Posts Tagged ‘enterprise’

Phone Firewall Can Identify Rogue Cell Towers Trying to Intercept Your Calls | WIRED

Wednesday, September 3rd, 2014

Rogue cell phone towers can track your phone and intercept your calls, and it’s only a matter of time before they’re as ubiquitous as GPS trackers. But at least now there’s a way to spot them.A firewall developed by the German firm GSMK for its secure CryptoPhone lets people know when a rogue cell tower is connecting to their phone. It’s the first system available that can do this, though it’s currently only available for enterprise customers using Android phones.GSMK’s CryptoPhone 500, a high-end phone that costs more than $3,000 and combines a Samsung Galaxy S3 handset with the CryptoPhone operating system, offers strong end-to-end encryption along with a specially hardened Android operating system that offers more security than other Android phones and the patented baseband firewall that can alert customers when a rogue tower has connected to their phone or turned off the mobile network’s standard encryption.

via Phone Firewall Can Identify Rogue Cell Towers Trying to Intercept Your Calls | Threat Level | WIRED.

Seagate Reveals World’s First 8TB Hard Drive | Digital Trends

Wednesday, August 27th, 2014

hard-drive-4-970x0

Seagate, a company known for making many of the world’s hard drives for eons, just announced that it is shipping the world’s first 8TB hard disk drive. Seagate made the announcement in this official blog post.

It wasn’t too long ago that Seagate announced a 6TB 3.5-inch hard drive, and just like that disk, this new 3.5-inch 8TB model is geared toward data centers and big businesses. As more and more people get online, and as more content is consumed on the Internet, the servers used to store and run those sites and services need to grow as well. That’s where drives like Seagate’s new 3.5-inch 8TB monster come in.

Related: Seagate release 6TB 3.5-inch hard drive for enterprise

“As our world becomes more mobile, the number of devices we use to create and consume data is driving an explosive growth in unstructured data,” Seagate exec Scott Horn says. “This places increased pressure on cloud builders to look for innovative ways to build cost-effective, high capacity storage for both private and cloud-based data centers.”

On top of this drive’s massive size, Seagate claims that the drive is super energy efficient, stating that it has the best watts-per-GB ratio in the enterprise storage space.

On the surface, this doesn’t seem to mean much for the average consumer. However, as the cost of running data centers rises, paired with the never-ending growth in Internet and cloud-based content and services that rely on servers to run, it’s important for hard drives to keep expanding in size as well. Otherwise, the rising costs associated with running these data centers could, at least in part, be passed on to the average Joe and Jane.

via Seagate Reveals World’s First 8TB Hard Drive | Digital Trends.

Can BlackBerry Become The Next Security Superpower?

Thursday, July 31st, 2014

BlackBerry announced its intent to acquire Secusmart. It’s a company that offers high-security voice and data encryption and anti-eavesdropping solutions for government organizations, enterprises and telecommunications service providers. BlackBerry had previously partnered with the company to offer Secusmart’s technology to its customers. John Chen said “We have addressed eavesdropping concerns with Secusmart, who has been a partner since 2009 and we currently have the SecuSUITE for BlackBerry 10. It’s a solution used by Germany’s Federal Office for Information Security for classified communications between the country’s top officials, including Chancellor Angela Merkel.”What to take away from the transaction? In case you hadn’t noticed, BlackBerry is fully retrenched on the enterprise and highly regulated industries. The company cut a deal with Amazon and Android that allows BlackBerry users to have access to more than 200,000 Android applications, including thousands of popular apps and games. Effectively, this allows BlackBerry to have consumer apps without requiring developers to build apps for its operating system. As a result, BlackBerry developers can focus their resources on creating more lucrative enterprise apps.BlackBerry is hanging its hat on becoming the next security company…and that’s not a bad thing. BlackBerry is making progress with its Enterprise Mobility Management EMM solution but this is a tough market to win against the likes of Vmware/Airwarch and Mobileiron. However, Mobileiron’s IPO is good for BlackBerry because there will be tighter pressure on the company to demonstrate good margins and revenue growth, not just customer wins. While the recently announced Apple and IBM partnership appears to make this harder, the focus of that partnership is on apps and analytics.

via Can BlackBerry Become The Next Security Superpower?.

Microsoft to Patch Critical Internet Explorer Zero-Day Vulnerability Today!

Tuesday, June 10th, 2014

IE update

Internet Explorer update

Today Microsoft has released its Advance Notification for the month of June 2014 Patch Tuesday releasing seven security Bulletins, which will address several vulnerabilities in its products, out of which two are marked critical and rest are important in severity.

This Tuesday, Microsoft will issue Security Updates to address seven major vulnerabilities and all those are important for you to patch, as the flaws are affecting various Microsoft software, including Microsoft Word, Microsoft Office and Internet Explorer.

CRITICAL VULNERABILITY THAT YOU MUST PATCH

Bulletin one is considered to be the most critical one, which will address a the zero-day Remote Code Execution vulnerability, affecting all versions of Internet Explorer, including IE11 in Windows 8.1.

All server versions of Windows are affected by this vulnerability, but at low level of severity because by default, Internet Explorer runs in Enhanced Security Configuration and just because Server Core versions of Windows Server do not include Internet Explorer, so are not affected.

The vulnerability allows a remote attacker to execute arbitrary code using JavaScript, but so far, the zero-day flaw is not known to have been used in any attacks, according to Microsoft. “The Update for Internet Explorer addresses CVE-2014-1770, which we have not seen used in any active attacks.”

Microsoft kept hidden this critical Internet explorer Zero-Day vulnerability from all of us since October 2013, but last month the team at ‘Zero Day Initiative’ disclosed the vulnerability publically when Microsoft failed to respond and patch this flaw within 180 days after receiving the details from security researcher.

The second Bulletin addresses one or more flaws in both Windows and Office products. It is also a Remote Code Execution vulnerability and rated ‘Critical’ on all versions of Windows including Server Core; Microsoft Live Meeting 2007 Console and all versions of Microsoft Lync, excluding the Lync Server. The flaw is also rated ‘Important’ for Office 2007 and Office 2010.

These critical security updates are really important for users to patch and both the patches will require a restart after the installation of the new versions.

OTHER IMPORTANT PATCHES TO INSTALL

Remaining five bulletins will address one or more remote code execution vulnerabilities in Office, an information disclosure bugs in Windows, information disclosure bugs in Lync Server, a Denial of Service (DoS) bug in all Windows versions since Vista, and a “tampering” vulnerability in Windows including Windows 7, 8.x and Server 2012.

NOT FOR XP THIS TIME

Microsoft will not release any security update for its older version of Windows XP, like last month it provided an ‘out-of-band security update’ for Windows XP machines affected by the zero-day vulnerability.

Microsoft stopped supporting Windows XP Operating System. So, if you are still running this older version of operating system on your PCs, we again advise you to move on to other operating system in order to receive updates and secure yourself from upcoming threats.

via Microsoft to Patch Critical Internet Explorer Zero-Day Vulnerability Next Tuesday – The Hacker News.

Red Hat Touts Linux Containers For Cloud – InformationWeek

Thursday, April 17th, 2014

Red Hat is turning to lightweight Linux containers to package workloads for transport to the cloud. As others take a rival approach sponsored by VMware-originated Cloud Foundry, Red Hat is standing by its OpenShift platform as a future element of OpenStack clouds.

…..

Red Hat isn’t necessarily using containers to compete with VMware. Rather, the company hopes that in some cases, developers will package applications in containers, thus stepping over the large VMware presence in the enterprise datacenter on their way to the cloud.

Cormier said Linux containers form a solid basis for planning hybrid cloud operations, where workloads sometimes run in an enterprise datacenter and other times are shuffled out to run in a public cloud. Red Hat offers a service to verify whether containerized applications have been formatted properly, and it will certify cloud servers as ready to run such workloads.

To support this approach,

via Red Hat Touts Linux Containers For Cloud – InformationWeek.

List of Features – sipXecs – Avaya SBC

Wednesday, April 9th, 2014

All the sipXecs application services are allocated to specific server roles. Using the centralized cluster management system each role can be instantiated on a dedicated server or several (all) roles can be run on a single server. Configuration of all services and participating servers is fully automatic and Web UI based.

SIP Session Router, optionally geo-redundant and load sharing

Media server for unified messaging and IVR (auto-attendant) services

Conferencing server based on FreeSWITCH

XMPP Instant Messaging (IM) and presence server (based on Openfire)

Contact center (ACD) server

Call park / Music on Hold (MoH) server

Presence server (Broadsoft and IETF compliant resource list server for BLF)

New: Shared Appearance Agent server to support shared lines (BLA)

Group paging server

SIP trunking server (media anchoring and B2BUA for SIP trunking & remote worker support)

Call Detail Record (CDR) collection & processing server

Third party call control (3PCC) server using REST interfaces

Management and configuration server

Process management server for centralized cluster management

via List of Features – sipXecs – SIPfoundry Wiki.