PRODUCTS

Cyber Security Elements by NSS

News

8

May

SophosLabs tracks huge volumes of spam from around the world, and once in a while we pause to take a look at the countries sending the most spam  – we call it our Dirty Dozen Spampionship.

In the results for the most recent quarter (January, February and March 2015), we found that the biggest spam-relaying country in the world is the United States, once again. Vietnam has climbed to number two, followed by Ukraine, Russia, South Korea, and China rounding out the top six.

Check out the rest of the list and you see some familiar places and some countries that come and go from the Dirty Dozen:

 

Measured per capita, though, and even a small country like Moldova can end up on top. Moldova hasn’t been in the Dirty Dozen before, but this time, spam coming from hosting providers’ servers, coupled with the more usual problem of zombie malware on home computers, have propelled the country to the number one spot. 

The rest of the dirty dozen measured by population is shown here:

So what does this mean? Cybercriminals have figured out that it’s harder to stop spam from a vast number of computers that have been infected by their malware. That’s why we see spam from all over the world.

All spam-sending computers are dangerous, and to stop spam we need to clean up the malware that makes it such a big problem. To scan your computer for malware, download our Free Virus Removal Tool.

For more about spam, and how to make sure you’re protected, check out these articles and podcasts:

You can read the original article here.

5

May

Τώρα, μπορείτε να αντικαταστήσετε το WD Arkeia στην επιχείρηση σας με ένα από τα καλύτερα υβριδικά συστήματα αντιγράφων ασφαλείας στον κόσμο, το SEP sesam με έκπτωση 20%. 

Η μετάβαση γίνεται εύκολα, γρήγορα και επιπλέον οικονομικά.  Το SEP sesam είναι μία ολοκληρωμένη, ενιαία λύση αντιγράφων ασφαλείας που ενσωματώνεται απρόσκοπτα σε οποιοδήποτε περιβάλλον χωρίς διακοπές ή απώλειες δεδομένων. Είναι ιδανικό για κάθε περιβάλλον IT και προορίζεται για επιχειρήσεις κάθε μεγέθους, από μικρές έως πολύ μεγάλες αλλά και για οργανισμούς. Είναι εξαιρετικά κλιμακούμενο και επεκτάσιμο, και λειτουργεί το ίδιο απλά, είτε βρίσκεται σε έναν, είτε σε πολλές χιλιάδες διακομιστές. 

Αφού εγκατασταθεί, απλώς λειτουργεί, όπως άλλωστε θα περιμένατε (set & forget). Το SEP sesam μπορεί να κρατήσει αντίγραφα ασφαλείας από 1GB έως 1000TB, και μέσω της τεχνολογίας πολλαπλών ροών (multi streaming) προσφέρει εκπληκτικά υψηλούς ρυθμούς μεταφοράς δεδομένων, πολλών terabytes την ώρα σε κατάλληλα διαμορφωμένα συστήματα. Η λύση SEP sesam ειδικεύεται στα αντίγραφα ασφαλείας σε πραγματικό χρόνο σε εφαρμογές, βάσεις δεδομένων και αρχεία σε περιβάλλοντα πολλαπλών λειτουργικών συστημάτων αφού υποστηρίζει όλα τα δημοφιλή λειτουργικά συστήματα, όλες τις πλατφόρμες εικονικοποίησης και  εφαρμογές, όλες τις βάσεις δεδομένων και τις τεχνολογίες αποθήκευσης. 

Πρόκειται για ένα ιδιαίτερα ευέλικτο, και ισχυρό υβριδικό σύστημα αντιγράφων ασφαλείας σε πραγματικό χρόνο. Το SEP sesam μπορεί να προσφέρει εξειδικευμένα αντίγραφα ασφαλείας για συστήματα όπως τα  Microsoft Exchange Server, Groupwise, Lotus Domino Server, Zarafa, Dovecot IMAP, Cyrus IMAP, Courier IMAP, openLDAP, Microsoft SharePoint και άλλα και υποστηρίζει βάσεις δεδομένων Oracle, MS SQL, IBM DB2, Informix SAP R/3, MaxDB κ.ά. 

Το SEP sesam επίσης προσφέρει εργαλεία που ενεργοποιούν την συγκέντρωση της διαχείρισης και των διαδικασιών ελέγχου για την εξασφάλιση της ευκολίας εποπτείας, παρακολούθησης και ασφάλειας του περιβάλλοντος και προσφέρει εκπληκτικές επιλογές αντιγράφων ασφαλείας για πλατφόρμες εικονικοποίησης συμπεριλαμβανομένων των VMware, Citrix XenServer, XEN, Hyper-V και RedHat. Επίσης μπορεί να ενσωματωθεί πολύ εύκολα με οποιαδήποτε πλατφόρμα στο cloud όπως Citrix Cloud Stack, Amazon EC2 ή οποιοδήποτε άλλο ιδιωτικό cloud.  

Αν θέλετε μία εξαιρετική λύση αντιγράφων ασφαλείας, που υποστηρίζει κλωνοποίηση δεδομένων για εφεδρεία σε περίπτωση διακοπής της λειτουργίας του συστήματος, με εύκολη κεντρική διαχείριση, με αποκατάσταση “bare metal”, με τεχνολογία Deduplication και με τεχνολογία πολλαπλών ροών, τότε αποτελεί την ιδανική πρόταση για να αντικαταστήσετε το σύστημα WD Arkeia, επωφελούμενοι της ειδικής προσφοράς – έκπτωσης 20%!

28

Apr

Back in the day, network speed and throughput were limiting factors for the overall productivity of an organization. Gigabit Ethernet came onto the scene in 1999, and offered a quantum leap in performance over previous connectivity standards.

10GbE was approved by IEEE in 2002, and slowly gained more widespread deployment as the switch vendors and others adopted the standard. Now, 40GbE and even 100GbE are available (though industry analyst firm Infonetics predicts that within one to two years, 40GbE will phase out as 25GbE and 100GbE become the norm).

The Rise of the Application

In that same timeframe, individual PC licenses for generalized office applications have been replaced by Software-as-a-Service offerings such as Microsoft’s Office 365 and Adobe Systems’ Creative Cloud. It’s almost the de facto standard to host an organization’s email on Microsoft Exchange Server. Applications such as Oracle’s suite of products, as well as those of SAP, IBM, EMC and many others, are used for tasks from order entry to business intelligence to electronic medical records and have become intrinsic to the operation, competitive edge, and overall success of the majority of businesses and other organizations today. Can you imagine attempting to conduct your job without the myriad applications you use on a daily basis?

So, Which is King?

Sorry, switch vendors. Ultimately the network exists to support the applications – and without applications, the network is just an empty pipe. Given adequate bandwidth and speed, and acceptable uptime standards, applications will run smoothly and end-users won’t flood the help desk with calls about application availability or slowness.

However, there is a caveat to that. What happens when dozens (or hundreds) of applications and their data are traversing the network? What happens when the same data (such as images, data files, etc.) is downloaded hundreds of times a day by end-users? What if multiple simultaneous connection requests overwhelm the application’s server? And how can you optimize application performance for mobile users on smart devices?

Array’s APV Series application delivery controllers (ADCs) and aCelera WAN optimization controllers can maximize the efficiency of servers and network connections, while providing application intelligence to optimize the end-user experience.

For example, APV Series dedicated ADC appliances can offload CPU-intensive connection management tasks, freeing server cycles for client requests. Connection multiplexing, developed by Array, also aggregates client connections to improve server efficiency by 50% or more.

APV Series ADCs can also apply caching, compression and traffic shaping to improve server performance, reduce bandwidth requirements, and assure critical applications take precedence over non-essential traffic.

aCelera WAN optimization minimizes traffic traversing the network, reducing end-user response times by up to 95% and ensuring a LAN-like experience regardless of end-users’ locations. aCelera also offers a mobile client to accelerate traffic between individual devices and aCelera appliances in the data center or cloud.

Long Live the King!

And the winner is: Your IT team, if your network resources are optimized to support the applications your company or organization needs in order to grow, thrive, compete and succeed. Explore our resources on application acceleration, WAN optimization, and application-specific deployment guides to learn more.

Υou can read the original article here.

24

Apr

Sophos makes enterprise-grade security that works for small and mid-sized businesses. Providing sophisticated protection with simple management, Sophos Endpoint Protection is ideal for under-resourced organizations. Sophos Endpoint Protection also offers flexibility. You choose management in the cloud, or on premise—whichever best suits your business.

Here are a few of examples demonstrating how real Sophos customers benefit from either choice. Midway Energy Services uses Sophos Cloud to secure 600 workers spread out at 11 locations in 5 states – with an IT staff of just one person.

Sophos Cloud offers web-based access to a unified console with policies that follow users across devices and platforms. That means the IT admin can check on remote workers on their laptops or mobile devices in one easy view. Plus, it’s easy to find and block threats and even clean up infections without the need to travel.

Deployment is a snap, because with Sophos Cloud there’s no server to install, so you’ll be up and running in just 60 seconds. And the cloud-based management console is designed with simplicity in mind, so you don’t need to be security expert to use it.

The on-premise Sophos Endpoint Protection is easy to deploy as well. Lassen County, in California, chose Sophos to replace its existing solution, partly because of how easy it was to switch.

Most of the other vendors promised ease of deployment, but removal and rollout didn’t work when we tested it,” says Lassen County IT Director Robert Talley. “Sophos provided an automatic migration that was smooth, fast and easy.

We make it even easier for you with default policies that are configured to balance protection, usability and performance – for simple security that works right out of the box.

More reasons to choose Sophos Endpoint Protection

If you’re looking to switch to endpoint protection that’s simply better, we give you five big reasons why you should consider choosing Sophos Endpoint Protection.

Learn more about how you can secure your organization with protection that offers these benefits:

You can read the original article here.

22

Apr

As much as we complain about email as an annoyance, a distraction, and a productivity killer, we depend on it for vital business and personal communications. We might hate email, but we’d probably be lost without it. What many people don’t realize is that email is quite old as a technology, and it’s very insecure. Not only are spam and phishing rampant, email snooping is a problem, too.

Because email traverses the Internet in plaintext, it’s only as private as sending a postcard. If you’re not encrypting your email, what you might think is a private communication could be read by anyone – whether it be Google, the NSA, or perhaps one of your competitors.

Sophos Global IT Security Manager Ross McKerchar wrote about the problem of email in a blog post on Naked Security: “Despite its lack of security, we keep using email because it’s become so ingrained in the way we do business, and it’s not going to be replaced any time soon“. To get email security right, you should think about all the ways email can be misused and abused.

Ross’s advice is to look at the options for email encryption, and figure out which one is best for your users – because, ultimately, you rely on them to make it work. Solutions range from the somewhat impractical (PGP and S/MIME), to the not totally secure (file encryption), to what we consider the simplest and least problematic – Sophos’s own SPX encryption technology.

To protect data and your organization from email-borne threats, you should look for a solution that also offers spam filtering and policy-based data loss prevention (DLP).

We can help you crack the problem of email security. Learn more about why unencrypted email is a “deadly IT sin” by checking out our 7 Deadly IT Sins website. It’s got lots of information about the ways organizations commit security “sins,” and it offers videos and other free resources to help you.

You can read the original article here.

17

Apr

Sophos announced the availability of Sophos Mobile Control 5, which redefines how organizations secure mobile devices by focusing on users and the way they work. By securing devices, content, and applications with a user-centric approach, Sophos Mobile Control 5 (SMC 5) makes compliance with corporate security policy simple for both administrator and end users across iOS 8, Windows Phone and Android platforms. 

To get you acquainted with what’s new, here are 5 great things about SMC 5.

1. Simplified dashboard and workflows. 

Instead of configuring, updating and managing each device individually, you can manage rights based on user. IT managers only have to set one policy, from any remote location, to manage the security of corporate content stored on the device or in a personal cloud. SMC 5 also provides administrators with filtering, exporting, sorting, and search across multiple dimensions. This means “find and fix” activities are done in seconds. 

2. Secure collaboration between users and partners. 

Collaboration between users and partners, and sharing data between devices and the cloud, is all made easier with Secure Workspace in SMC 5. With this mobile workspace, data is automatically encrypted and decrypted between users, applications and cloud environments, so that users can take full advantage of their mobile devices without worrying about security or data loss. 

3. Separation of personal and business data. 

With more workers choosing to use their personal devices for business, IT faces the complexity of managing corporate security and adhering to personal data privacy laws. Containerization and separation of personal from corporate information means business security and user peace of mind. 

4. A redesigned self-service portal saves you time. 

The simplified self-service portal allows users to quickly enroll their devices. Simple touchscreen workflows and an intuitive design make it easy for users to take care of their own needs, freeing up your time. 

5. Security that works better together. 

When we design for users it’s not just about the devices and data that need to be protected, but also the systems they interact with. We believe in building products that work better together, delivering security as a system. SMC 5 provides seamless integration into our UTM offering, which improves security by only allowing managed devices on the network. SMC 5 also manages Sophos Mobile Security to deliver anti-malware for Android devices. 

Watch this video to get a closer look at SMC 5. If you’ve been waiting for SMC to support Windows Phone 8.1 or iOS 8, the wait is over. Go to our knowledgebase article for more information on how to upgrade to SMC 5.

You can read the original article here.

15

Apr

Sophos announced the availability of Sophos Mobile Control 5 (SMC 5), to further simplify mobile device management by setting security and data policy by user, across all three major mobile platforms in one solution. New management options enable an administrator to easily achieve the separation and encryption of personal and corporate information, as well as configure access and security settings through automated tasks, reducing management time and costs.

Typically, each device (laptop, tablet, iPad or smartphone) would have to be configured, updated and managed individually, but by managing rights based on user, IT managers only have to set one policy, from any remote location, to manage the security of corporate content stored on the device or in a personal cloud. With a re-designed self-service portal, Sophos Mobile Control 5 makes compliance with corporate security policy simple for both administrator and end user across iOS 8, Windows Phone and Android platforms.

IT administrators need to secure and manage all the various devices employees use today to get work done – smartphones, tablets, laptops and desktops, but most management tools still treat these devices separately,” says Chris Hazelton, Research Director, Enterprise Mobility at 451 Research. “For small to medium-sized businesses, the ability reduce the number of management consoles can significantly streamline the onboarding process for IT departments that don’t have specialized staff. With the goal of  enabling BYOD with simplicity and secure productivity, EMM solutions must enable all forms of mobile computing.  This means managing and securing devices, content, and applications with a user-centric approach that delivers the simplest experience for both users and administrators.

Dan Schiappa, SVP and GM of Sophos’ Enduser Security Group, said:  “With more workers choosing to use their personal devices for business, IT managers have been faced with the complexity of managing corporate security, and adhering personal data privacy laws. Managing upwards of four devices per user brings considerable risk into the business, and unnecessarily diverts precious IT resource. By focusing on the user permissions, and with remote management and self-service capability, SMC 5 sets a new standard for usability and simplicity. The redesigned user interface and intuitive workflows make security and management of mobile devices a simple task that takes minimal time.

Recently named as an enterprise mobility management (EMM)  leader by Forrester, Sophos continues to bring enterprise level features to the small and medium business that does not typically have the resources to manage a compehensive BYOD strategy.

Our relationship with Sophos has allowed us to provide the most comprehensive security to our clients, while still ensuring that we can scale to our customers’ needs. We are testing Sophos Mobile Control 5 and are not only impressed by the easy-to-use console but also by the ability to separate business and personal information. Our current Sophos Mobile Control customers are happy with the complete security this Sophos solution brings to the table and our potential customers are excited about the features in the latest release. This latest version complements the Sophos story nicely and, as a company, we look forward to taking our clients’ security to the next level.” Michelle Drolet, CEO, Towerwall, Inc. a Sophos partner in North America.

You can read the original article here.

13

Apr

Who will cybercriminals target next? James Lyne, Sophos global head of security research, says gangs are creating new ways to attack ever more victims, and improving on the old ways to make more money. 

In a new video from the Wall Street Journal, James sounds off on recent and emerging trends in cybercrime, and talks about what’s coming next for security of the Internet of Things (IoT). 

James talks about:  

  • Ransomware gangs that make millions of dollars in Bitcoins by taking files and networks hostage with file-encrypting malware – ensnaring home users, businesses and public sector organizations and demanding a ransom. 
  • The Lizard Squad gang, which found new ways to attack big companies like Microsoft and Sony, by creating a weapon out of people’s previously innocent home routers, and harming millions of users in cyberattacks that brought down networks. 
  • The rapidly developing Internet of Things, which is what we call the millions of devices coming online – from security cameras and industrial systems, to connected homes and cars, and exciting and innovative new wearables like the Apple Watch. James asks, how will cybercriminals profit from next-generation IoT devices? 

Check out the video to hear more from James and fellow security experts who were interviewed by the Wall Street Journal. 

You can read the original article here.

9

Apr

There’s been a bit of buzz in the normally sedate SSL VPN market lately, with Juniper divesting its flagship Junos Pulse (a.k.a. MAG Series or SA Series) SSL VPN product line to Siris Capital – which in turn rolled out a new company to develop and sell the product line.

This big change has caused customers and resellers to evaluate their options for current and future SSL VPN purchases. Also recently, industry analyst firm Gartner released a Market Guide for Enterprise Infrastructure VPNs, in which the authors rightly found, “The VPN marketplace is mature and fragmented, because the capabilities are embedded in other products, such as routers, firewalls, portals, application suites, unified threat management (UTM) appliances and platform OSs. Mainstream VPN vendors offer it as part of a family of networking products and services, which can also include access management and single sign-on (SSO)”.

The authors also noted that “VPNs are alive and well, and have a long future: Companies should continue to use infrastructure VPN encryption methods as one of their security layers, review options in all four scenarios presented in this research and maintain a five-year plan.” The market guide, which is highly recommended reading, lists Array Networks as a representative vendor, and provides market recommendations that are very practical and well thought out.

At Array, we’ve had a singular focus on SSL from the start of the company nearly 15 years ago. In fact, we think of ourselves as ‘The SSL Company.’ Unlike most (if not all) other vendors, we developed our own SSL stack rather than using OpenSSL as a foundation. Through that foresight, Array’s AG Series and SPX Series have been immune to recent sensationalized OpenSSL vulnerabilities like Heartbleed and Man in the Middle (MitM).

Also through our long history as an SSL VPN vendor, our products are very mature with a rich set of features across a product line with models to serve very small to extremely large deployments.

As the Gartner guide noted, “Encrypted communications are fundamental to assuring the safe and secure transfer of business information.” We’ve got the commitment, the architecture, the features, scalability, performance and more to help you ensure a successful SSL VPN deployment.

Juniper SSL VPN Replacement Program

If you’re one of the many Juniper customers and resellers questioning your current SSL VPN options, Array can help! We’re committed to the SSL VPN market, and our AG Series can meet or exceed the capabilities of the corresponding MAG Series or SA Series products.

We’re offering a very attractive program right now to help you migrate to our AG Series, with free hardware and licensing – all you need purchase is a discounted 3-year support contract. Reach out to your Array sales representative or reseller today to learn more.

You can read the original article here.

7

Apr

Every day businesses are creating and accumulating data they need to protect from loss. Of course it’s absolutely vital to prevent data from getting out of your organization – but are you sure you can get it back if you do lose it?

The growing threat of ransomware like CryptoLocker and CryptoWall in the past couple of years has underscored the importance of backups, but it’s not only malware that can destroy your important files. There are many ways to lose data, from theft or accidental loss of a device to device failures and natural disasters.

Backups are critical for keeping your business up and running when a data disaster strikes. So, in recognition of these stark facts, and with a nod to World Backup Day, we’re providing some helpful tips on how to preserve and protect your data.

Here are three key things to consider when building or revamping your backup process.

Will you be using physical backup devices, cloud storage, or both? There are a variety of backup solutions, from hard drives to cloud storage. Backups should be stored on a different device and in a different location from your master copies. It’s a good idea to have redundancy in case one of your backup devices is destroyed or fails. If you’re using a cloud service, you need to trust that the provider has adequate protections in place to keep your data secure and private. Make sure you control access with strong passwords and two-factor authentication.

Are you able to recover the data easily? Not only is backing up important, but you need to able to restore the data in a suitable amount of time. Your data is important for your business continuity. What happens if everything goes down and you need to restore it? Downtime to restore data could cause significant loss of business and harm your reputation, stock value, etc. You should verify that a restoration procedure works. There’s no point in waiting until the worst happens only to find out that you hadn’t been backing up the right data, or the procedure wasn’t done properly.

Are you encrypting your backups? It’s all well and good to have data on your desktops, laptops and servers encrypted – but if your backups are stored in plain text, think of what happens if they get lost or stolen. It’s still a data breach, and you may still be culpable under data protection laws for failing to protect data.

5 more tips to secure your data

You need to have a data protection policy. Here are some tips to help you develop a comprehensive data loss prevention (DLP) strategy.

1. Understand what industry and government regulations impact your organization. Be sure to know which laws apply to you in your region. For example, the upcoming EU Data Protection Regulation requires you to protect data on EU citizens, even if you’re not located in the EU. If necessary, consult a corporate attorney to get clarity on detailed requirements.

2. Identify the types of data you have within your organization. For example, you should identify data covered under regulations and your valuable intellectual property. Determine where this data resides so you can identify the systems you need to monitor.

3. Evaluate the risk and impact of a data breach for each data type. Based on this information, prioritize risks and address the most serious first.

4. Educate users. User training, guidelines and acceptable use policies are critical to the success of your DLP strategy and should be factored into the project alongside any IT activities.

5. Deploy data protection technologies to prevent accidental data loss. Accidents happen—people lose laptops, or send emails to the wrong address. Protect against data loss by deploying security solutions such as content controldevice control and encryption to render data unreadable without a password.

For more help on creating a DLP strategy, download our free whitepaper, Don’t Let Data Loss Burn a Hole in Your Budget. This paper guides you through the steps necessary to implement a practical DLP strategy (registration required).

You can read the original article here.

6

Apr

As organizations around the globe become more-and-more reliant on the Internet, a serious weakness has begun to emerge in our connected world.  

Since its inception, the Internet has been all about availability; when the Internet goes down, businesses that rely on that availability go down with it. DDoS attacks are single handedly the most serious threat to Internet availability and the benefits derived from being online. 

For years businesses have deployed “redundant” sites, circuits, networks, routers, firewalls, switches, servers, applications, and even processes in the attempt to eliminate or reduce downtime due to a failed system or other unexpected outage.  

However, all the redundancy in the world will not help when your organization is targeted by a DDoS attack. Redundancy simply goes down with the ship. 

This dilemma forces any business to ask the question, “DDoS – whose responsibility it is?”  According to a recent survey conducted by a security vendor, 21% of the nearly four-thousand respondents believe it is the responsibility of the network service provider (ISP) or the website/hosting provider to protect businesses against a DDoS attack.  

These statistics demonstrate that many believe that their Service Providers or Hosting providers will solve their DDoS problems. 

However, not all service providers or hosting providers want to get involved in solving the DDoS problem for their downstream customers.  Why? Simple – it costs service providers time and money when they get involved in blocking your DDoS attacks.

Remember the service provider is not under a DDoS attack – you are!  When your organization is the target of an attack, the service provider is simply the delivery vehicle for the attack traffic.  They’re not the root cause of the attack. 

With that said, all businesses must take their own measures to detect DDoS attacks and prevent the outages that would be incurred due to an attack.  If businesses believe that their service provider or hosting provider will solve all of their problems, they should look closely at the Service Level Agreements (SLAs) to insure that their service provider will resolve a DDoS attack for them.  

If not then it’s really up to the targeted victims to purchase and/or deploy some sort of countermeasure. According to the survey mentioned above, “50% of all businesses agree that specialized countermeasures against DDoS attacks are an important security requirement. 

Who do you hold responsible for protecting your network against DDoS attacks? 

You can read the original article here.

4

Apr

There has been a flurry of DDoS reports from DDoS protection vendors as of late, and Corero has thrown its hat in the ring as well. The recently released Corero DDoS Trends and Analysis report offers a unique perspective of the growing DDoS threat; offering a stark contrast to the majority of the reports saturating the headlines this month.

The Corero findings are unique and differentiated from other vendor driven analysis of the DDoS landscape, due to the deployment and positioning of the Corero DDoS mitigation appliance in the customer network. The Corero SmartWall TDS is deployed at the very edge of the customer network or at the Internet peering points as a first line of defense, inspecting and mitigating all traffic arriving from the Internet in real time before the attacks impact the customer environment.

Cloud based anti-DDoS solutions, and trends and analysis reports authored by the manufacturers of those products and services only represent DDoS traffic that is re-routed to them for scrubbing, well after the attack has permeated the network. While those reports offer very interesting data points about large scale DDoS attacks, they represent only a fraction of DDoS traffic an organization faces on a daily basis.

For example, in Q4 2014 each of Corero’s protected customers experienced an average of 3.9 DDoS attack attempts per day.  In fact, one customer in particular actually experiences an average of 12 attack attempts per day.   Additionally, 87 percent of DDoS attack attempts were less than 1Gbps in peak bandwidth utilization, while another 10 percent were between 1-5Gbps in peak bandwidth utilization.

These sub-saturating attacks against Corero’s protected customers, if not mitigated at the network edge with real-time DDoS defense technology, may have gone completely undetected by traditional cloud-based DDoS solutions. Furthermore, utilizing cloud scrubbing services to defeat these attacks would be too little, too late.

The attack would have made it’s way into the network, degraded service and opened the door for the potential of further exploits and data exfiltration activity long before the attack could have been redirected to a scrubbing center.

Cloud based anti-DDoS services combined with on-premises real-time defense offer the Internet connected business comprehensive protection against the total DDoS threat landscape. 

In the event that organizations are faced with high volume DDoS attacks that completely saturate the Internet link, switching to the cloud to scrub traffic and re-route to maintain service availability is required. For everyday protection against sub-saturating DDoS events that are increasing in frequency and sophistication requires real-time visibility into the network traffic, immediate detection, analysis and mitigation of DDoS attacks—before the threats penetrate the network.

You can read the original article here.

2

Apr

Late last week industry analyst firm MarketsandMarkets issued a new report on the WAN optimization market that predicted a CAGR of 18.8% from 2014 to 2019, with North America expected to be the largest single market and the APAC region predicted to have a CAGR of 21.2% in that period.

The predicted growth more than doubles the market in just five years. This may be astounding to many – especially compared to overall tepid network equipment market forecasts – but if you drill down into it, you’ll quickly discover what we at Array have been promoting for quite some time:

WAN optimization is the ‘secret sauce’ that makes networks and applications work. It’s that simple. But it’s also a bit complex.

Network/application performance used to be fairly straightforward. Given adequate bits and bytes and speeds and feeds, you could be confident that your network and applications were performing at their peak.

The last five years have been game-changing though. BYOD means that employees can work anywhere, anytime. Applications like Exchange, Oracle and others have become integral to getting the job done. New work concepts like ROWE (Results-Oriented Work Environment) have cropped up, encouraging employees to focus on what matters: the bottom line.

It’s no longer ‘good enough’ to assure the C-suite that your network is providing adequate throughput. What matters now is employees’ perception of your network’s ability to supporttheir efforts in turn. Excessive downtime on a critical application like Exchange server? Slow response times from Oracle? These types of things cause headaches for employees – which will soon become your headache.

Add some Secret Sauce

WAN optimization works by streamlining the data that traverses your network. Put simply, data de-duplication and differencing (with caching) means that data that once was sent multiple times to a local data store now needs be sent only once. Traffic is prioritized so performance for end-users is greatly enhanced. TCP, and even relatively arcane protocols are optimized to eliminate redundant and chatty traffic. Compression further reduces the amount of traffic transmitted over the WAN.

This is, of course, just a small sampling of the many ingredients that combine to make WAN optimization the ‘secret sauce’ of network and application performance. To learn more, visit our WAN optimization solution page, or our aCelera WAN optimization controllers product page.

You can read the original article here.

30

Mar

More and more people are using multiple devices — a laptop for the office, a tablet for customer visits and a smartphone for everything in between.

Our per-user licensing for Sophos Endpoint Protection is affordable and simple to administer. You can protect all your users’ Windows, Mac and mobile devices together. And users can add devices without adding to your security overhead.

Recently we conducted a survey of IT managers to find out how they’re handling the growing challenge of device diversity across their organizations.

We found out that IT departments increasingly need to support Windows PCs, Macs and mobile devices: 78% support or plan to support Macs on their networks, and 41% see the number of Macs increasing in their corporate environments.

Mobile devices are proliferating just as rapidly as Macs, if not more so. Whether it be the iPad Air used by your CEO, the latest Samsung Galaxy smartphone running Android, or the iPhone 6 your users are pestering you to configure for corporate use – you need complete control over all of them.

Mobile devices can access corporate email accounts, corporate Wi-Fi networks, and other data your users share via applications – and that means your IT security is literally in the hands of your users.

With Sophos Endpoint Protection, we’re making it simpler than ever to get control of all your users’ devices. So you can confidently embrace BYOD and support and protect the wide range of user devices.

More reasons to choose Sophos Endpoint Protection

If you’re looking to switch to endpoint protection that’s simply better, we give you five big reasons why you should consider choosing Sophos Endpoint Protection.

Learn more about how you can secure your organization with protection that offers these benefits:

You can read the original article here.

28

Mar

Recently we focused on the threat of unprotected Wi-Fi networks to individuals – regular people who might not realize that using free public hotspots found at coffee shops and elsewhere actually leave them open to cyberattacks.

What sometimes goes unmentioned is that those Open Wi-Fi networks leave the owners of those networks vulnerable too. Unfortunately, many small businesses (and even some bigger ones) fail the wireless security test – they’re guilty of one of the more common of the “7 Deadly IT Sins.”

As Sophos Global Head of Security Research James Lyne discovered in his “warbiking” research experiments, around one-third of the Wi-Fi networks he scanned had no encryption or outdated encryption.

That means a hacker could spy on wireless traffic or trick users into visiting phony websites designed for phishing – stealing their account logins, passwords or financial information. These small business Wi-Fi networks often used default network names, and likely default network passwords as well – making it easy for cybercriminals to connect to the network, putting sensitive data at risk.

Bad security practices are common, often because – as James explains in the video – IT departments fail to update configurations over time, what he calls “configuration drift.”

If you’re guilty of the IT sin of unsecure Wi-Fi, we’ve got some tips and resources to help you.

Check out our 7 Deadly IT Sins website to learn more about how to protect your business from this and other security sins.

You can read the original article, here.

26

Mar

“Sophisticated simplicity” sounds like a bit of a paradox. How can something be sophisticated and simple? At Sophos, we bring simplicity to everything we do. It’s easy to use our innovative protection – that’s the sophisticated part – because our products are designed with you in mind.

Sophos is a snap to set up and manage, with just a few clicks. Let’s take a look at how easy it is to use the management console – in both our on-premise and cloud-managed solutions – to give you a better idea of what “sophisticated simplicity” means in action.

Let’s start with the on-premise version of Sophos Endpoint Protection, which (by the way) has won an AV-Test award for Best Usability.

In this video we take a quick look at how to block applications using our Application Control.

With Application Control, you can authorize required applications, and block those your company policy determines should be blocked – such as games – all from the central console.

Other solutions might require you to block each application individually – but with Sophos, you can block applications by type or user group. Τhen there’s Sophos Cloud Endpoint, which independent reviewers say is a “pleasure to use,” and “combines quick performance with ease of use.”

With Sophos Cloud, there’s no servers to set up, because your computers receive protection and updates from servers maintained by us. It’s effortless to deploy, and easy to use and manage.

Admins can log into the Cloud dashboard anywhere, updates and upgrades are automatic, and scalability is unlimited. Plus, we’ve already built in security best practices, so you get effective security settings by default.

Learn more about the simplicity of using our Sophos Cloud management console in this quick video.

More reasons to choose Sophos Endpoint Protection

If you’re looking to switch to endpoint protection that’s simply better, we give you five big reasons why you should consider choosing Sophos Endpoint Protection.

Learn more about how you can secure your organization with protection that offers these benefits:

  • Innovative technology from an industry leader
  • Lighting performance that won’t slow your users down
  • Sophisticated simplicity – saves time and easy to manage
  • User-based licensing to accommodate a modern workforce
  • Flexible deployment – on-premise or in the cloud

You can read the original article here.

24

Mar

Η ασφάλεια στον κλάδο της Τεχνολογίας Πληροφοριών πάντα αποτελούσε μία προσωρινή λύση. Αγοράζετε ένα προϊόν που επιλύει το ενδεχόμενο πρόβλημα, και μάλιστα αγοράζετε το καλύτερο προϊόν που υπάρχει διαθέσιμο, γιατί πολύ απλά είναι το καλύτερο για κάποιο λόγο, σωστά;

Με τα χρόνια, οικοδομείτε ένα εντυπωσιακό σύνολο από λύσεις που εξειδικεύονται στο να λύνουν συγκεκριμένα προβλήματα, και αυτό σημαίνει ότι είστε πια ασφαλείς.

Ή τουλάχιστον, έτσι λειτουργούσαν κάποτε τα πράγματα.

Αναρίθμητες περιπτώσεις από επιθέσεις υψηλού προφίλ τα τελευταία δύο χρόνια μας δείχνουν ότι αυτή η προσέγγιση έχει αρχίσει να καταρρέει.

Ελάτε στο 5ο συνέδριο Infocom Security, για να μάθετε περισσότερα και να ανακαλύψετε τους λόγους που πρέπει να ξανασκεφτούμε την παλαιά προσέγγιση μας στην Ασφάλεια IT σήμερα, ώστε να διασφαλίσουμε ότι δεν θα γίνουμε είδηση στις εφημερίδες, αύριο.

5ο Συνέδριο Infocom Security

Παρακολουθήστε το 5ο συνέδριο Infocom Security που θα πραγματοποιηθεί την 1η Απριλίου 2015 στο Ξενοδοχείο Divani Caravel. Δηλώστε συμμετοχή συμπληρώνοντας αυτή την φόρμα.  Το 5ο Συνέδριο Infocom Security, στο οποίο είναι χορηγός η NSS ως κορυφαία εταιρεία στον τομέα της ασφάλειας IT στη χώρα μας, διοργανώνουν η εταιρεία Smart Press και τα περιοδικά InfoCom και IT Security Professional.

Μη χάσετε την παρουσίαση της NSS που θα πραγματοποιηθεί από τον Jorn Lutters, Pre-sales Engineer της Sophos, με θέμα “It’s time to rethink security for the modern threat landscape” που θα πραγματοποιηθεί στις 10:00 – 12:00 στην 1η ενότητα του συνεδρίου με τίτλο “The New Rules of Cyber Security”. Στην παρουσίαση θα αναλυθεί για ποιό λόγο η φιλοσοφία του “Best of Breed” πολλές φορές δεν έχει θετικά αποτελέσματα

Σας περιμένουμε!

21

Mar

Our Always on the go, but need to stay connected? It might be tempting to log on to free open Wi-Fi networks at airports, cafes and other public hotspots. Don’t do it – those networks offer no protection against hackers looking to steal your identity.

Sophos security expert James Lyne drove home that point on the TODAY Show, as he demonstrated how easy it would be for a cybercriminal to intercept communications on open networks to steal passwords and bank account details.

Just like his previous research experiments in cities like London and San Francisco, James set up an open Wi-Fi hotspot in New York City to see how many people would connect to his network. The results might surprise you.

In the course of a day, more than 2,300 New Yorkers connected to James’s hotspot without knowing if he was out to do them harm. Even more shocking, 109 people agreed to pay $1 to $2 for the privilege, giving away their credit card information to a complete stranger.

Now, we all know that James is one of the good guys – his research is intended to raise awareness about wireless security, because so many people just don’t understand the risks.

Those risks apply to businesses as well as consumers. If your company employees use open Wi-Fi to connect their work laptops and mobile devices to the Internet, just imagine what a hacker could do with access to your employee passwords – the keys to your kingdom.

You can’t leave your users to fend for themselves. Businesses should keep mobile users safe whether they’re in or out of the office. Endpoint security, encryption, mobile device management, and web security are all critical components of a comprehensive security strategy.

The risks are everywhere, but wireless security doesn’t have to be difficult. Check out the video from the TODAY Show to see James’s hotspot experiment and learn how to stay secure.

Wireless security tips for consumers

Stay secure when using Wi-Fi. Follow these 5 easy tips, and get more of our top wireless security tips at sophos.com/wifi.

  • Think twice before connecting to a wireless network. The best level of protection for a wireless network is called WPA/WPA2. Don’t use WEP or Open networks.
  • Use a VPN (Virtual Private Network) to keep your connection encrypted.
  • Make sure you’re using HTTPS or SSL when visiting sensitive websites such as your email or bank.
  • Keep your mobile devices and laptops secure – turn off connecting automatically to Wi-Fi hotspots.
  • Use an antivirus and always keep your computers, devices and software patched with the latest security updates.

You can read the original article here.

18

Mar

According to ComputerWeekly’s 2015 IT Priorities Report, 46% of IT managers worldwide plan to implement a Bring Your Own Device (BYOD) initiative in 2015, and 30% plan to deploy mobile apps.

If you’re responsible for building your organization’s BYOD policy, there are hundreds, if not thousands, of articles and guides available on the topic – an article by industry consultant Bryan Barringer is one of the most recent, and it carries some very good insights. 

Unfortunately, most of the BYOD policy articles overlook a technology that has been the workhorse for secure remote access for more than a decade: SSL VPN. 

Originally designed for secure remote PC and laptop access, SSL VPNs have adapted and evolved over the years as BYOD morphed from a buzzword to reality for many organizations. The SSL VPN solutions of today, like Array’s AG Series secure access gateways, offer a wide range of support for smart mobile devices. And, due to their unique position at the network edge, with visibility into the endpoints and policy-based control over access to network resources, SSL VPNs can be your first line of defense for BYOD – the foundation for your BYOD policy, if you will. 

For example, Array’s SSL VPN solution provides granular access control based on user and role, and host-checking can verify device and user identity as well as whether the endpoint meets security parameters like anti-virus, anti-spyware, personal firewalls, allowed OS version, etc. 

A mobile client supports secure access for native business apps and HTML5 apps via a secure browser, and all data associated with enterprise apps is stored in a secure container to prevent data leakage. The secure container can be remotely wiped in the event of loss or theft of a mobile device, and device-based identification can be used to prevent future SSL VPN connectivity by that device. 

One Note of Caution: All SSL VPNs Are Not Created Equal 

You may have read over the past year or so of several vulnerabilities associated with OpenSSL, which is commonly used by other SSL VPN vendors. Heartbleed, Man-in-the-Middle, and GHOST are just a few of them. As you’re evaluating SSL VPN options, you may want to ask your vendor if their solution uses OpenSSL. Array’s AG Series uses a proprietary SSL stack, and thus has not been affected by any of the OpenSSL vulnerabilities.

You can read the original article here.

15

Mar

Observing and analyzing DDoS attacks over a period of time helps us all understand trends so that we can better prepare for the future. Verisign has recently published its DDoS Trends Report for the last half of 2014, and there are some interesting observations. 

For one thing, attacks are growing larger in size. In the attacks observed by Verisign in the latter half-year span of 2014, 65% were greater than 1 Gbps in size. Some of the largest attacks reached approximately 300 Gbps, but fortunately those were exceptional cases.

Verisign did say it mitigated multiple attacks in the 200+ Gbps range. In all, the average attack size was 12.42 Gbps, which still represents a 291% increase since a year ago. And while the attacks may have been large in size, they were, mercifully, not terribly long in duration. 

A common perception is that financial services companies, including banks, are the primary target of DDoS attacks. Perhaps this perception stems from the highly publicized attacks on American banks back in 2012 and 2013.

In reality, for the second half of 2014, the vertical sector most often attacked was Media & Entertainment/Content at 43%, followed closely by IT Services/Cloud/SaaS at 41%. The Financial Services sector caught a break for that half of the year, with only 5% of the DDoS attacks hitting that industry. 

The attacks are showing increasing complexity, sometimes quickly and unpredictably changing vectors over the course of the mitigation. For example, Verisign saw sophisticated TCP and UDP floods that targeted specific custom application ports and continuously switched vectors. Attacks are growing more sophisticated in their ability to evade common mitigation approaches. 

It’s clear that DDoS attacks have reached a point where specialized mitigation techniques are necessary. It’s noted that some companies simply try to over-provision bandwidth and other resources in order to absorb attacks, but that approach is not only needlessly expensive, it’s hardly feasible anymore as attacks grow in size and complexity. It’s simply an arms race that the defending company is doomed to lose without the right mitigation weapons. 

You can read the original article here.