senior Director and Head of Technology at Veritas.

One of the fundamental reasons enterprises turn to CSPs is the perceived benefits of ease of use, flexibility, cost-effectiveness, and peace of mind in terms of core needs such as security, backup and recovery. While the public cloud does indeed offer a myriad of benefits, organizations are in danger of assuming they are getting more than they actually are.

For example, the complexity of multi-cloud environments is leading many organizations to rely heavily on CSPs standard, add-on services for data security, backup, and recovery. These basic tools can create a false sense of security because they do not provide cross-cloud visibility and observability for all data and applications, as well as continuous data protection.

And, in a world where ransomware has evolved into a sophisticated form of organized crime, CSP tools do not offer the level of ransomware resilience, immutable storage, and reliable disaster recovery todays enterprises require. As a result, companies using these native tools are more severely impacted by ransomware.

The good news is that many recognize this risk and can take action. Almost three-quarters(73%) of enterprises told us they are aware of gaps in their cybersecurity when using a native cloud security tool. And over half said their organization is at risk of being the victim of ransomware as a result of relying on native cloud security backup.

Add to this is the fact that more than six in ten enterprises rely on default settings, rather than configuring native tools to their organization's unique requirements. In most cases, these settings do not provide adequate cover and instead widen the vulnerability gap.

As The Center for Internet Security warns, To avoid a gap in protection, consider implementing third-party tools to harden systems in addition to the CSPs native security tools. Its better to have overlaps between third-party security tools and the CSPs security services than to have gaps in your cloud security.

Native tools may appear easy to implement as an add-on service and seem cost-effective at the outset, but these are dangerous and potentially costly mistakes. Until organizations reassess their reliance on multiple and disparate CSP tools, visibility into their enterprise operations will remain low, while their vulnerability to ransomware attacks, potential for data and financial loss, and downtime and compliance issues will likely increase.

The rise of multi-cloud creates a transformative infrastructure and application development platform for enterprises. Tools offered by CSPs deliver basic functionality, but mission-critical applications require enterprise-grade capabilities and cross-cloud data mobility and visibility.

There is a clear advantage to streamlining data visibility and protection with a single solution that can reduce costs and complexity, as well as provide enhanced and multiple layers of cloud data and application security.

When you are in control of your multi-cloud, you get the most out of your enterprises most valuable resources by enabling cost optimization, accelerated technology adoption, fast recovery, analytics and insights, in tandem with cyber resiliency.

We've featured the best cloud backup. (opens in new tab)

Original post:
Why multi-cloud visibility is more vital than ever - TechRadar

What if cloud data was stored on floppy disks? – BetaNews

In 2020 alone, 61 percent of businesses migrated their workloads to the cloud, with 48 percent actively choosing to store their most important data in the cloud.

But because cloud storage is out of sight it can sometimes be difficult to understand just how much data there is stored out there.

By 2025, there will be an estimated 175 zettabytes of stored data in the cloud. In order to help visualize what these volumes of data mean Distrelec has created a clever infographic depicting European cloud data volumes as stacks of 3.5-inch 1.44MB floppy disks (younger readers ask your parents).

With each floppy having a depth of 3.3mm the disks for all of the nations studied would create a stack higher than the cruising altitude of a Boeing 747 (10km, or over 30,000 ft).

The largest cloud user in the study, Germanys storage equivalent in floppy disks would reach a height of 440,396 km, that's 55,996km higher than the moon and over 5,500 times the cruising height of a 747 airliner.

Italy, comes second with business storage requirements of 130,964 TB, reaching 302,854 km from the Earth or two-thirds of the way to the moon. France is third with less than half of Italy's data, but that's still a 125,417km high stack of floppies. Even tiny Malta would have a stack of disks over 4,000Km high.

You can see the graphic below.

Image credit: bepsimage/depositphotos.com

See the article here:
What if cloud data was stored on floppy disks? - BetaNews

$70 for Lifetime Access to 10TB Cloud Drive Supporting All File Types – Global Village space

Looking for a way to clear up space on your phone, tablet, or laptops hard drive? Look no further than Prism Drive Secure Cloud Storage. With a lifetime subscription offering 10TB of storage, this cloud storage solution is the perfect way to keep all your files safe and accessible from any device.

And right now, you can get a lifetime subscription to Prism Drive for just $69.97 a discount of 96% off the regular price. But act fast this deal is only available through April 11.

With Prism Drive, you can upload files from an unlimited number of devices and store any file type. Whether you need to clear out space on your phone for new apps or want to get your video library off your computer, Prism Drive has you covered.

There is a 10GB per upload size limit, so you may need to split large folders into separate uploads. But once your files are online, you can access them from any of your devices and share them with friends or colleagues using links.

One of the most important features of any cloud storage solution is safety. And with Prism Drive, you can rest assured that your files are secure. The service uses zero-knowledge encryption, meaning that only you can see what youve uploaded. And with the strongest available transfer encryption, you can trust that your files are safe during the upload process.

If youre worried about accidentally deleting something important, Prism Drive also offers a 30-day trash history. This means that if you delete something, you have 30 days to recover it before its gone forever.

So if youre looking for a safe and reliable way to store all your photos, videos, and other files, consider a lifetime subscription to Prism Drive Secure Cloud Storage. And with this limited-time offer, theres never been a better time to sign up.

See original here:
$70 for Lifetime Access to 10TB Cloud Drive Supporting All File Types - Global Village space

Outlook users face email issues as Microsoft starts using OneDrive … – BetaNews

If you are having trouble sending and receiving email via your Outlook.com account, you are not alone. Problems have started to surface following a recent policy change by Microsoft that means email attachments now eat into OneDrive storage limits -- as we reported previously.

Microsoft started to roll out the change at the beginning of February, but it seems that the pace of the rollout has increased as more and more users are hitting their storage limits and experiencing problems with their emails.

See also:

Microsoft now consolidates cloud storage across Microsoft 365 apps, and this means that Outlook.com users now have less space available to them.

The company warned users of the change towards the tail-end of last year, saying: "Starting February 1, 2023, cloud storage used across Microsoft 365 apps and services will include Outlook.com attachments data and OneDrive data. All data will continue to be protected with Microsoft's comprehensive set of security feature".

The notice continued:

This update may reduce how much cloud storage you have available to use with your OneDrive. If you reach your cloud storage quota, your ability to send and receive emails in Outlook.com will be disrupted.

At the time, users were advised of the staggered approach Microsoft would be taking:

To ensure we offer the best experience, the cloud storage changes and new quota bar will gradually roll out on or after February 1, 2023, across your app settings, Windows settings, and Microsoft account.

As the Register reports, these changes are now hitting more accounts, with users left baffled as to why they are unable to send or receive emails. Many are unhappy at the changes, with some complaining that they feel Microsoft is forcing them to pay for additional storage by upgrading to a different OneDrive tier.

Image credit: rafapress / depositphotos

See original here:
Outlook users face email issues as Microsoft starts using OneDrive ... - BetaNews

IDrive e2 Offers Hot Object Storage that is 85% More Affordable … – PR Newswire

LOS ANGELES, April 7, 2023 /PRNewswire/ -- IDrive e2, a high performance S3 compatible object storage platform, is offering their service for a fraction of the cost of Amazon S3, starting at a price point that is 85% less and enabling users to save money when storing large amounts of data securely in the cloud.

IDrive e2 is an object storage solution that is designed to provide users with the flexibility and scalability they need to manage their data effectively. It is suitable for data backup/archival, hosting applications, media workflow, gaming assets, e-commerce resources, and other large volumes of data.

With a tierless pricing approach, IDrive e2 is the most affordable object storage solution on the market, with pricing starting at $0.004/GB/month. The service offers no egress fees, as well as being one of the few solutions available that does not charge an extra fee for downloading data. IDrive e2 also offers a free 7 day trial with 1TB of space for prospective users to test the service.

IDrive e2 offers a host of cost-saving options, features and pricing packages that Amazon S3 either doesn't offer or charges extra for, helping e2 users save when storing and recovering data. These include:

The IDrive e2 service stores petabytes of data that users can retrieve based on their convenience using associated access key ID and secret access key. Enterprise users can access data directly from the IDrive e2 web console or via third-party tools like Rclone, MSP360, Duplicati, etc. Users can use the web console platform to secure their data, manage users, control account settings, and more.

With 14 edge computing locations across North America and Europe, IDrive e2 enables users across the globe to point their data to the location closest to them for a faster network and ease of access, as well as being able to retrieve their data quickly based on their convenience. This provides the fastest possible response time for all S3 API calls no matter what region the user is located in.

To keep user data safe and secure, IDrive e2 transmits all files using an encrypted TLS connection. Developers can also set Server-Side Encryption on e2 buckets. Data is stored in enterprise-class data centers equipped with state-of-the-art facilities with custom-designed elevated floors, HVAC temperature control systems with designated cooling zones, seismically-braced racks, and physical security features. The data centers are periodically checked for vulnerabilities in the network infrastructure with third-party audits.

About IDrive IDrive Inc. is a privately held company specializing in cloud storage, online backup, file sharing, remote access, compliance and related technologies. Core services include IDrive, IDrive e2, RemotePC and IBackup.The company's services help over 4 million customers back up over 500 Petabytes of data.

SOURCE IDrive Inc.

Read the original:
IDrive e2 Offers Hot Object Storage that is 85% More Affordable ... - PR Newswire

1 Hot Growth Stock to Buy Hand Over Fist Before It Soars 241 … – The Motley Fool

Snowflake (SNOW -0.55%) has turned out to be a terrible investment in the past few years with shares of the cloud data platform provider down 42% since it went public in September 2020.

However, it has been delivering terrific revenue growth thanks to the healthy demand for its cloud-based data platform that serves fast-growing niches such as data warehousing, machine learning, data engineering, and cybersecurity. As it turns out, the company's total addressable market has tripled since its initial public offeringto a whopping $248 billion.

So could this be an opportunity for investors? Here's why I think Snowflake stock has massive upside ahead.

According to a consensus estimateof 39 analysts covering Snowflake, the stock carries a median price target of $180. That points toward a 23% jump from Snowflake's current stock price. However, the Street-high price target of $500 indicates that this cloud stock could soar a massive 241% from current levels.

But can Snowflake put its past underperformance behind it and clock such terrific gains? Well, the company's slowing pace of growth suggests otherwise. The company is anticipating 40% revenue growth in fiscal 2024 to $2.7 billion. Though that's nothing to sneeze at, it is worth noting that Snowflake grew at a much faster pace of 70% last fiscal year.

CEO Frank Slootman pointed out on last month's earnings conference call that Snowflake "saw a measure of bookings reticence with certain customer segments in Q4, reflecting a lack of visibility in the business and preferring a cautious short-term stance versus larger, longer-term contract expansions."

This is an industry-wide problem as cloud spending growth has hit a speed bump of late. Microsoft's Azure cloud service recorded31% growth in the fourth quarter of 2022, down from 35% in the previous quarter. Amazon's Amazon Web Services growth also dropped to 20% in Q4 2022 from 28% in the prior quarter. Headwinds such as strong inflation, a possible recession, and high interest rates have led customers to pull back on their cloud spending of late.

However, it would be prudent to focus on the big picture as the slowdown is likely to be temporary. IDC estimates that the public cloud market could clock annual growthof 26% through 2026, which won't be surprising as enterprises increasepublic cloud storage. Meanwhile, the niches that Snowflake serves are also built for terrific growth as its massive addressable market indicates.

For instance, the data warehouse-as-a-service market is expected to clock annual growth of 23% through 2030, according to Polaris Market Research. The data science platform space, on the other hand, could clock 16% annual growth through 2030 and generate close to $380 billion in annual revenue thanks to the proliferation of artificial intelligence (AI) and machine learning.

The good part is that Snowflake is among the leading players in these markets. The company controls a 29% share of the data warehousing market, comfortably ahead of second-place SAP, which has a 23% share. Not surprisingly, Snowflake is rapidly building a solid customer base. The company had7,828 customers at the end of the last quarter, an increase of 31% over the prior year.

But more importantly, the number of customers spending at least $1 million on Snowflake's offerings increased at a much greater pace of 79% year over year last quarter. This explains why the company has a solid revenue pipeline with $3.7 billion in remaining performance obligations (RPO) at the end of the previous quarter. That's much bigger than the company's fiscal 2024 revenue forecast. Also, Snowflake is expected to maintain solid top-line growth momentum in the next fiscal year.

SNOW Revenue Estimates for Current Fiscal Year data by YCharts

Though Snowflake stock has underperformed since it went public, investors looking for a growth stock may want to consider it given that it is trading at a much cheaper valuation today as compared to when it went public. Snowflake now has a price-to-sales ratio of about 23. While that's expensive, it's much lower than in 2020 when it was trading at a whopping 163 times sales. The following chart shows why growth-oriented investors may want to start accumulating Snowflake.

SNOW PS Ratio data by YCharts

However, Snowflake's rich valuation also makes it susceptible to volatility, especially if there are signs of weakness in its growth story. But a pullback will open an opportunity for investors with a lower appetite for risk to buy this cloud stock at a relatively cheaper valuation, and they may not want to miss such a chance given the upside Wall Street sees and the lucrative growth opportunity.

John Mackey, former CEO of Whole Foods Market, an Amazon subsidiary, is a member of The Motley Fool's board of directors. Harsh Chauhan has no position in any of the stocks mentioned. The Motley Fool has positions in and recommends Amazon.com, Microsoft, and Snowflake. The Motley Fool has a disclosure policy.

More here:
1 Hot Growth Stock to Buy Hand Over Fist Before It Soars 241 ... - The Motley Fool

Google Nearby Share Beta for Windows really gives AirDrop a run … – Android Police

Since the advent of Nearby Share in 2020, Android users have been enjoying the convenience of wireless file transfers between their phones and tablets. However, moving files from an Android device to a Windows computer has always been a little more clunky, making us envious of Apples AirDrop. Times are changing and Google finally has a workable Nearby Share implementation for Windows, currently in beta. We took the utility for a spin to get a look at everything it has to offer.

Google announced plans to launch Nearby Share for Windows at CES 2022. Nearly a year later, like many of you, I was still emailing files to myself, using cloud storage as an intermediary, or messaging myself on WhatsApp. But hope for change arrived earlier this week, when Google announced the Nearby Share beta for Windows. Although still in testing for now, this release gives us a solid look at what to expect from the stable feature.

Pros:

Cons:

Googles beta is available in the US and many other countries, with the notable exceptions mostly in Europe. Youll need a device running Android 6 Marshmallow or newer (which is hopefully not a problem for pretty much anyone), and a computer running the 64-bit version of Windows 10 or 11. Unfortunately, ARM-based computers arent supported.

All the devices involved in the transfer need Bluetooth, and must be connected to the same Wi-Fi network. Google recommends a separation of 16 feet (5 meters) or less between your phone/tablet and computer.

To use Googles Nearby Share utility, you'll need to download and install the software. Click Get started with Beta on the Nearby Share app webpage, download the installer file (named BetterTogetherSetup.exe), and run it. During the installation, it may ask you to sign in to your Google account, name your computer for the Nearby Share transfers, choose who can share with you, and opt in to sending diagnostic data. Dont worry about incorrectly configuring these during installation, because we can change all these settings later. Close the installer after the setup is complete.

Google Nearby Share Windows Beta installation process

Disappointingly, the installation doesn't create a desktop shortcut, but you will find Nearby Share Beta from Google now living in your Start menu. You can pin it to the Start menu, or set it to auto-run after boot like I did. Switch on Wi-Fi and Bluetooth from the taskbar on your Windows computer and open the program. I was pleased to see a rather Android-y interface, even though that means a stark contrast to the Windows 10 or 11 UI. In the program, click the gear icon in the upper right corner to change a few settings (the ones you configured during installation) before your first file transfer using Nearby Share.

The Device name setting defines how your computer will appear to other devices. Below that, you can configure the directory to save received files. The application defaults to using the Downloads folder, which is okay, but remember that you cannot define the save location separately for each transfer. The Device visibility setting has four options, just like on Android:

We advise against using Everyone mode on public Wi-Fi like at airports and coffee shops, for security reasons. The mode is useful if youre on secure Wi-Fi, though. I found it convenient to switch device visibility from the drop-down menu on the programs home page.

It's also really nice how the program is minimized to the taskbar corner overflow menu even when you close it. Remember that you can use Everyone mode even without signing in during the setup process, but other modes require a Google sign-in.

On your phone, make sure Wi-Fi and Bluetooth are turned on. An option to turn on Nearby Share should be available under Settings > Connected Devices > Connection Preferences > Nearby Share. Here, switch on the toggles for Use Nearby Share and Device visibility, so your phone is visible to your computer.

You can tap the Device Visibility option to switch from Everyone mode to any other setting. For this demonstration, we will use Everyone mode on both the PC and the Android device, but if you sign in to the same Google account on both devices, you can stick to the Your devices mode for enhanced security. Note that Device visibility must be switched on for transfers, even if youre sharing files between your own devices.

Once configured correctly and connected to the same Wi-Fi network, you can start your first transfer.

Receiving files on your PC is just as straightforward, as long as you connect the devices to the same Wi-Fi network.

In our usage over the last couple of days, Googles Nearby Share beta has worked reliably, and we didnt encounter any failed transfers or random disconnects as long as the Android device was close to the PC. Transfer speeds are respectable, too, with multiple images and documents taking just a few seconds when transferred to and from the Windows computer.

Googles Nearby Share for Windows has the potential to become the AirDrop equivalent we've always wanted, but the companys choice of an Android-inspired design for the Windows client serves as a constant reminder this is not Microsoft's native solution. Googles solution is functional, but for a truly homogenous experience, we may have to wait for Microsoft to upgrade its own nearby sharing for Windows to support Android phones.

Visit link:
Google Nearby Share Beta for Windows really gives AirDrop a run ... - Android Police