Page 3,872«..1020..3,8713,8723,8733,874..3,8803,890..»

HiveIO Adds Data Protection, BI, Cloud Storage to Its Intelligent Virtualization Solution – Integration Developers

The latest update to HiveIOs intelligent virtualization solution adds data protection for virtual machines, BI support and disaster recovery by seamlessly integrating with cloud storage. IDN looks at Hive Fabric 8.0.

by Tom Donoghue

Tags: BI, cloud HiveIO, virtualization,

The latest update to HiveIOs intelligent virtualization solution aims to deliver robust disaster recovery that lets customers replicate their VMs and user data to cloud-based storage.

Hive Fabric 8.0 is the latest upgrade to HiveIOs hardware-agnostic virtualization software to simplifies the deployment and management of virtual desktops, virtual servers, and software-defined storage. With a collection of integrated technologies, including accelerated computing and local storage, HiveIO allows IT generalists to design and build a highly scalable virtual infrastructure.

"With 8.0, we deliver a powerful disaster recovery solution capable of replicating VMs and user data to cloud-based storage such as Amazon S3, providing even more flexibility to our customers, said Toby Coleridge, HiveIOs vice president of product in a statement. End users also drove several updates for Hive Fabric 8.0, he added, including support for business insights and automation.

Hive Fabric 8.0 also incorporates BI tools into Hive Sense to provide valuable insight into applications and resource utilization. Its new capabilities include added data protection, backup to the cloud, application insights, an updated user interface, and more features for its

Hive Sense platform for visibility and business insights.

Hive Fabric technology offers an end-to-end virtualization solution, including several vital features -- hypervisor, remote monitoring, management, VDI provisioning, broker, as well as storage acceleration.

Hive Sense provides visibility into a companys IT infrastructure. This allows admins to monitor how various applications are being used, as well as utilize that data to analyze their application environment for license inefficiencies (via IT Asset Management reporting) -- without additional third-party products. One popular use case is to let customers track how many licenses are being used for a specific application, leading to potential savings in overall licensing costs, the company noted.

Among some of the notable new features in Hive Fabric 8.0 are:

Data Protection:In the event of a disaster, Hive Fabric 8.0 provides customers with the ability to back up their storage locally or to a cloud provider platform, such as Amazon AWS or Microsoft Azure. Integrating with cloud-based storage provides organizations with a new level of agility and time saved on data protection.

User Interface:HiveIO analyzed how current users operated their Hive Fabric user interface (UI) to launch an updated version in 8.0. To further improve the end-user admin experience, operations have been increasingly simplified and real-time information and virtual desktop insights appear in the admin's dashboard.

Expanded AI:Hive Fabric 8.0 also build upon the artificial intelligence-ready solution that enables organizations to deploy virtualization technology without unnecessary vendor complexity or the need for costly specialists.

Hive Fabric also enables users to deploy virtual desktops, virtual servers, and software-defined storage in a single install, which eliminates the need for a multi-vendor and multi-contract approach.

In specific, the Hive Fabric virtualization platform sports a set of fabric cluster services that aim to simplify the deployment and management of virtual desktops, virtual servers, and software-defined storage. The architecture uses a KVM kernel alongside an intelligent message bus, which together can deliver a complete end-to-end VDI solution.

Directly out-of-the-box, Hive Fabric provides several critical services for virtualized resources, including hypervisor, remote monitoring and management, desktop broker, gateway, and storage acceleration services. The benefit of such an architecture is that Hive does not require any added appliances, systems, layers of security.

An early adopter of Hive, Solihull College & University Centre, credited the platform with delivering simplicity and cost-efficiency.

The UK-based organizations IT Director Dave Gartside said in a statement, "Moving our virtual server and desktop environment from VMware to Hive Fabric dramatically simplifies the administration for our IT team. The single web-based interface allows us to gain insight into how our users work and what applications they are running. We are especially excited to see the integration with cloud storage, which provides us with more agility and a cost-effective solution for Disaster Recovery."

Hive is a hardware-agnostic bare metal install that works on any X86 server.

back

See original here:
HiveIO Adds Data Protection, BI, Cloud Storage to Its Intelligent Virtualization Solution - Integration Developers

Read More..

Cloud Storage Market Growth by Top Companies, Trends by Types and Application, Forecast to 2026 – News Parents

The report is an all-inclusive research study of the Cloud Storage Market taking under consideration the expansion factors, recent trends, developments, opportunities, and competitive landscape. The market analysts and researchers have done extensive analysis of the global Cloud Storage market with the help of research methodologies such as PESTLE and Porters Five Forces analysis. They have provided accurate and reliable market data and useful recommendations with an aim to help the players gain an insight into the overall present and future market scenario. The report comprises in-depth study of the potential segments including product type, application, and user and their contribution to the general market size.

Global cloud storage market was valued at USD 22.56 billion in 2016 and is projected to reach USD 191.17 billion by 2025, growing at a CAGR of 26.8% from 2017 to 2025.

The Cloud Storage market report provides detailed information on key factors, Opportunities, Challenges, industry trends and their impact on the market. The market report Cloud Storage also includes company data and its operation. This report also contains information about the pricing strategy, brand strategy and target customer of the Cloud Storage market.

Get | Download Sample Copy @https://www.verifiedmarketresearch.com/download-sample/?rid=1742&utm_source=NPN&utm_medium=002

The top Manufacturer with company profile, sales volume, and product specifications, revenue (Million/Billion USD) and market share

Global Cloud Storage Market Competitive Insights

The competitive analysis serves as a bridge between manufacturers and other participants that are available on the Cloud Storage Market. The report includes a comparative study of Top market players with company profiles of competitive companies, Cloud Storage Market product innovations and cost structure, production sites and processes, sales details of past years and technologies used by them. The Cloud Storage Market report also explains the main strategies of competitors, their SWOT analysis and how the competition will react to changes in marketing techniques. In this report, the best market research techniques were used to provide the latest knowledge about Cloud Storage Market to competitors in the market.

Global Cloud Storage Market Segmentation information

The report provides important insights into the various market segments presented to simplify the assessment of the global Cloud Storage Market. These market segments are based on several relevant factors, including Cloud Storage Market product type or services, end users or applications and regions. The report also includes a detailed analysis of the regional potential of the Cloud Storage Market, which includes the difference between production values and demand volumes, as well as the presence of market participants and the growth of each Region over the given forecast period

Ask For Discount (Exclusive Offer) @ https://www.verifiedmarketresearch.com/ask-for-discount/?rid=1742&utm_source=NPN&utm_medium=002

Cloud Storage Market: Regional Analysis :

As part of regional analysis, important regions such as North America, Europe, the MEA, Latin America, and Asia Pacific have been studied. The regional Cloud Storage markets are analyzed based on share, growth rate, size, production, consumption, revenue, sales, and other crucial factors. The report also provides country-level analysis of the Cloud Storage industry.

Table of Contents

Introduction: The report starts off with an executive summary, including top highlights of the research study on the Cloud Storage industry.

Market Segmentation: This section provides detailed analysis of type and application segments of the Cloud Storage industry and shows the progress of each segment with the help of easy-to-understand statistics and graphical presentations.

Regional Analysis: All major regions and countries are covered in the report on the Cloud Storage industry.

Market Dynamics: The report offers deep insights into the dynamics of the Cloud Storage industry, including challenges, restraints, trends, opportunities, and drivers.

Competition: Here, the report provides company profiling of leading players competing in the Cloud Storage industry.

Forecasts: This section is filled with global and regional forecasts, CAGR and size estimations for the Cloud Storage industry and its segments, and production, revenue, consumption, sales, and other forecasts.

Recommendations: The authors of the report have provided practical suggestions and reliable recommendations to help players to achieve a position of strength in the Cloud Storage industry.

Research Methodology: The report provides clear information on the research approach, tools, and methodology and data sources used for the research study on the Cloud Storage industry.

What will you find out from the global Cloud Storage Market Report?

The report contains statistical analyses of the current and future Status of the global Cloud Storage Market with a forecast to 2026.The report contains detailed information on manufacturers, Cloud Storage Market raw material suppliers and buyers with their trade outlook for 2020-2026.The report informs you about the most important drivers, technologies and Trends that will shape the global Cloud Storage Market in the near future.The report added an exclusive market segmentation, broken down by Product Type, Cloud Storage Market end user and Region.The strategic perspectives on Cloud Storage Market Dynamics, current production process and applications.

Complete Report is Available @ https://www.verifiedmarketresearch.com/product/global-cloud-storage-market-size-and-forecast-to-2025/?utm_source=NPN&utm_medium=002

About Us:

Verified market research partners with clients to provide insight into strategic and growth analytics; data that help achieve business goals and targets. Our core values include trust, integrity, and authenticity for our clients.

Our research studies help our clients to make superior data-driven decisions, capitalize on future opportunities, optimize efficiency and keeping them competitive by working as their partner to deliver the right information without compromise.

Contact Us:

Mr. Edwyne FernandesCall: +1 (650) 781 4080Email:[emailprotected]

TAGS: Cloud Storage Market Size, Cloud Storage Market Growth, Cloud Storage Market Forecast, Cloud Storage Market Analysis, Cloud Storage Market Trends, Cloud Storage Market

Continued here:
Cloud Storage Market Growth by Top Companies, Trends by Types and Application, Forecast to 2026 - News Parents

Read More..

Catch Of The Week: Ransomware On The Rise – Los Alamos Daily Post

By BECKY RUTHERFORD

Los Alamos

It can cripple global businesses, governments, schools, hospitals, and more; ransomware attacks are on the rise. Read on to learn more about this cyber threat and how you can protect yourself.

According to a recent study by Emsisoft, a security firm that helps companies hit by ransomware, in 2019, there were 205,280 organizations they assisted with recovery from ransomware infections. This is a 41% increase from the year before. Average payments to recover from ransomware (for businesses, not consumers) jumped up to $84,116- more than double what it was the previous quarter, according to Coveware, another security firm.

Recent victims of ransomware include the US Coast Guard, city of New Orleans, city of Baltimore, Travelex, and many more. Ransomware doesnt just go after large companies and municipalities; it can target anyone, including you. Nobody is too small to be beyond their notice; anyone can be a customer, and this is something you want to avoid at all costs.

What is ransomware? Ransomware is a type of malware that encrypts (translates all the data into random ciphertext) all of your files, making them completely inaccessible unless you shell out the cash for the decryption key. Ironically, ransomware has some of the best customer service you will find anywhere. Users are shown detailed instructions on how to pay the fee to get the decryption key, almost always in Bitcoin. Dont know how to do this? There is usually a customer service email or number you can call to get assistance. So helpful!

There are many different kinds of ransomware in the wild. Some of them have decryption keys publicly available; others do not. Ransomware families include; Locky, Cerber, DMA Locker, REvil, Crysis, SamSam, and many more. Some varieties of ransomware are evolving to target ICS (Industrial Control Systems); other types of ransomware seek out data for exfiltration before encryption. The biggest new trend is the threat of publicly releasing your sensitive data if you dont pay up. So even if you have backups you can depend on, if you dont pay up all your sensitive files will be released on the internet for all to see.

How do you get a ransomware infection? There are many ways you can be exposed to this. One of the most common ways to deliver the ransomware is via a phishing email with malicious attachments. Once you open the attachments and enable macros, you are opening up your system to the attacker to take over your computer. Other types of ransomware, like NotPetya, exploit security holes to infect computers without the need for any user interaction. This is just one more reason to keep your system up to date, and not to open attachments from unknown senders. Another way is via a drive-by download; you might visit a legitimate website, but the ads on the website may have been compromised and contain links to malicious sites, or malicious software downloads. Avoid clicking online ads; they could be malicious.

To prevent ransomware at home or work, follow these steps:

What to do if you are the victim of a ransomware attack? Try to contain the infection; disconnect the computer from any networks and the internet. This will minimize the chance of the infection spreading to other computers. Dont pay the ransom, paying the ransom does not guarantee the return of your data. In some cases, even if you get the key, your unencrypted data will be so badly damaged it will be useless. Contact a computer repair professional and see if they can work on your machine, there might be a free decryptor available online for the ransomware. If nothing else works, if you have good backups, you should be able to get your computer reimaged and restored with your backed up data. If you arent a techie, its best to pay someone else to take care of this for you.

Ransomware is an evolving threat, and it will likely get worse before it gets better. Be aware, be safe online, and dont become a victim.

Editors note: Becky Rutherford works in information technology at Los Alamos National Laboratory.

See the rest here:
Catch Of The Week: Ransomware On The Rise - Los Alamos Daily Post

Read More..

Pester power! One big customer prompts Dell EMC PowerProtect systems to work with Actifio – Blocks and Files

Dell EMC PowerProtect arrays (formerly branded Data Domain) have gained copy data management functionality via Actifio, through a deal prompted by an unnamed customer.

Actifio CMO Brian Reagan told us: The primary driver here was one of our largest joint customers, who was looking to extend the useful life of their DD estate and also capitalize on the installed Actifio data management platform. They needed an integrated solution that could scale to support their global environment. Actifio and Dell share a commitment to customer success, so it was a natural conclusion.

Actifio supplies copy data management software that makes virtual copies of databases and other data. It provides them on-demand to copy data users, such as test and dev, and compliance officers. It has used its OnVault software to store archival copies of this data on public clouds AWS, Azure, GCP, IBM COS and others or on-premises object storage systems Dell EMC ECS, Hitachi Vantara HCP, NetApp StorageGRID and Scality.

The deal with Dell sees Actifio step outside the ranks of public cloud and on-premises object storage systems for the first time.

Now it is adding PowerProtect storage to that list. This entails Actifio integrating PowerProtect interface functionality into OnVault, enabling the software to act as a source for data stored on PowerProtect arrays. According to Actifio, through this, users get high-performance and scalable instant access to any size data stores.

OnVault can capitalise on a 7:1 fan-in ratio (7:1) for cross-appliance deduplication and better space efficiency. That refers to seven Actifio appliances pushing data to a single PowerProtect system with cross deduplication of data from those seven source appliances.

Actifio said it does not intend to sign similar deals with other suppliers of backup-to-disk (B2D) target systems, such as Commvault, Exagrid and Quantum: We do not have plans to support other B2D systems, Reagan said. Our primary interoperability strategy with OnVault is object storage platforms on-premises or in the cloud, including EMC ECS, IBM cloud object storage, HDS content platform, Scality, and all hyperscalers.

In a recentSilicon Angle webcast sponsored by Actifio, Reagan said: Were fortunate to have partnered with Dell EMC as one of our focus infrastructure partners.

We have reference architectures for converged infrastructures using the rail and the rack designs [with] the VxFlex OS underneath and really going after the database cloning market opportunities. So, bringing an, essentially, data centre pod architecture with Actifio software running inside to power these databases as a service opportunities that exist in the large enterprises.

Separately, Reagan told us: OnVault will be included as part of our OEM relationship with Dell, so all Database Cloning appliances will support this functionality.

We understand the Actifio partnership with Dell EMC will be extended in the coming months.

Read more:
Pester power! One big customer prompts Dell EMC PowerProtect systems to work with Actifio - Blocks and Files

Read More..

Office 365: 9 Baked-In Productivity Tools Built That Workers Are Using – CMSWire

PHOTO:Indi Samarajiva

Office 365 for business is a Microsoft subscription service that includes access to Office applications and online productivity services, as well as business services such as web conferencing, hosted email, and online storage. However, Microsoft keeps adding new tools and services in response to enterprise need, but are workers using all of them? We talked to several enterprises to see what part of Office 365 is working for them, and, in some cases what they would like to see added to the productivity suite in the future.

For Jovan Milenkovic, co-founder of KommandoTech based in the Czech Republic, One Drive is one of the most underrated productivity tools included in Office 365. It allows users real-time access to edit, share and to keep their work safely stored on Microsoft's servers. With a basic Office 365 package, each user is capped at a whopping tera-byte, which should be plenty for most small businesses. OneDrive enables teams to collaborate on projects using Office 365 tools quickly and efficiently from anywhere in the world. "With data stored on the Microsoft cloud, your work is secure and accessible from any device while you're on the move. It increases productivity by keeping all files neatly stored on a shared cloud, saving the hassle of downloading endless attachments or having to sift through your mailbox to find important files," he said.

Everything is on the cloud and two-clicks away from a shareable link that your co-workers can quickly access shared files and get work done more efficiently.

Norhanie Pangulima is anoutreach consultant at Kansas City, Miss.-based Centriq. He cites two tools in Office 365 as being particularly useful. Office 365, he said, is equipped with Microsoft Teams, which you can use to host online meetings and video calls. It acts as a communication tool that doubles as a collaboration tool, which is needed for a fluid interaction between employees in a workplace who dont always get to work in the same physical location.

As such, Teams provides users with a unified communication and collaboration platform that combines persistent workplace chat, video meetings, file storage (including collaboration on files), and application integration. Teams is a competitor to services such as Slack and is the evolution and upgrade path from Microsoft Skype for Business.

Related Article:Don't Know Which Microsoft Collaboration Tool to Use? You're Not Alone

Citing the fact that 95% of organizations use email as their way of communicating internally, he said that a digital workplace is not going to work if there is no email system in place to provide a venue for the exchange of formal communication. Office 365 has this as well, through Outlook. Primarily an email application, Outlook also includes a calendar, task manager, contact manager, note taking, journal, and web browsing.

Hunter Willis, product marketing manager atJersey City-based AvePointshared that traditionally Exchange and One Drive have been very important, but as Microsoft continues to roll out features in Office 365, SharePoint and the Power Platform along with Teams have become increasingly important for productivity. Demand for mobile accessibility and enabling the modern digital workplace has shifted the focus and nature of collaboration to be much more reliant on chat interfaces.

'Power Platform' is a collective term for three Microsoft products: Power BI, PowerApps and Flow. They provide the means to help people easily manipulate, surface, automate and analyze data and can be used with Office 365 and Dynamics 365.

In addition, the speed and pace that is required by less structured work processes and the diversification of workforce talents require a faster pace of productivity. The power of chat-based collaboration coupled with the search and data organization tools that come with SharePoint are extremely enabling when it comes to rapid collaboration productivity.

Related Article:10 Keys to Microsoft Teams Governance Success

In addition, Microsoft Graph and its AI engine proactively surface documents that users may have been unaware of but may be interested or could be useful to them. This is extremely powerful when it comes to optimizing collaboration. Office 365 enables not even IT pros or tech junkies, but any passionate worker to automate processes, build apps, collaborate in chat, email and document sharing, all from one interface.

The stack of Teams, SharePoint/ (One Drive) and the Power Platform (Power Apps, Power Automate and Power BI) are the future of digital workplace collaboration productivity, Willis said.

Andreea Zorz, an online marketer at Canada-basedDistantjob pointed out that she, like many people, is just looking for the basics. She said that Word, Excel, and Outlook are the most used tools by desk-workers. Skype is a great tool if you often need to have extensive online meetings with distributed team members, but its chat features leave something to be desired, She also said that she finds the support offered for Skype annoying. If you create a ticket, you get numerous emails and calls, and the calls always come in the evening, long after I've finished work, she said.

Reuben Yonatan is CEO of Fresh Meadows, New York-based GetVoIP. He said that when it comes to productivity tools, the ones that help us collaborate over a distance are the most helpful. Yammer (found within Office 365) is a great example of that. It enables workers to brainstorm with each other, share information, and come up with solid ideas. It also provides usage stats that help us really hone-in on how we work best as a team and which tools help us the most, he said.

Yammer is a social networking service designed with enterprise communication in mind. Created by a company called Geni and launched in 2008, it was acquired by Microsoft in 2012. Microsoft rolled the new product into their Office 365 suite in 2014, and today it is used by 85% of fortune 500 companies worldwide, according to Microsoft.

Other than Outlook, Word and Excel, Cira Apps CTO and founder Vern Weitzman said that his favorite Office 365 app is To Do. I have tried Asana, Trello, Todoist and a few others. Microsoft To Do app is hands down the easiest to get my thoughts into a checklist, he said.

To-Do is an intelligent task management app that makes it easy to plan and manage your day.Microsoft To-Do delivers a smart, more personal and intuitive way to help people stay organized. Powered by Office 365 integration and an intelligent algorithm, it is part of Microsofts objective to simplify task management and help you to achieve more.

But there are holes and as they become more apparent, other third-party vendors are going to step up to the mark. Joe Ferdinando is president of HotHeadTech, an IT support company. He told us that the biggest thing Office 365 is missing in his opinion is file recovery.

There's no way that office 365 can recover the lost data which can lead to confusion, and ultimately, frustration if your employees are using Office 365 to get their work done. Make sure you have proper backups in place or and saving your work to the cloud because if not, you may end up paying the consequences, said Ferdinando.

For Sarah Franklin of Blue Tree AIin Ottawa, some of the most effective productivity tools in digital workplaces include time trackers to set deadlines, dashboard organizers to clean up your business, new tech applications, and a platform that allows all the employees and leaders to communicate in the same area and share work/ideas so there is no confusion about what is to be done. Office 365 is a great service to use for improving productivity, but I do believe there are better options available that provide more detailed help to create a very personal space for a business, she said.

This leads to a more effective way of growing and maintaining success to increase financial gain. Office 365 provides a very general service which is great for newer businesses but can lack authenticity as a business begins to grow larger.

Excerpt from:
Office 365: 9 Baked-In Productivity Tools Built That Workers Are Using - CMSWire

Read More..

Data protection must be boardroom priority – ITWeb

Danie Marais, director of software development at Redstor.

Data protection must be a boardroom priority, not the IT departments prime concern.

So said Danie Marais, director of software development at Redstor, addressing the ITWeb Cloud, Data Centre & DevOps Summit, held at The Forum in Bryanston yesterday.

In his talk How data protection can enrich your SaaS [software-as-as-service] strategies Marais emphasised that companies need to get serious about data protection.

He said enterprises need to equip themselves with tools and solutions to protect data, which will help minimise costs. In order to do that, we need to change our thinking about data.

Marais warned that SaaS providers are always keen to talk about the cost and efficiency benefits a move to the cloud can deliver, but they tend to be much less vocal about the potential impact on compliance and data protection.

He cautioned that without the right safeguards in place, moving to SaaS solutions can put compliance and business continuity at risk, all while costing more than expected.

Marais said data is no longer the new oil but rather is now equivalent to water. Data is extremely important and valuable, therefore it makes sense to compare it to oil; however, he believes the comparison to water is more apt.

Water is life, water gets distributed in different places, and it must be accessible and clean. Water, just like data, must be protected.

He noted that data churned by companies is growing every day, hence the need to be vigilant when it comes to data management.

We find ourselves in a different world than it was 40 years ago, or even five years ago. Every year, the amount of data businesses are using is growing by a staggering 50%. Not only is it growing at a staggering rate, it is being stored in more and more different locations.

We have data on-premises, we have data on mobile devices, we have data on laptops, and now we have data in the cloud. When it is in the cloud, its not even in a single place; you get multiple cloud storage applications, each with its own way to store data.

He cautioned that with the increased sharing and storing of files in the cloud, potentially sensitive data is being exposed, as cloud is not exempt from losing data.

Another panellist to the session, Lawrence Reddy, technical director, Cloudlogic SA, is also of the belief that cloud is not a destination.

He said cloud is not a trend, not cheap, not simple (especially security) and certainly not a magic bullet. Cloud is an enabler. An enabler to business, technical and operations today, without the need to move a single workload.

Moreover, Reddy thinks cloud should be brought to the business not vice versa.

See original here:
Data protection must be boardroom priority - ITWeb

Read More..

Eight ways to stay safe online, Tech News & Top Stories – The Straits Times

Stay safe online with these tips from the Cyber Security Agency of Singapore and cyber security firms Akamai, Check Point and HackerOne.

To avoid falling victim to phishing attacks, do not carelessly open links or files sent via e-mail or social media.

Examine the URL of links to ensure they are legitimate before clicking on them. Be extra cautious if an offer or deal sounds too good to be true. Never reply with personal information such as passwords or bank account details.

Strong passwords have a mix of random alphanumeric characters and symbols that are harder to crack by brute-force attacks.

However, they can be difficult to remember. This is especially so if you follow what experts recommend and do not reuse passwords for your different accounts.

The solution is to use a password manager to generate and automatically fill in the passwords for your accounts. All you need is to remember a master password.

Google's Chrome browser, for instance, comes with a built-in password manager. It even has a Password Checkup feature - launched last year for Android and the Web - that can check saved passwords to see if they had been leaked or compromised in past breaches.

Alternatively, choose biometric authentication methods such as facial recognition or fingerprint if available.

Turn on two-factor authentication - an extra layer of identity verification through a one-time password or biometric authentication - to secure your online accounts.

For those who are at greater risk of being targeted by cyber criminals - journalists, activists and business leaders, for instance - Google has an Advanced Protection Program that offers enhanced security for personal Google accounts.

For instance, users must use a physical security token - on top of a password - to sign in to their Google accounts.

Google also limits access to Gmail and Google Drive files to its own apps and select third-party apps, thus reducing the chance of a malicious app gaining access.

Prevent cyber attacks that exploit software bugs by keeping your apps and software updated with the latest patches.

Turn on automatic updates, which are usually scheduled to occur in the middle of the night to avoid disruption.

Malware may disguise itself as legitimate apps to get past your defences. Hence, avoid downloading apps via links in e-mails or social media.

Use the Apple App Store or Google Play Store instead of unofficial third-party stores or websites.

Although the vast majority of apps from the official app stores are safe, there have been cases where malware have got past Apple and Google's checks.

To mitigate the harm that could be done by such apps, scrutinise the permissions requested by a new app and deny unnecessary ones. For instance, a weather app should not need access to your photos or phone call function.

It may also be helpful to check the number of times the app has been downloaded before you get it, though this is not a fool-proof method.

A virtual private network (VPN) creates a secure, encrypted connection over the Internet. It is handy if you are using a public or unsecured Wi-Fi connection.

While most VPNs are not free, there are decent free ones around, albeit with limitations, such as data quota. For infrequent users who do not need unlimited data, check out free VPNs such as ProtonVPN, hide.me and TunnelBear.

Several PC makers have added physical privacy shutters to the front camera of laptops to block prying eyes in the event of the computer being compromised by malware. Or you could simply paste a sticky tape over the camera.

To disable the microphone in Windows 10 PCs, go to Device Manager, Audio inputs and outputs, right-click Microphone and select Disable. For Mac computers, go to System Preferences, Security & Privacy, click Privacy. Select Microphone to change an app's access to it.

Apple's Safari browser for iOS 13 also lets you control the camera and microphone permissions for each website.

Even if you take all conceivable precautions, it is still possible for your devices to suffer from a ransomware attack that locks their contents unless a ransom is paid.

Thus, it is important you back up your data regularly to multiple locations to mitigate data loss. Consider using a reputable cloud storage vendor, such as Microsoft OneDrive or Google Drive, on top of an external storage device.

Read the original:
Eight ways to stay safe online, Tech News & Top Stories - The Straits Times

Read More..

Facilis to debut version 8 of their shared storage system and version 3.5 of FastTracker MAM – Screen Africa

At NAB 2020, Facilis a leading international supplier of cost-effective, high performance shared storage solutions for collaborative media production networks will debut version 8 of the Facilis Shared Storage System, version 3.5 of its FastTracker Media Asset Management software, and new Object Cloud Synchronization features.

One ofthe most compelling releases to date, version 8 includes uniquesoftware-defined Bandwidth Priority, SSD Tiering and Multi-disk Parity:

FacilisFastTracker media asset management software continues to advance with filemovement profiles, duplicate file reporting, and a secure browse interface.FastTracker can now flush and pre-fetch files and folders from cloud and LTOlocations through the Object Cloud feature, while reporting the status ofarchived media. Facilis Object Cloud will introduce a new Multi-site Syncfeature that can bring together groups of editors on the same file systemacross multiple locations. Using the cloud storage included with the feature,projects can be shared and linked on remote workstations, as easily as linkingto a local drive.

Were extremely excited to show our latest developments this year at NAB, said Jim McKenna, Chief Marketing Officer at Facilis Technology. Our shared file system and storage architecture continues to be the best in the business, allowing content creators all over the world to be more efficient and collaborative. This year, were reaching outside the facility as well, to enable secure access for remote workgroups, producers and stakeholders to in-facility assets through cloud workflows that are as simple as they are powerful.

Facilis is represented by Protea Technology Group in South Africa.

View post:
Facilis to debut version 8 of their shared storage system and version 3.5 of FastTracker MAM - Screen Africa

Read More..

Army accelerates push to the cloud – Defense Systems

Cloud

The Army wants 2020 to be the year of the cloud and hopes to carry that momentum into 2021 with its cloud implementation plan.

"FY20 is very important for us because that's where we're going to set conditions leveraging existing capabilities," Army CIO Lt. Gen. Bruce Crawford said at the service's first-ever Data and Cloud Colloquium Feb. 10.

That plan includes tapping the Army's enterprise-as-a-service pilots with the Air Force, the Joint Enterprise Defense Infrastructure (JEDI) cloud and other existing cloud contracts.

The Army is looking to adapt and build an environment to facilitate data transparency and accessibility by the fourth quarter and begin to operationalize that environment in the first quarter of fiscal 2021, according to presentation documents from the event. That process will unfold over the next year so the Army can verify that data and ensure it's readable before it begins scaling it to the entire service by fiscal 2022.

Additionally, the Army wants to establish an enterprise data management framework environment by December 2021 and have a clean and usable data and information environment ready to use by December 2022. It plans to use its data to leverage emerging technologies and support ongoing operations by December 2023, according to Army presentation documents.

The Army recently stood up its Enterprise Cloud Management Office and named its director, Paul Puckett III.

"We need an enterprise place where we can start to ingest, discover, analyze and consume data beyond the systems-of-systems approach," Puckett said during his presentation Feb. 10.

He emphasized the need to manage the data and develop tools before artificial intelligence and machine learning can be used on a large scale.

And while JEDI is a start, the Army hopes to use additional cloud providers to supply simple and centralized account management, Puckett said. This capability would transition to financial data and IT categorization and asset management to determine how much is spent on cloud computing and migration.

Media was only permitted in the first part of the data and cloud industry day, but Puckett was scheduled to detail the Army's cloud implementation plan.

The Army's initially released budget documents didn't specifically call out cloud investments. But on the research front, the Army wants to spend up to $46 million out of a total $12.6 billion research budget on software and digital technology research and development, which wasn't present in the last two years of requests, according to budget documents released to reporters. The Army's top-line budget request totals $178 billion for 2021.

This article first appeared on FCW, a partner site to Defense Systems.

About the Author

Lauren C. Williams is a staff writer at FCW covering defense and cybersecurity.

Prior to joining FCW, Williams was the tech reporter for ThinkProgress, where she covered everything from internet culture to national security issues. In past positions, Williams covered health care, politics and crime for various publications, including The Seattle Times.

Williams graduated with a master's in journalism from the University of Maryland, College Park and a bachelor's in dietetics from the University of Delaware. She can be contacted at lwilliams@fcw.com, or follow her on Twitter @lalaurenista.

Click here for previous articles by Wiliams.

More:
Army accelerates push to the cloud - Defense Systems

Read More..

Sonrai Security Joins the Cloud Security Alliance – Business Wire

NEW YORK--(BUSINESS WIRE)--Sonrai Security, an innovator in public cloud security, today announced that it has joined the Cloud Security Alliance (CSA), a non-profit organization formed to promote the use of best practices for providing security assurance within cloud computing and provide education on the uses of cloud computing to help secure all other forms of computing.

Sonrai Security delivers a security platform focused on identity and data protection inside AWS, Azure, and Google Cloud. Identity and data access complexity are exploding across an organization's public cloud. This is causing security holes companies dont even know exist. First-generation security tools simply miss this as witnessed by so many breaches. Sonrais multi-cloud security platform finds these holes, helps plug them, and makes sure they wont reappear.

Our aim at Sonrai Security is to help our customers deliver security in public clouds far superior to anything possible with traditional data centers, said Manny Ataebi, VP of Marketing at Sonrai Security. We do this with a cloud-native platform that monitors AWS, Azure and Google platforms to eliminate identity and data access risk.

As a member of CSA, Sonrai Security will contribute to the organizations mission to promote the use of best practices designed to provide security in the cloud. The company will participate in CSA-driven events, research, contribute thought leadership, and collaborate with the more than 90,000 CSA members to further education and use of cloud technologies.

As the use of public clouds becomes more ubiquitous, the dual issues of identity and data protection become increasingly important. The insight Sonrai provides into not only how your data has been accessed but the ways in which it can be accessed in the future is invaluable. We're excited to count them as our newest CSA member and look forward to working together to create a safe and secure cloud ecosystem," said J.R. Santos, Chief Customer Officer at CSA.

For more information on Sonrai Securitys Identity and Data protection platform for AWS, Azure, and Google Cloud, please visit: https://sonraisecurity.com/platform/.

About Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud. We can show you all the ways data has been accessed in the past and can be accessed in the future. Our platform delivers a complete risk model of all identity and data relationships, including activity and movement across cloud accounts, cloud providers, and third-party data stores. For further information, visit https://sonraisecurity.com.

About the Cloud Security Alliance

The Cloud Security Alliance (CSA) is the worlds leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events, and products. CSAs activities, knowledge, and extensive network benefit the entire community impacted by cloud from providers and customers to governments, entrepreneurs and the assurance industry and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem. CSA has developed the definitive best practices for the industry, such as the Security Guidance for Critical Areas of Focus in Cloud Computing, the Cloud Controls Matrix, Top Threats to Cloud Computing and 50 other cloud security research artifacts. For further information, visit us at cloudsecurityalliance.org.

See more here:
Sonrai Security Joins the Cloud Security Alliance - Business Wire

Read More..