Softprom Value Added Distributor




Synology® unveils Surveillance Station 8.2 to liberate phone-based surveillance

Synology Inc. today officially announced Surveillance Station 8.2. This release showcases LiveCam, a brand new security camera app that instantly turns a spare phone into an IP camera.
The iOS version has been released with the Android version coming around October.
The revamp of DS cam offers higher performance, along with the addition of IP speakers to the hardware support list. The next generation of Application Center offers greater flexibility for application management.


"With the combination of LiveCam on iOS and the brand new DS cam, Surveillance Station has entered a mobile era of transforming the phone into a security camera and having its video recordings accessible by DS cam" said Ivan Chang, Product Manager at Synology Inc. "Features like Smart Time Lapse, Dual Authentication and support for IP speakers make Surveillance Station the project-ready solution."


Surveillance Station 8.2 includes the following new features

Turn phones into cameras with LiveCam:
Your mobile device can now be an IP camera. Once LiveCam is installed on your mobile phone, you can add it to Surveillance Station as an IP camera that can record as you go. Put your spare devices to good use.

Application Center that knows just what you need:
New style of add-ons called Application Center provides up to 26 applications and utilities. Use the category filter or keyword search to quickly find the application that you are looking for and customize your Surveillance Station.

Revamped DS cam with extraordinary performance and compatibility:
The next generation of DS cam not only provides a more streamlined viewing experience, but also multi-timeline capabilities for intuitively searching through video footage. In addition, with off-line license authentication in place, you can now easily deploy the system at a faster pace.

Now support IP speakers:
Surveillance Station 8.2 can transmit audio or arrange scheduled broadcasts on integrated IP speakers. In multi-speaker deployment, either single or group broadcast is also available.

Oversee sizable project with Time Lapse:
Time Lapse shortens lengthy videos down to minutes or even seconds. This application is particularly useful for showing a large-scale project from start to completion.

Safeguard your data with Dual Authorization:
A safer and more flexible privilege management measure, Dual Authorization restricts sensitive functions such as managing cameras or accessing video records to only be performed with authorization from another party. With extra protection in place, this prevents the leaking of sensitive information.

Stream to the world with Live Broadcast:
Share your excitement with the world as you live stream to YouTube with no settings required. Simply select the camera and enter the path information provided on YouTube. Your live stream broadcast is ready for action.


Citrix Makes Unified Digital Workspace Available for New Samsung Devices

Business and technology initiatives are rapidly changing in the age of digital transformation. Citrix has committed to turning the workspace into something far more integrated, unified and people-centric, and providing organizations with the ability to manage any device people choose to get work done. Citrix continues to lead in delivering next-generation unified endpoint management for all devices that people use to get work done, whether laptops, smart phones, tablets or new IoT devices. Citrix is extending support for new Samsung DeX-enabled smart phones and tablets that were recently unveiled at their Online (Galaxy Tab S4) and Live (Galaxy Note9) events including support for the new DeX APIs used to manage the devices, applications and user policies. Samsung and Citrix have been working together over the course of several years to provide a secure and easy-to-use digital workspace on Samsung devices for enterprise use cases including public safety, financial services, healthcare, retail and other field service organizations.


The integration with Samsung maintains the company’s commitment to provide day-one support for any device and platform. With Citrix Workspace app, Samsung device users can access virtual apps and desktops, mobile and SaaS apps and data securely, while seamlessly moving between mobile devices and laptops or workstations to complete tasks. Citrix Unified Endpoint Management provides all the elements of end-user computing management in a single-platform solution that helps IT administrators securely manage their enterprise applications, desktops, and data from a secure digital perimeter.

“Citrix and Samsung are working together to provide organizations with a solution that allows them to mobilize their employees and deliver a better customer experience through with the combination of Samsung DeX and Citrix Workspace, giving a flexible and secure unified workspace on Samsung devices,” said Eric McCarty, vice president of Mobile product marketing at Samsung Electronics.


Delivering a Unified Workspace Experience for Mobile

Citrix has expanded its portfolio of delivering virtual apps, desktops and mobile apps to provide secure access to SaaS apps and content via Citrix Workspace app, creating the first unified digital workspace for organizations. Citrix Workspace app joins Secure Mail and the company’s Content Collaboration and Unified Endpoint Management solutions that integrate with Samsung DeX-enabled phones and tablets.

Citrix Workspace gives users secure, single sign-on (SSO) access to all the applications, including widely-used apps like Salesforce and Workday, and provides compelling features including, enabling data loss prevention and virtual and SaaS app watermarking for increased security. Embedded with the company’s proven networking and file-sharing capabilities, Citrix continues to improve the unified experience, whether in the office or mobile by enabling automation and integration of third-party apps, for example, allowing users to move conversations from email to Slack with the same seamless sign-on experience – all aimed at improving productivity for mobile employees.


The Mobile-first Retail Branch Experience

As an example of the power of Citrix Workspace with Samsung DeX, the integration with Samsung DeX-enabled devices will be able to deliver a new, mobile-first retail experience. For employees in retail locations or in branch offices, Citrix Workspace can provide access to virtual apps, desktops and mobile apps to provide secure access to SaaS apps and content on Samsung DeX-enabled devices to effectively run multiple apps and desktops during sales conversations, and allowing employees to roam back and forth between mobile devices and desktops to complete customer transactions. Citrix Workspace app helps provide a new retail branch solution for stores with Samsung DeX-enabled phones and tablets, lowering the total cost of ownership and giving organizations the ability to provide a secure, mobile-first customer service experience.

“By integrating Citrix Workspace with the new Samsung DeX-enabled phones and tablets, we’re not only expanding the unified experience of SaaS, web, mobile, and virtual apps to any device, but also helping organizations transform their employee and customer experiences to be mobile-first. Combined with Citrix Unified Endpoint Management, customers can securely manage Samsung devices along with all their corporate-issued or BYO devices,” said Calvin Hsu, vice president, product marketing at Citrix.


Meet the fastest Plus series NAS ever

Synology® Inc. launched DiskStation DS1618+, a 6-bay NAS featuring the Intel Atom® C3538.
For tech enthusiasts and small to medium sized businesses, DS1618+ is the perfect all-in-one solution for file serving, application hosting, data backup, and real-time collaboration — all aided by its exceptional performance.

DS1618+ is powered by a quad-core Intel Atom® processor C3538 and 4GB DDR4 non-ECC SODIMM, expandable up to 32 GB in ECC SODIMMs. The storage capacity can be upgraded to 192TB when connected to two DX517 expansion units, providing fast-growing companies a data storage solution that scales with their business.


"Modern-day companies compete based on the speed at which they generate, process, and use data to drive innovations," said Derren Lu, CEO at Synology. "By integrating Intel technology , we are putting a compact powerhouse in every SMB. It will allow them to take advantage of that untapped throughput to give their companies that extra edge."

With Synology's M2D17 PCIe adapter card, DS1618+ can house dual M.2 SATA SSD, taking advantage of the SSD cache to boost maximum throughput and reduce the I/O latency. By alternatively installing a network interface card via the PCIe slot, DS1618+ supports up to two 10GbE ports to reach a maximum throughput of 1,551 MBps reading and 586 MBps writing.

"Small to medium sized businesses need powerful, secure and scalable storage solutions to efficiently manage their growing levels of digital content," said Dan Artusi, Vice President and General Manager of Intel's Connected Home Division. "Through our collaboration with Synology, their new DiskStation NAS products based on the Intel Atom® processor C series have the performance and configurable high-speed I/O to help businesses quickly store and manage their most critical data."

DS1618+ runs on DiskStation Manager, the advanced and intuitive operating system for Synology NAS devices, with quality applications offered to enhance data security and work efficiency. Synology has received numerous media accolades, topping the mid-range NAS category in TechTarget's storage solution survey and winning PC Mag Readers' Choice seven years in a row.


Synology's Extended Warranty add-on service (EW201) can be purchased together with DS1618+, available in select regions worldwide, to provide up to five years of hardware warranty coverage.


5 Key Cybersecurity Tools Your Company Must Have

No business, small or large, can afford to ignore cyber security. According to a recent Verizon Data Breach Investigations Report, 60 percent of cyber-attacks target SMBs, largely because they are easier targets.

But you don’t have to be passive. Here are five tools and services which small and medium business can use to protect themselves.

1. Get secure office hardware.

"In the scramble to secure the cloud, hardware is often overlooked," says Christoph Schell, president, Americas, HP Inc. "The truth is, if you have 500 employees, it is easier to have one secure cloud structure than it is to secure 500 laptops. Reduce your risk through security-centered device management and proactive practices and policies to engage each employee in the security process." 

In addition to creating a secure network, small businesses must select secure hardware and adopt secure protocols to really protect themselves. HP Inc., has developed security software Touchpoint Manager to help companies streamline their protection policy, minimize security vulnerabilities and monitor protected systems.

2. Keep spies out of your email.

Marketers, lawyers and sales people are widely using email tracking solutions to improve sales and better engage with prospects and current clients. Those solutions are popular in CRM systems as well. But cybercriminals are also using these tools to track the date and time emails are opened, where they are opened, where they are forwarded and so forth.

MailControl allows companies to block spymail from hitting their inbox. It is an especially effective tool in preventing targeted phishing attacks from reaching your business.

3. Stop ransomware.

The most prevalent cyber security risk to small businesses today is ransomware. The FBI estimates that over 4,000 U.S. businesses are infected by ransomware every day.  Ransomware takes control of the files on small business networks by encrypting them and holding them for ransom. The existing tools, like anti-virus, are not effective against the rapidly changing variants.

WatchPoint has an easy to use tool, called CryptoStopper, which small businesses can download and install to protect their network. CryptoStopper deploys bait files throughout a network. When these bait files are encrypted, the infected user is isolated, and the ransomware is stopped before doing damage. This is a new and unique approach to stopping ransomware.

4. Train your employees.

One of the most common, and preventable, attacks on small businesses is a social-engineering attack triggered by phishing attempts, improper web use or incoming phone calls. The most current training systems on the market are designed for large enterprises, but some companies set up our solution to help any size business, from those with just a few employees to those with thousands.

Security Awareness Training -- Security Mentor: Employees aren’t always ready to combat a cyberattack or know when they are being baited into one. Security Mentor has created 10-minute lessons with its Security Awareness Training program. Small businesses will be able to train employees to be aware and alert, while making the right choices in a potential cyber crisis through these brief, online lessons.

5. Get SLL for your website.

Traditionally, companies have used SSL/TLS certificates (displayed as “https”) only on shopping carts or login pages. This can help, as it encrypts the data being sent between the customer’s computer and the SMB’s web server. Also, if companies use an Extended Validation (EV) certificate, the web browser will display a green padlock and website-address bar, as well as the company’s name next to the website address.

Today, though, companies are encouraged to follow what’s known as Always on SSL. This means that the entire website is protected by https, instead of just a couple of pages. This helps protect against modern attacks that seek to steal information when a site visitor browses between secure and not-secure pages.

Finally, Dan Hubbard, product CTO of Cloud Security, Cisco Systems, shared some advice. “There are a few things small businesses can do," he said. First, make sure you have security solutions in place that are proven to detect and stop the majority of malware -- and make sure they are deployed at critical points within the company. "Second, in terms of ransomware: Back up your data. If you have a copy of your information that the attackers can’t get to, you are not at their mercy.”

In sum, you don’t need to do everything, but do something. Attacks happen and small businesses need to pay close attention to cybersecurity because they are increasingly becoming a point of focus for attackers. 




3 key challenges for the new GDPR compliance officer

With the May 25 General Data Protection Regulation deadline almost upon us, some organizations are still searching for the right talent to manage their compliance strategies.

Whether an organization is looking for a data protection officer, a managed services provider, a consultant or a chief privacy officer, an understanding of GDPR’s technological challenges is essential. Finding professionals who realize the underlying components of data privacy and what makes them so difficult to implement could save organizations from massive sanctions.

Here then are three challenges that any GDPR professional or vendor should understand.

GDPR is a whole different animal

GDPR’s requirement to find and potentially remediate personal data upon request—articles 15 to 18— has drawn comparisons to eDiscovery. This is understandable, and on the surface the two are similar: Both processes involve searching for relevant documents in enterprise repositories and producing them. As a result, some organizations and vendors are approaching GDPR searches as somewhat of an extension of eDiscovery. However, there are fundamental differences in the requirements of the two that make GDPR searches far more difficult.

For instance, eDiscovery requires you to find a single copy of each relevant document; GDPR requires you to find every copy. In eDiscovery you only have to search a small portion of enterprise repositories related to the custodian; GDPR requires you to search across the entire enterprise. There’s a long list of differences between eDiscovery and GDPR searches that make most eDiscovery tools on their own insufficient.

In short, GDPR is in many ways unlike anything we’ve seen. Therefore, when hiring for GDPR it is prudent to ensure a candidate is aware of the aspects in which GDPR and eDiscovery depart. A keen understanding in this area will be an indicator of a candidate’s success.

GDPR respects no silos

As information management is concerned, today’s organizations are largely silo-based. Data is stored in numerous repositories across the enterprise, including:

  • Format-based silos (email, file share, SharePoint, ECM, etc.)
  • Geographical location-based silos
  • Management-based silos (cloud vs. hybrid, in place vs. archive)
  • Function-based silos (eDiscovery, regulatory compliance, records management, etc.)

The problem is that each of these silos often has distinct management policies, a unique search engine, and there exists a general lack of coordination between them all. Bridging across these silos is becoming one of the greatest IT challenges of our time, and GDPR compliance is heavily impacted by this challenge. In fact, the two puzzles are interrelated.

How does an organization search across each repository simultaneously to find a subject’s personal data, and when they find it, how can they quickly understand the purposes for which it’s being used across the enterprise?

Data may have several duplicates being used for different functions, and each of the functions may have different policies associated with it. In other words, records management may call to retain a document for X number of years while regulatory compliance calls to retain it for Y number of years, and now GDPR calls to delete it. How can an organization reconcile conflicting policies between these function-based silos if there isn’t adequate communication between them?

When hiring a GDPR professional, he or she should have a grasp on the obstacles that face siloed architectures, and their impact on GDPR. Unfortunately, it’s rare to find someone who truly realizes these issue, let alone someone who has a solution.

True privacy is complicated

There are two camps when it comes to data privacy. On one side there are those that think privacy is preserved by leaving personal data untouched. This is an intuitive approach because it seems natural that to maintain privacy, one should not go digging around for personal information. However, the issue is that when personal data exists that is not accounted for, it will inevitably be accessed by someone, and this can have negative consequences.

For instance, data that is meant to be kept protected might end up being processed for analytics purposes, leading to several potential liabilities, including GDPR violations.

A better is one in which organizations index all documents as they’re created and apply rules-based policies to manage retention and remediation. Personal data can be readily searched, managed, and given access privileges to ensure it isn’t misused. While this holistic system of information governance calls for a degree of initial intrusion into the content of all documents, it ultimately protects the privacy of data subjects because documents are only used for legitimate purposes, and personal data can be remediated when needed.

These are some of the fundamental components of data privacy that few GDPR professionals grasp. Finding one who does could make all the difference.



Cybersecurity Spring Cleaning You Should Do

Extend spring cleaning to your computer, cellphone and all Internet-connected devices, and you will be safer for it. “By conducting a digital spring cleaning and taking care of overdue online maintenance, you will be more secure against losing personal information and becoming a victim of identity theft,” says the National Cyber Security Alliance. Like with regular spring cleaning, pack rats are often those who need to do the cyber version the most.

“Our connected devices contain volumes of details about family and friends. Information like contacts, photos and videos, along with confidential health and financial records, could easily get into the wrong hands and cause chaos,” warns the cyberprotection group’s executive director Russ Schrader. He noted the average consumer is doing very little to protect their data.

If you are one of those who has put off going through your records until this weekend or early next week to do your taxes, this is a great opportunity to purge the many computer records you don’t need.

Here are seven simple cybersecurity spring cleaning tips the National Cyber Security Alliance and the Better Business Bureau urge:

  • Begin your spring cleaning by fortifying your online accounts and enabling the strongest authentication tools available, such as biometrics, security keys or a unique one-time code through an app on your mobile device. “Your usernames and passphrase are not enough to protect key accounts like email, banking and social media.,” caution the groups.
  • Delete unused apps and keep others current, including the operating system on your mobile devices.
  • Clean up your email: Save only those emails you really need and unsubscribe to email you no longer need/want to receive.
  • Ensure all software on Internet-connected devices is up to date to reduce risk of infection from malware. Often software can be programmed simply to do the updates automatically.
  • Permanently delete old files using a program that deletes the data, “wipes” it from your device and overwrites it by putting random data in place of your information ‒ that then cannot be retrieved.
  • Depackrat your old digital devices you never use. Information still exists on them and could be stolen. Don’t wait: wipe and/or destroy unneeded hard drives as soon as possible. For devices like tape drives and thumb drives, remove any identifying information that may be written on labels before disposal.
  • Review the privacy and security settings on websites you use to ensure they’re at your comfort level for sharing.
  • It’s OK to limit how and with whom you share information, the cyberprotection guidance notes.

Use spring cleaning as a jump-start for regular, consistent maintenance. The Better Business Bureau and the NCSA recommend keeping a keen eye on all sensitive accounts like online banking, your credit cards and credit report.



Portnox Brings Increased Network Visibility and Enforcement with TrapX Integration

Portnox, a market leader for network visibility, access control and device risk management solutions, and TrapX Security, the global leader in deception-based advanced cyber-security defense, announced today the integration of Portnox’s cloud-based and on-premise network access control (NAC) solutions, Portnox CLEAR and Portnox CORE, with TrapX’s DeceptionGrid product. The joint solution will give customers the ability to detect unauthorized activity on the network, as well as enforce security policies in real time.

The integration of Portnox’s solutions with DeceptionGrid provides CISOs, CSOs, IT teams and network administrators with a complete view of the network, as well as increased visibility into devices – including BYOD, Internet of Things (IoT), mobile and managed devices, anywhere in the world. As DeceptionGrid identifies threats, it shares that information with Portnox to either allow or restrict device access. Portnox generates unique risk scores for each device based on whether a device is on or off premise, over wired, VPN or wireless networks and creates accurate risk profiles and authenticates devices according to score.

“As today’s workforce is increasingly complex and difficult to secure, organizations need a way to secure both the entire network and every endpoint – whether it’s a laptop, smartphone or even a TV in the boardroom – attempting to access the network,” said Ofer Amitai, CEO, Portnox. “We are committed to helping enterprises implement easy-to-deploy network security solutions and our integration with TrapX, further helps us provide complete visibility and control. Partnering with TrapX, the deception market leader, allows us to provide both the detection and enforcement enterprises need to keep their networks safe.”

Additionally, as more organizations undergo digital transformation, it’s important they have the right solutions to minimize digital business risk. Portnox CLEAR, the cloud-based NAC solution, has all the benefits of a Security-as-a-Service solution paired with robust access controls, network visibility and risk monitoring capabilities.

“Cyber adversaries have found new ways to bypass perimeter solutions and penetrate the network. As our customers undergo cloud and IoT transformations, they are looking for end-to-end solutions that allow them not only to detect highly sophisticated attacks across their network, IoT and cloud infrastructure, but to also automatically repel those attacks,” said Ori Bach, VP of Product, TrapX Security. “Integrating with Portnox was a natural fit that enhanced our detection capabilities to include enforcement of access policies for all devices with the goal of preventing unauthorized access.”

Together, the integration of Portnox and TrapX enables customers to:

  • Detect threats faster in areas of the network where they previously had limited visibility, minimizing the chances of a successful breach. This deep visibility into malicious activity within an organization’s cloud can minimize or eliminate the risk to intellectual property, IT assets, critical infrastructure and impact on business operations.
  • See relevant security risks on the network. The joint solution will provide continuous visibility, including real-time risk assessments of all endpoints in all geographical locations, as well as discovery and visibility of IoT and BYOD devices.
  • Control access by mitigating cybersecurity risks with automated features to limit access, quarantine and block rogue devices or install patch updates. Portnox immediately remediates security issues by allowing for complete control and wield over all network variables.
  • Automate reactions based on device and user behavior to prevent breaches. By automating access policies based on device risk scores, customers are prompted with administrator reactions such as patch, anti-virus and OS updates.

About Portnox

Portnox provides security for organizations with NAC / NAM next-generation solutions. Portnox solutions allow you to control any user and any device including IoT, BYOD, mobile devices regardless of the location and type of connection to the network.
Portnox was founded in 2007. The company offers its global clients solutions that reduce risks and tighten network control.
Softprom by ERC - the official distributor of Portnox in Europe and the CIS countries.

About TrapX Security

TrapX has created a new generation of deception technology that provides real-time breach detection and prevention. Their field proven solution deceives would-be attackers with turn-key decoys (traps) that “imitate” your true assets. Hundreds or thousands of traps can be deployed with little effort, creating a virtual mine field for cyberattacks, alerting you to any malicious activity with actionable intelligence immediately.

TrapX Security is a leader in dynamic deception operations. Our deception-based solutions rapidly detect, analyze and defend against new zero day and APT attacks in real-time. DeceptionGrid™ provides automated, highly accurate insight into malware and malicious activity unseen by other types of cyber defense. They enable a pro-active security posture, fundamentally changing the economics of cyber defense by shifting the cost to the attacker. The TrapX Security customer base includes global 2000 commercial and government customers around the world in sectors including defense, healthcare, finance, energy, consumer products and other key industries.

Softprom by ERC - the official distributor of TrapX Security in Europe and the CIS countries.

Via Businesswire


A new suite of enterprise security solutions from ESET

16 Apr 2018 - the cybersecurity firm ESET ushers in a new generation of enterprise security products and services, bringing its 30 years of expertise to market at RSA 2018.

The standouts in the latest suite of enterprise offerings include the all-new ESET Enterprise Inspector, an Endpoint Detection and Response (EDR) solution with features and granularity that surpass anything on the market; and ESET Dynamic Threat Defense, a tool that provides off-premise cloud sandboxing, which leverages machine learning and behavior-based detection to prevent zero-day attacks.

ESET also says goodbye to ESET Remote Administrator and hello to the all-new ESET Security Management Center, an enterprise-grade server that provides visibility management and reporting across all operating systems.

All of ESET’s enterprise solutions integrate seamlessly into this single pane of glass and allow for visibility into threats like zero-days, APTs and botnets while also making adjustments to policies and configurations of endpoint security products seamless and easy.

“We traveled around the world to talk to enterprise IT security specialists, to hear what their needs were,” said ESET CTO Juraj Malcho. ”What we found is that they needed a single console that allowed for visibility into all stages of threat interception: prediction, prevention, detection and remediation. So that is what we made. And, you won’t find us using the term ‘next-gen’ in any of our messaging or product names, because the reality is, since 2005 we have been doing what people are just now calling ‘next-gen.’ We are focused less on hype and more on R&D, and on building solutions that work.”

ESET’s enterprise solutions are built by cybersecurity experts and backed by machine learning. The use of machine learning to automate decisions and evaluate possible threats is a vital part of ESET’s approach – but it is only as strong as the people who stand behind the system.

Human expertise is paramount in providing the most accurate threat intelligence possible due to threat actors being intelligent opponents. ESET’s endpoint products contain a cloud reputation system that feeds relevant information about the most recent threats and benign files. ESET’s reputation system, ESET LiveGrid®, is made up of 110 million sensors worldwide and verified by research & development centers, which allows customers to have the highest level of confidence when viewing information and reports within their console.

The enterprise-ready products and services being debuted at RSA 2018 include the following:


  • ESET Security Management Center
  • ESET Enterprise Inspector
  • ESET Dynamic Threat Defense


  • ESET Threat Monitoring
  • ESET Threat Hunting
  • ESET Threat Intelligence (re-release)


“I think many people don’t know that ESET has some of the most iconic enterprise companies in the world as customers,” concluded Malcho. “Now, more enterprises will be able to leverage ESET to respond and react to the increasing volume and sophistication of cyberattacks.”


Contact us


V-Ray for Rhino updated for Rhino 6

The latest V-Ray for Rhino now supports Rhino 6.2 and above. Chaos Group also made some overall improvements to make your rendering workflow faster, smoother and more productive.


Get the update


Chaos Group also recently added V-Ray to Grasshopper, so you can render parametric designs without leaving Grasshopper. Check out Jan Kokol’s blog post to see how he’s used it to create astonishing images.


Want to see what else is new?
Download a 30-day trial of V-Ray for Rhino — even if you've tried it before!


RackStation RS2418+/RS2418RP+ Designed for businesses needing flexible storage

TAIPEI, Taiwan—Mar 29, 2018 — Synology® Inc. today launched RackStation RS2418+/RS2418RP+, a 2U, 12-bay rackmount NAS providing easy-to-scale storage capacity with affordable total cost of ownership (TCO) for small- and medium-sized businesses.


RS2418+/RS2418RP+ supports up to 144TB raw capacity in a single 2U chassis. The storage capacity can be further expanded up to 288TB when connected to one RX1217/RX1217RP, providing on-the-fly volume expansion.

"RS2418+/RS2418RP+ is designed to solve common IT challenges for small- and medium- sized businesses: budgets are tight, data volume is increasing rapidly, and IT staff is limited." said Jason Fan, Product Manager at Synology Inc. "RS2418+/RS2418RP+ is designed to solve these challenges. It offers scalable storage capacity with affordable TCO, at the same time providing versatile software applications which make it ideal to serve as a file server, a centralized backup target, or a hub-and-spoke backup target for distributed businesses."


RS2418+/RS2418RP+ is powered by an Intel® Atom® C3538 quad-core CPU and 4GB DDR4 non-ECC UDIMM RAM, expandable up to 64GB with four 16GB ECC UDIMMs. The four plug-and-play Gigabit Ethernet LAN ports come by default and can be expanded with higher performance 10GbE NIC through the PCIe 3.0 slot, providing over 1,400 MBps sequential throughput and 38,900 iSCSI random IOPS.

The PCIe slot can also seat the M.2 SSD adapter card, which can significantly boost the performance through the SSD cache, ideal for applications like database storage, multiple user file server, or video editing.

RS2418+/RS2418RP+ runs on DiskStation Manager, the advanced and intuitive operating system for Synology NAS devices, with various applications offered to enhance work productivity.

Synology has received numerous media accolades, topping the mid-range NAS category in TechTarget's storage solution survey and winning PC Mag Readers' Choice seven years in a row.


For more information on RS2418+/RS2418RP+, please visit



Improve collaboration in Google Docs, Sheets, and Slides with Activity dashboard

G Suite makes it easier for users to collaborate efficiently and effectively. An important part of collaboration is deciding how and when to follow up with others.

To help inform these decisions, G Suite introducing Activity dashboard in Google Docs, Sheets, and Slides. It’s a feature that lets users with edit access see who has viewed the file and when they viewed it.

For example, a user can check if a coworker has seen a file already and alert them that it’s been updated. Or an account manager can judge the best way to follow up with a partner, depending on whether that partner has viewed the materials they previously sent.

As of March 7th, G Suite administrators have access to new Admin console settings to control the Activity dashboard feature for their domain or the organizational units (OUs) within it.

On March 21st, end users will begin to see Activity dashboard in Docs, Sheets, and Slides.


Understand when user viewing data will be visible

A file’s Activity dashboard contains viewing data, which is information on who viewed the file and when they viewed it.

The viewing data that’s shown in the dashboard depends on both your organization’s Admin console settings and a user’s individual settings:

  • As an admin, you can determine whether viewing data from your organization’s users is shown in Activity dashboard. Specifically, you can choose to make viewing data for your organization’s users visible, not visible, or only visible within your organization.
    See the “Review and change your organization’s Activity dashboard settings” section below for more information.
  • If you make viewing data visible for your organization, your users can still choose to exclude their individual viewing data from showing in Activity dashboard via their personal privacy settings. If an admin makes their organization’s viewing data not visible, your end users won’t be able to choose to share their viewing data.
    See the “End user controls for Activity dashboard” section below for more info.

Users with edit access to a file and who belong to the same domain as the file’s owner will be able to see that file’s Activity dashboard and any viewing data which is available in it.


When Activity dashboard becomes available to users, they’ll see a notification in Google Docs, Sheets, and Slides that explains the feature and their control options.
Activity dashboard will only show viewing data for a user after they see this notification. It will not display any activity from before they saw it.


All users will have access to privacy settings that allow them to control whether their views show up in Activity dashboard at any time.

For more information and to change settings, users can see the Activity dashboard Help Center article for users.



Activity dashboard access: Available to G Suite Business, Enterprise, Education, and Nonprofit editions only. Users will be able to see the Activity dashboard for a file if they have edit access to that file.

Activity dashboard viewing data visibility settings: All users have access to privacy settings for Activity dashboard, as data from users in all G Suite editions can appear in the dashboard.



Synology C2 Backup Now Available to Users Worldwide

Taipei, Taiwan — March 19, 2018 — Synology® Inc. announced the general availability of the Synology C2 Backup service to users worldwide.

Initially established to meet the increasing demands from European customers for a secure and highly-integrated cloud backup solution, C2 Backup now allows precious data stored on Synology NAS around the world to retain copies on Synology's Europe-based cloud storage in case of disaster recovery.

C2 Backup has sustained high growth in the six months following the initial launch. Its data center in Frankfurt has expanded in response to the overwhelming popularity and the increasing storage demand. The level of customer satisfaction is attested by the subscription retention rate, with over 96% of new users continuing their subscription after the free trial.
All the success in the European market proves the service to be a well-optimized and cost-effective solution, and it stands to reason that the same solution will benefit even more customers in more countries.

"The flexibility of cloud backup in terms of low barrier to entry and strong future scalability plays a key role in the rapid growth of this market. With the demand for offsite data protection on the rise, we have received numerous requests from regions outside EMEA to expand our C2 Backup coverage," said Jia-Yu Liu, Director of Application Group at Synology Inc. "We are happy to announce that all users around the world can now enjoy the same seamless backup experience designed specifically for Synology NAS."


Synology C2 Backup offers two plans for users with different requirements:

Plan I fulfills essential backup needs with the following features:

  • Daily backup with regular retention
  • Up to 11 backup versions for the past 30 days
  • Flexible plan selection of 100GB, 300GB, and 1TB storage capacities

Plan II provides users that require advanced data protection with the following features:

  • Flexible backup schedules
  • Customizable retention policies
  • Data deduplication for storage usage optimization
  • Terabytes of storage capacity


Synology C2 Backup offers a 30-day free trial for new subscribers to try the solution in their production deployment environments.



Synology Introduces RackStation RS3618xs

Agile storage solution to scale with your business


TAIPEI, Taiwan — March 1, 2018 — Synology® Inc. today launched RackStation RS3618xs, a 12-bay rackmount NAS providing excellent performance, effortless capacity scaling and optimized virtualization solutions for expanding businesses.


RS3618xs is a 2U RackStation NAS powered by an Intel® Xeon® D-1521 quad-core CPU and 8GB DDR4 ECC UDIMM RAM, expandable up to 64GB.

The four plug-and-play Gigabit Ethernet LAN ports can be expanded with higher performance 10GbE NICs through the PCIe 3.0 slot, providing over 3,900 MBps throughput and 143,500 iSCSI IOPS.


Besides the native 12-drive support, the storage capacity can be further expanded up to 432TB when connecting to two RX1217(RP), providing on-the-fly volume expansion. Its capability to support massive storage space on demand makes it ideal to serve as a virtualization solution, a centralized file server, a backup target or iSCSI storage.

"RS3618xs is an enterprise storage solution that meets the demands of large enterprises," said Jason Fan, Product Manager at Synology Inc. "Businesses can benefit from its comprehensive storage technology, including instant snapshots, SSD caching and high availability, keeping data safe and increasing efficiency."


RS3618xs runs on DiskStation Manager, the advanced and intuitive operating system for Synology NAS devices, with various applications such as file sharing, data backup, or collaboration tools to enhance work productivity.

Certified by VMware®, Citrix®, Microsoft Hyper-V®, and OpenStack Cinder®, RS3618xs can be seamlessly integrated into a company's virtualization environment.


For more information on RS3618xs, please visit


Synology has received numerous media accolades, topping the mid-range NAS category in TechTarget's storage solution survey and winning PCMag Readers' Choice Award seven years in a row.



Have a perpetual license?

Move to subscription and save on the latest software of your choice.


Autodesk industry collections at 25% off - ideal if you need more than one Autodesk product

Get the most out of your favorite software. Industry collections combine leading products with specialized solutions to optimize your workflows so you can do more, faster, with greater confidence.

You can buy 1-year subscriptions or for 3-year subscriptions, please contact your Autodesk Reseller.


Save up to 25% on individual products

You can also trade in any eligible old licenses and trade up to the newest individual products of your choice.

AutoCAD®, AutoCAD LT®, Civil 3D®, Revit®, Inventor®, 3ds Max® and others.

Buy 1- or 3-year subscriptions from your Reseller


How do I get this offer?

Simply trade in your qualifying old perpetual license(s) and purchase a new 1- or 3-year subscription to any eligible collection or individual product of your choice.

Once you submit your perpetual license(s), you agree to discontinue use of the traded-in license(s).
This offer ends April 20, 2018.

Can I get a different product than I have now?

You do not need to purchase the same product as the perpetual trade-in license. For example, you can trade in an old, eligible perpetual license of AutoCAD and subscribe to a collection at the promotional price.


Contact us >>


Softprom by ERC and FireEye sign distribution agreement for the CIS market

Softprom by ERC, a Value Added Distributor today announced it has signed a distribution announcement with intelligence-led security company, FireEye. 

Under the agreement, Softprom by ERC is authorized to distribute all FireEye security products and solutions to partners in Azerbaijan, Armenia, Belarus, Georgia, Kazakhstan, Kyrgyzstan, Moldova, Tajikistan, Turkmenistan, Uzbekistan and Ukraine.


Softprom by ERC identified FireEye as a strong partner in the directions of cyber security and malware protection. FireEye's solutions provide security of data centre, industrial systems and critical infrastructure security, enterprise network security and endpoint security, as well as solutions for small and midsize businesses.


“Our target is to enhance the value added to our partners and provide the best security portfolio for solving key tasks customers of our partners. With FireEye, we strengthen our position as a value-added distributor of Security solutions,” said Paul Zhdanovych, managing director at Softprom by ERC.


High storage capacity NAS ideal for growing businesses

February 1, 2018 — Synology® Inc. launched RackStation RS2818RP+, a 3U 16-bay NAS providing large storage capacity with affordable total cost of ownership (TCO) for small-sized and medium-sized businesses.

High storage capacity NAS ideal for Growing Businesses


RS2818RP+ is Synology's first 3U RackStation NAS in the Plus Series product line, supporting up to 16 drive bays with up to 192TB raw capacity. The storage capacity can be further expanded up to 336TB when connecting to one RX1217(RP), providing on-the-fly volume expansion.

"One of the common challenges for modern small- and medium-sized businesses is finding a storage solution that can store large amounts of data while having the flexibility to scale when business grows," said Jason Fan, Product Manager at Synology Inc. "RS2818RP+ offers large storage capacity with affordable TCO. It is ideal to serve as a centralized backup target, a file server or a hub-and-spoke backup target for distributed businesses."


RS2818RP+ is powered by an Intel® Atom® C3538 quad-core CPU and 4GB DDR4 non-ECC UDIMM RAM, expandable up to 64GB with four 16GB ECC UDIMMs. The four plug-and-play Gigabit Ethernet LAN ports can be expanded with higher performance 10GbE NICs, providing over 1,400 MBps sequential read throughput and 26,000 random write IOPS.

RS2818RP+ can be purchased together with Synology's Extended Warranty (EW202) service, available in select regions worldwide, to provide up to 5 years of hardware warranty coverage.


RS2818RP+ runs on DiskStation Manager, the advanced and intuitive operating system for Synology NAS devices, with various applications offered to enhance work productivity. Synology has received numerous media accolades, topping the mid-range NAS category in TechTarget's storage solution survey and winning PC Mag Readers' Choice seven years in a row.


Protect your business! 7 tools of cybersecurity that entrepreneur needs

If you do not take proactive steps to protect the digital assets of your business, then you are definitely at risk. Approximately 43% of all cyberattacks, according to Symantec, are focused on small business - in part because they are large enough to be valuable, but also small enough to be vulnerable.

In addition, according to the National Alliance for Cybersecurity, 60 percent of small and medium-sized businesses that were hacked went out of business six months after cyberattacks.

Therefore, the conclusion suggests: enterprises that do not invest enough in their cybersecurity probably do not invest enough in other areas of their business. But statistics are still a concern, so if you want to protect your business, you need to make the investments and updates necessary for security.

The problem is that for an inexperienced entrepreneur or business without an official IT department, the world of cybersecurity is very confusing. Fortunately, you do not need to be a technical expert to make reasonable decisions regarding investment and protection. In fact, there are many tools that can protect you from the vast majority of potential attacks.

Here are some of the most important security tools that you will need for your business:

Password tools

According to Deloitte, your passwords are one of the biggest vulnerabilities in your business, with 90 percent of the passwords being weak enough and available for hacking. Choosing strong passwords, managing them effectively and changing them often are some of the best ways to prevent any cybercrime. The whole problem is where to store passwords securely. Therefore, a security tool such as Hideez Key can help. It stores up to 1000 passwords to your accounts in social networks, mail, cloud services, local applications. In order to enter the password, just press the button on the keyfob or the "hot key" on the keyboard.


You also need to use a virtual private network (VPN), which can encrypt all of your network traffic. The only network vulnerability is all that is required for an attacker to gain access to all your data, so invest in a tool such as Portnox Clear. The solution provides continuous monitoring of local and remote network devices, cloud environments regardless of the type of connection: wired, wireless, VPN.

Antivirus software 

You also need to invest in antivirus software for your devices. Antivirus software is not a reliable bet to protect you from hackers, but it will keep you up to date if your computer is infected with malware, and scans e-mail attachments to make sure they are not malicious. AVG Technologies offers free anti-virus software for individual users and special packages for businesses. In the market there is also McAfee and other options.


Invest in a firewall that will monitor incoming and outgoing traffic, filter out specific threats, and even block some sites altogether. The firewall will not protect you from all the threats on the Internet, but this is an additional level of insurance, which you should not refuse.

Better equipment

Old computers, servers and other hardware can be less expensive, but they create much more serious security risks. They tend to use older software and have security holes that are known and exploited for years. Make sure that you update your equipment regularly, every few years.

Better software (for all)

You will also need to pay close attention to what software and applications you use for tasks such as data storage, communication and project management. Each individual platform has its strengths and weaknesses, so choose vendors you trust with a long history of protecting customer data.


Finally, invest in training and awareness of your employees. Most hacks are explained by human mistakes, so more educated employees will be able to prevent them. Allocate time each month to check for updates, and remind your employees about the importance of habits, such as changing passwords regularly and avoiding suspicious links.

Stay alert!

Over the past 2 years, more than 14 million companies have been "hacked", but your business should not be next in line. While you make a reasonable investment, regularly monitor and improve the habits of your employees, and commit to stay abreast of the latest digital threats, you will significantly reduce your risks. Whatever you do, you have the right to protect your business from cyber threats.


EXCLUSIVE: Predictions in the field of cybersecurity from the CEO of Portnox

Blocking and hacking applications

Many believe that the blockade is not subject to hacking. But last year the number of attacks on applications based on block connections increased. Vulnerabilities do not arise from the block chain itself, but rather from applications that run on the block chain.

One of the most striking examples is Bitfinex hacking in August 2016, which resulted in the stolen bitcoin worth $ 60 million. Hacking was possible due to the fact that Bitfinex changed the encryption method, which makes it easier for hackers to access passwords and secret keys. Social engineering will be used more often to extract these secret keys, so the external development of the block chain is a risk, suggests Ofer Amitai, CEO and co-founder of Portnox.

DDoS ransomware

The creation of a new and more acute form of blackmail, DDoS and ransomware combine efforts to curtail progress in digital transformations that bring monetary benefits. These attacks are made possible by the use of botnets or large groups of "zombie" devices, which are often Internet of Things devices, such as web cameras, to redirect traffic to infected malicious web addresses, which in turn extract data from accessible endpoint and require redemption to return these encrypted data. One such example is the use of the Mirai botnet devices to activate inactive WannaCry viruses for reactivation due to the direction of their movement into the kill-switch domain.

These attacks are often called "failures" attacks, because DDoS traffic is directed to sites containing dangerous malicious programs. Thanks to the widespread adoption of Internet of Things devices at the enterprise and the increase in requirements for redemption, we are likely to see more of these attacks in the next year. The trend is heightened by the popularity of crypto conversions that an anonymous payment system has made available to hackers so that they can demand more and extend their foreclosure activities.

Workflow mobility

One of the clear trends for 2018 is to increase the mobility of the work process. With a large number of employees working remotely, organizations significantly reduce their capital costs (many even abandoned the physical office space) while simultaneously channeling operating costs to digital transformation trends, such as the cloud and BYOD.

The organization's mobility is good for the balance of companies, but the flexibility of technology makes cyber security vulnerable, which can serve as a gateway to hackers into the corporate network. Thus, companies that are tuned to mobile trends in the workflow will invest in more complex solutions for endpoints, networks and cloud solutions that protect access and assets in various locations and in various related environments.

Increasing IoT security regulation

The rules governing IoT security functions are already beginning to operate, but the demand from consumers is still low.

It is a serious question whether the US government or the EU will introduce security rules for IoT device manufacturers that protect consumers and companies from digital (and even physical) risk. Therefore, together with the GDPR and other organizations in 2018, we are likely to see more government and industry members (such as NIST) stepping up work to ensure compliance with the rules of confidentiality, general security and safety for IoT manufacturers. This can also lead to an increase in the cost of IoT devices.


Softprom by ERC signs Global Distribution Agreement with Imperva

Softprom by ERC, a value-added distributor, announced that they have signed a distribution agreement with Imperva, a cyber security leader that delivers solutions to protect data and applications in the cloud and on-premises. Softprom by ERC will offer Imperva solutions to partners in Azerbaijan, Belarus, Georgia, Kazakhstan, Moldova, Tajikistan, Turkmenistan, Uzbekistan and certain regions of the Ukraine.


Softprom by ERC will proactively engage partners and help them to understand the benefits of best-in-class cyber security solutions from Imperva. Imperva has been recognized as a leader in web application firewall and DDoS mitigation reports from top analyst firms. 


"We are excited to work with Imperva as this crucial relationship helps us to expand and develop our Information Security division. Through this relationship, our in region partners have access to a winning combination of market leading cybersecurity solutions from Imperva and our outstanding services, training and sales support capabilities," said Alexander Georgiev, head of the security department at Softprom by ERC.


“Softprom by ERC is a leading CIS value-added distributor known for providing outstanding professional services in testing, training, installation, implementation and technical support. We’re excited to add them as a distributor and to help accelerate the strong growth and interest that we see in the region. Together we’ll work to help enterprises protect their business-critical data and applications,” said Piotr Kluczwajd, Imperva area vice president for Eastern Europe, Russia, CIS and Turkey.



About Imperva
Imperva® (NYSE:IMPV) is a leading provider of cyber security solutions that protect business-critical data and applications. The company’s SecureSphere, Incapsula and Skyfence product lines enable organizations to discover assets and risks, protect information wherever it lives – in the cloud and on-premises – and comply with regulations.

The Imperva Application Defense Center, a research team comprised of some of the world’s leading experts in data and application security, continually enhances Imperva products with up-to-the-minute threat intelligence, and publishes reports that provide insight and guidance on the latest threats and how to mitigate them. Imperva is headquartered in Redwood Shores, California. 


About Softprom by ERC
Softprom by ERC is a leading Value Added Distributor in the Eastern Europe and CIS markets to which trust more than 1000 partners. 

The company provides professional services in testing, training, installation, implementation and technical support.  At the moment, Softprom by ERC has more 40 distribution contracts with the world's largest vendors. 


Women in cybersecurity: scholarship program launched

The ISC Cybersecurity Scolarship Program is implemented by the Cybersecurity and Education Center. With the global labor shortage in cybersecurity and the lack of representation of women in this field (only 10%), this program was created in order to attract more women to cybersecurity. In total, ISC and the Center for Cybersecurity and Education have allocated more than $ 1 million in cybersecurity scholarships.

"By this program, we want to inspire more women to build an interesting career in cybersecurity," said Patrick Craven, director of the Center for Security and Education in Cybernetics. "I look forward to rewarding worthy students with the financial help they need to realize their dreams."

The Center evaluates candidates based on academic excellence, passion for the industry and financial needs. Since 2011, the Women's Scolarship Program (ISC) had a positive impact:

"It was such an honor for me to receive this scholarship," said Ai Nguyen (USA). "This reduced the financial burden on my parents, and also allowed me to work less and have more time to focus on studying security. Getting this scholarship makes me believe that my hard work has really paid off, and there are so many people who still care about students, especially about women's education and success. I will definitely try my best to apply what I got, and spend all my time on the computer science community. "

"I am extremely grateful to ISC and the Cybersecurity and Education Center for choosing me for this prestigious scholarship," said Aventika Ramesh (USA). "My classes would not be possible without the generous support of fellows, such as ISC and the Center for Cybersecurity and Education."

"Being in the information security community for more than four years, I have always followed events and seminars around the world," said Mudita Khurana (India). "I am very grateful to them for giving me the opportunity to expand my knowledge in information security."

For more information about the ISC scholarship program, look to the page.