Synology Inc. today officially announced Surveillance Station 8.2. This release showcases LiveCam, a brand new security camera app that instantly turns a spare phone into an IP camera.
The iOS version has been released with the Android version coming around October.
The revamp of DS cam offers higher performance, along with the addition of IP speakers to the hardware support list. The next generation of Application Center offers greater flexibility for application management.
"With the combination of LiveCam on iOS and the brand new DS cam, Surveillance Station has entered a mobile era of transforming the phone into a security camera and having its video recordings accessible by DS cam" said Ivan Chang, Product Manager at Synology Inc. "Features like Smart Time Lapse, Dual Authentication and support for IP speakers make Surveillance Station the project-ready solution."
Turn phones into cameras with LiveCam:
Your mobile device can now be an IP camera. Once LiveCam is installed on your mobile phone, you can add it to Surveillance Station as an IP camera that can record as you go. Put your spare devices to good use.
Application Center that knows just what you need:
New style of add-ons called Application Center provides up to 26 applications and utilities. Use the category filter or keyword search to quickly find the application that you are looking for and customize your Surveillance Station.
Revamped DS cam with extraordinary performance and compatibility:
The next generation of DS cam not only provides a more streamlined viewing experience, but also multi-timeline capabilities for intuitively searching through video footage. In addition, with off-line license authentication in place, you can now easily deploy the system at a faster pace.
Now support IP speakers:
Surveillance Station 8.2 can transmit audio or arrange scheduled broadcasts on integrated IP speakers. In multi-speaker deployment, either single or group broadcast is also available.
Oversee sizable project with Time Lapse:
Time Lapse shortens lengthy videos down to minutes or even seconds. This application is particularly useful for showing a large-scale project from start to completion.
Safeguard your data with Dual Authorization:
A safer and more flexible privilege management measure, Dual Authorization restricts sensitive functions such as managing cameras or accessing video records to only be performed with authorization from another party. With extra protection in place, this prevents the leaking of sensitive information.
Stream to the world with Live Broadcast:
Share your excitement with the world as you live stream to YouTube with no settings required. Simply select the camera and enter the path information provided on YouTube. Your live stream broadcast is ready for action.
Business and technology initiatives are rapidly changing in the age of digital transformation. Citrix has committed to turning the workspace into something far more integrated, unified and people-centric, and providing organizations with the ability to manage any device people choose to get work done. Citrix continues to lead in delivering next-generation unified endpoint management for all devices that people use to get work done, whether laptops, smart phones, tablets or new IoT devices. Citrix is extending support for new Samsung DeX-enabled smart phones and tablets that were recently unveiled at their Online (Galaxy Tab S4) and Live (Galaxy Note9) events including support for the new DeX APIs used to manage the devices, applications and user policies. Samsung and Citrix have been working together over the course of several years to provide a secure and easy-to-use digital workspace on Samsung devices for enterprise use cases including public safety, financial services, healthcare, retail and other field service organizations.
The integration with Samsung maintains the company’s commitment to provide day-one support for any device and platform. With Citrix Workspace app, Samsung device users can access virtual apps and desktops, mobile and SaaS apps and data securely, while seamlessly moving between mobile devices and laptops or workstations to complete tasks. Citrix Unified Endpoint Management provides all the elements of end-user computing management in a single-platform solution that helps IT administrators securely manage their enterprise applications, desktops, and data from a secure digital perimeter.
“Citrix and Samsung are working together to provide organizations with a solution that allows them to mobilize their employees and deliver a better customer experience through with the combination of Samsung DeX and Citrix Workspace, giving a flexible and secure unified workspace on Samsung devices,” said Eric McCarty, vice president of Mobile product marketing at Samsung Electronics.
Citrix has expanded its portfolio of delivering virtual apps, desktops and mobile apps to provide secure access to SaaS apps and content via Citrix Workspace app, creating the first unified digital workspace for organizations. Citrix Workspace app joins Secure Mail and the company’s Content Collaboration and Unified Endpoint Management solutions that integrate with Samsung DeX-enabled phones and tablets.
Citrix Workspace gives users secure, single sign-on (SSO) access to all the applications, including widely-used apps like Salesforce and Workday, and provides compelling features including, enabling data loss prevention and virtual and SaaS app watermarking for increased security. Embedded with the company’s proven networking and file-sharing capabilities, Citrix continues to improve the unified experience, whether in the office or mobile by enabling automation and integration of third-party apps, for example, allowing users to move conversations from email to Slack with the same seamless sign-on experience – all aimed at improving productivity for mobile employees.
As an example of the power of Citrix Workspace with Samsung DeX, the integration with Samsung DeX-enabled devices will be able to deliver a new, mobile-first retail experience. For employees in retail locations or in branch offices, Citrix Workspace can provide access to virtual apps, desktops and mobile apps to provide secure access to SaaS apps and content on Samsung DeX-enabled devices to effectively run multiple apps and desktops during sales conversations, and allowing employees to roam back and forth between mobile devices and desktops to complete customer transactions. Citrix Workspace app helps provide a new retail branch solution for stores with Samsung DeX-enabled phones and tablets, lowering the total cost of ownership and giving organizations the ability to provide a secure, mobile-first customer service experience.
“By integrating Citrix Workspace with the new Samsung DeX-enabled phones and tablets, we’re not only expanding the unified experience of SaaS, web, mobile, and virtual apps to any device, but also helping organizations transform their employee and customer experiences to be mobile-first. Combined with Citrix Unified Endpoint Management, customers can securely manage Samsung devices along with all their corporate-issued or BYO devices,” said Calvin Hsu, vice president, product marketing at Citrix.
Synology® Inc. launched DiskStation DS1618+, a 6-bay NAS featuring the Intel Atom® C3538.
For tech enthusiasts and small to medium sized businesses, DS1618+ is the perfect all-in-one solution for file serving, application hosting, data backup, and real-time collaboration — all aided by its exceptional performance.
DS1618+ is powered by a quad-core Intel Atom® processor C3538 and 4GB DDR4 non-ECC SODIMM, expandable up to 32 GB in ECC SODIMMs. The storage capacity can be upgraded to 192TB when connected to two DX517 expansion units, providing fast-growing companies a data storage solution that scales with their business.
"Modern-day companies compete based on the speed at which they generate, process, and use data to drive innovations," said Derren Lu, CEO at Synology. "By integrating Intel technology , we are putting a compact powerhouse in every SMB. It will allow them to take advantage of that untapped throughput to give their companies that extra edge."
With Synology's M2D17 PCIe adapter card, DS1618+ can house dual M.2 SATA SSD, taking advantage of the SSD cache to boost maximum throughput and reduce the I/O latency. By alternatively installing a network interface card via the PCIe slot, DS1618+ supports up to two 10GbE ports to reach a maximum throughput of 1,551 MBps reading and 586 MBps writing.
"Small to medium sized businesses need powerful, secure and scalable storage solutions to efficiently manage their growing levels of digital content," said Dan Artusi, Vice President and General Manager of Intel's Connected Home Division. "Through our collaboration with Synology, their new DiskStation NAS products based on the Intel Atom® processor C series have the performance and configurable high-speed I/O to help businesses quickly store and manage their most critical data."
DS1618+ runs on DiskStation Manager, the advanced and intuitive operating system for Synology NAS devices, with quality applications offered to enhance data security and work efficiency. Synology has received numerous media accolades, topping the mid-range NAS category in TechTarget's storage solution survey and winning PC Mag Readers' Choice seven years in a row.
Synology's Extended Warranty add-on service (EW201) can be purchased together with DS1618+, available in select regions worldwide, to provide up to five years of hardware warranty coverage.
No business, small or large, can afford to ignore cyber security. According to a recent Verizon Data Breach Investigations Report, 60 percent of cyber-attacks target SMBs, largely because they are easier targets.
But you don’t have to be passive. Here are five tools and services which small and medium business can use to protect themselves.
"In the scramble to secure the cloud, hardware is often overlooked," says Christoph Schell, president, Americas, HP Inc. "The truth is, if you have 500 employees, it is easier to have one secure cloud structure than it is to secure 500 laptops. Reduce your risk through security-centered device management and proactive practices and policies to engage each employee in the security process."
In addition to creating a secure network, small businesses must select secure hardware and adopt secure protocols to really protect themselves. HP Inc., has developed security software Touchpoint Manager to help companies streamline their protection policy, minimize security vulnerabilities and monitor protected systems.
Marketers, lawyers and sales people are widely using email tracking solutions to improve sales and better engage with prospects and current clients. Those solutions are popular in CRM systems as well. But cybercriminals are also using these tools to track the date and time emails are opened, where they are opened, where they are forwarded and so forth.
MailControl allows companies to block spymail from hitting their inbox. It is an especially effective tool in preventing targeted phishing attacks from reaching your business.
The most prevalent cyber security risk to small businesses today is ransomware. The FBI estimates that over 4,000 U.S. businesses are infected by ransomware every day. Ransomware takes control of the files on small business networks by encrypting them and holding them for ransom. The existing tools, like anti-virus, are not effective against the rapidly changing variants.
WatchPoint has an easy to use tool, called CryptoStopper, which small businesses can download and install to protect their network. CryptoStopper deploys bait files throughout a network. When these bait files are encrypted, the infected user is isolated, and the ransomware is stopped before doing damage. This is a new and unique approach to stopping ransomware.
One of the most common, and preventable, attacks on small businesses is a social-engineering attack triggered by phishing attempts, improper web use or incoming phone calls. The most current training systems on the market are designed for large enterprises, but some companies set up our solution to help any size business, from those with just a few employees to those with thousands.
Security Awareness Training -- Security Mentor: Employees aren’t always ready to combat a cyberattack or know when they are being baited into one. Security Mentor has created 10-minute lessons with its Security Awareness Training program. Small businesses will be able to train employees to be aware and alert, while making the right choices in a potential cyber crisis through these brief, online lessons.
Traditionally, companies have used SSL/TLS certificates (displayed as “https”) only on shopping carts or login pages. This can help, as it encrypts the data being sent between the customer’s computer and the SMB’s web server. Also, if companies use an Extended Validation (EV) certificate, the web browser will display a green padlock and website-address bar, as well as the company’s name next to the website address.
Today, though, companies are encouraged to follow what’s known as Always on SSL. This means that the entire website is protected by https, instead of just a couple of pages. This helps protect against modern attacks that seek to steal information when a site visitor browses between secure and not-secure pages.
Finally, Dan Hubbard, product CTO of Cloud Security, Cisco Systems, shared some advice. “There are a few things small businesses can do," he said. First, make sure you have security solutions in place that are proven to detect and stop the majority of malware -- and make sure they are deployed at critical points within the company. "Second, in terms of ransomware: Back up your data. If you have a copy of your information that the attackers can’t get to, you are not at their mercy.”
In sum, you don’t need to do everything, but do something. Attacks happen and small businesses need to pay close attention to cybersecurity because they are increasingly becoming a point of focus for attackers.
With the May 25 General Data Protection Regulation deadline almost upon us, some organizations are still searching for the right talent to manage their compliance strategies.
Whether an organization is looking for a data protection officer, a managed services provider, a consultant or a chief privacy officer, an understanding of GDPR’s technological challenges is essential. Finding professionals who realize the underlying components of data privacy and what makes them so difficult to implement could save organizations from massive sanctions.
Here then are three challenges that any GDPR professional or vendor should understand.
GDPR’s requirement to find and potentially remediate personal data upon request—articles 15 to 18— has drawn comparisons to eDiscovery. This is understandable, and on the surface the two are similar: Both processes involve searching for relevant documents in enterprise repositories and producing them. As a result, some organizations and vendors are approaching GDPR searches as somewhat of an extension of eDiscovery. However, there are fundamental differences in the requirements of the two that make GDPR searches far more difficult.
For instance, eDiscovery requires you to find a single copy of each relevant document; GDPR requires you to find every copy. In eDiscovery you only have to search a small portion of enterprise repositories related to the custodian; GDPR requires you to search across the entire enterprise. There’s a long list of differences between eDiscovery and GDPR searches that make most eDiscovery tools on their own insufficient.
In short, GDPR is in many ways unlike anything we’ve seen. Therefore, when hiring for GDPR it is prudent to ensure a candidate is aware of the aspects in which GDPR and eDiscovery depart. A keen understanding in this area will be an indicator of a candidate’s success.
As information management is concerned, today’s organizations are largely silo-based. Data is stored in numerous repositories across the enterprise, including:
The problem is that each of these silos often has distinct management policies, a unique search engine, and there exists a general lack of coordination between them all. Bridging across these silos is becoming one of the greatest IT challenges of our time, and GDPR compliance is heavily impacted by this challenge. In fact, the two puzzles are interrelated.
How does an organization search across each repository simultaneously to find a subject’s personal data, and when they find it, how can they quickly understand the purposes for which it’s being used across the enterprise?
Data may have several duplicates being used for different functions, and each of the functions may have different policies associated with it. In other words, records management may call to retain a document for X number of years while regulatory compliance calls to retain it for Y number of years, and now GDPR calls to delete it. How can an organization reconcile conflicting policies between these function-based silos if there isn’t adequate communication between them?
When hiring a GDPR professional, he or she should have a grasp on the obstacles that face siloed architectures, and their impact on GDPR. Unfortunately, it’s rare to find someone who truly realizes these issue, let alone someone who has a solution.
There are two camps when it comes to data privacy. On one side there are those that think privacy is preserved by leaving personal data untouched. This is an intuitive approach because it seems natural that to maintain privacy, one should not go digging around for personal information. However, the issue is that when personal data exists that is not accounted for, it will inevitably be accessed by someone, and this can have negative consequences.
For instance, data that is meant to be kept protected might end up being processed for analytics purposes, leading to several potential liabilities, including GDPR violations.
A better is one in which organizations index all documents as they’re created and apply rules-based policies to manage retention and remediation. Personal data can be readily searched, managed, and given access privileges to ensure it isn’t misused. While this holistic system of information governance calls for a degree of initial intrusion into the content of all documents, it ultimately protects the privacy of data subjects because documents are only used for legitimate purposes, and personal data can be remediated when needed.
These are some of the fundamental components of data privacy that few GDPR professionals grasp. Finding one who does could make all the difference.
Extend spring cleaning to your computer, cellphone and all Internet-connected devices, and you will be safer for it. “By conducting a digital spring cleaning and taking care of overdue online maintenance, you will be more secure against losing personal information and becoming a victim of identity theft,” says the National Cyber Security Alliance. Like with regular spring cleaning, pack rats are often those who need to do the cyber version the most.
“Our connected devices contain volumes of details about family and friends. Information like contacts, photos and videos, along with confidential health and financial records, could easily get into the wrong hands and cause chaos,” warns the cyberprotection group’s executive director Russ Schrader. He noted the average consumer is doing very little to protect their data.
If you are one of those who has put off going through your records until this weekend or early next week to do your taxes, this is a great opportunity to purge the many computer records you don’t need.
Here are seven simple cybersecurity spring cleaning tips the National Cyber Security Alliance and the Better Business Bureau urge:
Use spring cleaning as a jump-start for regular, consistent maintenance. The Better Business Bureau and the NCSA recommend keeping a keen eye on all sensitive accounts like online banking, your credit cards and credit report.
Portnox, a market leader for network visibility, access control and device risk management solutions, and TrapX Security, the global leader in deception-based advanced cyber-security defense, announced today the integration of Portnox’s cloud-based and on-premise network access control (NAC) solutions, Portnox CLEAR and Portnox CORE, with TrapX’s DeceptionGrid product. The joint solution will give customers the ability to detect unauthorized activity on the network, as well as enforce security policies in real time.
The integration of Portnox’s solutions with DeceptionGrid provides CISOs, CSOs, IT teams and network administrators with a complete view of the network, as well as increased visibility into devices – including BYOD, Internet of Things (IoT), mobile and managed devices, anywhere in the world. As DeceptionGrid identifies threats, it shares that information with Portnox to either allow or restrict device access. Portnox generates unique risk scores for each device based on whether a device is on or off premise, over wired, VPN or wireless networks and creates accurate risk profiles and authenticates devices according to score.
“As today’s workforce is increasingly complex and difficult to secure, organizations need a way to secure both the entire network and every endpoint – whether it’s a laptop, smartphone or even a TV in the boardroom – attempting to access the network,” said Ofer Amitai, CEO, Portnox. “We are committed to helping enterprises implement easy-to-deploy network security solutions and our integration with TrapX, further helps us provide complete visibility and control. Partnering with TrapX, the deception market leader, allows us to provide both the detection and enforcement enterprises need to keep their networks safe.”
Additionally, as more organizations undergo digital transformation, it’s important they have the right solutions to minimize digital business risk. Portnox CLEAR, the cloud-based NAC solution, has all the benefits of a Security-as-a-Service solution paired with robust access controls, network visibility and risk monitoring capabilities.
“Cyber adversaries have found new ways to bypass perimeter solutions and penetrate the network. As our customers undergo cloud and IoT transformations, they are looking for end-to-end solutions that allow them not only to detect highly sophisticated attacks across their network, IoT and cloud infrastructure, but to also automatically repel those attacks,” said Ori Bach, VP of Product, TrapX Security. “Integrating with Portnox was a natural fit that enhanced our detection capabilities to include enforcement of access policies for all devices with the goal of preventing unauthorized access.”
Together, the integration of Portnox and TrapX enables customers to:
Portnox provides security for organizations with NAC / NAM next-generation solutions. Portnox solutions allow you to control any user and any device including IoT, BYOD, mobile devices regardless of the location and type of connection to the network.
Portnox was founded in 2007. The company offers its global clients solutions that reduce risks and tighten network control.
Softprom by ERC - the official distributor of Portnox in Europe and the CIS countries.
TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Their field proven solution deceives would-be attackers with turn-key decoys (traps) that “imitate” your true assets. Hundreds or thousands of traps can be deployed with little effort, creating a virtual mine field for cyberattacks, alerting you to any malicious activity with actionable intelligence immediately.
TrapX Security is a leader in dynamic deception operations. Our deception-based solutions rapidly detect, analyze and defend against new zero day and APT attacks in real-time. DeceptionGrid™ provides automated, highly accurate insight into malware and malicious activity unseen by other types of cyber defense. They enable a pro-active security posture, fundamentally changing the economics of cyber defense by shifting the cost to the attacker. The TrapX Security customer base includes global 2000 commercial and government customers around the world in sectors including defense, healthcare, finance, energy, consumer products and other key industries.
Softprom by ERC - the official distributor of TrapX Security in Europe and the CIS countries.
16 Apr 2018 - the cybersecurity firm ESET ushers in a new generation of enterprise security products and services, bringing its 30 years of expertise to market at RSA 2018.
The standouts in the latest suite of enterprise offerings include the all-new ESET Enterprise Inspector, an Endpoint Detection and Response (EDR) solution with features and granularity that surpass anything on the market; and ESET Dynamic Threat Defense, a tool that provides off-premise cloud sandboxing, which leverages machine learning and behavior-based detection to prevent zero-day attacks.
ESET also says goodbye to ESET Remote Administrator and hello to the all-new ESET Security Management Center, an enterprise-grade server that provides visibility management and reporting across all operating systems.
All of ESET’s enterprise solutions integrate seamlessly into this single pane of glass and allow for visibility into threats like zero-days, APTs and botnets while also making adjustments to policies and configurations of endpoint security products seamless and easy.
“We traveled around the world to talk to enterprise IT security specialists, to hear what their needs were,” said ESET CTO Juraj Malcho. ”What we found is that they needed a single console that allowed for visibility into all stages of threat interception: prediction, prevention, detection and remediation. So that is what we made. And, you won’t find us using the term ‘next-gen’ in any of our messaging or product names, because the reality is, since 2005 we have been doing what people are just now calling ‘next-gen.’ We are focused less on hype and more on R&D, and on building solutions that work.”
ESET’s enterprise solutions are built by cybersecurity experts and backed by machine learning. The use of machine learning to automate decisions and evaluate possible threats is a vital part of ESET’s approach – but it is only as strong as the people who stand behind the system.
Human expertise is paramount in providing the most accurate threat intelligence possible due to threat actors being intelligent opponents. ESET’s endpoint products contain a cloud reputation system that feeds relevant information about the most recent threats and benign files. ESET’s reputation system, ESET LiveGrid®, is made up of 110 million sensors worldwide and verified by research & development centers, which allows customers to have the highest level of confidence when viewing information and reports within their console.
The enterprise-ready products and services being debuted at RSA 2018 include the following:
“I think many people don’t know that ESET has some of the most iconic enterprise companies in the world as customers,” concluded Malcho. “Now, more enterprises will be able to leverage ESET to respond and react to the increasing volume and sophistication of cyberattacks.”
The latest V-Ray for Rhino now supports Rhino 6.2 and above. Chaos Group also made some overall improvements to make your rendering workflow faster, smoother and more productive.
Chaos Group also recently added V-Ray to Grasshopper, so you can render parametric designs without leaving Grasshopper. Check out Jan Kokol’s blog post to see how he’s used it to create astonishing images.
Want to see what else is new?
Download a 30-day trial of V-Ray for Rhino — even if you've tried it before!
TAIPEI, Taiwan—Mar 29, 2018 — Synology® Inc. today launched RackStation RS2418+/RS2418RP+, a 2U, 12-bay rackmount NAS providing easy-to-scale storage capacity with affordable total cost of ownership (TCO) for small- and medium-sized businesses.
RS2418+/RS2418RP+ supports up to 144TB raw capacity in a single 2U chassis. The storage capacity can be further expanded up to 288TB when connected to one RX1217/RX1217RP, providing on-the-fly volume expansion.
"RS2418+/RS2418RP+ is designed to solve common IT challenges for small- and medium- sized businesses: budgets are tight, data volume is increasing rapidly, and IT staff is limited." said Jason Fan, Product Manager at Synology Inc. "RS2418+/RS2418RP+ is designed to solve these challenges. It offers scalable storage capacity with affordable TCO, at the same time providing versatile software applications which make it ideal to serve as a file server, a centralized backup target, or a hub-and-spoke backup target for distributed businesses."
RS2418+/RS2418RP+ is powered by an Intel® Atom® C3538 quad-core CPU and 4GB DDR4 non-ECC UDIMM RAM, expandable up to 64GB with four 16GB ECC UDIMMs. The four plug-and-play Gigabit Ethernet LAN ports come by default and can be expanded with higher performance 10GbE NIC through the PCIe 3.0 slot, providing over 1,400 MBps sequential throughput and 38,900 iSCSI random IOPS.
The PCIe slot can also seat the M.2 SSD adapter card, which can significantly boost the performance through the SSD cache, ideal for applications like database storage, multiple user file server, or video editing.
Synology has received numerous media accolades, topping the mid-range NAS category in TechTarget's storage solution survey and winning PC Mag Readers' Choice seven years in a row.
For more information on RS2418+/RS2418RP+, please visit
G Suite makes it easier for users to collaborate efficiently and effectively. An important part of collaboration is deciding how and when to follow up with others.
To help inform these decisions, G Suite introducing Activity dashboard in Google Docs, Sheets, and Slides. It’s a feature that lets users with edit access see who has viewed the file and when they viewed it.
For example, a user can check if a coworker has seen a file already and alert them that it’s been updated. Or an account manager can judge the best way to follow up with a partner, depending on whether that partner has viewed the materials they previously sent.
As of March 7th, G Suite administrators have access to new Admin console settings to control the Activity dashboard feature for their domain or the organizational units (OUs) within it.
On March 21st, end users will begin to see Activity dashboard in Docs, Sheets, and Slides.
Understand when user viewing data will be visible
A file’s Activity dashboard contains viewing data, which is information on who viewed the file and when they viewed it.
The viewing data that’s shown in the dashboard depends on both your organization’s Admin console settings and a user’s individual settings:
Users with edit access to a file and who belong to the same domain as the file’s owner will be able to see that file’s Activity dashboard and any viewing data which is available in it.
All users will have access to privacy settings that allow them to control whether their views show up in Activity dashboard at any time.
For more information and to change settings, users can see the Activity dashboard Help Center article for users.
Activity dashboard access: Available to G Suite Business, Enterprise, Education, and Nonprofit editions only. Users will be able to see the Activity dashboard for a file if they have edit access to that file.
Activity dashboard viewing data visibility settings: All users have access to privacy settings for Activity dashboard, as data from users in all G Suite editions can appear in the dashboard.
Taipei, Taiwan — March 19, 2018 — Synology® Inc. announced the general availability of the Synology C2 Backup service to users worldwide.
Initially established to meet the increasing demands from European customers for a secure and highly-integrated cloud backup solution, C2 Backup now allows precious data stored on Synology NAS around the world to retain copies on Synology's Europe-based cloud storage in case of disaster recovery.
C2 Backup has sustained high growth in the six months following the initial launch. Its data center in Frankfurt has expanded in response to the overwhelming popularity and the increasing storage demand. The level of customer satisfaction is attested by the subscription retention rate, with over 96% of new users continuing their subscription after the free trial.
All the success in the European market proves the service to be a well-optimized and cost-effective solution, and it stands to reason that the same solution will benefit even more customers in more countries.
"The flexibility of cloud backup in terms of low barrier to entry and strong future scalability plays a key role in the rapid growth of this market. With the demand for offsite data protection on the rise, we have received numerous requests from regions outside EMEA to expand our C2 Backup coverage," said Jia-Yu Liu, Director of Application Group at Synology Inc. "We are happy to announce that all users around the world can now enjoy the same seamless backup experience designed specifically for Synology NAS."
Plan I fulfills essential backup needs with the following features:
Plan II provides users that require advanced data protection with the following features:
Synology C2 Backup offers a 30-day free trial for new subscribers to try the solution in their production deployment environments.
TAIPEI, Taiwan — March 1, 2018 — Synology® Inc. today launched RackStation RS3618xs, a 12-bay rackmount NAS providing excellent performance, effortless capacity scaling and optimized virtualization solutions for expanding businesses.
RS3618xs is a 2U RackStation NAS powered by an Intel® Xeon® D-1521 quad-core CPU and 8GB DDR4 ECC UDIMM RAM, expandable up to 64GB.
The four plug-and-play Gigabit Ethernet LAN ports can be expanded with higher performance 10GbE NICs through the PCIe 3.0 slot, providing over 3,900 MBps throughput and 143,500 iSCSI IOPS.
Besides the native 12-drive support, the storage capacity can be further expanded up to 432TB when connecting to two RX1217(RP), providing on-the-fly volume expansion. Its capability to support massive storage space on demand makes it ideal to serve as a virtualization solution, a centralized file server, a backup target or iSCSI storage.
"RS3618xs is an enterprise storage solution that meets the demands of large enterprises," said Jason Fan, Product Manager at Synology Inc. "Businesses can benefit from its comprehensive storage technology, including instant snapshots, SSD caching and high availability, keeping data safe and increasing efficiency."
RS3618xs runs on DiskStation Manager, the advanced and intuitive operating system for Synology NAS devices, with various applications such as file sharing, data backup, or collaboration tools to enhance work productivity.
For more information on RS3618xs, please visit synology.com/products/RS3618xs
Synology has received numerous media accolades, topping the mid-range NAS category in TechTarget's storage solution survey and winning PCMag Readers' Choice Award seven years in a row.
Have a perpetual license?
Move to subscription and save on the latest software of your choice.
Get the most out of your favorite software. Industry collections combine leading products with specialized solutions to optimize your workflows so you can do more, faster, with greater confidence.
You can buy 1-year subscriptions or for 3-year subscriptions, please contact your Autodesk Reseller.
You can also trade in any eligible old licenses and trade up to the newest individual products of your choice.
AutoCAD®, AutoCAD LT®, Civil 3D®, Revit®, Inventor®, 3ds Max® and others.
Buy 1- or 3-year subscriptions from your Reseller
Simply trade in your qualifying old perpetual license(s) and purchase a new 1- or 3-year subscription to any eligible collection or individual product of your choice.
Once you submit your perpetual license(s), you agree to discontinue use of the traded-in license(s).
This offer ends April 20, 2018.
You do not need to purchase the same product as the perpetual trade-in license. For example, you can trade in an old, eligible perpetual license of AutoCAD and subscribe to a collection at the promotional price.
Softprom by ERC, a Value Added Distributor today announced it has signed a distribution announcement with intelligence-led security company, FireEye.
Under the agreement, Softprom by ERC is authorized to distribute all FireEye security products and solutions to partners in Azerbaijan, Armenia, Belarus, Georgia, Kazakhstan, Kyrgyzstan, Moldova, Tajikistan, Turkmenistan, Uzbekistan and Ukraine.
Softprom by ERC identified FireEye as a strong partner in the directions of cyber security and malware protection. FireEye's solutions provide security of data centre, industrial systems and critical infrastructure security, enterprise network security and endpoint security, as well as solutions for small and midsize businesses.
“Our target is to enhance the value added to our partners and provide the best security portfolio for solving key tasks customers of our partners. With FireEye, we strengthen our position as a value-added distributor of Security solutions,” said Paul Zhdanovych, managing director at Softprom by ERC.
February 1, 2018 — Synology® Inc. launched RackStation RS2818RP+, a 3U 16-bay NAS providing large storage capacity with affordable total cost of ownership (TCO) for small-sized and medium-sized businesses.
RS2818RP+ is Synology's first 3U RackStation NAS in the Plus Series product line, supporting up to 16 drive bays with up to 192TB raw capacity. The storage capacity can be further expanded up to 336TB when connecting to one RX1217(RP), providing on-the-fly volume expansion.
"One of the common challenges for modern small- and medium-sized businesses is finding a storage solution that can store large amounts of data while having the flexibility to scale when business grows," said Jason Fan, Product Manager at Synology Inc. "RS2818RP+ offers large storage capacity with affordable TCO. It is ideal to serve as a centralized backup target, a file server or a hub-and-spoke backup target for distributed businesses."
RS2818RP+ is powered by an Intel® Atom® C3538 quad-core CPU and 4GB DDR4 non-ECC UDIMM RAM, expandable up to 64GB with four 16GB ECC UDIMMs. The four plug-and-play Gigabit Ethernet LAN ports can be expanded with higher performance 10GbE NICs, providing over 1,400 MBps sequential read throughput and 26,000 random write IOPS.
RS2818RP+ can be purchased together with Synology's Extended Warranty (EW202) service, available in select regions worldwide, to provide up to 5 years of hardware warranty coverage.
RS2818RP+ runs on DiskStation Manager, the advanced and intuitive operating system for Synology NAS devices, with various applications offered to enhance work productivity. Synology has received numerous media accolades, topping the mid-range NAS category in TechTarget's storage solution survey and winning PC Mag Readers' Choice seven years in a row.
If you do not take proactive steps to protect the digital assets of your business, then you are definitely at risk. Approximately 43% of all cyberattacks, according to Symantec, are focused on small business - in part because they are large enough to be valuable, but also small enough to be vulnerable.
In addition, according to the National Alliance for Cybersecurity, 60 percent of small and medium-sized businesses that were hacked went out of business six months after cyberattacks.
Therefore, the conclusion suggests: enterprises that do not invest enough in their cybersecurity probably do not invest enough in other areas of their business. But statistics are still a concern, so if you want to protect your business, you need to make the investments and updates necessary for security.
The problem is that for an inexperienced entrepreneur or business without an official IT department, the world of cybersecurity is very confusing. Fortunately, you do not need to be a technical expert to make reasonable decisions regarding investment and protection. In fact, there are many tools that can protect you from the vast majority of potential attacks.
According to Deloitte, your passwords are one of the biggest vulnerabilities in your business, with 90 percent of the passwords being weak enough and available for hacking. Choosing strong passwords, managing them effectively and changing them often are some of the best ways to prevent any cybercrime. The whole problem is where to store passwords securely. Therefore, a security tool such as Hideez Key can help. It stores up to 1000 passwords to your accounts in social networks, mail, cloud services, local applications. In order to enter the password, just press the button on the keyfob or the "hot key" on the keyboard.
You also need to use a virtual private network (VPN), which can encrypt all of your network traffic. The only network vulnerability is all that is required for an attacker to gain access to all your data, so invest in a tool such as Portnox Clear. The solution provides continuous monitoring of local and remote network devices, cloud environments regardless of the type of connection: wired, wireless, VPN.
You also need to invest in antivirus software for your devices. Antivirus software is not a reliable bet to protect you from hackers, but it will keep you up to date if your computer is infected with malware, and scans e-mail attachments to make sure they are not malicious. AVG Technologies offers free anti-virus software for individual users and special packages for businesses. In the market there is also McAfee and other options.
Invest in a firewall that will monitor incoming and outgoing traffic, filter out specific threats, and even block some sites altogether. The firewall will not protect you from all the threats on the Internet, but this is an additional level of insurance, which you should not refuse.
Old computers, servers and other hardware can be less expensive, but they create much more serious security risks. They tend to use older software and have security holes that are known and exploited for years. Make sure that you update your equipment regularly, every few years.
You will also need to pay close attention to what software and applications you use for tasks such as data storage, communication and project management. Each individual platform has its strengths and weaknesses, so choose vendors you trust with a long history of protecting customer data.
Finally, invest in training and awareness of your employees. Most hacks are explained by human mistakes, so more educated employees will be able to prevent them. Allocate time each month to check for updates, and remind your employees about the importance of habits, such as changing passwords regularly and avoiding suspicious links.
Over the past 2 years, more than 14 million companies have been "hacked", but your business should not be next in line. While you make a reasonable investment, regularly monitor and improve the habits of your employees, and commit to stay abreast of the latest digital threats, you will significantly reduce your risks. Whatever you do, you have the right to protect your business from cyber threats.
Many believe that the blockade is not subject to hacking. But last year the number of attacks on applications based on block connections increased. Vulnerabilities do not arise from the block chain itself, but rather from applications that run on the block chain.
One of the most striking examples is Bitfinex hacking in August 2016, which resulted in the stolen bitcoin worth $ 60 million. Hacking was possible due to the fact that Bitfinex changed the encryption method, which makes it easier for hackers to access passwords and secret keys. Social engineering will be used more often to extract these secret keys, so the external development of the block chain is a risk, suggests Ofer Amitai, CEO and co-founder of Portnox.
The creation of a new and more acute form of blackmail, DDoS and ransomware combine efforts to curtail progress in digital transformations that bring monetary benefits. These attacks are made possible by the use of botnets or large groups of "zombie" devices, which are often Internet of Things devices, such as web cameras, to redirect traffic to infected malicious web addresses, which in turn extract data from accessible endpoint and require redemption to return these encrypted data. One such example is the use of the Mirai botnet devices to activate inactive WannaCry viruses for reactivation due to the direction of their movement into the kill-switch domain.
These attacks are often called "failures" attacks, because DDoS traffic is directed to sites containing dangerous malicious programs. Thanks to the widespread adoption of Internet of Things devices at the enterprise and the increase in requirements for redemption, we are likely to see more of these attacks in the next year. The trend is heightened by the popularity of crypto conversions that an anonymous payment system has made available to hackers so that they can demand more and extend their foreclosure activities.
One of the clear trends for 2018 is to increase the mobility of the work process. With a large number of employees working remotely, organizations significantly reduce their capital costs (many even abandoned the physical office space) while simultaneously channeling operating costs to digital transformation trends, such as the cloud and BYOD.
The organization's mobility is good for the balance of companies, but the flexibility of technology makes cyber security vulnerable, which can serve as a gateway to hackers into the corporate network. Thus, companies that are tuned to mobile trends in the workflow will invest in more complex solutions for endpoints, networks and cloud solutions that protect access and assets in various locations and in various related environments.
The rules governing IoT security functions are already beginning to operate, but the demand from consumers is still low.
It is a serious question whether the US government or the EU will introduce security rules for IoT device manufacturers that protect consumers and companies from digital (and even physical) risk. Therefore, together with the GDPR and other organizations in 2018, we are likely to see more government and industry members (such as NIST) stepping up work to ensure compliance with the rules of confidentiality, general security and safety for IoT manufacturers. This can also lead to an increase in the cost of IoT devices.
Softprom by ERC, a value-added distributor, announced that they have signed a distribution agreement with Imperva, a cyber security leader that delivers solutions to protect data and applications in the cloud and on-premises. Softprom by ERC will offer Imperva solutions to partners in Azerbaijan, Belarus, Georgia, Kazakhstan, Moldova, Tajikistan, Turkmenistan, Uzbekistan and certain regions of the Ukraine.
Softprom by ERC will proactively engage partners and help them to understand the benefits of best-in-class cyber security solutions from Imperva. Imperva has been recognized as a leader in web application firewall and DDoS mitigation reports from top analyst firms.
"We are excited to work with Imperva as this crucial relationship helps us to expand and develop our Information Security division. Through this relationship, our in region partners have access to a winning combination of market leading cybersecurity solutions from Imperva and our outstanding services, training and sales support capabilities," said Alexander Georgiev, head of the security department at Softprom by ERC.
“Softprom by ERC is a leading CIS value-added distributor known for providing outstanding professional services in testing, training, installation, implementation and technical support. We’re excited to add them as a distributor and to help accelerate the strong growth and interest that we see in the region. Together we’ll work to help enterprises protect their business-critical data and applications,” said Piotr Kluczwajd, Imperva area vice president for Eastern Europe, Russia, CIS and Turkey.
Imperva® (NYSE:IMPV) is a leading provider of cyber security solutions that protect business-critical data and applications. The company’s SecureSphere, Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives – in the cloud and on-premises – and comply with regulations.
The Imperva Application Defense Center, a research team comprised of some of the world’s leading experts in data and application security, continually enhances Imperva products with up-to-the-minute threat intelligence, and publishes reports that provide insight and guidance on the latest threats and how to mitigate them. Imperva is headquartered in Redwood Shores, California.
About Softprom by ERC
Softprom by ERC is a leading Value Added Distributor in the Eastern Europe and CIS markets to which trust more than 1000 partners.
The company provides professional services in testing, training, installation, implementation and technical support. At the moment, Softprom by ERC has more 40 distribution contracts with the world's largest vendors.
The ISC Cybersecurity Scolarship Program is implemented by the Cybersecurity and Education Center. With the global labor shortage in cybersecurity and the lack of representation of women in this field (only 10%), this program was created in order to attract more women to cybersecurity. In total, ISC and the Center for Cybersecurity and Education have allocated more than $ 1 million in cybersecurity scholarships.
"By this program, we want to inspire more women to build an interesting career in cybersecurity," said Patrick Craven, director of the Center for Security and Education in Cybernetics. "I look forward to rewarding worthy students with the financial help they need to realize their dreams."
The Center evaluates candidates based on academic excellence, passion for the industry and financial needs. Since 2011, the Women's Scolarship Program (ISC) had a positive impact:
"It was such an honor for me to receive this scholarship," said Ai Nguyen (USA). "This reduced the financial burden on my parents, and also allowed me to work less and have more time to focus on studying security. Getting this scholarship makes me believe that my hard work has really paid off, and there are so many people who still care about students, especially about women's education and success. I will definitely try my best to apply what I got, and spend all my time on the computer science community. "
"I am extremely grateful to ISC and the Cybersecurity and Education Center for choosing me for this prestigious scholarship," said Aventika Ramesh (USA). "My classes would not be possible without the generous support of fellows, such as ISC and the Center for Cybersecurity and Education."
"Being in the information security community for more than four years, I have always followed events and seminars around the world," said Mudita Khurana (India). "I am very grateful to them for giving me the opportunity to expand my knowledge in information security."
For more information about the ISC scholarship program, look to the page.