On Thursday 28th of October at 14:00 hour we are organizing a webinar where we will discuss Zero Trust secure BYOD remote work environment. Webinar is intended for IT personnel that needs to provide remote work environment or remote access. Speaker will be from Awingu.
News
Security, Access, and Reliability for Cloud-Connected Networks and Applications news
- 13.05.2021Heimdal™ AI Discovers a Complex Phishing Cryptocurrency Scam CampaignRead More
Cryptocurrencies have been tremendously growing in popularity, which never fails to attract cybercriminals. While there are still legitimate transactions and investment opportunities in this fintech niche, there are also a lot of shady deals covered up by the anonymity of cryptocurrency, or even downright scams.
- 08.03.2021Announcement: Osirium Automation now included with Osirium PAMRead More
Osirium PAM boosts security and productivity with free IT process automation
- 08.03.2021Why Modern Manufacturers Need Enterprise Password SecurityRead More
Prior to the COVID-19 pandemic, manufacturers were gradually shifting to digital technologies in what the industry calls the Fourth Industrial Revolution, also known as Industry 4.0. When the pandemic began, manufacturers accelerated their digital transformations as they retooled their production lines and back-end operations to meet shifting customer demands, product cycles, and time-to-market schedules, as well as COVID-19 safety protocols.
- 05.03.2021What is a Remote Access Trojan (RAT)?Read More
How Does It Work and Who Are the Targets. How to Protect Yourself from RAT Software.
A Remote Access Trojan (RAT) is a type of malware that provides the attacker with full remote control over your system. When a RAT reaches your computer, it allows the hacker to easily access your local files, secure login authorization, and other sensitive information, or use that connection to download viruses you could unintentionally pass on to others.
- 27.08.2020Essentials of SD-WANRead More
The networking industry has been undergoing a radical digital transformation over the last few years. Major enterprises, as well as small and medium-sized businesses, and even individual consumers, have been adopting SD-WAN (software-defined WAN) with broadband bonding at an accelerating rate, and the SD-WAN market has boomed. An IDC report from last year, “SD-WAN Infrastructure Market Poised to Reach $5.25 Billion in 2023” states that “This important segment of the enterprise networking market [SD-WAN] will grow at a 30.8% compound annual growth rate (CAGR) from 2018 to 2023 to reach $5.25 billion, according to IDC’s SD-WAN Infrastructure Forecast.”
- 11.08.2020Cohesity Named a Leader in the Gartner Magic Quadrant for Data Center Backup and Recovery SolutionsRead More
San Jose, Calif. – July 22, 2020 – Cohesity today announced that it has been named a Leader in the Gartner Magic Quadrant for Data Center Backup and Recovery Solutions. The company is positioned as a Leader in just its second time in this Magic Quadrant. Gartner states that “Leaders execute well against their current vision and are well positioned for tomorrow.”*
- 04.06.2020Top 5 Requirements for Enterprise Backup & RecoveryRead More
By 2021, 50% of organizations will augment or replace their current backup application with another solution.
– Magic Quadrant for Data Center Backup and Recovery Solutions, Gartner 2017Data is your organization’s most valuable asset. Yet backing it up often creates costly and risky IT management headaches. That’s because backup solutions are typically provided by four or five vendors, siloed across dozens of different locations, in aging infrastructure. This causes mass data fragmentation, slowing recovery, and dark data.
- 22.04.2020TeamViewer Pilot Among First Apps to Use New iPad Pro LiDAR ScannerRead More
AR functionality enables remote experts to guide field service workers performing complex tasks with precision using new iPad Pro
- 11.03.2020Cohesity uvrščen med 12 naboljših rešitev za varovanje podatkov (Data Protection)!Read More
Solutions Review’s listing of the best data protection companies is an annual sneak peek of the vendors included in our Buyer’s Guide and Solutions Directory. Information was gathered online via online materials and reports, conversations with vendor representatives, and examinations of product demonstrations and free trials.
- 26.02.2020Enabling TCO Reduction: Simplicity is TangibleRead More
A reduction in infrastructure total cost of ownership can mean lowered expenses as well as corollary advantages: increased employee productivity, agility, and time savings. The benefits are clear. Charting a path to it is more ambiguous.
By definition, the total cost of ownership (TCO) is the purchase price of an asset plus the costs of operation. Assessing the total cost of ownership represents taking a broader look at what problem we’re solving, the solution, and the solution’s efficacy over time. Buyers need to look beyond the short-term price, or purchase price, and understand the long-term price. In other words, conversations revolving around TCO reduction need to factor in the core element of TCO analysis: the effectiveness of a solution in addressing the most impactful requirements.
- 12.02.2020Ransomware Attacks Grow, Crippling Cities and BusinessesRead More
Hackers are locking people out of their networks and demanding big payments to get back in. New data shows just how common and damaging the attacks have become.
SAN FRANCISCO — New Orleans’s city government crippled. A maritime cargo facility temporarily closed. Hospitals forced to turn away patients. Small businesses shuttered.
The cause in each of these incidents: ransomware attacks. In recent years, hackers have taken to locking down entire computer networks and demanding payments to let users back into their systems.
The frequency of ransomware attacks — among the scariest and most costly online assaults — has been hard to pinpoint because many victims quietly pay off their attackers without notifying the authorities.
Now, an array of new data provides perhaps the best available picture of the problem. In 2019, 205,280 organizations submitted files that had been hacked in a ransomware attack — a 41 percent increase from the year before, according to information provided to The New York Times by Emsisoft, a security firm that helps companies hit by ransomware. - 04.02.2020Average Cost To Recover From Ransomware Skyrockets To Over $84,000Read More
It’s getting more and more expensive for victims of ransomware attacks to recover. The average cost more than doubled in the final quarter of 2019.
According to a new report from Coveware, a typical total now stands at $84,116. That’s a little over double the previous figure of $41,198.
It’s not just the result of cybercriminals demanding steeper ransoms, though that’s certainly one factor. Others include hardware replacement and repair costs, lost revenues, and, in some incidents, damage to the victim’s brand.
Generally speaking, these costs all increase sharply in relation to the sophistication and duration of the attack. - 28.01.2020Barracuda named a 2020 Gartner Peer Insights Customers’ Choice for Network FirewallsRead More
We are pleased to announce that Barracuda has been recognized as a 2020 Gartner Peer Insights Customers' Choice for Network Firewalls.
This recognition is especially meaningful to us because it is based on end-user feedback that is verified by Gartner.
This verification process ensures that all Peer Insight reviews meet a minimum standard for context, quality, and relevance.
- 21.01.2020Data backup strategies in 2020 vs. 2025: What's going to change?Read More
Let's look to the future -- all the way to the year 2025. How will data backup evolve? How will sharp increases in data volume affect backup strategies?
Current shifts in technology and business drive changes that will impact how we think about backups. So, what might data backup strategies look like in five years.
- 15.01.2020Kubernetes - How and why backupRead More
Kubernetes allows us to run a containerized application at scale without drowning in the details of application load balancing.
You can ensure high availability for your applications running on Kubernetes by running multiple replicas (pods) of the application.
All the complexity of container orchestrations is hidden away safely so that you can focus on developing application instead of deploying it.
- 07.01.2020NASA's second test of LDSD for Mars Landing is completed and streamed liveRead More
Mushroom Networks technology help NASA in their 2nd test for the Low-Density Supersonic Decelerator (LDSD), designed for landing missions on Mars. Mushroom's WAN orchestration technology is being used daily by many brand-name organizations around the world, however, our team was especially proud to be part of a NASA project.
- 19.12.2019Qualitest Research shows competitive advantages of TeamViewerRead More
TeamViewer’s core offering provides best-in-class device coverage and ease of use
Goppingen, December 12, 2019 – TeamViewer®, a global leader in secure remote connectivity solutions, engaged Qualitest, the world’s largest, independent, pure-play quality assurance company, to provide independent measurement and data-driven external feedback on TeamViewer’s core product and its positioning in the competitive environment.
Qualitest comprehensively and methodically evaluated the capability and usability of TeamViewer 14 in comparison to the biggest and most relevant competitor’s products with real-world measurements within three competition sets: “Platform Competitors”, “File Transfer Competitors” and “Point Solution Competitors”.Qualitest comprehensively and methodically evaluated the capability and usability of TeamViewer 14 in comparison to the biggest and most relevant competitor’s products with real-world measurements within three competition sets: “Platform Competitors”, “File Transfer Competitors” and “Point Solution Competitors”.
- 16.12.2019Why primary storage suppliers are consolidating – and why secondary storage is a different storyRead More
Interview Major and mature high tech industry markets consolidate to two or three major suppliers and minor players fighting for market niches left available.
Blocks & Files asked GigaOM storage analyst Enrico Signoretti for his thoughts. He mailed us his replies while waiting at Las Vegas for a plane delayed because of snow at Chicago’s O’Hare airport. Winter is coming.
- 12.12.2019SECURITY ALERT: Snatch Ransomware Reboots Your PC in Safe Mode to Avoid DetectionRead More
This is a never-before-seen strategy in ransomware and malware. Here’s how the Snatch ransomware will bypass Antivirus detection, and how to stay safe.
Ransomware is experiencing a resurgence in the second half of 2019 and it will probably grow in 2020, which is about to begin, too. In perhaps the most disturbing ransomware development of the year, a newcomer has developed a novel strategy to bypass Antivirus detection. The Snatch ransomware starts its activity by rebooting Windows computers in Safe Mode.
This allows it to elude Antivirus detection since it only starts behaving like ransomware after rebooting. Unfortunately, most commercial Antivirus programs don’t initialize in Windows Safe Mode, since that type of booting is only used as a temporary state for troubleshooting a malfunctioning system.
It’s not the first time malware has found ways to disable Windows defenses and trick it, but the Snatch ransomware has the potential to be the most damaging attack vector yet. I can’t stress the importance of learning about Snatch and taking all defensive measures against it. - 06.12.2019Cohesity DataPlatform and DataProtect Software Tested and Validated for AWS OutpostsRead More
New Comprehensive Cohesity Data Management Integration Capabilities Ready for AWS Outposts Customers Today
San Jose, Calif. – Dec. 3, 2019 – Cohesity today announced that it has completed validation that its Cohesity DataPlatform and Cohesity DataProtect software have capabilities to support AWS Outposts and are available immediately. AWS Outposts delivers fully managed and configurable compute and storage racks built with Amazon Web Services (AWS)-designed hardware that allow customers to run compute and storage on-premises, while seamlessly connecting to AWS’s broad array of services in the cloud.
- 19.11.2019Barracuda named a Gartner Peer Insights Customers’ Choice for Email Security, September 2019.Read More
Don’t miss what IT security professionals are writing on Gartner Peer Insights about Barracuda’s enterprise email security solutions.
- 18.11.2019WINNER DATACENTRE VENDOR OF THE YEARRead More
Cohesity took home the Datacentre Vendor of the Year award at the annual CRN Channel Awards!
- 30.10.2019Energy Company Saves on Backup and RecoveryRead More
Schneider Electric has led energy management and automation in homes, buildings, data centers, infrastructure, and across a wide variety of industries.
The mission of their IT team was to innovate its backup and recovery infrastructure. The company had virtualized 90% of its environment. However, they were using a solution for backups that was not made for virtualization, creating a complex challenge.
- 23.10.2019Password Mistakes You and Your Employees Are (Probably) MakingRead More
Your employees might already be aware of a few password security practices. But are they actually following the latest recommendations? In fact, are you aware of what makes up a strong password policy? Both you and your employees could be (unknowingly) making common password mistakes and applying antiquated password security guidelines. So, keep on reading to make sure you’re in alignment with the most recent password requirements.
- 14.10.2019Cohesity Partner CEE Installation Professional Training in BudapestRead More
Last week we completed first in a series of Cohesity trainings in CEE.
Official Cohesity resellers came from Bulgaria, Croatia, Czech Republic, Serbia and Slovenia.
- 10.10.2019TeamViewer is an easy solution for remote connections. TeamViewer is offering 60% off migration from old to the latest license.Read More
TeamViewer ™ is the most popular remote desktop tool in the world.
It's the only tool you'll ever need to have all your computers, servers, and devices at your fingertips.
- 03.10.2019Cohesity on “Vendors to Watch” list in Gartner’s Magic Quadrant for Distributed File Systems and Object Storage.Read More
Today, Gartner published the Magic Quadrant for Distributed File Systems and Object Storage. The report lists “Vendors to Watch” based on their traction in the market. Cohesity is excited to be listed as a Vendor to Watch in this Magic Quadrant.
- 26.09.2019Enabling DNS over HTTPS (DoH): Advantages and Best PracticesRead More
A new internet protocol is making headlines in the world of enterprise security: DNS over HTTPS. Even though this is of major interest especially for businesses and organizations, regular users will be impacted by it as well. Are you ready for this cybersecurity revolution yourself?
Here’s what all the fuss is about the new DoH protocol. If done right, the hype around it is well-deserved. Once it’s implemented well, DoH can make network communications much more secure.
The new DNS over HTTPS protocol is still relatively new in the world of network connections. First emerged about two years ago, the new protocol is mostly not implemented yet.
When it comes to browsers, Google seems to be the first to it. They recently announced they plan to roll out DNS over HTTPS in the near future.
This guide will tell you what this means and how you can implement DNS over HTTPS yourself, the changes to expect and so on.
What Is DNS over HTTPS (DoH) and How Does This Protocol Work?
First thing’s first, let’s clear up the basics. Not everyone understands exactly what DNS is and how it works, let alone the new DNS over HTTPS. - 24.09.2019Barracuda named a Challenger in 2019 Gartner Magic Quadrant for Web Application FirewallsRead More
Evaluation Based on Completeness of Vision and Ability to Execute
Campbell, Calif. — (September 20, 2019) — Barracuda, a trusted partner and leading provider for cloud-enabled security solutions, today announced that it has been recognized as a Challenger in the 2019 Gartner Magic Quadrant for Web Application Firewalls.
According to Gartner, “By 2023, more than 30% of public-facing web applications and APIs will be protected by cloud web application and API protection (WAAP) services, which combine distributed denial of service (DDoS) protection, bot mitigation, API protection and WAFs. This is an increase from fewer than 10% today.” 1 - 16.09.2019Cohesity Named a Leader by Independent Research Firm in Data Resiliency Solutions EvaluationRead More
Cohesity Cited as a Leader Based on Its Scores in Current Offering and Strategy
San Jose, Calif. – Sept. 12, 2019 – Cohesity today announced that it has been named a Leader by Forrester Research in “The Forrester Wave™: Data Resiliency Solutions, Q3 2019.” Cohesity was one of ten vendors evaluated for the Forrester Wave based on 40 criteria that examined a vendor’s current offering, strategy, and market presence. Cohesity received the highest score possible in the criterion of security and tied for the top score in the customer feedback criterion.
- 19.08.2019Barracuda intel exposes how cybercriminals are using email account takeover to launch lateral phishing attacksRead More
New report looks at evolving email threats, the latest tactics used by scammers, and how to protect your business
CAMPBELL, Calif., August 15, 2019 —
- 13.08.2019Threat Spotlight: Barracuda Study of 3,000 Attacks Reveals BEC Targets Different DepartmentsRead More
One of the most prevalent types of cyberfraud is the Business Email Compromise, or BEC scam. These attacks are responsible for billions of dollars in fraud losses over the last few years, and the criminals keep getting better at scamming their victims.
In this Barracuda Threat Spotlight, we take a look at the different types of BEC attacks that have been analyzed by the Barracuda Sentinel Team. - 08.08.2019Cohesity Expands Security Capabilities by Empowering Enterprises — For the First Time — to Uncover Vulnerabilities and Cyber Exposures Using Backup DataRead More
San Jose, Calif. – August 1, 2019 – Cohesity today expanded its security offerings with the release of Cohesity CyberScan, a new application that is the first and only solution that leverages backup data to assess the vulnerabilities, or risk posture, of an enterprise’s IT environment. This is significant because vulnerabilities often lead to cyberattacks — such as ransomware attacks or data breaches — and discovering these exposures is the first step in defending against online criminals.
- 07.08.2019AWINGU LAUNCHES COMPETITIVE UPGRADE PROGRAM ‘MIGRATE 2 AWINGU’Read More
Executive summary
July 1st – Awingu launches its competitive upgrade program: Migrate 2 Awingu. With this program, businesses that are using alternative solutions such as Citrix, Parallels, VMWare, etc. can benefit from a “3+1” promotion, meaning that if you buy 3 licenses, you get the 4th one for free. This competitive upgrade program is valid from July 1st 2019 until Dec 15th 2019. For details on the steps to take, and applicable conditions, click here.
- 07.08.2019Current promotions for TeamViewerRead More
TeamViewer is a product that everybody knows and use. For business use it should be licensed. Let us know if you would like to became a partner. It is an easy process without demands.
- 02.08.2019Cohesity Better backup in the cloudRead More
There are entrepreneurs who struggle to start one successful company. Mohit Aron has launched two. He took a job at Google when it was just starting out and sold the shares he was given for a sizeable sum. Rather than relax, he used the money to help co-found Nutanix, a cloud computing software company that went public in 2016. That's when he began working on his second startup—Cohesity.
- 25.07.2019City of Hamilton Realizes Massive Efficiencies With Integrated Solution From Cohesity and HPERead More
SAN JOSE, Calif.--(BUSINESS WIRE)--
Cohesity Platform Cuts Backup Times From 12 Hours to 12 Minutes and Unifies Global Data Management on Trusted HPE Hardware
Cohesity today announced that the City of Hamilton, one of the ten most populous municipalities in Canada, achieved massive improvements to its backup and recovery and data management processes with a joint solution from Hewlett Packard Enterprise (HPE) and Cohesity. - 15.05.2019MICROSOFT ANNOUNCES WINDOWS VIRTUAL DESKTOP (WVD): WHY SHOULD WE AND YOU CARE?Read More
On March 21st, 2019, Microsoft announced the public beta release of ‘WVD’ – “Windows Virtual Desktop” in full. It’s kind of a big thing for Microsoft, and perhaps for the entire industry. In this blog post, we’ll give insight into what WVD is, and what it isn’t. Furthermore, let’s take a look at how it compares to Awingu… and how Awingu can “adapt and improve” WVD.
- 24.04.2019TeamViewer 14 is Here The new standard for remote control and remote supportRead More
Performance. The new benchmark.
- 23.04.2019Cohesity Cloud Backup Service is just a few simple clicks awayRead More
At Cohesity we like to simplify things. We have already radically simplified backup and recovery for applications that run in the cloud, on-premises, and the edge. We are now taking simplification a step further by providing our first SaaS (Software as a Service) offering: a true web-scale backup solution for your cloud native Google Cloud apps!
- 16.04.2019Heimdal Security Provides Thor Foresight Banking Security to RBS Business Customers And why this partnership is valuable to usRead More
Heimdal Security now provides the recommended banking security for RBS Business Banking customers using their Bankline service, offering accessible, multilayered protection against the most advanced online threats.
Heimdal Security, the winner of the Anti Malware Solution of the Year at the CSA Awards 2018, has the pleasure of providing its award-winning security software solutions to Royal Bank of Scotland, NatWest and Ulster Bank customers.
- 16.04.2019Securing the workspace with Awingu & BarracudaRead More
Expectations of our “workspace” are evolving. The age-mix of businesses is shifting with a much bigger concentration of ‘millennials’. A study from PWC suggests 50% of the global workforce will be constituted of millennials (pdf).
- 04.04.2019Barracuda Total Email ProtectionRead More
Product review from SC Magazine gives Barracuda's Total Email Protection a 5-star rating in all categories and found no weaknesses. Get the details.
- 08.03.2019Data Intelligence at the Heart of Cohesity's New CapabilitiesRead More
In its most recent announcement, Cohesity introduced new capabilities that will help its customers go beyond
just backup or data consolidation, crossing what I call the "Data Management" chasm.
- 06.03.2019What is a Secure Web Gateway – And What Can One Do for You?Read More
This article from eSecurity Planet discusses secure web gateways and the benefits compared to other security tools.
This piece identifies Barracuda Networks as a prominent vendor in this space.
- 01.03.2019Mobilizing the Belgian federal policeRead More
The business applications of the Belgian police were developed long before mobile internet existence and are only available through the corporate network. The real police work, on the other hand, which mainly occurs in the field. Awingu builds the bridge between these two worlds.
- 26.10.2018Significant Expansion to the Cohesity Partner Program to Help Meet Exploding DemandRead More
Cohesity Announces Significant Expansion to the Cohesity Partner Program to Help Meet Exploding Demand For Unified Secondary Data and Application Services. Program Includes Comprehensive Free Training, Sales Tools, Aggressive Marketing Initiatives, Enticing Incentives, and Adds New Service Provider Route-To-Market.
- 23.10.2018Heimdal wins the title of 'Anti Malware Solution of the Year'Read More
At a ceremony held this week by the Computing Security Awards in London, Heimdal Security was voted the "Anti Malware Solution" of the year. It is a distinction that shows how much Heimdal has developed over the past couple of years.
- 23.10.2018Barracuda Web Application FirewallRead More
Barracuda has been recognized in the 2018 Gartner Magic Quadrant for Web Application Firewalls (WAF) in both completeness of vision and ability to execute.