Quantcast
Channel: Press Release – CloudTweaks.com

Commvault – Redefines Cloud Based Data Protection

$
0
0

Content by CloudTweaks.com

Commvault News

TINTON FALLS, N.J., Oct. 20, 2015 /PRNewswire/ — Commvault (NASDAQ: CVLT), a global leader in enterprise data protection and information management, today announced the next generation of its market leading solutions portfolio, delivering a broad spectrum of innovation designed to help customers address the increasing challenges of managing data and information in highly disrupted, fast-paced global business environments.

Commvault’s new offerings fundamentally redefine the data protection, archive and cloud data markets where everything is application aware, authentication and encryption data security is essential, backup windows are significantly reduced, instant recovery is the standard, data is accessible natively from all live and versioned locations, disaster recovery is automated, and resources are optimized and orchestrated (storage, compute, and network). The new product innovations in the latest solutions release enable Commvault to be best positioned as the market leader to help customers of all sizes transition from traditional to modern hyper and converged infrastructures, consume new technologies, and fully explore true exploitation of the cloud for critical business workloads…

Read Full Source: PRnewswire

The post Commvault – Redefines Cloud Based Data Protection appeared first on CloudTweaks.com.


Infographic – Western Digital $19 Billion Dollar SanDisk Acquisition

$
0
0

Content by CloudTweaks.com

IRVINE, Calif. and MILPITAS, Calif. — Oct. 21, 2015 — Western Digital® Corporation (NASDAQ: WDC) and SanDisk Corporation (NASDAQ: SNDK) today announced that they have entered into a definitive agreement under which Western Digital will acquire all of the outstanding shares of SanDisk for a combination of cash and stock. The offer values SanDisk common stock at $86.50 per share or a total equity value of approximately $19 billion, using a five-day volume weighted average price ending on October 20, 2015 of $79.60 per share of Western Digital common stock. If the previously announced investment in Western Digital by Unisplendour Corporation Limited closes prior to this acquisition, Western Digital will pay $85.10 per share in cash and 0.0176 shares of Western Digital common stock per share of SanDisk common stock; and if the Unisplendour transaction has not closed or has been terminated, $67.50 in cash and 0.2387 shares of Western Digital common stock per share of SanDisk common stock. The transaction has been approved by the boards of directors of both companies.

Transaction_Infographic_001

Transaction_Infographic_002

The combination is the next step in the transformation of Western Digital into a storage solutions company with global scale, extensive product and technology assets, and deep expertise in non-volatile memory (NVM). With this transaction, Western Digital will double its addressable market and expand its participation in higher-growth segments. SanDisk brings a 27-year history of innovation and expertise in NVM, systems solutions and manufacturing. The combination also enables Western Digital to vertically integrate into NAND, securing long-term access to solid state technology at lower cost…

Read Full Release: Western Digital

The post Infographic – Western Digital $19 Billion Dollar SanDisk Acquisition appeared first on CloudTweaks.com.

Cisco Announces New Threat Awareness Service

$
0
0

Content by CloudTweaks.com

Threat Awareness Service Gives Organizations the Upper Hand in Securing the Network

SAN JOSE, CA, November 3, 2015 – Cisco today announced it is advancing its Security Everywhere strategy deeper into the cloud, network, and endpoints with new security products and features, and a threat awareness service as organizations execute on their digital transformation.

Companies are banking on digital initiatives to provide new avenues of financial growth and reduce operational complexity. As data becomes more pervasive, so do attacks by threat actors which often leave companies scrambling to secure their assets. They are faced with a complex array of point solutions, which by design often are not interoperable, leaving security teams with limited visibility into potential threats and compromises on their networks. The value of Cisco architecture is its emphasis on embedding security spanning the extended network – including routers, switches and the data center – closing gaps across the attack continuum and significantly reducing time to detection and remediation.

Specifically, Cisco is adding Cisco® Cloud Access Security (CAS), which provides visibility and data security for cloud-based applications; Identity Services Engine (ISE) enhancements, extending visibility and control for network and endpoints with new location access controls; and Threat Awareness Service, which provides organizations with threat visibility into their networks.

Cloud Visibility and Control

According to the Cisco Cloud Consumption Services trend data, the number of unauthorized cloud applications used by employees in the enterprise is 15 to 20 times higher than CIOs predicted due to Shadow IT. The new Cisco Cloud Access Security (CAS) offering allows organizations to address this complexity as well as increase visibility and control over data in cloud applications.

Partnering with Skyhigh Networks and Elastica, CAS delivers increased visibility into “hidden” applications that employees might bring onto the network; detection of malicious behavior; and the ability to set security policies that tailor application usage and user behavior to align with corporate policies. To protect cloud-based applications, such as Dropbox and Salesforce.com, CAS prevents the uploading of sensitive information and inappropriate sharing of data in the applications, to limit data exposure breaches.

Cisco Cloud Web Security now integrates with CAS and provides branch offices secure direct Internet access with Integrated Services Router 4K router integration, saving on bandwidth costs.

Safeguarding Endpoint Connections and Data Access

As businesses open their networks to the IoT and mobile devices as well as third-party applications, they are faced with balancing access and protection with accelerating how quickly they can make security changes to map to their business requirements. Over 68 percent of enterprises find that employees’ use of mobile devices on their networks has significantly increased endpoint risk.

The Cisco Identity Services Engine (ISE) is extending software-defined business policies for control over more granularly segmented endpoint, user and geographical access. ISE now integrates with the Cisco Mobility Services Engine, so IT can create and enforce location policies that define access to data down to a specific room. This reduces the overall attack surface, containing network threats, and securing wired, wireless and remote network access across the entire attack continuum.

ISE also is extending its security coverage through its pxGrid partner ecosystem with nine new partners – including Check Point, Infoblox, Invincea, E8 Security, Hawk Defense, Huntsman Security, LogRhythm, SAINT, and SOTI – bringing the total number of partners to 30 in its first year of deployment. Ecosystem partners can now share security telemetry bi-directionally between pxGrid partners. A new feature of the pxGrid Adaptive Network Control allows partners to leverage ISE to rapidly investigate and contain attacks using the network as an enforcer.

Threat Awareness Protection

Often organizations do not have visibility of potential vulnerabilities in their network. What they can’t see, they can’t protect.

Leveraging the power of Cisco’s threat intelligence telemetry, Cisco Threat Awareness Service enhances threat visibility of inbound and outbound network activity and highlights potential threats that may require additional attention. A base offer is included with purchases of the Cisco SMARTnet™ Total Care™ Service, while a premium offer, with additional functionality, is available as a yearly subscription.

Enhancing Protection for AnyConnect, AMP Everywhere

Rounding out the new security offerings are the addition of the Network Visibility Module to AnyConnect® VPN to provide traffic flow and contextual data regarding users, applications, devices, locations, and destinations. Also, AMP (Advanced Malware Protection) Threat Grid now provides broader contextual information across the full AMP portfolio, extending protection for ASA with FirePOWER™ Services and AMP for Networks. Both put more visibility and control into the hands of businesses to rapidly address cyber threats.

OpenDNS Umbrella

Newly acquired OpenDNS uses its unique view of global Internet activity to provide cloud-delivered network security and threat intelligence solutions that provide advanced threat protection for any device, anywhere, anytime. With this latest update, the OpenDNS Umbrella threat enforcement platform prevents system compromise and data exfiltration over any port or protocol for both DNS and IP-initiated connections. Additionally, the OpenDNS Investigate global threat intelligence product now features a new search functionality that can uncover shared attacker infrastructure, find newly registered domains that are used to impersonate brand websites, and identify other patterns in phishing or targeted attacks.

Extended Security for Partners

The advancement of the Cisco Security Everywhere strategy creates new profitable business opportunities for partners by further addressing customers’ security challenges across their entire IT infrastructure and extended network. This expanded portfolio provides greater visibility, context and control further into the cloud, the network and endpoints. It provides an end-to-end security platform that covers the entire attack continuum, while reducing complexity for the customer and driving growth for partners. Cisco has made significant investments to help partners profitably grow their Cisco Security business through a joint go-to-market approach, training, and skills development workshops.

Supporting Quotes

Organizations that are seizing the digital opportunity need security everywhere – from the network to the endpoint and from the cloud to every corner of their operations – to limit the risk of sensitive data compromise. Our integrated approach minimizes security risks and exposure versus point solutions that can leave gaps as they lack a holistic view. Today’s product, solution and services enhancements provide our customers with visibility, protection and control to address a broader cross-section of issues. This will allow them to focus on growing their businesses.”

— David Goeckeler, Senior Vice President and General Manager, Security Business Group

Attacks are no longer simply a network or endpoint concern. Today, we share industry concerns that attackers pose significant risks to how we conduct business, looking for any possible entry point. Wherever we have a digital presence – whether that’s mobile, cloud, branch office or our corporate network – the only way to effectively combat these attacks is with protection that reaches from the foundational network to the cloud, device and remote locations. Cisco’s Security Everywhere concept increases our ability to not only leverage existing infrastructure to deploy new protection in near real-time, but also allows us to streamline our efforts, helping reduce complexity and costs.”

— William Dugger, Senior Manager, Network Engineering, Beachbody, LLC

About Cisco Capital

Cisco Capital® is a wholly owned subsidiary of Cisco. Its mission is to help enable business outcomes for customers and partners by providing tailored financing solutions for Cisco products and services in more than 150 countries. For more information, please visit http://www.ciscocapital.com.

About Cisco

Cisco (NASDAQ: CSCO) is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. For ongoing news, please go to http://thenetwork.cisco.com.

The post Cisco Announces New Threat Awareness Service appeared first on CloudTweaks.com.

2016 Outlook: Vulnerability Risk Management and Remediation Trends

$
0
0

Content by CloudTweaks.com

Organizations Call for Major Security Vulnerability Remediation Changes

NopSec Unveils 2016 Vulnerability Risk Management and Remediation Outlook, Finds Significant Discrepancies Between Perception and Reality

NEW YORK, NY–(Marketwired – Nov 4, 2015)NopSec released its latest report today, “2016 Outlook: Vulnerability Risk Management and Remediation Trends.” Based on a recent survey of 200+ security and IT professionals, the report examines the current state of vulnerability risk management, top prioritization and remediation challenges, and 2016 priorities.

The 2015 Verizon Data Breach Investigations Report found that 99.9 percent of vulnerabilities were exploited over a year after they were disclosed. Organizations are not able to secure the holes within their environment faster than cybercriminals can exploit them. This was confirmed in the survey; 82 percent of organizations indicated their current remediation process is broken, and 37 percent noted that current remediation processes need major improvement.

ketts_profileVulnerability scanners provide visibility into potential network, application and endpoint risks, but much of the value of that data is lost in a never-ending deluge of spreadsheets, ineffective business processes and lack of cross-team communication. Security teams are already drowning, and more data is not always the answer,” added NopSec’s Vice President of Strategy and Operations, Kevin Ketts. “Organizations need clear visibility on what to fix, as well as when and how to fix it.

Additional report highlights include:

  • Even though organizations claim to be actively detecting threats across their environment — nearly 70 percent noted they scan on a daily or weekly basis — they are still lost when it comes to next steps.
  • More than half (51 percent) of organizations surveyed cited data overload as their biggest challenge to prioritizing data generated from vulnerability scanning, followed by lack of resources (46 percent) and too many false positives (34 percent).
  • Roadblocks to faster remediation include lack of resources (78 percent), competing priorities among internal teams (76 percent) and validity of vulnerability data/ false positives (70 percent).
  • However, the boardroom might not fully understand the importance of vulnerability remediation — 60 percent of those surveyed stated company executives are only “somewhat” to “not at all” informed about the risk posed to their business from today’s security threats.
  • Organizations recognize the value of additional context with the majority of respondents (85 percent) citing the use of open source, commercial threat intelligence feeds, or a combination of both, within their current vulnerability management programs.
  • Yet, security vulnerability prioritization is not as sophisticated — 45 percent of respondents are still using basic risk forecasting based on the CVSS score, asset classification and/or manual processes.
  • Surprisingly, only 40 percent of the organizations surveyed stated they have metrics in place to measure the success of their vulnerability management program.
  • Organizations know that improving prioritization and remediation is critical to drastically reducing the risk of a data breach. Respondents called out three vulnerability management priorities in 2016: implementing tools to improve vulnerability and threat prioritization (50 percent), scanning networks and applications more frequently (42 percent), and improving communication between remediation teams (40 percent).

Organizations are finally realizing that the compliance checklist mentality is not enough when it comes to vulnerability management, and that it is essentially worthless when it comes to actual remediation,” noted Arnold Felberbaum, strategic advisor to NopSec, former CISO, and adjunct professor in Information Security at NYU Tandon School of Engineering, who also contributed to the survey. “Properly prioritizing vulnerabilities and working across teams to rapidly remediate the top threats is the only way we can close the gap and keep up with the onslaught of cyber attacks.”

NopSec-infographic_001

ABOUT NOPSEC

NopSec provides vulnerability risk management and remediation workflow solutions to help businesses protect their IT environments from security breaches. The company’s flagship product, Unified VRM, is based on a flexible SaaS architecture that provides intelligent context to vulnerability data, enabling security teams to visually forecast threat risk to dramatically reduce the turnaround time between identification and remediation of critical security vulnerabilities across infrastructure and applications. NopSec has been recognized as one of the 20 Most Promising Enterprise Security Companies of 2015 by CIO Review and named to CRN’s list of Emerging Security Vendors for four consecutive years. NopSec is based in New York, NY. For more information, please visit www.nopsec.com.

The post 2016 Outlook: Vulnerability Risk Management and Remediation Trends appeared first on CloudTweaks.com.

Cloud Spectator Releases The 2016 Top Ten Cloud Vendor Benchmark Report

$
0
0

Top Ten Cloud Vendor Benchmark Report Report Uncovers A Staggering 350% Performance Difference Between The Top 10 Cloud Service Providers BOSTON, MA. JANUARY 13, 2016 – Cloud Spectator, the industry leading IaaS cloud benchmarking agency, today released the Top Ten Cloud Vendor Benchmark 2016 Report, a price-performance analysis of the leading public IaaS (Infrastructure-as-a-Service) vendors in […]

This post Cloud Spectator Releases The 2016 Top Ten Cloud Vendor Benchmark Report appeared first on CloudTweaks Connected CloudTweaks.com.

$58.8 Billion In Venture Capital Invested Across U.S. In 2015

$
0
0

$11.3 Billion in Venture Capital Deployed to Startup Ecosystem in Fourth Quarter 2015 Makes Second Highest Full Year Total Since 1995 WASHINGTON, DC–(Marketwired – January 15, 2016) – The venture capital ecosystem deployed $58.8 billion across the United States in 2015, marking the second highest full year total in the last 20 years, according to […]

This post $58.8 Billion In Venture Capital Invested Across U.S. In 2015 appeared first on CloudTweaks Connected CloudTweaks.com.

SAS Celebrates 40th Year of Record Revenue — US$3.16 Billion In 2015

$
0
0

SaS Record Revenue Risk, Fraud and Security Intelligence Influence 40th Consecutive Year of Growth CARY, NC–(Marketwired – February 02, 2016) – Growing customer demand for risk, fraud and security intelligence analytics strongly influenced SAS’ 40th consecutive year of revenue growth. SAS posted US$3.16 billion in total operating revenue, up 6.4 percent in constant currency (2.3 […]

This post SAS Celebrates 40th Year of Record Revenue — US$3.16 Billion In 2015 appeared first on CloudTweaks Connected CloudTweaks.com.

IBM Launches Cloud Data And Analytics Marketplace For Developers

$
0
0

IBM Launches Cloud Data and Analytics Marketplace Makes sweeping portfolio open for data scientists and app developers with more than 25 cloud data services and 150 publicly available datasets ARMONK, New York – February 4, 2016: IBM (NYSE: IBM) today announced a broad expansion of its Cloud Data Services portfolio with more than 25 services […]

This post IBM Launches Cloud Data And Analytics Marketplace For Developers appeared first on CloudTweaks Connected CloudTweaks.com.


IBM Helps Make “Bring Your Own” Cloud Apps Safe For Work

$
0
0

Cloud Apps Safe For Work One-third of Fortune 1000 Employees Share Sensitive Company Data with Third-Party Apps; IBM Cloud Security Enforcer Helps Organizations to See, Manage and Secure Usage Across Public and Hybrid Cloud Environments ARMONK, New York – September 18, 2015 – IBM today announced new cloud security technology that helps safeguard the increasing use […]

This post IBM Helps Make “Bring Your Own” Cloud Apps Safe For Work appeared first on CloudTweaks Connected CloudTweaks.com.

NetApp Announces Chief Technology Officer Mark Bregman

$
0
0

NetApp Announces Chief Technology Officer Mark Bregman Industry Innovator to Drive Technical Strategy and Accelerate Portfolio Innovation to Help Customers Respond to Rapid IT Changes SUNNYVALE, CA–(Marketwired – Sep 21, 2015) – NetApp, Inc. (NASDAQ: NTAP), today announced the appointment of Mark Bregman as chief technology officer (CTO). Bregman brings more than 30 years of technology […]

This post NetApp Announces Chief Technology Officer Mark Bregman appeared first on CloudTweaks Connected CloudTweaks.com.





Latest Images