Why would I care about the type of device that connects to the network? Someone has already approved it!
IoT devices seem to get all-access passes to corporate networks due to the assumption that they can bring no harm to your network.
What users fail to comprehend is that IoT devices are possibly the weakest point in the corporate network. When an IP connects to an internet forum that’s okay, but when that IP is an IP security camera, itprobably means that, that IP security camera is compromised.
Only IT teams connect IoT devices to the corporate network The notion that ONLY IT teams connect IoT devices to the organizational network doesn’t reflect our reality.
In reality, there are many instances where an employee can connect their own device to the corporate network without it being cleared by IT. For instance, a doctor might bring a medical device to help him better diagnose his patients, he just plugs the device into the hospital network and uses it. Since IT never checked its security settings, the hospital network becomes susceptible to malicious activity, such as the theft of patients’ medical records.
If it’s a hardware device – it’s secure! On-prem appliances provide security teams with a false sense that they are safer than other softwarebased solutions.
The truth of the matter is that once appliances leave the vendor, regular firmware patch updates are required. Appliances that have not been vigilantly updated with the latest firmware patch expose corporate networks to security risks.
It’s ok to connect your point of sales (POS), PC and IP Security camera on the same network segment What can potentially go wrong? It’s convenient and easy to define. There shouldn’t be any issues from a security stand point. Right? Wrong!
Since IoT devices are your weakest link, putting them on the same network segment as other devices, you not only put them at risk, you also make the hacker’s job much easier.
If it’s up and running, it’s good to go! Another common misconception is that if a device is working on default configuration, then that is enough. For example, setting up an IP camera on the network without first changing the default password.
This default configuration poses a significant threat by exposing the device to attacks from other unsecured devices. Failing to change the default settings on an IoT device can allow a hacker to remotely execute malicious code, spy on users, break devices, or recruit them into a DDoS botnet through a known backdoor. Most users do not bother to change factory default usernames and passwords, making the hackers’ lives much easier.
Healthcare is one of society’s most vital industries, yet many healthcare organizations are struggling to keep up with technological innovations, namely the Internet of Things (IoT) and cloud computing. In this guest post, Ofer Amitai, CEO and co-founder of Portnox, a company that delivers network access control, visibility, management and policy compliance to ensure networks run smoothly and securely, provides ways healthcare organizations can control their exposure to risks.
The hesitance of some healthcare organizations is understandable, as making these changes could put lives at risk if the technological transfer fails or creates security concerns for the safety of patients’ protected health information and personal medical devices. While these concerns are valid, there are a number of benefits in making the shift to IoT and cloud computing technologies that causes organizations like MarketsandMarkets to predict that by 2020, healthcare spending on cloud services will reach $9.5 billion.
IoT is a big deal for health care because it has so many relevant applications. From personal medical devices, like pacemakers and insulin pumps, to vital hospital equipment for patient care and facility operations, the applications seem endless. Yet hospitals are concerned with the lack of security regulation for IoT devices and that by applying the technology known for increasing efficiency and productivity, they could be putting their business and even patients’ lives at risk. However, there are a few simple ways that healthcare organizations can control their exposure to risks from IoT devices using existing solutions in their data center.
Securing IoT devices beings, first and foremost, by gaining visibility into the connected endpoints on the network, including device parameters such as operating systems, anti-virus/anti-malware status, and running applications to identify potential areas of vulnerability. Once organizations know what’s on their network – a step that’s sometimes overlooked when it comes to IoT medical devices – they will be able to effectively prepare their IT teams to address areas of risk.
Another best practice is segmenting IoT devices (that often can’t be patched) into a separate part of the network, so that if they’re commandeered by a hacker, they can be easily contained and controlled. This creates a boundary between the IoT devices, sensitive medical records and other endpoints, such as laptops, PCs, etc., and other medical devices to control against lateral attacks across the hospital network.
Finally, another important rule of thumb is to change the default credentials of IoT devices connected to the network. The logon credentials of nearly 36,000 medical devices are listed on the Shodan network for Internet-connected devices, which makes them easy targets for hackers. Once these credentials are changed to unique passwords, hackers will have a harder time accessing the IoT device to carry out an attack.
While IoT transforms the lives of healthcare employees and patients, cloud computing has also shown its immense benefits in improving the management of healthcare data, as well as hospitals’ network infrastructure. Some of the top benefits of moving to the cloud for CSOs/CISOs in the hospital environment include: flexibility, reduction of capital expenditures, efficiency and improved doctor-patient relations.
With solutions like cloud storage, hospital data centers can store information off-site and make data accessible to patients and doctors in all locations. In addition, with data off-site, hospitals increase their resiliency to cyber threats and ensure business continuity, in the case of weather events or other disasters.
The move to the cloud also means hospital CISOs/CSOs no longer need to renew physical hardware and software to keep their data centers in compliance with industry standards, making investment in security appliances an operational expense as opposed to a hefty capital expense. Finally, cloud solutions are known for fast deployment, which makes time for data center professionals to engage in more essential tasks, such as monitoring the network for vulnerabilities.
Despite the wide range of benefits inherent in the cloud shift, CISOs/CSOs remain concerned with the security of these solutions. That’s why, in addition to deploying cloud security solutions, hospital data centers should ensure they have a full-proof security and mitigation plan in the case of a cloud outage or weather event (preventing Internet access, thereby preventing access to the cloud).
In addition, CISOs/CSOs should encourage a peer review system so that network security is being actively monitored in house, together with the cloud. Some hospitals have decided to categorize which data is relevant for storage in the cloud – patient health records and financial systems, for instance – as opposed to what is managed on premise, such as emails and security appliances. These are decisions that every hospital should make based on its business needs.
IoT and cloud computing have real value for healthcare industry because they allow for a democratization of patient-doctor relations like we’ve never seen before. Indeed, allowing patients full access to their healthcare records so they can receive adequate medical care from any location and any doctor is what IoT and cloud enable.
These advancements are great news for patients and doctors, but slightly worrisome for IT security professionals tasked with securing the hospital network. However, with enough planning and visibility into the hospital network, IoT and cloud can be embraced with open arms by the IT security community.
Ofer Amitai is the CEO and co-founder of Portnox, a company that delivers network access control, visibility, management and policy compliance to ensure networks run smoothly and securely.
With version 3.6, you can take advantage of new render elements, and enjoy support for Nuke 11.
With the Light Select Render Element in V-Ray 3.6, you can now render the full contribution of any light, or group of lights, including global illumination, reflections and refractions.
Cryptomatte automatically generates ID mattes with support for transparency, depth of field and motion blur.
This update is free for all V-Ray for Nuke customers.
Sign up to get a free V-Ray for Nuke trial >
Discover pricing options for educators and academic institutions>
Check out new review from Peter Stephenson, technology editor, SC Media about TrapX Security DeceptionGrid™ :
"This product is the most representative of what we see as an advanced deception network. It is actively morphing constantly to cut off the intruder at every turn and lure him into the deception grid and away from the real network using advanced AI and an escalating deployment of lures and deceptions. DeceptionGrid is an exceptionally well-thought-out system that has a specific process feeding a workflow and integrating with third party tools. In the early stages of an attack, the intruder is led through a series of intensifying functions that either derail the attack or lead it to a conclusion that is, itself, a dead-end.
The first stage is the deployment of endpoint lures. These are low interaction and are intended to move a genuine attacker along or to defeat the attack as in the case of a script kiddy who finds himself seeing assets but getting nowhere near them and giving up. The next stage is a medium interaction trap that masquerades as whatever is typical within the victim network. This is not a full operating system but has the characteristics of one. A persistent attacker is led to a high interaction honeypot which is a real (virtual) machine with a complete operating system and the types of applications and activity that would be expected on the real network.
This behavior is routed to the workflow, which collects intelligence dynamically and feeds an incident response process supported by third-party products such as SIEMs. The process is bait attackers with endpoint lures, then trap them with emulated traps and engage them with full operating system traps. The medium interaction traps can be deployed in very large numbers to help detect lateral movement when taken with the targets makes it easier to identify attackers.
The system can deploy any quantities of up to 500 unique decoys. When it is time to deploy full O/S decoys it uses lightweight virtual deployments, such as .ova files. These decoys can be deployed manually, can be imported or the system can decide what it needs on the fly. The medium interaction decoys are not full O/S deployments though they appear to be and have all the characteristics, behave correctly and the attacker cannot use them to escape into the real system.
High interaction honeypots are full O/S contained in a wrapper that allows the attacker to interact at all levels without being able to escape into the real operating environment. The deception tokens are lures or breadcrumbs that draw the attacker towards the safe part of the deception grid. To aid in identifying malware, a sandbox subscription is included in the licensing fee.The highpoint of the system is the event analysis.
This consists of the event analyzer, attack visualization, forensics, event correlation, the monitor and the event workflow. Attack visualization is one of the system's crown jewels. The visualization shows exactly what the attacker has done, how it has moved and with what it is interacting. Drilling down gets significant detail. TrapX contends that because assets in a deception network are not real they have no business reason to exist. Therefore, any attempted interaction must be malicious. The web site is adequate and there is premium support included in the licensing fee.
September 28, 2017 — Synology® Inc. announced the official launch of DiskStation DS418play, a 4-bay NAS ideal for serving as a home multimedia center.
DS418play is equipped with a dual-core 2GHz processor capable of bursting up to 2.5GHz. It comes with 2GB DDR3L memory by default, which is twice the size of its predecessor, and expands up to 6GB to enhance multi-tasking operations. Powered by a new hardware transcoding engine, DS418play supports up to two channels of H.265/H.264 4K video transcoding.
"Mobile devices supporting 4K video recording are becoming increasingly popular. However, since 4K video clips are capacity-consuming and not all TVs at home support 4K video playback, users tend to record videos with lower resolution as an alternative," said Michael Wang, product manager at Synology Inc. "With DS418play supporting up to 40TB of raw capacity, users can store their favorite videos in ultra-high definition, organize and share videos with families and friends effortlessly, and transcode videos on-the-fly to allow video playback on devices that do not support 4K."
The processor of DS418play supports AES-NI hardware accelerated encryption. With Link Aggregation enabled, DS418play delivers excellent encrypted data throughput at over 226 MB/s reading and 185 MB/s writing. Users' digital assets are protected by AES-256 encryption, which allows them to enjoy high-performance data transmission.
DS418play runs on DiskStation Manager (DSM) 6.1, the advanced and intuitive operating system for Synology NAS devices, with various applications offered to enhance work productivity. Synology has received numerous media accolades, topping the mid-range NAS category in TechTarget's storage solution survey and winning PC Mag Readers' Choice seven years in a row.
What’s NEW in MindManager 2018
Your priorities — straight.
Isolate your priorities in uncluttered interface that makes next steps clear. Items tagged with priority icons will automatically show up in the view. Or drag and drop unassigned tasks into priority columns. When priorities change, you can rearrange them in seconds, to keep projects moving forward on the right track.
Get a clear picture of the road ahead.
Organize your to-dos in a clean, easy-to-read and instantly- accessible calendar. When you know what’s coming when, you can plan and spend your time a lot more effectively. And with simple drag-and-drop scheduling, attaching dates to action items you create while brainstorming or planning won’t take you out of the flow.
Your wish is your map’s command.
Make your dashboards come alive with new Conditional Formatting capabilities. Trigger dynamic changes in response to fluctuations in whatever data you choose — so you can instantly understand and react to new developments in a plan, project or your business, without having to read a word.
Your vision. Our tools. Endless possibilities.
Reinvent the way you use MindManager with expanded background objects and map-making tools. Customize existing templates or create whole new structures to organize and understand your world. You have free rein over the way your map looks, the story it tells about your business, and the results it helps you achieve.
Visualize new paths to growth and profit.
Take our new library of background objects to the next level with more than a dozen inspired NEW and improved templates that help you see ideas, plans and possibilities in ways that empower more informed thinking, smarter decisions and better outcomes.
Forest and trees, together at last.
Surface the information you need in an ingenious new layered view that brings your selected items into sharp focus, while keeping the rest of your map visible in the background — the perfect blend of detail and context. Now you can focus on one thing, without losing sight of anything.
Send your maps on a journey of their own.
Some maps are too good to keep to yourself. Publish lets you quickly and easily share ideas with colleagues to build understanding and alignment, show proposals and plans to customers to create engagement and excitement, or simply put your masterpieces “out there” for others to learn from, be inspired by and build on.
Make your point with REAL power.
The latest evolution of the HTML5 Interactive Map Export introduces a new level of polish, professionalism, effortlessness and impact to your map presentations.
Whether you’re a fan of digital transformation or not, there’s no denying that the shift to the cloud is engulfing enterprise IT. According to Gartner, over the next five years, over $1 trillion in compounded IT spending will be directly or indirectly impacted by the cloud shift, making cloud computing one of the most disruptive forces of IT spending since the early days of the digital age. That said, it’s time to debunk some of the most common myths regarding cloud security before an outdated IT stack exposes your organization to emerging digital business risks.
Myth #1 – The Cloud Isn’t Secure
The top concern among C-Suites and IT teams alike is that cloud-based security solutions are more prone to external threats than legacy security solutions.
Debunked: On-premise security appliances require firmware upgrades to protect against known exploits, resulting in a constant need to keep the solutions up-to-date. In addition, configuration changes could expose the network to potential vulnerabilities, requiring tedious maintenance of management procedures and periodic penetration testing. However, cloud-based security solutions are constructed, from the outset, to evolve to address relevant threats in the current cyber security landscape. David Linthicum, a leading cloud analyst and VP at Cloud Technology Partners, explains that the security of the cloud is on par with the security of any external device: “Anything that can be possibly accessed from the outside – whether enterprise or cloud – has equal chances of being attacked, because attacks are opportunistic in nature”.
Myth #2 – The Cloud Is Still Too ‘New’ To Be Trusted
Cloud-based applications and services are relatively new on the IT front. So why trust them?
Debunked: An increasing number of both large and small to medium-sized enterprises across a variety of industries – government, healthcare, ecommerce etc. – are employing cloud-based solutions for everything from human resource management to network security. According to IDG Research, “Cloud technology is becoming a staple to organization’s infrastructure as 70% have at least one application in the cloud”.
Myth #3 – The Cloud Is Great for Productivity Apps, But Not for Securing the Network
There is big difference between cloud productivity apps, and performing key security actions, such as Network Access Control (NAC) from the cloud.
Debunked: NAC is a growing concern for CIO/CISOs and IT teams in large to SMEs due to the increased need to gain control over digital business risks. And the stigma of the cloud being less secure isn’t necessarily correct. Gartner reports that by 2018, the 60% of enterprises that implement appropriate cloud visibility and control tools will experience one-third fewer security failures.
Myth #4 – Cloud Solutions Require Re-Educating IT Teams
Training IT teams to deploy a cloud-based security-as-a-service solution would require significant time and resources.
Debunked: Cloud solutions inherently cut time and costs associated with security management in IT teams, freeing them up to carry out more productive and profitable action items. That’s added to the easy and instant deployment associated with cloud-based solutions including automatic system updates, usage demos, access to use cases, and more.
Myth #5 – Cloud Solutions Can’t Help with Compliance
Cloud solutions are constantly changing – one minute they are a “must have” security tool, and the next they are an imminent source of risk to company information. How can you trust cloud security solutions uphold compliance?
Debunked: Cloud solutions are taking heed and are doing their part to relieve this part of the “IT headache”. Many solutions integrate compliance standards into their product while allowing for modifications to the network policy where necessary. Built-in compliance is a winning strategy for business success, and ensures that there aren’t any loopholes the IT team is missing out on.
As Gartner puts it, “By 2020, a corporate ‘no-cloud’ policy will be as rare as a ‘no-Internet’ policy is today”. While in many cases, hype can have dangerous potential, in the case of cloud security, it’s a win-win situation: a win for digital transformation and a win for the IT team that’s eager to expand their business value proposition.
Portnox CLEAR – Security-as-a-Service Solution: The first completely cloud-based Security-as-a-Service solution for Network Access Control (NAC), CLEAR controls access for all devices and users to wired, wireless and virtual networks, to effectively confront digital business risks and cybersecurity threats.
Effective October 2nd, usage of Linux instances that are launched in On-Demand, Reserved, and Spot form will be billed in one-second increments. Similarly, provisioned storage for EBS volumes will be billed in one-second increments.
Per-second billing also applies to Amazon EMR and AWS Batch:
Amazon EMR – Our customers add capacity to their EMR clusters in order to get their results more quickly. With per-second billing for the EC2 instances in the clusters, adding nodes is more cost-effective than ever.
AWS Batch – Many of the batch jobs that our customers run complete in less than an hour. AWS Batch already launches and terminates Spot Instances; with per-second billing for the EC2 instances, batch processing will become even more economical.
One of the many advantages of cloud computing is the elastic nature of provisioning or deprovisioning resources as you need them. By billing usage down to the second we will enable customers to level up their elasticity, save money, and customers will be positioned to take advantage of continuing advances in computing.
This change is effective in all AWS Regions and will be effective October 2, for all Linux instances that are newly launched or already running. There is a 1 minute minimum charge per-instance.
Per-second billing is not currently applicable to instances running Microsoft Windows or Linux distributions that have a separate hourly charge.
List prices and Spot Market prices are still listed on a per-hour basis, but bills are calculated down to the second, as is Reserved Instance usage (you can launch, use, and terminate multiple instances within an hour and get the Reserved Instance Benefit for all of the instances).
Synology Inc. introduced Synology C2 Backup, a cost-effective and on-premise cloud backup solution for protecting important data stored on Synology NAS.
"The demand for off-site data protection has been increasing. Due to the flexibility of cloud backup, it is playing a vital role in meeting customers' various needs," said Jia-Yu Liu, Senior Manager of Cloud & Backup Division at Synology Inc. "To ensure a consistent experience on both local and cloud backups for our users, Synology has spent over a year building our own data center to provide the most optimized and cost-effective cloud backup solutions."
For new subscribers, Synology C2 Backup offers a 30-day free trial to try out all the great features.
Many organizations add their data to e-discovery processing and review tools in Microsoft Personal Storage Table (PST) format.
To save those businesses time and to make the process of producing and importing data easier, Google giving Vault admins the ability to export Gmail, Google Groups, and on-the-record Google Hangouts chat data in PST format.
Starting on September 18, Gmail and Inbox by Gmail on Android, iOS, and the web will begin converting text to interactive hyperlinks whenever they detect phone numbers, addresses, and email addresses in emails.
Clicking an address link will take the user to Google Maps. Clicking an email address will compose a new email, using the user’s default email client.
Finally, when using a mobile device, clicking a phone number will start a call request using the default phone app.
Launch Details >>
Available to all G Suite editions
Synology® Inc. announced the official launch of new product lineup featuring:
To allow for ultra-high performance using SSD cache without occupying internal drive bays, DS3018xs features a PCIe slot, which can be installed with a dual M.2 SATA SSD adapter card (M2D17). DS918+ comes with dedicated dual M.2 NVMe slots at the bottom where you can directly install M.2 NVMe SSDs. DS418 features 10-bit H.265 4K video transcoding.
DS3018xs, Synology's first 6-bay tower NAS, is compact but powerful as it features the advanced processor Intel Pentium D1508 dual-core 2.2GHz (Turbo Boost up to 2.6GHz) with AES-NI encryption engine, offering scalability of RAM up to 32 GB and of storage capacity up to 30 drives with two Synology DX1215.
In addition to four Gigabit LAN ports, DS3018xs takes advantage of boosting maximum throughput with an optional 10GbE network interface card, delivering stunning performance at over 2,230 MB/s sequential reading and 265,000 sequential read IOPS.
DS918+ and DS718+ are powered by Intel® Celeron® J3455 quad-core processor. DS218+ is powered by Intel® Celeron® J3355 dual core processor. All these models are equipped with AES-NI hardware encryption engine. Powered by transcoding engine, these Plus-series NAS servers support up to two channels of H.265/H.264 4K video transcoding. The RAM can be scaled up to 8 GB for DS918+, and up to 6 GB for the other two products, allowing you to operate more intensive tasks at once. DS918+ and DS718+ are equipped with two LAN ports, and their storage capacity can be scaled up to 9 and 7 drives respectively with Synology DX517.
"Responding to the demands from our customers, DS3018xs is built as a comprehensive business-ready desktop NAS. Running mission-critical applications or planning virtualization deployment with DS3018xs has never been easier." said Vic Hsu, CEO of Synology Inc. "The new DS918+, DS718+, and DS218+ are optimized to be your digital video libraries, and will bring you excellent experiences with high definition live video transcoding anywhere you go."
DS418 is equipped with a 1.4GHz quad-core processor with hardware encryption engine, 2 GB RAM, and two LAN ports. Powered by the hardware transcoding engine, DS418 supports H.265 4K transcoding to serve as your media library. DS418 is ideal for offices and home users to manage, protect, and share the critical data efficiently.
DS3018xs, DS918+, DS718+, DS218+, and DS418 run with DiskStation Manager (DSM) 6.1, one of the most advanced and intuitive operating systems for network-attached storage devices which offers a wide range of applications to bring better productivity at work. Synology has received numerous media accolades, such as topping the mid-range NAS category in TechTarget's storage solution survey and PC Mag Readers' Choice for seven years in a row.
For more information>>
ESET announced that GREYCORTEX, a network security provider joins the ESET Technology Alliance, expanding its scope with the advanced network security, visibility, and performance monitoring solution: MENDEL. The solution creates an advanced layer of protection for organizations, governments, and the critical infrastructure sector, while also providing rapid detection and response to security breaches and other incident types.
Nowadays, businesses face much more sophisticated threats than in years prior. Just a brief look back at 2017’s massive malware campaigns shows just how quickly we can be deprived of control over the most valuable resource of all - data. The critical importance of cybersecurity was recently highlighted, first by the outbreak of the WannaCry ransomware; which left many in the healthcare sector paralyzed, then subsequently Petya ransomware; a targeted supply-chain attack that appeared to spread out of control.
Built on a decade of extensive industry and academic experience, GREYCORTEX uses advanced machine learning and data analysis to help protect sensitive data, networks, trade secrets, and reputations, which might be left unknowingly unprotected.
“In order to protect their IT networks, organizations need to be able to react quickly and effectively,” said Petr Chaloupka, CEO, GREYCORTEX. “MENDEL is built around specialized algorithms and extensive academic research providing deep insight into network traffic in order to make the detection of advanced threats such as WannaCry or other behavioral anomalies more sensitive and reliable, while simultaneously decreasing the costs of operation.”
As a solution, GREYCORTEX MENDEL is able to detect known and unknown malware, ransomware, RATs, Trojans, Zero-day attacks, etc., as well as targeted threats to infrastructure – all of which are able to dwell for long periods within a network, undetected by other network security solutions. Moreover, MENDEL is able to identify insider threats, network performance issues, and provide full visibility of every device on the network, up to, and including the application layer. For IT security teams, this means not only greatly improved threat detection, but full network visibility for incident investigation.
“There are never enough layers of security for one’s network infrastructure,” said Jeronimo Varela, Director of Global Sales at ESET. “The GREYCORTEX solution provides an analysis of any behavioral anomalies that may go unnoticed. Moreover, the solution is easily integrated into the infrastructure of businesses of any size and can work not only as a detection or monitoring tool, but also to provide visibility into the functionality of additional security components.”
Launched in 2013, the ESET Technology Alliance is an integration partnership that aims to better protect businesses by offering a range of complementary IT security solutions. All members of the ESET Technology Alliance are carefully vetted against a set of established criteria to extend “best-in-class” business protection across IT environments.
REDWOOD SHORES, Calif., Aug. 17, 2017 (GLOBE NEWSWIRE) — Securonix, the market leader in big data security analytics and advanced threat detection has been recognized by the Software & Information Industry Association’s (SIIA) prestigious 2017 CODiE Award for Best Big Data Reporting and Analytics Solution.
Securonix SNYPR is a big data security analytics platform that leverages machine learning based techniques to power the next generation of advanced threat detection. The SNYPR platform empowers alert fatigued security operations center (SOC) and security incident response analysts, helping predict, detect and respond to advanced insider and cyber security threats that legacy SIEM and log management tools are unable to find.
“We are particularly honored to be recognized by a body of highly selective peers in the software industry for our innovation and leadership in big data security analytics”, said Sachin Nayyar, Securonix CEO. “Securonix SNYPR was also placed as a “Strong Performer” earlier this year in the “Forrester Wave: Security Analytics Platforms”. This acknowledgment from SIIA further validates our efforts aimed at re-defining cyber threat detection by leveraging the power of entity context, machine learning, and big data.”
The SIIA CODiE Awards are unique in that they are the only peer-recognized program in the content, information, education, and software technology industries so each CODiE Award win serves as incredible market validation for a product’s innovation, vision, and overall industry impact.
Securonix SNYPR has won several awards for its product leadership as security teams struggle with their legacy SIEM deployments’ increasing lack of effectiveness against advanced hackers and insider threats, while simultaneously seeing the cost of their deployment balloon out of control. SNYPR, built on an open Hadoop data store and a full stack big data architecture provides the bleeding edge in security analytics, increasing threat detection accuracy, reducing false positives and giving cyber security personnel the information they need to respond to modern threats facing their organizations. The open data model enables organizations to ingest data once and analyze it many times using your own custom or third-party applications.
Securonix radically transforms enterprise security with actionable intelligence. Our purpose-built security analytics platforms mine, enrich, analyze, score and visualize data into actionable intelligence on the highest risk threats to organizations. Using signature-less anomaly detection techniques, Securonix detects data security, insider threat, and fraud attacks automatically and accurately.
Chaos Group’s Hybrid Rendering Technology is now available in V-Ray 3.6 for Maya. Now, you can render on NVIDIA CUDA GPUs, CPUs — or a combination of both.
Learn more >>.
New and improved features include:
Adobe (Nasdaq:ADBE) and Microsoft Corp. (Nasdaq:MSFT) recently delivered their first set of joint solutions to help enterprises transform their customer experience with Adobe Experience Cloud, Microsoft Azure and Microsoft Dynamics. The companies are now expanding their strategic alliance to increase workforce productivity and drive more efficient business processes. Beginning today, Adobe Sign, the market-leading e-signature service in Adobe Document Cloud, is now Microsoft’s preferred e-signature solution across the company’s portfolio, including the 100 million monthly commercial active users of Microsoft Office 365. In addition, Microsoft Teams, the new chat-based workspace in Microsoft Office 365, is now the preferred collaboration service for Adobe Creative Cloud, Document Cloud and Experience Cloud. In addition to product integrations, Adobe will make Microsoft Azure its preferred cloud platform for Adobe Sign.
Together, Adobe and Microsoft will ensure individuals and teams can efficiently collaborate, communicate and drive decision-making across devices.
Adobe and Microsoft are the leaders in document and productivity software, with a rich heritage of innovating to deliver ubiquitous solutions that touch hundreds of millions of customers through integrated desktop tools, innovative mobile apps and cloud-based services. In addition to the partnership announced today, the companies will explore opportunities to continue collaborating on artificial intelligence, analytics and intelligent document automation, taking productivity in the cloud to the next level.
“Adobe and Microsoft are working together to redefine what the modern enterprise experience looks like with collaboration, identity, data and intelligence at the core,” said Abhay Parasnis, chief technology officer, Adobe. “Together we will develop integrated cloud services with best-in-class solutions like Adobe Sign and Office 365 that help businesses digitally transform while delivering great experiences to their customers.”
“Together with Adobe, we’re committed to fostering creativity and a culture of teamwork for our shared customers, so they can unlock the opportunities of today’s rapidly evolving workplace,” said Peggy Johnson, executive vice president, Business Development, Microsoft. “We’re thrilled that our partnership with Adobe has now grown to span our three clouds —Microsoft Azure, Office 365 and Dynamics 365 — providing customers with the powerful integrations they need to navigate digital transformation.”
“When Adobe and Microsoft team up to innovate, their customers win,” said Jamie McLellan, chief technology officer, J. Walter Thompson Worldwide. “As power users of Microsoft Teams, Adobe Sign and Adobe Creative Cloud, we’re excited to realize the immediate impact delivered by these integrations that will enhance creativity, teamwork and overall productivity across our agency.”
“The most successful companies today are relentlessly focused on helping employees be more effective. Productivity suffers when work requires multiple applications that don’t interact,” said Alan Lepofsky, VP and principal analyst at Constellation Research. “The integration of team collaboration, electronic signatures and creative content provides customers with huge efficiency gains, and paves the way for how people will get work done in the future.”
Adobe Sign for Microsoft Dynamics and Microsoft SharePoint is already available. New Adobe Sign integrations for Microsoft Teams, Microsoft Flow, Microsoft Word, Microsoft PowerPoint and Microsoft Outlook are expected to be available in the coming weeks. Adobe Creative Cloud integration with Microsoft Teams is also expected to be available in the coming weeks with Experience Cloud integrations to follow.
Autodesk and GE Appliances® are looking for a few innovative robots before 2025 that will help run a modern home. Design the robot of the future today in the Autodesk Design for Robotics Challenge. Entrants have the chance to win a new Apple MacBook Pro, a VEX Robotics kit, or a SpaceMouse Pro - all tools to help you advance your 3D modeling skills!
Winning entries will be chosen by engineers and designers from GE Appliances, and the top three designers will also receive virtual mentoring sessions and a design review session with a judge from GE Appliances.
Create an original design with your CAD tool of choice, or quick-start your robotics design with an Autodesk Fusion 360 start file. Fusion 360 is free for students and works on both Mac and PC.
All entries must contain a 3D model file plus a render of the file. Additionally, you have the option to submit a description or a YouTube video about your design.
To participate you must be at least 13 years old and a student. See [ Official Rules ] for details.
TrapX has earned the Innovative Product of the Year – Threat Detection award at the Cyber Security Awards for its TrapX DeceptionGrid™.
TrapX DeceptionGrid™ provides a multi-tier deception architecture that is designed to match attackers’ techniques and deceive them at every step. This includes deception Tokens (lures) and medium and high-interaction Traps (decoys). DeceptionGrid baits, traps and engages attackers by deploying camouflaged Traps and Tokens among organisations’ actual IT resources.
Judge Karla Jobling said “The competition this year was really exciting, as innovation and changes in the industry really shone through. There were so many fresh ideas and success stories, it has been challenging to pick the best. There were also a record number of applicants, making the competition in many categories, even tougher.”
“It’s wonderful to be named as winner for the Cyber Security Awards and gain added recognition for our hard work and success,” said Eran Barkat, CEO of TrapX Security. “Having been the first to market with a solution in the deception space, we are proud not only to have won the award but also, to see, for the first time, other deception vendors qualifying to compete. This reaffirms the growth of the deception space in which we continue to lead the market.”
The Cyber Security Awards were established in 2014, to reward the best individuals, teams and companies within the cyber security industry. Excellence and innovation are core themes, throughout all categories.
Corona is fast, it’s easy to use, and renders beautifully. From the beginning, our mission has been to help all artists and designers visualize anything they can imagine, and to push the boundaries of what rendering can do. Render Legion shares this same vision and together we believe that great visualization benefits us all.
The first thing you should know is both Corona and V-Ray are here to stay. Both products will continue to be developed independently by the same teams that you’ve come to trust, with the same level of innovation that you’ve come to expect. Now we can share ideas, research and technology to make both renderers as powerful as possible. One advantage of being an independent company is you get to choose your own path. What’s exciting about Render Legion is they come from that same mindset, which makes it easy for us to work towards the same vision. Together, we’ll continue our commitment to the industry and to our communities.
What just happened?
The entire Render Legion team, and the Corona Renderer, are now a part of Chaos Group.
Why did Chaos Group acquire Render Legion?
Render Legion is a brilliant team, and we share the same passion and vision. By working together, we can make both V-Ray and Corona better — in ways we couldn’t do alone.
Will Render Legion continue to develop the Corona Renderer?
Yes. The core Render Legion team will continue to develop the Corona Renderer with our full support. It’s an excellent product, and we’re committed to its success. In fact, we plan to expand its development team even more.
Will Chaos Group continue to develop V-Ray?
Yes. V-Ray will continue to be a core component of Chaos Group.
We are already working with the Render Legion team to make Corona and V-Ray even better. For example, our DMC sampler will be in Corona 1.7, and we’re already optimizing V-Ray’s dome light with the help of the Render Legion team. And that’s just the beginning.
In general, it’s still business as usual. You still buy both products from the same places; you still talk to the same people; the only update is now everything is under one roof.
August 24, 2017 — Synology® Inc. announced the official release of Surveillance Station 8.1, which boasts faster performance and provides a more complete surveillance solution than previous versions with the introduction of the remote recording archiving feature, the integration with transaction devices and intercom cameras, and the ability to intelligently switch between different security levels.
In this new release, we focused on enhancing performance and providing a complete surveillance solution for homes and retail businesses." said Ruby Lin, Product Manager at Synology Inc., "The integration of POS systems with surveillance videos, and the capability to archive recordings remotely from branch offices to headquarters, provide users a more complete retail solution. With new features that enable automatic switching between different security levels according to the location of the mobile device, and the integration with intercom systems, Surveillance Station 8.1 strives to deliver the most convenient and safe monitoring experience to home users. Additionally, the GPU decoder lets users use built-in graphic cards from the CPU to achieve blazing fast performance on Surveillance Station Client.
Remote recording archiving:
Designed to help chain stores when individual branches have limited storage space, Surveillance Station now lets users customize the recording time and event type which will be archived to a remote location, such as the company's headquarters. Users will also have the ability to setup the execution time for archiving tasks and implement bandwidth control to prevent archiving tasks from affecting usual network activity.
Stores can now monitor every transaction with corresponding videos, and quickly resolve disputes by searching historical records via an intuitive interface. Users can also choose to receive notifications whenever there are abnormal transactions, or customize their notifications with the Action Rule application.
Intercom camera* integration:
With the integration of intercom cameras, users now have the ability to interact with visitors like never before. With functions such as video surveillance, doorbell, door lock operation, and two-way audio, intercom cameras provide users a new level of flexibility. In addition, users also have the ability to search through historical records in Surveillance Station, correspond with visitors via two-way audio and even enter the surveillance area with one-time manual access via DS cam.
For home security, Surveillance Station 8.1 provides two different security settings depending on whether the user is at home or away. Users can switch between different security modes manually, via a schedule, or automatically by Geofence. When switching to a different security setting, the system will adjust to different recording schedules, notification settings, stream profiles, and activate specific action rules.
With support for HTML5, users are no longer required to use Surveillance Station Client or install plugins on Internet Explorer and Safari to manage Surveillance Station. On Surveillance Station 8.1, users can now view videos directly in Chrome.
GPU acceleration is now supported in the Windows version of Surveillance Station Client. After upgrading to Surveillance Station 8.1 and enabling the GPU acceleration option, users can now enjoy smoother performance by leveraging the built-in graphics card. This eliminates the need to buy additional graphic cards and significantly reduces CPU usage while providing a much smoother video display.
To learn more about Surveillance Station 8.1, please visit https://www.synology.com/surveillance.
Surveillance Station 8.1 is available for free download on DiskStation Manager in Package Center, and is compatible with Synology DiskStation, RackStation, and NVR models running DSM 6.0 and above.