Security, Access, and Reliability for Cloud-Connected Networks and Applications news

  • 15.10.2021
    Webinar: VPN doesn’t provide a secure remote work environment!

    On Thursday 28th of October at 14:00 hour we are organizing a webinar where we will discuss Zero Trust secure BYOD remote work environment. Webinar is intended for IT personnel that needs to provide remote work environment or remote access. Speaker will be from Awingu.

    Read More
  • 13.05.2021
    Heimdal™ AI Discovers a Complex Phishing Cryptocurrency Scam Campaign

    Cryptocurrencies have been tremendously growing in popularity, which never fails to attract cybercriminals. While there are still legitimate transactions and investment opportunities in this fintech niche, there are also a lot of shady deals covered up by the anonymity of cryptocurrency, or even downright scams.

    Read More
  • 08.03.2021
    Announcement: Osirium Automation now included with Osirium PAM

    Osirium PAM boosts security and productivity with free IT process automation

    Read More
  • 08.03.2021
    Why Modern Manufacturers Need Enterprise Password Security

    Prior to the COVID-19 pandemic, manufacturers were gradually shifting to digital technologies in what the industry calls the Fourth Industrial Revolution, also known as Industry 4.0. When the pandemic began, manufacturers accelerated their digital transformations as they retooled their production lines and back-end operations to meet shifting customer demands, product cycles, and time-to-market schedules, as well as COVID-19 safety protocols.

    Read More
  • 05.03.2021
    What is a Remote Access Trojan (RAT)?

    How Does It Work and Who Are the Targets. How to Protect Yourself from RAT Software.

    A Remote Access Trojan (RAT) is a type of malware that provides the attacker with full remote control over your system. When a RAT reaches your computer, it allows the hacker to easily access your local files, secure login authorization, and other sensitive information, or use that connection to download viruses you could unintentionally pass on to others.

    Read More
  • 27.08.2020
    Essentials of SD-WAN

    The networking industry has been undergoing a radical digital transformation over the last few years. Major enterprises, as well as small and medium-sized businesses, and even individual consumers, have been adopting SD-WAN (software-defined WAN) with broadband bonding at an accelerating rate, and the SD-WAN market has boomed. An IDC report from last year, “SD-WAN Infrastructure Market Poised to Reach $5.25 Billion in 2023” states that “This important segment of the enterprise networking market [SD-WAN] will grow at a 30.8% compound annual growth rate (CAGR) from 2018 to 2023 to reach $5.25 billion, according to IDC’s SD-WAN Infrastructure Forecast.”

    Read More
  • 11.08.2020
    Cohesity Named a Leader in the Gartner Magic Quadrant for Data Center Backup and Recovery Solutions

    San Jose, Calif. – July 22, 2020 – Cohesity today announced that it has been named a Leader in the Gartner Magic Quadrant for Data Center Backup and Recovery Solutions. The company is positioned as a Leader in just its second time in this Magic Quadrant. Gartner states that “Leaders execute well against their current vision and are well positioned for tomorrow.”*

    Read More
  • 04.06.2020
    Top 5 Requirements for Enterprise Backup & Recovery

    By 2021, 50% of organizations will augment or replace their current backup application with another solution.

    Magic Quadrant for Data Center Backup and Recovery Solutions, Gartner 2017

    Data is your organization’s most valuable asset. Yet backing it up often creates costly and risky IT management headaches. That’s because backup solutions are typically provided by four or five vendors, siloed across dozens of different locations, in aging infrastructure. This causes mass data fragmentation, slowing recovery, and dark data.

    Read More
  • 22.04.2020
    TeamViewer Pilot Among First Apps to Use New iPad Pro LiDAR Scanner

    AR functionality enables remote experts to guide field service workers performing complex tasks with precision using new iPad Pro

    Read More
  • 11.03.2020
    Cohesity uvrščen med 12 naboljših rešitev za varovanje podatkov (Data Protection)!

    Solutions Review’s listing of the best data protection companies is an annual sneak peek of the vendors included in our Buyer’s Guide and Solutions Directory. Information was gathered online via online materials and reports, conversations with vendor representatives, and examinations of product demonstrations and free trials.

    Read More
  • 26.02.2020
    Enabling TCO Reduction: Simplicity is Tangible

    A reduction in infrastructure total cost of ownership can mean lowered expenses as well as corollary advantages: increased employee productivity, agility, and time savings. The benefits are clear. Charting a path to it is more ambiguous.

    By definition, the total cost of ownership (TCO) is the purchase price of an asset plus the costs of operation. Assessing the total cost of ownership represents taking a broader look at what problem we’re solving, the solution, and the solution’s efficacy over time. Buyers need to look beyond the short-term price, or purchase price, and understand the long-term price. In other words, conversations revolving around TCO reduction need to factor in the core element of TCO analysis: the effectiveness of a solution in addressing the most impactful requirements.

    Read More
  • 12.02.2020
    Ransomware Attacks Grow, Crippling Cities and Businesses

    Hackers are locking people out of their networks and demanding big payments to get back in. New data shows just how common and damaging the attacks have become.

    SAN FRANCISCO — New Orleans’s city government crippled. A maritime cargo facility temporarily closed. Hospitals forced to turn away patients. Small businesses shuttered.

    The cause in each of these incidents: ransomware attacks. In recent years, hackers have taken to locking down entire computer networks and demanding payments to let users back into their systems.
    The frequency of ransomware attacks — among the scariest and most costly online assaults — has been hard to pinpoint because many victims quietly pay off their attackers without notifying the authorities.

    Now, an array of new data provides perhaps the best available picture of the problem. In 2019, 205,280 organizations submitted files that had been hacked in a ransomware attack — a 41 percent increase from the year before, according to information provided to The New York Times by Emsisoft, a security firm that helps companies hit by ransomware.

    Read More
  • 04.02.2020
    Average Cost To Recover From Ransomware Skyrockets To Over $84,000

    It’s getting more and more expensive for victims of ransomware attacks to recover. The average cost more than doubled in the final quarter of 2019.

    According to a new report from Coveware, a typical total now stands at $84,116. That’s a little over double the previous figure of $41,198.

    It’s not just the result of cybercriminals demanding steeper ransoms, though that’s certainly one factor. Others include hardware replacement and repair costs, lost revenues, and, in some incidents, damage to the victim’s brand.

    Generally speaking, these costs all increase sharply in relation to the sophistication and duration of the attack.

    Read More
  • 28.01.2020
    Barracuda named a 2020 Gartner Peer Insights Customers’ Choice for Network Firewalls

    We are pleased to announce that Barracuda has been recognized as a 2020 Gartner Peer Insights Customers' Choice for Network Firewalls.

    This recognition is especially meaningful to us because it is based on end-user feedback that is verified by Gartner. 

    This verification process ensures that all Peer Insight reviews meet a minimum standard for context, quality, and relevance.

    Read More
  • 21.01.2020
    Data backup strategies in 2020 vs. 2025: What's going to change?

    Let's look to the future -- all the way to the year 2025. How will data backup evolve? How will sharp increases in data volume affect backup strategies?

    Current shifts in technology and business drive changes that will impact how we think about backups. So, what might data backup strategies look like in five years.

    Read More
  • 15.01.2020
    Kubernetes - How and why backup

    Kubernetes allows us to run a containerized application at scale without drowning in the details of application load balancing. 

    You can ensure high availability for your applications running on Kubernetes by running multiple replicas (pods) of the application. 

    All the complexity of container orchestrations is hidden away safely so that you can focus on developing application instead of deploying it.

    Read More
  • 07.01.2020
    NASA's second test of LDSD for Mars Landing is completed and streamed live

    Mushroom Networks technology help NASA in their 2nd test for the Low-Density Supersonic Decelerator (LDSD), designed for landing missions on Mars. Mushroom's WAN orchestration technology is being used daily by many brand-name organizations around the world, however, our team was especially proud to be part of a NASA project.

    Read More
  • 19.12.2019
    Qualitest Research shows competitive advantages of TeamViewer

    TeamViewer’s core offering provides best-in-class device coverage and ease of use

    Goppingen, December 12, 2019TeamViewer®, a global leader in secure remote connectivity solutions, engaged Qualitest, the world’s largest, independent, pure-play quality assurance company, to provide independent measurement and data-driven external feedback on TeamViewer’s core product and its positioning in the competitive environment.
    Qualitest comprehensively and methodically evaluated the capability and usability of TeamViewer 14 in comparison to the biggest and most relevant competitor’s products with real-world measurements within three competition sets: “Platform Competitors”, “File Transfer Competitors” and “Point Solution Competitors”.

    Qualitest comprehensively and methodically evaluated the capability and usability of TeamViewer 14 in comparison to the biggest and most relevant competitor’s products with real-world measurements within three competition sets: “Platform Competitors”, “File Transfer Competitors” and “Point Solution Competitors”.

    Read More
  • 16.12.2019
    Why primary storage suppliers are consolidating – and why secondary storage is a different story

    Interview Major and mature high tech industry markets consolidate to two or three major suppliers and minor players fighting for market niches left available. 

    Blocks & Files asked GigaOM storage analyst Enrico Signoretti for his thoughts. He mailed us his replies while waiting at Las Vegas for a plane delayed because of snow at Chicago’s O’Hare airport. Winter is coming.

    Read More
  • 12.12.2019
    SECURITY ALERT: Snatch Ransomware Reboots Your PC in Safe Mode to Avoid Detection

    This is a never-before-seen strategy in ransomware and malware. Here’s how the Snatch ransomware will bypass Antivirus detection, and how to stay safe.

    Ransomware is experiencing a resurgence in the second half of 2019 and it will probably grow in 2020, which is about to begin, too. In perhaps the most disturbing ransomware development of the year, a newcomer has developed a novel strategy to bypass Antivirus detection. The Snatch ransomware starts its activity by rebooting Windows computers in Safe Mode.

    This allows it to elude Antivirus detection since it only starts behaving like ransomware after rebooting. Unfortunately, most commercial Antivirus programs don’t initialize in Windows Safe Mode, since that type of booting is only used as a temporary state for troubleshooting a malfunctioning system.

    It’s not the first time malware has found ways to disable Windows defenses and trick it, but the Snatch ransomware has the potential to be the most damaging attack vector yet. I can’t stress the importance of learning about Snatch and taking all defensive measures against it.

    Read More
  • 06.12.2019
    Cohesity DataPlatform and DataProtect Software Tested and Validated for AWS Outposts

    New Comprehensive Cohesity Data Management Integration Capabilities Ready for AWS Outposts Customers Today

    San Jose, Calif. – Dec. 3, 2019 – Cohesity today announced that it has completed validation that its Cohesity DataPlatform and Cohesity DataProtect software have capabilities to support AWS Outposts and are available immediately. AWS Outposts delivers fully managed and configurable compute and storage racks built with Amazon Web Services (AWS)-designed hardware that allow customers to run compute and storage on-premises, while seamlessly connecting to AWS’s broad array of services in the cloud.

    Read More
  • 19.11.2019
    Barracuda named a Gartner Peer Insights Customers’ Choice for Email Security, September 2019.

    Don’t miss what IT security professionals are writing on Gartner Peer Insights about Barracuda’s enterprise email security solutions.

    Read More
  • 18.11.2019

    Cohesity took home the Datacentre Vendor of the Year award at the annual CRN Channel Awards! 

    Read More
  • 30.10.2019
    Energy Company Saves on Backup and Recovery

    Schneider Electric has led energy management and automation in homes, buildings, data centers, infrastructure, and across a wide variety of industries.

    The mission of their IT team was to innovate its backup and recovery infrastructure. The company had virtualized 90% of its environment. However, they were using a solution for backups that was not made for virtualization, creating a complex challenge.

    Read More
  • 23.10.2019
    Password Mistakes You and Your Employees Are (Probably) Making

    Your employees might already be aware of a few password security practices. But are they actually following the latest recommendations? In fact, are you aware of what makes up a strong password policy? Both you and your employees could be (unknowingly) making common password mistakes and applying antiquated password security guidelines. So, keep on reading to make sure you’re in alignment with the most recent password requirements.

    Read More
  • 14.10.2019
    Cohesity Partner CEE Installation Professional Training in Budapest

    Last week we completed first in a series of Cohesity trainings in CEE. 

    Official Cohesity resellers came from Bulgaria, Croatia, Czech Republic, Serbia and Slovenia.

    Read More
  • 10.10.2019
    TeamViewer is an easy solution for remote connections. TeamViewer is offering 60% off migration from old to the latest license.

    TeamViewer ™ is the most popular remote desktop tool in the world. 

    It's the only tool you'll ever need to have all your computers, servers, and devices at your fingertips.

    Read More
  • 03.10.2019
    Cohesity on “Vendors to Watch” list in Gartner’s Magic Quadrant for Distributed File Systems and Object Storage.

    Today, Gartner published the Magic Quadrant for Distributed File Systems and Object Storage. The report lists “Vendors to Watch” based on their traction in the market. Cohesity is excited to be listed as a Vendor to Watch in this Magic Quadrant.

    Read More
  • 26.09.2019
    Enabling DNS over HTTPS (DoH): Advantages and Best Practices

    A new internet protocol is making headlines in the world of enterprise security: DNS over HTTPS. Even though this is of major interest especially for businesses and organizations, regular users will be impacted by it as well. Are you ready for this cybersecurity revolution yourself?

    Here’s what all the fuss is about the new DoH protocol. If done right, the hype around it is well-deserved. Once it’s implemented well, DoH can make network communications much more secure.

    The new DNS over HTTPS protocol is still relatively new in the world of network connections. First emerged about two years ago, the new protocol is mostly not implemented yet.

    When it comes to browsers, Google seems to be the first to it. They recently announced they plan to roll out DNS over HTTPS in the near future.
    This guide will tell you what this means and how you can implement DNS over HTTPS yourself, the changes to expect and so on.
    What Is DNS over HTTPS (DoH) and How Does This Protocol Work?
    First thing’s first, let’s clear up the basics. Not everyone understands exactly what DNS is and how it works, let alone the new DNS over HTTPS.

    Read More
  • 24.09.2019
    Barracuda named a Challenger in 2019 Gartner Magic Quadrant for Web Application Firewalls

    Evaluation Based on Completeness of Vision and Ability to Execute

    Campbell, Calif. — (September 20, 2019) — Barracuda, a trusted partner and leading provider for cloud-enabled security solutions, today announced that it has been recognized as a Challenger in the 2019 Gartner Magic Quadrant for Web Application Firewalls.
    According to Gartner, “By 2023, more than 30% of public-facing web applications and APIs will be protected by cloud web application and API protection (WAAP) services, which combine distributed denial of service (DDoS) protection, bot mitigation, API protection and WAFs. This is an increase from fewer than 10% today.” 1

    Read More
  • 16.09.2019
    Cohesity Named a Leader by Independent Research Firm in Data Resiliency Solutions Evaluation

    Cohesity Cited as a Leader Based on Its Scores in Current Offering and Strategy

    San Jose, Calif. – Sept. 12, 2019Cohesity today announced that it has been named a Leader by Forrester Research in “The Forrester Wave™: Data Resiliency Solutions, Q3 2019.” Cohesity was one of ten vendors evaluated for the Forrester Wave based on 40 criteria that examined a vendor’s current offering, strategy, and market presence. Cohesity received the highest score possible in the criterion of security and tied for the top score in the customer feedback criterion.

    Read More
  • 19.08.2019
    Barracuda intel exposes how cybercriminals are using email account takeover to launch lateral phishing attacks

    New report looks at evolving email threats, the latest tactics used by scammers, and how to protect your business

    CAMPBELL, Calif., August 15, 2019 —

    Read More
  • 13.08.2019
    Threat Spotlight: Barracuda Study of 3,000 Attacks Reveals BEC Targets Different Departments

    One of the most prevalent types of cyberfraud is the Business Email Compromise, or BEC scam. These attacks are responsible for billions of dollars in fraud losses over the last few years, and the criminals keep getting better at scamming their victims.

    In this Barracuda Threat Spotlight, we take a look at the different types of BEC attacks that have been analyzed by the Barracuda Sentinel Team.

    Read More
  • Cohesity Expands Security Capabilities by Empowering Enterprises — For the First Time — to Uncover Vulnerabilities and Cyber Exposures Using Backup Data
    Cohesity Expands Security Capabilities by Empowering Enterprises — For the First Time — to Uncover Vulnerabilities and Cyber Exposures Using Backup Data

    San Jose, Calif. – August 1, 2019 – Cohesity today expanded its security offerings with the release of Cohesity CyberScan, a new application that is the first and only solution that leverages backup data to assess the vulnerabilities, or risk posture, of an enterprise’s IT environment. This is significant because vulnerabilities often lead to cyberattacks — such as ransomware attacks or data breaches — and discovering these exposures is the first step in defending against online criminals.

    Read More
  • 07.08.2019

    Executive summary

    July 1st – Awingu launches its competitive upgrade program: Migrate 2 Awingu. With this program, businesses that are using alternative solutions such as Citrix, Parallels, VMWare, etc. can benefit from a “3+1” promotion, meaning that if you buy 3 licenses, you get the 4th one for free. This competitive upgrade program is valid from July 1st 2019 until Dec 15th 2019. For details on the steps to take, and applicable conditions, click here.

    Read More
  • 07.08.2019
    Current promotions for TeamViewer

    TeamViewer is a product that everybody knows and use. For business use it should be licensed. Let us know if you would like to became a partner. It is an easy process without demands.

    Read More
  • 02.08.2019
    Cohesity Better backup in the cloud

    There are entrepreneurs who struggle to start one successful company. Mohit Aron has launched two. He took a job at Google when it was just starting out and sold the shares he was given for a sizeable sum. Rather than relax, he used the money to help co-found Nutanix, a cloud computing software company that went public in 2016. That's when he began working on his second startup—Cohesity.

    Read More
  • 25.07.2019
    City of Hamilton Realizes Massive Efficiencies With Integrated Solution From Cohesity and HPE


    Cohesity Platform Cuts Backup Times From 12 Hours to 12 Minutes and Unifies Global Data Management on Trusted HPE Hardware
    Cohesity today announced that the City of Hamilton, one of the ten most populous municipalities in Canada, achieved massive improvements to its backup and recovery and data management processes with a joint solution from Hewlett Packard Enterprise (HPE) and Cohesity.

    Read More

    On March 21st, 2019, Microsoft announced the public beta release of ‘WVD’ – “Windows Virtual Desktop” in full. It’s kind of a big thing for Microsoft, and perhaps for the entire industry. In this blog post, we’ll give insight into what WVD is, and what it isn’t. Furthermore, let’s take a look at how it compares to Awingu… and how Awingu can “adapt and improve” WVD.

    Read More
  • 23.04.2019
    Cohesity Cloud Backup Service is just a few simple clicks away

    At Cohesity we like to simplify things. We have already radically simplified backup and recovery for applications that run in the cloud, on-premises, and the edge. We are now taking simplification a step further by providing our first SaaS (Software as a Service) offering: a true web-scale backup solution for your cloud native Google Cloud apps!

    Read More
  • 16.04.2019
    Heimdal Security Provides Thor Foresight Banking Security to RBS Business Customers And why this partnership is valuable to us

    Heimdal Security now provides the recommended banking security for RBS Business Banking customers using their Bankline service, offering accessible, multilayered protection against the most advanced online threats.

    Heimdal Security, the winner of the Anti Malware Solution of the Year at the CSA Awards 2018, has the pleasure of providing its award-winning security software solutions to Royal Bank of Scotland, NatWest and Ulster Bank customers.

    Read More
  • 16.04.2019
    Securing the workspace with Awingu & Barracuda

    Expectations of our “workspace” are evolving. The age-mix of businesses is shifting with a much bigger concentration of ‘millennials’. A study from PWC suggests 50% of the global workforce will be constituted of millennials (pdf)

    Read More
  • 04.04.2019
    Barracuda Total Email Protection

    Product review from SC Magazine gives Barracuda's Total Email Protection a 5-star rating in all categories and found no weaknesses. Get the details.

    Read More
  • 08.03.2019
    Data Intelligence at the Heart of Cohesity's New Capabilities

    In its most recent announcement, Cohesity introduced new capabilities that will help its customers go beyond 

    just backup or data consolidation, crossing what I call the "Data Management" chasm.

    Read More
  • 06.03.2019
    What is a Secure Web Gateway – And What Can One Do for You?

    This article from eSecurity Planet discusses secure web gateways and the benefits compared to other security tools. 

    This piece identifies Barracuda Networks as a prominent vendor in this space.

    Read More
  • 01.03.2019
    ​Mobilizing the Belgian federal police

    The business applications of the Belgian police were developed long before mobile internet existence and are only available through the corporate network. The real police work, on the other hand, which mainly occurs in the field. Awingu builds the bridge between these two worlds.

    Read More
  • 26.10.2018
    Significant Expansion to the Cohesity Partner Program to Help Meet Exploding Demand

    Cohesity Announces Significant Expansion to the Cohesity Partner Program to Help Meet Exploding Demand For Unified Secondary Data and Application Services. Program Includes Comprehensive Free Training, Sales Tools, Aggressive Marketing Initiatives, Enticing Incentives, and Adds New Service Provider Route-To-Market.

    Read More
  • 23.10.2018
    Heimdal wins the title of 'Anti Malware Solution of the Year'

    At a ceremony held this week by the Computing Security Awards in London, Heimdal Security was voted the "Anti Malware Solution" of the year. It is a distinction that shows how much Heimdal has developed over the past couple of years.

    Read More
  • 23.10.2018
    Barracuda Web Application Firewall

    Barracuda has been recognized in the 2018 Gartner Magic Quadrant for Web Application Firewalls (WAF) in both completeness of vision and ability to execute. 

    Read More