As Ransomware Attacks Worsen, Actifio Helping Immunize Organizations From ‘The Most Likely Disaster Recovery Event in 2020’

Importance of Data Immutability Highlighted at Actifio's Virtual Data Driven 2020 Conference From the early weeks of the COVID-19 pandemic, and as the sudden rise of remote work,  ransomware attacks surged as employers struggle to seal off the vulnerabilities of a dispersed workforce and the critically important data sources they must be able to access to drive their businesses forward. Of all the approaches that attempt to protect these organizations from ransomware, the data immutability characteristics of Actifio may…

Cyclonis Backup Launched to Protect Against Ransomware & Securely Backup Files from Data Loss

Cyclonis Limited releases Cyclonis Backup, an easy-to-use and full-featured backup solution that leverages the Cloud and strong AES-256 encryption to help users protect themselves against ransomware and backup their data. Cyclonis Ltd. releases Cyclonis Backup, a backup solution designed to simplify the process of backing up and restoring information. Cyclonis Backup's intuitive interface is tailored to help both novice and expert users to seamlessly and effectively backup their important files. Backup data is encrypted…

The Revival of Ransomware: Webroot Reveals 2019’s Nastiest Threats

Webroot Finds Ransomware, Phishing and Botnets to Be Some of the Most Vicious Webroot, a Carbonite company, released its third annual Nastiest Malware list, shedding light on 2019's worst cybersecurity threats. From ransomware strains and cryptomining campaigns that delivered the most attack payloads to phishing attacks that wreaked the most havoc, it's clear that cyber threats across the board are becoming more advanced and difficult to detect. Consumers and businesses alike need to become savvier and take…

Zix Acquires Leading Cloud-Based Backup And Recovery Provider CloudAlly

Zix Corporation, a leading provider of cloud email security, productivity, and compliance solutions, has acquired privately-held CloudAlly Ltd., an industry leader in cloud-based data backup and recovery for business. Founded in 2011, Israel based CloudAlly is a pioneer of enterprise-grade, software-as-a-service (SaaS) cloud backup and recovery solutions. The company offers a robust suite of award-winning, ISO 27001 certified and GDPR/HIPAA compliant solutions for Microsoft Office 365, Google Workspace (formerly G Suite),…

34% Of Employees Say Their Company Doesn’t Follow Basic Cybersecurity Protocols During COVID-19

More than one-third (34%) of full-time employees at companies in the U.S. admitted to not practicing basic cybersecurity protocols during COVID–19, according to a new survey report from Visual Objects, a visual guide to finding and hiring the best creative firms. Despite increased risk due to remote work, employees said their companies aren’t requiring secure WiFi networks, phishing training, two-factor authentication, VPNs, or password managers. Cybersecurity experts such as Darren Deslatte, vulnerability operations…

Mobolize Announces Technology Partnership with Akamai to Enable Security on Mobile Devices

Enterprise Threat Protector (ETP) available on iOS, Android and Chrome OS leverages Mobolize technologies Mobolize, the recognized leader for providing an on-device Data Management Engine that provides security, connectivity and optimization on mobile devices, announced a partnership with Akamai, the intelligent edge platform for securing and delivering digital experiences, to offer security to mobile devices for enterprises. The addition of mobile protection adds an extra layer of proactive security controls and threat…

Egnyte Releases Advanced Content Governance Tools

Egnyte, the leader in cloud content governance, announced several enhancements to its platform aimed at enabling secure remote work across more apps, devices, clouds, and locations than ever before. The rapid shift to remote work has accelerated content sprawl as companies adopt new cloud-first ways of working. This expanding corporate data footprint is opening up new threat vectors and compliance concerns; 40% of IT leaders say content sprawl is increasing their risk of a data breach. Marketing Technology News: Digital…

Cohesity Announces Strategic Collaboration with AWS to Deliver Comprehensive Data Management as a Service

First-of-its-kind Data Management as a Service (DMaaS) offering charts new course in data management for mid-size and enterprise customers Cohesity announced that it has formed a strategic collaboration with Amazon Web Services (AWS) to address the growing customer need for data management that is flexible, available, scalable, and reliable. Together, both companies are bringing to market a modern Data Management as a Service (DMaaS) offering unlike any other on the market today. The DMaaS solution is designed to provide…

BlackBerry Unveils Industry’s First Unified Endpoint Security (UES) Solution for AI-powered Cybersecurity

Integrates powerful AI machine learning across EPP, EDR, MTD, UEBA in a single offering BlackBerry Limited announced BlackBerry Cyber Suite, the industry's first, comprehensive, AI-powered unified endpoint security (UES) solution that furthers BlackBerry's leadership in AI. While other solutions on the market only address parts of the cybersecurity challenge, BlackBerry Cyber Suite delivers security and Zero Trust with a zero touch end-user experience through a single console and offers the end-to-end solution with the…

BeyondTrust Achieves ISO 27001 Certification and SOC 2 Type 1 Compliance Demonstrating Commitment to Customer Security

BeyondTrust, the worldwide technology leader in Privileged Access Management (PAM), announced it has successfully completed both the International Organization for Standardization (ISO) 27001 certification, and the Service Organization Control 2 (SOC 2) Type 1 audit. Achievement of these security milestones included a broad scope of BeyondTrust systems, including its internal controls and Endpoint Privilege Management (EPM) and Secure Remote Access (SRA) product portfolios. Achieving ISO 27001 and SOC 2 Type 1 compliance…

Veritas Acquires Globanet, Extending Its Leading Digital Compliance Portfolio

New capabilities will enable customers to see, act on more sources of content than ever Veritas Technologies, a global leader in data protection, availability and insights, today announced that it has acquired Globanet, a privately held software company based in Los Angeles, California. The acquisition further extends Veritas’ strong portfolio of digital compliance and governance offerings to give customers native visibility into over 80 new content sources. Globanet provides comprehensive compliance and intelligent…

iProov Launches World’s First Global Threat Intelligence System for Biometric Assurance

iProov has launched the world’s first system of global threat intelligence for biometric assurance. The iProov Security Operations Centre (iSOC) combines technology, process, and people to monitor and manage the rapidly evolving landscape of biometric cyber-crime. It further secures iProov’s Genuine Presence Assurance technology and protects organizations and individuals against the growing threat of AI-driven cyber-attacks, including deepfakes. Biometrics have become the technology of choice for digital user…

Druva Achieves 100 Percent Growth in APJ Fueled by Rapid Cloud Adoption and Demand for Improved Business Agility

Data center workload revenue rises as budding startups and legacy companies embrace cloud-first approach for data protection needs Druva, Inc., the leader in Cloud Data Protection and Management, announced it is continuing to experience accelerated growth for its SaaS-based data protection solutions in Asia-Pacific and Japan. As businesses of all sizes increasingly utilize the region’s rapidly expanding cloud resources to re-imagine business operations, Druva has grown its data center workload revenue more than 100…

Validity Launches Everest, the Industry’s Most Comprehensive Email Marketing Success Platform

Validity, the most trusted leader in email deliverability, announced the worldwide availability of Everest, an all-new platform for email optimization, analytics, and delivery. The new platform takes advantage of the capabilities of 250ok, Return Path, and BriteVerify, which Validity acquired in the past two years while adding several critical new features not found in any other solution on the market. With Everest, brands can maximize their email success to engage more customers and accelerate growth. Since the outset of…

DH2i Extends Free Access to DxOdyssey Work From Home (WFH) Software to December 31st

DH2i, the leading provider of multi-platform Software Defined Perimeter (SDP) and Smart Availability software, announced that it is extending free access to its DxOdyssey networking software to December 31, 2020. Originally launched in March 2020 in response to the escalating COVID-19 pandemic and the subsequent work from home (WFH) paradigm that resulted for employees, students, and others, DxOdyssey WFH enables fast and secure access to approved computers, and all appropriate associated data located onsite at work, school,…

Oracle Cloud VMware Solution Now Available in All Global Regions and Oracle Dedicated Region Cloud@Customer

Delivers support for scale production VMware workloads in a customer-controlled tenancy Customers include Entel, largest telecom provider in Chile and the third largest in Peru Building on the recent launch of Oracle Cloud@Customer, Oracle continues an aggressive push to deliver flexibility and scale that meets customers where they are in their cloud transformation. Today Oracle announced availability of Oracle Cloud VMware Solution, a dedicated, cloud-native VMware-based environment that enables enterprises to easily move…

Acronis Lauded by Frost & Sullivan for its Breakthrough Integrated Data Protection

Acronis Cyber Protect's integration of backup, disaster recovery, anti-malware, and management features creates capabilities that are not available in competing solutions Based on its recent analysis of the North American data protection market, Frost & Sullivan recognizes Acronis with the 2020 North American New Product Innovation Award for Acronis Cyber Protect, the first integrated cyber protection product – combining data protection, cybersecurity and management capabilities. Acronis Cyber Protect combines data…

BlackBerry and Intel Partner to Stop Cryptojacking Malware

BlackBerry Optics endpoint detection and response (EDR) solution automatically detects cryptojacking at the hardware level BlackBerry Limited announced today the release of BlackBerry® Optics v2.5.1100 with cryptomining and cryptojacking detection for Intel-based commercial PCs. To detect advanced cryptojacking malware, the BlackBerry Optics Context Analysis Engine (CAE) leverages unique CPU telemetry from Intel® Threat Detection Technology (Intel® TDT) to provide enterprises and SMBs unparalleled detection of …

Veeam Enables Organizations to Elevate Their Cloud Data Strategies at VeeamON 2020

VeeamON 2020 - a two-day online Data Management event - brings together IT leaders from 148 countries to help accelerate Digital Transformation journeys Veeam Software, the leader in Backup solutions that deliver Cloud Data Management™, kicked off VeeamON, the world’s premier online Data Management event. Featuring live and interactive experiences that will help attendees unlock the power of their data, inspiring keynotes from Veeam’s leadership team – including Bill Largent, CEO, Danny Allan, CTO and SVP of Product…

IRONSCALES Expands Threat Assessment Capabilities; Launches Email Security’s First Phishing Emulator

Security teams can automatically test current anti-phishing defenses against real and trending phishing attacks, in just minutes, with new self-service technology from IRONSCALES IRONSCALES, the pioneer of self-learning email security, today announced another industry’s first with Phishing Emulator. Available to both current and prospective customers, this fully automated solution enables security professionals to evaluate their organization’s email security defenses by relaunching real-world, unmodified phishing attacks…