News by Professionals 4 Professionals

internet

Wedge Offers Vulnerable Businesses WannaCry & Future Ransomware Threat Protection as Free Trial

Wedge Offers Vulnerable Businesses WannaCry & Future Ransomware Threat Protection As Free Trial

Wedge Advanced Malware Blocker

Wedge Offers Vulnerable Businesses WannaCry & Future Ransomware Threat Protection As Free Trial

Wedge Networks

WedgeAMB Uses Multiple Layers of Network Security to Detect and Immediately Block WannaCry and Future Variants of Ransomware Providing Immediate Protection

CALGARY, ALBERTA, CANADA, May 24, 2017 /EINPresswire.com[1]/ — Wedge Networks, the leader in real-time network threat prevention, today announced a Prevention First program making virtual machine (VM) versions of the Wedge Advanced Malware Blocker (WedgeAMB) immediately available as free trial systems to protect enterprise networks while companies re-evaluate their threat prevention strategies. Countless businesses and institutions globally were caught off guard and unprotected by the WannaCry ransomware attack over the past week. WedgeAMB uses a unique combination of patented real-time deep content inspection with four different cutting edge security technologies to detect and immediately block new zero-day multi-vectored threats such as WannaCry ransomware and much more. For a limited time, Wedge is offering free access to WedgeAMB VMs to concerned network operators for up to 90 days, providing them with advanced threat prevention while they seek budget approvals for longer term requirements.

Security is evolving as rapidly as new threats such as the WannaCry ransomware attacks , said James Hamilton, CEO of Wedge Networks, Inc. Enterprises are challenged to keep up with investigating and evaluating new security technologies to protect against brand new, never before encountered threats. They need solutions that provide immediate protection against new threats as they emerge, without having to wait hours or days for their vendor to issue a new signature or software update. WedgeAMB provides this level of new threat prevention and we want to make it available to companies with a concern about their current vulnerability to these attacks. That s why we ve launched the Prevention First program.

Computex used the recent release of the WannaCry ransomware-worm as an opportunity to validate the efficacy of the Wedge NetworksAMB solution in identifying the new WannaCry variants and sanitizing them from the network stream. The WedgeAMB appliance blocked all known variants of WannaCry as well as the worm s proliferation efforts via the Microsoft SMB vulnerability exploit mechanism said Jason Robohm, Practice Manager of Cybersecurity for Computex Technology Solutions. “Our customers were not impacted by WannaCry because Computex understands the importance of cybersecurity and has always been a step ahead of the bad guys in helping protect our clients. We recommend, deploy and manage solutions like Cylance Protect and Wedge Networks for our customers. Our relentless focus on cybersecurity coupled with our disciplined approach to keep IT assets current, patched and secure powered by our Managed Services team has always yielded the great results a CISO strives for,” said Faisal Bhutto, Computex VP of Enterprise Networking, Cloud, & Cybersecurity. The WannaCry ransomware is reported to have been delivered using different threat vectors. In some cases, phishing attacks were used to deliver the ransomware payload, in other cases a worm, exploiting a vulnerability in Microsoft SMB v1.0 servers was used. WedgeAMB employs a combination of technologies which makes it uniquely positioned to defend against these multi-vectored attacks. The 100 Mbps and 1 Gbps VM versions of WedgeAMB are available for a free download and trial period evaluation. Interested parties can register for a free trial and evaluation system by visiting www.WedgeNetworks.com[2] or via this trial registration link[3].

As a VM, WedgeAMB will run on standard, commercial off the shelf server hardware which enterprise customers can procure online or from local computer stores. The VM can be loaded on a variety of virtualization hosts which are also available online. Details on the required virtualization environment can be found on the WedgeAMB data sheet[4]. By the end of the 90-day evaluation period, customers can convert to a fully licensed VM systems or purchase an appliance. There is no obligation to purchase a WedgeAMB license or appliance. About WedgeAMB and Free Evaluation System

WedgeAMB is one of the key security application sets supported on the Wedge s Absolute Real-time Protection (WARP) Series of network security products. WedgeAMB is available in both appliance and virtual machine (VM) versions, supporting 100 Mbps, 1 Gbps, and soon 10 Gbps network connections. WedgeAMB is typically placed in-line at the enterprise or datacenter location, where it conducts a combination of deep packet and deep content inspection, including the real-time creation of fully reconstructed MIME objects (web pages, word, PDF, power point, excel documents, etc.) and subjects them to an orchestrated, multi-thread scanning with IPS/IDS, signature-based AV, heuristic-based AV, and AI-based anti-malware. This comprehensive analysis is completed in milliseconds, allowing malware to be detected and immediately blocked at the network level, before content is delivered to endpoints. Further information on WedgeAMB is available on the Wedge Networks website, or in this link to a WedgeAMB product brochure[5].

WedgeAMB is based upon the same award winning Wedge security technologies and software that lead to Gartner s inclusion of Wedge Networks in their 2016 Cool Vendor report for cyber security.

About Wedge Networks:

Wedge Networks is revolutionizing real-time network security with cutting edge innovation, performance, and scale. Embracing global innovation, Wedge s Cloud Network Defense (WedgeCND ) and Absolute Real-Time Protection (WedgeARP ) Series of products integrate and orchestrate the industry s highest performance security inspection and mediation engines with best-in-class security technologies developed by Wedge and third parties. Purpose-built as fully virtualized security systems, these products can be deployed in the form of x86 appliances, virtual machines, or cloud application software. Today, these industry-leading solutions block security threats for tens of millions of end users in enterprise, service provider, government agency, and security-as-a-service networks spanning more than 17 countries.

Wedge Networks is headquartered in Calgary, Canada with international offices in Dallas, USA; and Manama, Bahrain. Visit http://www.wedgenetworks.com/[6] for more information

Kate Fly
Zonic Group PR
+1 512 751 4637
email us here[7]

Wedge Advanced Malware Blocker

Wedge Offers Vulnerable Businesses WannaCry & Future Ransomware Threat Protection As Free Trial

References

  1. ^ EINPresswire.com (www.einpresswire.com)
  2. ^ www.WedgeNetworks.com (www.WedgeNetworks.com)
  3. ^ trial registration link (wedgenetworks.com)
  4. ^ WedgeAMB data sheet (wedgenetworks.com)
  5. ^ WedgeAMB product brochure (wedgenetworks.com)
  6. ^ http://www.wedgenetworks.com/ (www.wedgenetworks.com)
  7. ^ email us here (www.einpresswire.com)

Timeline of events: Disruptive passenger’s travel to Hawaii

Fighter jets were scrambled to escort an American Airlines[1] flight to Honolulu after a disruptive passenger’s laptop caused fear among flight attendants that it may contain explosives. Here’s a timeline of events involving Anil Uskanli’s travel to Hawaii.

12:03 a.m., Friday, May 19: Anil Uskanli uses a credit card to purchase a ticket to Honolulu at Los Angeles International Airport. He later goes through a security checkpoint.

Around 2:45 a.m. PDT: He opens a door to an airfield ramp and walks up to a contractor asking where he can get food, according to airport police. The contractor calls airport police, and officers arrive. Officers notice that he smells of alcohol, but there are no visible signs he’s drunk. Police issue a citation for misdemeanor trespassing, confiscate his boarding pass and walk him out to a public area of the airport. He then goes back, gets another boarding pass for the flight and goes through security screening again.

8:43 a.m. PDT: American Airlines Flight No. 31 pushes off from the gate. Uskanli is the first passenger to board, carrying only a laptop, phone and some items in his pockets, according to a criminal complaint.

9:10 a.m. PDT: The Airbus[2] A321 is airborne, carrying 181 passengers and six crew members. Passengers seated near Uskanli notice his strange behavior, including talking to himself and talking about being a famous actor. At one point, he goes to use the bathroom, but he doesn’t lock the door. He gets upset when a passenger walks in and starts yelling and pounding on walls, according to the complaint.

During six-hour flight: Uskanli moves out of his assigned seat, 35B, and walks toward the front of the plane while carrying his laptop and with a blanket wrapped around his head. A flight attendant pushes a drink cart down the aisle to block him, the complaint said. Several passengers, including an off-duty law enforcement agent, stand up to help. Uskanli puts his laptop on the drink cart. Flight attendants are frightened of the laptop because of warnings that laptops may contain explosives that are undetected by airport screening. The off-duty officer sits with him for the remainder of the flight.

About 9:50 a.m. HST, Friday May 19: An airline corporate security representative notifies FBI that the flight has enacted safety precautions because of a disruptive passenger.

About 10:30 a.m. HST: Hawaii National Guard receives a request to check out an aircraft heading to Honolulu, according to spokesman Lt. Col Charles Anthony. They scramble two F-22 Raptors from Joint Base Pearl Harbor-Hickam to meet the plane and escort it to Honolulu International Airport.

11:35 a.m. HST: The plane lands. Local law enforcement officers, FBI agents and bomb technicians secure the plane and seize the laptop, according to the complaint. Dogs sweep the aircraft. All passengers and carry-on bags are re-screened. Checked bags are inspected by an explosive detection canine team. No explosives are found. Passengers are bused to the terminal. Uskanli is taken into custody, signs a waiver of his rights and consents to an interview with FBI agents. He consents to a urine test and a series of field sobriety tests. The urinalysis is presumptively positive for benzodiazepine[3], and the field tests show possible use of stimulants or cannabis.

May 20: U.S. Magistrate Judge Barry Kurren signs the FBI affidavit, finding that there is probable cause for a charge of interference with flight crew members and attendants.

May 22: The criminal complaint is filed in federal court in Honolulu. Uskanli remains held at the Honolulu Federal Detention Center.

1:45 p.m. HST, May 22: Uskanli appears in federal court in Honolulu for a brief initial appearance. He speaks briefly with a Turkish interpreter. Federal Public Defender Peter Wolff requests a competency evaluation. Kurren orders the evaluation.

AP Airlines Writer David Koenig in Dallas and AP Writer Michael Balsamo in Los Angeles contributed to this report.

References

  1. ^ American Airlines (abcnews.go.com)
  2. ^ Airbus (abcnews.go.com)
  3. ^ benzodiazepine (abcnews.go.com)

Security as a Service? We want it, say IT leaders

Until recently, security was cloud’s Achilles Heel. Now, many are turning to the cloud itself to provide needed security.

Security As A Service? We Want It, Say IT Leaders Photo: Joe McKendrick

That’s one of the takeaways of a recent survey[1] of 401 IT professionals, released by Insight, a technology services provider. Overall, the survey shows, IT professionals graded their current IT infrastructure an average of “B,” a modest uptick from a “B minus” in 2016. Cloud computing has, for all intents and purposes, simply become “computing.”

The survey finds Software as a Service (57 percent) and Security as a Service (51 percent) rank as the leading cloud computing models that companies are adopting, followed by Infrastructure as a Service (39 percent) and Disaster Recovery as a Service (34 percent). The survey also finds enterprises are embracing the Internet of Things. Almost half of respondents report they are embedding IoT into their technology strategies around consumer engagement. Security (55 percent) and the cloud (44 percent) as the top two areas in which tech decision-makers stated that their IT budgets need to grow. Close to two-thirds report data security is paramount when it comes to investing in cloud services, suggesting the question of the cloud’s safety is a pressing one for many IT personnel

For many organizations, cloud adoption also can be messy affairs. More than three out of 10 report data availability concerns in a cloud environment, and one-third of respondents worry that implementation of cloud services is too disruptive to their organizations.

Most technology decision makers (84 percent) say their organizations invested in cloud services over the past year. For most, it’s a mixed, hybrid approach reflecting a gradual evolution. While only 15 percent have fully migrated their corporate application workloads to public clouds, 47 percent are more than halfway implemented in the cloud, with large and medium companies leading the way. A majority are also seeing benefits from their cloud efforts. Sixty-one percent report a more flexible and collaborative IT environment. Interestingly, 59 percent also report they have a safer data environment as a result of moving to cloud. Additional benefits seen include better remote access (55 percent), improved support from providers (48 percent), faster speed to market (36 percent), and a reduction in capital expenditure fees (35 percent).

That last item on the list is worth noting — cost savings is the lowest-ranked benefit seen from cloud. Ironically, cost savings is usually the top business case made for moving to cloud, and survey after survey shows this as the leading reason. But as things get underway, businesses begin to realize less-tangible, but harder-hitting benefits such as flexibility and security. Technology influencers identify security (55 percent) and the cloud (44 percent) as the top two areas in which their IT budgets need to grow. Marketing (33 percent), sales (33 percent), and mobile (30 percent) comprise the second tier for desired budget growth. While IT leaders are generally satisfied with the state of their infrastructures, they still face challenges when it comes to optimization, with upgrading existing hardware and software as the biggest pain point (53 percent), followed by application integration (38 percent) mobile device integration (34 percent), and better visibility into traffic patterns and data management (32 percent).

In fact, 63% of IT personnel say their companies have begun to adopt a “bimodal” IT approach,where one group focuses on predictability and operations, and another group focuses on innovation. IT as a profession is getting closer to the customer action.

It’s interesting to follow the money in measuring bimodal IT stances. Organizations plan to align 37% of their 2017 IT budgets to maintenance of existing equipment and 32% to adoption of new technologies.

Follow daily IT routines as well to gauge bimodal IT adoption. Nearly half of today’s IT professionals are concentrating on the customer: 49% are concerned with improving the customer experience, and 38% are focused on more consistent customer engagement. Not only are today’s IT professionals tasked with operations inside the organization, but they are now expected to address customer needs as well.At the same time, more than three out of 10 report that ongoing maintenance and support “is their biggest pain point.”

References

  1. ^ survey (www.insight.com)
1 2 3 184