<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives - ICT News</title>
	<atom:link href="https://www.ict-news.org/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ict-news.org</link>
	<description>Information &#38; Communication technology world news</description>
	<lastBuildDate>Fri, 28 Apr 2017 07:50:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.9.3</generator>

<image>
	<url>https://www.ict-news.org/wp-content/uploads/2018/03/ICT-icon-3.png</url>
	<title>Security Archives - ICT News</title>
	<link>https://www.ict-news.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Old Windows Server machines can still fend off hacks. Here&#8217;s how</title>
		<link>https://www.ict-news.org/old-windows-server-machines-can-still-fend-off-hacks-heres/</link>
					<comments>https://www.ict-news.org/old-windows-server-machines-can-still-fend-off-hacks-heres/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Fri, 28 Apr 2017 07:50:38 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Cybercrime]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Servers]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.ict-news.org/?p=7757</guid>

					<description><![CDATA[<p>Old Windows Server machines can still fend off hacks. Here&#8217;s how Many businesses still use Windows Server 2003, even as Microsoft no longer supports the OS If you&#8217;re running a Windows Server 2003 machine, you have a problem. Your already-vulnerable computer is now at severe risk of being hacked. That&#8217;s due to the internet release earlier this month of a batch [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ict-news.org/old-windows-server-machines-can-still-fend-off-hacks-heres/">Old Windows Server machines can still fend off hacks. Here&#8217;s how</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Old Windows Server machines can still fend off hacks. Here&#8217;s how</h1>
<h2>Many businesses still use Windows Server 2003, even as Microsoft no longer supports the OS</h2>
<p>If you&#8217;re running a Windows Server 2003 machine, you have a problem. Your already-vulnerable computer is now at severe risk of being hacked.</p>
<p>That&#8217;s due to the internet release earlier this month of a batch of updates that paint a bull&#8217;s-eye on computers running Windows Server 2003, according to security researchers.</p>
<p>“I can teach my mom how to use some of these exploits,” said Jake Williams, founder of Rendition Infosec, a security provider. “They are not very complicated at all.”</p>
<p>Experts are urging affected businesses to upgrade to the latest Windows OSes, which offer <a href="http://www.pcworld.com/article/3190161/security/microsoft-past-patches-address-leaked-nsa-exploits.html">security patches</a> that can address the threat.</p>
<aside class="nativo-promo smartphone"></aside>
<p>But some, particularly those in manufacturing and healthcare, cannot because they rely on legacy software that won&#8217;t run on a modern operating system.</p>
<p>“It’s usually very costly to upgrade,” he said. “And again, the machine is working fine, but control has to be done through Windows Server 2003.”</p>
<p>There may be more than 500,000 Windows Server 2003 machines publicly exposed to the internet, <a href="https://www.renditioninfosec.com/2017/04/shadow_brokers_windows_exploits/">according to Shodan</a>, a search engine for devices. But Williams estimates there are many more vulnerable machines running behind company firewalls.</p>
<p>So, for those that can’t, here are some tips to keep your old Windows Server 2003 machine secure.</p>
<h3><strong>The danger</strong></h3>
<p>The spying tools include several Windows-based exploits, or hacking programs, that target the Windows Server Message Block (SMB) protocol, which is used for file-sharing purposes. The exploits work by remotely triggering the OS to execute code, which can be used to install other malware.</p>
<h3><strong>Network segmentation and monitoring</strong></h3>
<p>Companies saddled with older Windows Server machines can still protect themselves. Williams suggests they go beyond putting vulnerable servers behind a firewall, and use a tactic called network segmentation.</p>
<p>This can involve restricting access to your most critical servers, and ensuring only system admins can control them. “So instead of giving 20,000 people in a company access, you can cut that number down to 20,” Williams said.</p>
<p>Thus, if hackers ever do breach the firewall, they’ll have access to a smaller segment of the corporate network.</p>
<p>Network segmentation also doesn’t cost a lot of money. Enterprise internet routers often contain access control features that can limit which computers can talk to what, Williams said.</p>
<p>Businesses should also consider monitoring the vulnerable servers, or at least the ones carrying critical information. Any unusual data traffic moving through them is probably a sign they’ve been hacked, he said.</p>
<h3><strong>Weighing the risks</strong></h3>
<p>To keep malicious activity out of vulnerable systems, <a href="http://computerworld.com/article/3002516/security/deploying-application-whitelisting-nist-has-some-advice-for-you.html">application whitelisting</a> can also be used, said Jason Leitner, president of Below0Day, an IT security provider.</p>
<p>Whitelisting works by allowing only trusted applications to run on a computer. It’s the opposite approach of antivirus products, which essentially blacklists malicious programs based on known indicators.</p>
<p>Businesses can also create backups of any sensitive data stored in these machines. One malicious threat that’s been growing in recent years has been <a href="http://computerworld.com/article/3152052/security/ransomware-became-one-of-the-top-threats-to-enterprises-this-year.html">ransomware</a>. It works by infecting a computer, and encrypting all the data inside. To free the machine, victims have to pay a ransom, usually in bitcoin.</p>
<p>However, even with these safeguards, the best solution to protecting a vulnerable Windows Server system is to upgrade, according to security experts.</p>
<p>Although it might be costly in the short term, the investment can help businesses avoid a disastrous data breach. Tiago Henriques, CEO of security firm BinaryEdge, encourages businesses to calculate which is higher: “The cost of buying the upgrade or the damage to their brand and their clients if they get hacked?”</p>
<p>&nbsp;</p>
<p>By <a href="http://www.computerworld.com/author/Michael-Kan/" rel="author">Michael Kan</a>, source by <a href="http://www.computerworld.com">ComputerWorld</a></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> website to learn more about <a href="https://www.ict-hardware.com/">Microsoft Products</a></p>
<p>The post <a rel="nofollow" href="https://www.ict-news.org/old-windows-server-machines-can-still-fend-off-hacks-heres/">Old Windows Server machines can still fend off hacks. Here&#8217;s how</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/old-windows-server-machines-can-still-fend-off-hacks-heres/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Oracle fixes Struts and Shadow Brokers exploits in huge patch release</title>
		<link>https://www.ict-news.org/oracle-fixes-struts-shadow-brokers-exploits-huge-patch-release/</link>
					<comments>https://www.ict-news.org/oracle-fixes-struts-shadow-brokers-exploits-huge-patch-release/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Fri, 21 Apr 2017 09:51:59 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Oracle]]></category>
		<category><![CDATA[Patch Management]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.ict-news.org/?p=7742</guid>

					<description><![CDATA[<p>Oracle fixes Struts and Shadow Brokers exploits in huge patch release The quarterly Oracle patch update fixes a record 299 security vulnerabilities Oracle has released a record 299 security fixes for vulnerabilities in its products, including patches for a widely exploited vulnerability in the Apache Struts framework and a Solaris exploit supposedly used by the U.S. National Security Agency. The [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ict-news.org/oracle-fixes-struts-shadow-brokers-exploits-huge-patch-release/">Oracle fixes Struts and Shadow Brokers exploits in huge patch release</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>Oracle fixes Struts and Shadow Brokers exploits in huge patch release</h1>
<section class="deck viewability">
<h2>The quarterly Oracle patch update fixes a record 299 security vulnerabilities</h2>
</section>
<div class="cat-social">
<p>Oracle has released a record 299 security fixes for vulnerabilities in its products, including patches for a widely exploited vulnerability in the Apache Struts framework and a Solaris exploit supposedly used by the U.S. National Security Agency.</p>
<p>The Struts vulnerability allows for remote code execution on Java web servers and was patched on March 6. Attackers have quickly adopted it and <a href="http://www.cio.com/article/3188344/security/apache-struts-2-exploit-used-to-install-ransomware-on-servers.html">have used it in widespread attacks</a> since then.</p>
<aside class="fakesidebar"><strong>[ MySQL face-off: <a href="http://www.infoworld.com/article/3133856/cloud-computing/mysql-face-off-amazon-outscales-google.html#tk.ifw-infsb">Amazon vs. Google</a>. | Learn how to <a href="http://www.infoworld.com/article/2615974/applications/how-to-get-started-with-mysql.html#tk.ifw-infsb">get started, step by step, with MySQL</a>. | Also on InfoWorld: <a href="http://www.infoworld.com/article/2616674/database-administration/10-essential-performance-tips-for-mysql.html#tk.ifw-infsb">10 essential performance tips for MySQL</a> | Track the latest trends in open source with InfoWorld&#8217;s <a href="http://www.infoworld.com/newsletters/signup.html#tk.ifw-infsb">Linux Report newsletter</a>. ]</strong></aside>
<p>Oracle uses Apache Struts 2 in several of its products, which is why Tuesday’s critical patch update (CPU) fixed 25 instances of the vulnerability in Oracle Communications, Retail and Financial Services applications, as well as in the MySQL Enterprise Monitor, Oracle WebCenter Sites, Oracle WebLogic Server and the Siebel E-Billing app.</p>
<p>The company also fixed the vulnerability behind the EXTREMEPARR exploit for Solaris 10 that was leaked recently by a group called Shadow Brokers as part of <a href="http://www.csoonline.com/article/3188965/security/latest-shadow-brokers-exploit-dump-poses-little-threat.html">a larger data dump of alleged NSA cyber tools</a>. Another Solaris exploit that was part of the same arsenal and was dubbed EBBISLAND has been patched since 2012 in Solaris 10 Update 11, Oracle said.</p>
<p>Oracle’s quarterly patch bundle contains fixes for 40 vulnerabilities that are rated as critical, 25 of which have the highest severity score of 10 in the Common Vulnerability Scoring System (CVSS). Overall, 162 out of the 299 patched vulnerabilities are remotely exploitable.</p>
<p>Oracle’s applications for specific industry sectors—financial services, retail, communications, utilities, hospitality, health sciences and insurance—account for almost 40 percent of all security fixes this quarter, according to <a href="https://erpscan.com/press-center/blog/analyzing-oracle-security-oracle-critical-patch-update-april-2017/">an analysis</a> by security vendor ERPScan.</p>
<p>Oracle business-critical applications like Oracle PeopleSoft, E-Business Suite, JD Edwards, Siebel CRM and the Primavera Products Suite received 83 security fixes.</p>
<p>“Nowadays, hackers set their eyes on enterprises more than on individuals, as they understood that this option is more profitable,” said Alexander Polyakov, CTO at ERPScan. “Taking into account that Oracle’s products are installed in the largest enterprises, these applications can be the ultimate target.”</p>
<p>On the database side, Oracle patched 39 vulnerabilities in MySQL and 3 in its Oracle Database Server. Java also received 8 security fixes.</p>
<p>Triaging and deploying the patches that make up this Oracle CPU, the largest ever for the company, will be a lot of work for systems administrators. The size of Oracle’s quarterly updates has steadily increased over the years, raising the question of whether a monthly update cycle instead of a quarterly one wouldn’t be more appropriate.</p>
</div>
<p>By <a href="http://www.infoworld.com/author/Lucian-Constantin/" rel="author">Lucian Constantin</a>, source by <a href="http://www.infoworld.com">InfoWorld</a></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> website to get more info about <a href="https://www.ict-hardware.com/">Oracle Products</a></p>
<p>The post <a rel="nofollow" href="https://www.ict-news.org/oracle-fixes-struts-shadow-brokers-exploits-huge-patch-release/">Oracle fixes Struts and Shadow Brokers exploits in huge patch release</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/oracle-fixes-struts-shadow-brokers-exploits-huge-patch-release/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>6 steps to securing your email</title>
		<link>https://www.ict-news.org/6-steps-securing-email/</link>
					<comments>https://www.ict-news.org/6-steps-securing-email/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Wed, 22 Mar 2017 09:16:11 +0000</pubDate>
				<category><![CDATA[HP]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.ict-news.org/?p=7669</guid>

					<description><![CDATA[<p>6 steps to securing your email Is your company&#8217;s email providing a tempting route for cyber criminals to attack your business? Hackers continue to target businesses with phishing attacks. Once opened, these malicious email messages can hijack an entire company&#8217;s financial information and gain access to funds and personal information. Email is a business essential, but also an easy avenue [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ict-news.org/6-steps-securing-email/">6 steps to securing your email</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 id="PAT2:TITLE" class="hero">6 steps to securing your email</h1>
<p>Is your company&#8217;s email providing a tempting route for cyber criminals to attack your business? Hackers continue to target businesses with phishing attacks. Once opened, these malicious email messages can hijack an entire company&#8217;s financial information and gain access to funds and personal information. Email is a business essential, but also an easy avenue for hackers to use and abuse. How can you keep your business secure?</p>
<h2>The human factor</h2>
<p>Businesses of all sizes face vulnerabilities via email. When email accounts are hacked and compromised, cyber criminals can gain access to information including user names, telephone numbers, birthdates, passwords, and unencrypted security questions.</p>
<p>Email is a common entry point for hackers because it&#8217;s an easy way to exploit the weak link in cybersecurity policies: humans. Employees rushing through their emails can easily click on a malicious link. No wonder that a recent survey reveals some 90% of cyber attacks initiate with email.<sup>1</sup></p>
<p>Today, hackers are becoming more sophisticated than ever in their approach to email hacking. They&#8217;ve expanded from &#8220;phishing&#8221;—which tricks recipients into opening malicious emails or clicking on bad links—to now &#8220;spear phishing.&#8221; This new approach relies on emails that appear to be from a trusted sender, such as the company&#8217;s CEO, a vendor, or the business&#8217;s bank, in order to fool recipients. Companies affected by these attacks lost productivity, money, and intellectual property.</p>
<h2>Email do&#8217;s and don&#8217;ts</h2>
<p>Don&#8217;t wait for your business to be victimized before you take action. Taking a few simple steps can help shore up any email vulnerabilities your business may have. Here are the do&#8217;s and don&#8217;ts to follow.</p>
<ol>
<li><strong>Do educate employees in the basics of email security.</strong> For example, remind them to pay attention to where an email came from before clicking on attachments or links. Cyber criminals excel at crafting legitimate-looking emails that appear to come from the IRS, banks, or health insurance providers. One clue to fraud is an email address that&#8217;s slightly &#8220;off&#8221; (for instance, the letter &#8220;o&#8221; is replaced with the numeral &#8220;0&#8221; or the letter &#8220;l&#8221; is replaced with the numeral &#8220;1&#8221;). Grammatical errors, typos, and low-resolution logos are other warning signs. Explain to your team that financial, government, and law enforcement institutions do not request personal information or passwords via email. And teach them it&#8217;s better to be safe than sorry: If an email from a familiar source seems strange, contact the sender to double-check its authenticity.</li>
<li><strong>Don&#8217;t make email your default communication method.</strong> Think twice about sharing sensitive data over email or attaching documents with sensitive information. Consider using cloud-based file-sharing services instead. (Make sure the service you choose uses appropriate security measures.) Send a link to the file and limit access only to those who need it.</li>
<li><strong>Do require frequent password resets—at least every six months.</strong> Instruct employees how to create strong passwords and to keep them safe—not just posted on their computer or keyboard. Remind employees not to share their passwords with others. In case they give in to temptation, create an added layer of security by using PCs equipped with <a title="Opens in a new window" href="http://www8.hp.com/us/en/solutions/mobility/mobility-moment.html" target="_blank">multi-factor authentication</a>. Biometric identification such as fingerprints or facial recognition can provide additional security to reduce the risk of compromised emails.</li>
<li><strong>Don&#8217;t access your business email over public networks.</strong> While using a coffee shop&#8217;s Wi-Fi to check your email is common for today&#8217;s mobile workforce, it can put your business&#8217;s data at risk. Public networks are vulnerable to hackers who can exploit your laptop or mobile device as an &#8220;in&#8221; to your business network. Set up a virtual private network (VPN) to use when accessing email outside the office, and enable two-factor authentication of your email accounts for times when a public network is your only option.</li>
<li><strong>Do provide physical protection. </strong>Employees working on laptops in public places can expose email passwords to prying eyes. Shield your business from this risk by equipping notebooks with <a title="Opens in a new window" href="http://store.hp.com/us/en/mdp/accessories-88342--1/privacy-screens" target="_blank">privacy filters</a>. The <a title="Opens in a new window" href="http://store.hp.com/us/en/mdp/laptops/elitebook-folio-14-243568--1#!&amp;Tab=features" target="_blank">HP EliteBook 1040</a> and <a title="Opens in a new window" href="http://store.hp.com/us/en/mdp/elitebook--zbook---probook/elitebook-800--14-243565--1" target="_blank">HP EliteBook 840</a> feature HP&#8217;s Sure View integrated privacy screen, which darkens at the touch of a button.<sup>2</sup> The <a title="Opens in a new window" href="http://www8.hp.com/us/en/campaign/computersecurity/workwise.html" target="_blank">HP WorkWise</a><sup>3</sup>smartphone app locks and unlocks your PC if you step away from it, and instantly alerts you if your PC is tampered with.</li>
<li><strong>Don&#8217;t forget to terminate email access as soon as an employee leaves the company.</strong> Even if a worker leaves on good terms, cyber criminals could discover the person&#8217;s email password and use it to access your network. Shutting down former employees&#8217; email access protects against potential threats.</li>
</ol>
<h2>Better safe than sorry</h2>
<p>Set and enforce strict email usage policies, enlist the right technology to protect your network, and you&#8217;ll be able to rest assured you&#8217;ve done all you can to keep your business safe from email-based attacks.</p>
<p>&nbsp;</p>
<p><sup>[1] Cloudmark, <a class="icon-ext" title="Opens in a new window" href="https://blog.cloudmark.com/2016/01/13/survey-spear-phishing-a-top-security-concern-to-enterprises/" target="_blank">Survey Reveals Spear Phishing as a Top Security Concern to Enterprises</a><br />
[2] HP Sure View integrated privacy screen is an optional feature that must be configured at purchase expected to be available Q2 2017.<br />
[3] HP WorkWise smartphone app is available as a free download on the Apple Store and Google Play.</sup></p>
<p>Source by <a href="http://www8.hp.com">HP</a></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> website to get more info about <a href="https://www.ict-hardware.com/">HP Products</a></p>
<p>The post <a rel="nofollow" href="https://www.ict-news.org/6-steps-securing-email/">6 steps to securing your email</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/6-steps-securing-email/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Is Windows 10 the most secure Windows ever?</title>
		<link>https://www.ict-news.org/windows-10-secure-windows-ever/</link>
					<comments>https://www.ict-news.org/windows-10-secure-windows-ever/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Mon, 20 Mar 2017 09:05:40 +0000</pubDate>
				<category><![CDATA[HP]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://www.ict-news.org/?p=7654</guid>

					<description><![CDATA[<p>Is Windows 10 the most secure Windows ever? It&#8217;s easy to poke fun at &#8220;12345&#8221; passwords and phish-y emails, but PC security is tough for the average user to manage. And if you&#8217;re a network admin, it&#8217;s even tougher to deal with security slipups that infect the whole network. That&#8217;s where the new Windows Defender Security Center will come in [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.ict-news.org/windows-10-secure-windows-ever/">Is Windows 10 the most secure Windows ever?</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 id="PAT2:TITLE" class="hero">Is Windows 10 the most secure Windows ever?</h1>
<p>It&#8217;s easy to poke fun at &#8220;12345&#8221; passwords and phish-y emails, but PC security is tough for the average user to manage. And if you&#8217;re a network admin, it&#8217;s even tougher to deal with security slipups that infect the whole network.</p>
<p>That&#8217;s where the new Windows Defender Security Center will come in handy. Debuting spring 2017 as part of the Creators Update, it&#8217;s an efficient suite of security features that&#8217;ll help users avoid hacking, malware, and other threats. You can view and control your security protections—the applications running in the background that most users don&#8217;t often think about—all in one place.</p>
<p>It&#8217;s simple, really: The Defender Security Center is a dashboard where users can get a full security overview of their system. And if a problem is discovered, the security center makes it easy to solve it. The Center is also a place to customize security across what Microsoft has deemed &#8220;the five pillars of protection&#8221;:</p>
<p><strong>Virus and threat protection</strong> allows you to view your anti-malware app, whether you&#8217;ve chosen to use the Windows Defender Antivirus app that comes with Windows 10 or a third-party app. If you&#8217;ve chosen the Windows Defender Antivirus app for your network, you can scan results directly on the screen. (A third party app will just appear on your screen and you can launch it from there.)</p>
<p><strong>Device performance and health</strong> displays your latest Windows updates, battery life, storage capacity, and drivers. This is also where you can access the &#8220;Refresh Windows&#8221; feature, which helps you do a clean install while saving your files and settings.</p>
<p><strong>Firewall and network protection</strong> gives you information on network connections and firewall settings, helping you find network issues and troubleshoot them.</p>
<p><strong>App and browser control</strong> lets you adjust your SmartScreen settings and tips you off to possible malicious sites and downloads, as well as unrecognized internet apps and files.</p>
<p><strong>Family options</strong> is a consumer feature. According to Microsoft, you can also view the health and safety of your personal devices from this centralized location,<sup>1</sup> which helps make all your PCs running Windows 10 more secure and manageable.</p>
<h2>How can Defender Security Center help your business?</h2>
<p>It&#8217;s a security tool that can be especially handy for remote workers who have to troubleshoot their devices without hands-on support. And by making it easier for the average user to secure their devices on a day-to-day basis, you&#8217;re saving your IT staff time and money—not to mention catching small problems before they become big ones.</p>
<p>Excited about checking out the Defender Security Center (and the entire Creators Update)? This spring you can give it a try on the <a title="Opens in a new window" href="http://store.hp.com/us/en/pdp/Laptops/hp-elitebook-x360-1030-g2-notebook-pc---customizable-x3u18av-mb" target="_blank">HP EliteBook x360</a>, the world&#8217;s thinnest and most secure business convertible<sup>2</sup>, and the <a title="Opens in a new window" href="http://store.hp.com/us/en/pdp/Laptops/hp-elite-x3-and-hp-elite-x3-desk-dock-x9u42ut-aba" target="_blank">HP Elite x3</a>, the world&#8217;s first built for business 3-in-1 device.<sup>3</sup>The <a title="Opens in a new window" href="http://www8.hp.com/us/en/ads/elite-products/overview.html" target="_blank">HP Elite</a> series—enhanced with HP Sure Start Gen3<sup>4</sup> and <a title="Opens in a new window" href="http://www8.hp.com/us/en/campaign/computersecurity/workwise.html" target="_blank">HP WorkWise</a><sup>5</sup> protection—also supports other Windows 10 security features, such as Windows Hello and the monthly Windows Update, that work together to make sure your device security is up-to-date.</p>
<p><strong><a title="Opens in a new window" href="http://www8.hp.com/us/en/campaign/computersecurity/index.html" target="_blank">Learn more ways to stay one step ahead of hackers, thieves, and unauthorized users</a></strong></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><sup>[1] Windows, <a class="icon-ext" title="Opens in a new window" href="https://blogs.windows.com/windowsexperience/2017/01/23/introducing-windows-defender-security-center/#zslucUj86b63TZxg.97" target="_blank">Introducing Windows Defender Security Center</a><br />
[2] Most secure based on HP’s unique and comprehensive security capabilities at no additional cost among vendors with &gt;1M annual sales as of December 1, 2016 on HP Elite PCs with Intel 7th Gen Intel® Core<img src="https://s.w.org/images/core/emoji/13.1.0/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> processors, Intel® integrated graphics, and Intel® WLAN. Thinnest Based on competitors with &gt;1m units annually of convertible, non-detachables having a Windows Pro OS and 6th or 7th generation U series Intel® Core<img src="https://s.w.org/images/core/emoji/13.1.0/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> vPro<img src="https://s.w.org/images/core/emoji/13.1.0/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> processors.<br />
[3] Based on HP&#8217;s internal analysis as of May 11, 2016 of mobile devices delivering phablet, laptop, and desktop business productivity, preinstalled with Windows 10 Mobile, MIL-STD 810G and IP67 testing, the ability to run virtualized corporate apps on a big screen using an optional dock, and a biometric solution for security.<br />
[4] Available on HP Elite products equipped with Intel® 7th generation processors.<br />
[5] HP WorkWise smartphone app is available as a free download on the Apple Store and Google Play.</sup></p>
<p>Source by <a href="http://www8.hp.com">HP</a></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> to get more info about <a href="https://www.ict-hardware.com/">HP Products</a></p>
<p>The post <a rel="nofollow" href="https://www.ict-news.org/windows-10-secure-windows-ever/">Is Windows 10 the most secure Windows ever?</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/windows-10-secure-windows-ever/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Mobile World Congress 2017: HP debuts 2-in-1 device with Windows 10</title>
		<link>https://www.ict-news.org/mobile-world-congress-2017-hp-debuts-2-1-device-windows-10/</link>
					<comments>https://www.ict-news.org/mobile-world-congress-2017-hp-debuts-2-1-device-windows-10/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Tue, 28 Feb 2017 10:22:09 +0000</pubDate>
				<category><![CDATA[HP]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Elite x3]]></category>
		<category><![CDATA[Pro x2]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://newsroom.ict-hardware.com/?p=7507</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://www.ict-news.org/mobile-world-congress-2017-hp-debuts-2-1-device-windows-10/">Mobile World Congress 2017: HP debuts 2-in-1 device with Windows 10</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="container-wrap  main-color "  style="padding-top:40px;padding-bottom:40px" ><div class="section-container container"><div class="vc_row vc_row-fluid row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner "><div class="wpb_wrapper">
	<div class="kleo_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<div class="post-lede">
<p>HP’s new Pro x2 with Windows 10 and Elite x3 accessories offer versatility and security for productivity in the mobile workforce</p>
</div>
<p>Today at Mobile World Congress 2017, HP Inc. unveiled a new 2-in-1 device powered by Windows 10, along with a range of accessories for the company’s x2 and x3 portfolio. Let’s take a closer look at what they announced.</p>
<h2><strong>The HP Pro x2 512 G2 with Windows 10</strong></h2>
<p>The new Pro x2 612 G2 is designed to inspire the way mobile professionals across a range of industries work – merging individuality and productivity with industrial design in a sleek and secure device.</p>
<p>The Pro x2 is a versatile 2-in-1 detachable with a touchscreen perfect for drawing with <a href="https://blogs.windows.com/windowsexperience/2016/04/22/a-closer-look-at-windows-ink/#3ovvcQSkLygXusd8.97">Windows Ink</a> or marking up webpages in Microsoft Edge. It’s built with multiple modes for commercial workflows including presentation mode, inking mode and notebook mode for productivity. The HP Pro x2 Collaboration Keyboard snaps easily into place on the device with magnetic connections, turning the Pro x2 into a notebook with backlit hot keys for conference calls. Tablet Mode in Windows 10 will allow your apps to scale smoothly and onscreen features to adapt for easy navigation. The Pro x2 also has a removable back cover and removable SSD, allowing customers to keep secure data on premises and make basic repairs and upgrades to their device on-site.</p>
<p><strong>Other features include:</strong></p>
<ul>
<li>The Pro x2 can also be configured with a choice of the latest 7th generation Intel processors, providing reliable performance to meet a variety of mobile end user’s needs.</li>
<li>For drawing and taking notes, the HP Active Wacom Pen with App Launch combined with the extended 165-degree kickstand make it easy to use Windows Ink to draw, annotate, and create presentations or documents.</li>
<li>With both USB-C and USB-A connections, you can quickly charge your device, connect to external monitors or transfer data quickly.</li>
<li>The Pro x2 offers up to 11 hours of battery life and can be charged up to 50 percent in 30 minutes.</li>
<li>Built-in smart card reader and anoptional fingerprint reader that allows you to login quickly and securely with Windows Hello.</li>
<li>Superior in-field serviceability enabling end users to do minor repairs on the SSD, kickstand and A/C adapter, and IT on WLAN/WWAN, storage, system board, battery or the LCD/touch module, the chassis and some other components.</li>
</ul>
<p><strong>Pricing and Availability:</strong> The HP Pro x2 612 G2 is available now at <a href="http://www.hp.com/go/prox2">http://www.hp.com/go/prox2</a>, starting at $979.</p>
<h2><strong>New accessories for the x2 and Elite x3 portfolio</strong></h2>
<p>HP’s x2 and x3 devices are designed with versatility in mind. Today, HP announced a new range of accessories for those devices, built to address a variety of commercial workflows.</p>
<p><strong>HP Pro x2 612 G2 Rugged Case: </strong>Ideal for customers in extreme work environments, this case features a 360-degree rotating hand strap, shoulder strap, stylus holder, optional port plugs and is compatible with the Pro x2’s keyboard.<strong> Pricing and Availability: </strong>The HP Pro x2 612 G2 Rugged Case is available now, starting at $49.</p>
<p><strong>HP Elite USB-C Dock: </strong>Turning your device into a virtual desktop, this new dock is enterprise IT ready, and is compatible with devices like the Pro x2 that have a multi-function Type-C USB port or devices with a Thunderbolt port.<strong> Pricing and Availability: </strong>The HP Elite USB-C Dock is expected to be available in March, starting at $129.</p>
<p><strong>HP USB-C Travel Hub: </strong>Ideal for mobile professionals who need access to additional peripheral ports while on-the-go, this solution delivers pass-through connectivity for displays and USB devices and charging for the Pro x2 or Elite x3 while the device is being used – with one USB-C cable.<strong> Pricing and Availability:</strong>The HP USB-C Travel Hub is available now, starting at $49.</p>
<p><strong>HP Elite x3 Mobile Scanning Solution: </strong>Designed to mobilize vertical workflows for retail, healthcare and field workers, the integrated barcode scanner can be used to check prices, access inventory and CRM information on-the-go and then seamlessly transition to the back-office with the ability to dock and connect to a large display, mouse, and keyboard for a full PC experience. <strong>Pricing and Availability:</strong> The HP Elite x3 Mobile Scanning Solution is available now, starting at $999 (this price includes the HP Elite x3).</p>
<p>It’s great to see partners including HP creating new devices broadening the Windows ecosystem to offer customers more choice and versatility.</p>
<p>By <a class="author url fn" title="Posts by Mollie Ruiz-Hopper" href="https://blogs.windows.com/windowsexperience/author/mollie/" rel="author">Mollie Ruiz-Hopper</a>, source by <a href="https://blogs.windows.com">Microsoft</a></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> to get more info about <a href="https://www.ict-hardware.com/">Microsoft Products</a>. <a href="https://www.ict-hardware.com/">ICT Hardware </a>is one of <a href="https://www.ict-hardware.com/">Microsoft Partners</a></p>

		</div> 
	</div> </div></div></div></div></div></section><!-- end section -->
<p>The post <a rel="nofollow" href="https://www.ict-news.org/mobile-world-congress-2017-hp-debuts-2-1-device-windows-10/">Mobile World Congress 2017: HP debuts 2-in-1 device with Windows 10</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/mobile-world-congress-2017-hp-debuts-2-1-device-windows-10/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>BROCADE INTRODUCES RUCKUS CLOUDPATH ES 5.1 SOFTWARE TO SECURE CONNECTED INTERNET OF THINGS DEVICES</title>
		<link>https://www.ict-news.org/brocade-introduces-ruckus-cloudpath-es-5-1-software-secure-connected-internet-things-devices/</link>
					<comments>https://www.ict-news.org/brocade-introduces-ruckus-cloudpath-es-5-1-software-secure-connected-internet-things-devices/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Fri, 17 Feb 2017 13:25:21 +0000</pubDate>
				<category><![CDATA[Brocade]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[RUCKUS CLOUDPATH ES 5.1]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Software]]></category>
		<guid isPermaLink="false">https://newsroom.ict-hardware.com/?p=7499</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://www.ict-news.org/brocade-introduces-ruckus-cloudpath-es-5-1-software-secure-connected-internet-things-devices/">BROCADE INTRODUCES RUCKUS CLOUDPATH ES 5.1 SOFTWARE TO SECURE CONNECTED INTERNET OF THINGS DEVICES</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="container-wrap  main-color "  style="padding-top:40px;padding-bottom:40px" ><div class="section-container container"><div class="vc_row vc_row-fluid row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner "><div class="wpb_wrapper">
	<div class="kleo_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p><em>Device Fingerprinting Enables Certificate-based IoT Device Security</em></p>
<p><strong>SAN FRANCISCO—RSA Conference 2017, Booth N4410—Feb. 15, 2017—</strong><a href="http://www.ruckuswireless.com/">RUCKUS WIRELESS</a><img src="https://s.w.org/images/core/emoji/13.1.0/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />, a part of Brocade, today announced version 5.1 of its Cloudpath<img src="https://s.w.org/images/core/emoji/13.1.0/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> ES security and policy management software. The latest software release enables organizations to automatically and securely connect Internet of Things (IoT) devices using certificates—the gold standard of device security—allowing IT to establish policies governing the behavior of those devices. In conjunction with the Cloudpath software certificate authority (CA) and supported standards-based protocols, the new capabilities allow organizations and IoT device manufacturers to easily and automatically secure a wide range of connected IoT devices without changing existing security infrastructure.</p>
<p>Gartner <a href="https://www.gartner.com/doc/3558917/forecast-internet-things--endpoints">REPORTS</a><a title="" href="http://newsroom.brocade.com/manual-releases/2017/Brocade-Introduces-Ruckus-Cloudpath-ES-5-1-Softwar#_ftn1" name="_ftnref1"><u>[1]</u></a> that IoT endpoints will reach an installed base of 20.4 billion units by 2020. In addition, AT&amp;T’s Cybersecurity Insights Report<a title="" href="http://newsroom.brocade.com/manual-releases/2017/Brocade-Introduces-Ruckus-Cloudpath-ES-5-1-Softwar#_ftn2" name="_ftnref2">[2]</a>, which surveyed more than 5,000 enterprises around the world, <a href="https://www.business.att.com/cybersecurity/docs/exploringiotsecurity.pdf">FOUND</a> that 85 percent of enterprises are in the process of or intend to deploy IoT devices. Yet, according to the report, a mere 10 percent of those surveyed feel confident that they could secure those devices against hackers.</p>
<p>“The use of IoT-connected devices is now poised to grow exponentially, with IoT technology investments expected to reach $1.29 trillion by the year 2020 across multiple vertical segments and industries,” said Rohit Mehra, vice president, network infrastructure, IDC. “As with other aspects of IT infrastructure and applications, security risks and vulnerabilities associated with IoT are now a key area of focus for enterprise IT and LoB managers on an ongoing basis. These enterprises, along with their technology solution providers, need to find reliable, cost-effective ways to better secure their connected IoT applications and infrastructure, a challenge that Ruckus seeks to address with these new capabilities.”</p>
<p>Cloudpath ES 5.1 software introduces device fingerprinting, a technique that allows IT to automatically identify IoT device types by comparing the device profile to a device fingerprint database. Together with other Cloudpath software features, the new release delivers the following benefits:</p>
<ul>
<li><strong>IT can automatically secure, using certificates, fingerprint-identified IoT devices.</strong> If the device is unable to use a certificate, a Ruckus Dynamic Pre-Shared Key<img src="https://s.w.org/images/core/emoji/13.1.0/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" /> can be used to secure it. Both approaches enable IT to establish IoT device-specific policies. For example, IoT devices may be authorized to connect only to the cloud service with which they’re associated.</li>
<li><strong>IT can continue to use existing RADIUS and CAs to secure non-IoT devices</strong>. By using Cloudpath software and its dedicated CA to secure IoT devices, organizations avoid reconfiguring their current AAA and CA security implementation or, worse, creating custom middleware to secure devices using an existing CA.</li>
<li><strong>Manufacturers can improve the security readiness of their IoT devices. </strong>They can leverage standards-based certificate retrieval protocols such as SCEP and EST, which are native to the Cloudpath CA.</li>
<li><strong>Managed service providers (MSPs) can add new tenants at will. </strong>MSPs can utilize the multitenant capabilities in the Cloudpath virtual deployment implementation, thereby reducing deployment costs and management overhead compared to deploying a separate instance of security and policy management software for each end customer.</li>
</ul>
<div></div>
<p>“Traditionally, configuring IoT devices has been a huge headache for IT. These devices not only expose organizations to new security threats, but often require manual onboarding, assuming they can be onboarded at all,” said Kevin Koster, chief Cloudpath architect, Ruckus Wireless Business Unit, Brocade. “Cloudpath helps IT departments ensure their IoT devices don’t put their network and their users at risk, while enabling IoT device manufacturers to meet their own customers’ need for IoT device security.”</p>
<p>The latest release of Cloudpath ES software will be generally available in the second quarter of 2017. For more information, please visit the Ruckus Wireless <a href="https://www.ruckuswireless.com/products/smart-wireless-services/cloudpath">WEBSITE</a>.</p>
<p><strong>About the Ruckus Wireless Business Unit</strong><br />
The <a href="https://www.ruckuswireless.com/">RUCKUS WIRELESS</a> Business Unit of Brocade delivers simply better wireless networking—and now wired switching as well—for enterprise, service provider, government, and small business customers worldwide. Ruckus is focused on technology innovation, partner ecosystems, and customer service—yielding the best possible wireless or wired experience for the most challenging indoor and outdoor environments. Its <a href="https://www.ruckuswireless.com/products">SMART WI-FI</a> platform delivers scalable, high-performance Wi-Fi with simplified control and management for on premise and cloud-based Wi-Fi deployments, along with new services for secure on-boarding, policy management, location services, and analytics that enable new business opportunities. <a href="https://www.ruckuswireless.com/products/campus-network-switches/brocade-icx-7000-family">THE BROCADE® RUCKUS ICX® 7000 FAMILY OF SWITCHES</a> provides flexible scalability and simplified management, meeting the needs of businesses and organizations of all types and sizes.</p>
<p>Source by <a href="http://newsroom.brocade.com">BROCADE</a></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> to get more info about <a href="https://www.ict-hardware.com/">Brocade Products</a></p>

		</div> 
	</div> </div></div></div></div></div></section><!-- end section -->
<p>The post <a rel="nofollow" href="https://www.ict-news.org/brocade-introduces-ruckus-cloudpath-es-5-1-software-secure-connected-internet-things-devices/">BROCADE INTRODUCES RUCKUS CLOUDPATH ES 5.1 SOFTWARE TO SECURE CONNECTED INTERNET OF THINGS DEVICES</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/brocade-introduces-ruckus-cloudpath-es-5-1-software-secure-connected-internet-things-devices/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>HP Inc. Protects Businesses from Web-Based Attacks with HP Sure Click</title>
		<link>https://www.ict-news.org/hp-inc-protects-businesses-web-based-attacks-hp-sure-click/</link>
					<comments>https://www.ict-news.org/hp-inc-protects-businesses-web-based-attacks-hp-sure-click/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Wed, 15 Feb 2017 10:25:53 +0000</pubDate>
				<category><![CDATA[HP]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Bromium Inc.]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://newsroom.ict-hardware.com/?p=7496</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://www.ict-news.org/hp-inc-protects-businesses-web-based-attacks-hp-sure-click/">HP Inc. Protects Businesses from Web-Based Attacks with HP Sure Click</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="container-wrap  main-color "  style="padding-top:40px;padding-bottom:40px" ><div class="section-container container"><div class="vc_row vc_row-fluid row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner "><div class="wpb_wrapper">
	<div class="kleo_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p>Company partners with Bromium Inc. to further strengthen the world’s most secure and manageable PCs</p>
<p>Palo Alto, Calif., Feb. 13, 2017 – At the RSA Conference 2017, HP Inc. today announced the addition of HP Sure Click technology to protect customers from web-based security threats. Building on the security solutions found on the world’s most secure and manageable PCs<sup>1</sup> , HP worked closely with <a href="https://www.bromium.com/">Bromium Inc.</a> to create a solution that helps organizations protect themselves from malware and ransomware accidently downloaded through an employee’s internet browsing activity. HP Sure Click will first be available on the award-winning HP EliteBook x360 1030 G2<sup>2</sup>.</p>
<p><em>“With 81 percent of IT security managers citing unsecure web browsers as a primary attack vector, organizations are challenged to protect themselves against this ever-evolving threat<sup>3</sup>,”</em> said Alex Cho, vice president and general manager, Commercial PCs, Personal Systems, HP Inc. <em>“By partnering with Bromium to create HP Sure Click, we provide exclusive hardware-enforced security for web browsers as a standard feature, giving both users and businesses the freedom to browse confidently.”</em></p>
<p>According to a recent survey of 400 CIOs, 68 percent say that attackers have become more sophisticated, making it difficult for users to differentiate between safe and unsafe sites<sup>4</sup>. HP Sure Click is designed to shift the responsibility from the end user to the PC. With HP Sure Click, many types of web-based attacks originating from unintentional website visits where ransomware or malware may be hidden are automatically prevented.</p>
<p>When a user starts a browsing session in Internet Explorer or Chromium, every site visited triggers HP Sure Click. For example, each time a user visits a website, HP Sure Click creates a hardware-based isolated browsing session, which eliminates the ability of one website from infecting other tabs or the system itself.</p>
<p><em>“HP’s philosophy and approach to security is a natural fit with our own mission to stop cybercrime and keep the Internet safe for everyone,”</em> explains Ian Pratt, co-founder and president, Bromium Inc. <em>“We are thrilled about our strategic relationship, and we’re excited to have Bromium’s virtualization-based security used as a platform for HP Sure Click to deliver secure browsing built into HP’s world-class devices.”</em></p>
<p>HP Sure Click will first be introduced as a web download for the HP EliteBook x360 1030 G2 in Spring 2017 and will be available as a standard feature on Elite PC platforms launching in the second half of the year. For more information about HP’s security and manageability features in its Elite PCs and the security, visit <a href="http://www.hp.com/go/clientsecurity">www.hp.com/go/clientsecurity</a>.</p>
<hr />
<ol>
<li>Based on HP’s unique and comprehensive security capabilities at no additional cost and HP Manageability Integration Kit’s management of every aspect of a PC including hardware, BIOS and software management using Microsoft System Center Configuration Manager among vendors with &gt;1M unit annual sales as of November 2016 on HP Elite PCs with 7th Gen Intel® Core® Processors, Intel® integrated graphics, and Intel® WLAN.</li>
<li>Coming soon as a web-download for the HP EliteBook x360 G2 on <a href="http://www.hp.com/go/clientmanagement">www.hp.com/go/clientmanagement</a> and supports Microsoft® Internet Explorer and Chromium<img src="https://s.w.org/images/core/emoji/13.1.0/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />.</li>
<li>The Challenge of Preventing Browser-Borne Malware, Ponemon Institute, sponsored by Spikes, February 2015.</li>
<li><a title="" href="http://www8.hp.com/us/en/hp-news/press-release.html?id=2405444#_ednref4" name="_edn4"></a><a href="https://www.bromium.com/company/press-releases/majority-cios-believe-they-are-losing-battle-against-cybercrime.html">Study of 400 CIOs for large enterprises in the United States, United Kingdom and Germany</a>, conducted by Vanson Bourne on behalf of Bromium Inc., January 24, 2017.</li>
</ol>
<p>Source by <a href="http://www8.hp.com">HP</a></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> to get more info about <a href="https://www.ict-hardware.com/">HP Products</a>. <a href="https://www.ict-hardware.com/">ICT Hardware</a> is one of <a href="https://www.ict-hardware.com/">HP Partners</a></p>

		</div> 
	</div> </div></div></div></div></div></section><!-- end section -->
<p>The post <a rel="nofollow" href="https://www.ict-news.org/hp-inc-protects-businesses-web-based-attacks-hp-sure-click/">HP Inc. Protects Businesses from Web-Based Attacks with HP Sure Click</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/hp-inc-protects-businesses-web-based-attacks-hp-sure-click/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco amps-up Tetration platform with better security, reduced footprint, AWS cloud option</title>
		<link>https://www.ict-news.org/cisco-amps-tetration-platform-better-security-reduced-footprint-aws-cloud-option/</link>
					<comments>https://www.ict-news.org/cisco-amps-tetration-platform-better-security-reduced-footprint-aws-cloud-option/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Thu, 09 Feb 2017 09:02:27 +0000</pubDate>
				<category><![CDATA[analytics]]></category>
		<category><![CDATA[Cisco]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Cisco Subnet]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Data Center]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://newsroom.ict-hardware.com/?p=7469</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://www.ict-news.org/cisco-amps-tetration-platform-better-security-reduced-footprint-aws-cloud-option/">Cisco amps-up Tetration platform with better security, reduced footprint, AWS cloud option</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="container-wrap  main-color "  style="padding-top:40px;padding-bottom:40px" ><div class="section-container container"><div class="vc_row vc_row-fluid row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner "><div class="wpb_wrapper">
	<div class="kleo_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<section class="deck viewability">
<h2>Cisco Tetration helps users move toward Zero Trust data center</h2>
</section>
<div class="ad viewability">
<p>Cisco has rolled out a second release of its Tetration Analytics package with features such as a smaller footprint and a cloud <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">service</span></span> that will go a long way toward making the system alluring to more data center customers.</p>
<p>Announced in June of last year, Cisco’s Tetration Analytics is a turnkey analytics package that gathers <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">information</span></span> from hardware and software sensors and analyzes the information using big data and machine learning.</p>
<p>Tetration software sensors support Linux and Windows server hosts, while hardware sensors are embedded in Cisco network switch ASICS: Nexus 9200, Nexus 9300-EX and Nexus 9500-EX, to collect flow data at line rate from all the ports. Per Cisco once in place, the Tetration platform learns its enterprise environment and any policies IT has in place. From there it can learn which applications are dependent on each other throughout their data center and into the cloud. It can monitor server behavior patterns and group servers more efficiently.</p>
<aside class="nativo-promo smartphone"></aside>
<p>For policy setting, customers can validate new policies by running them through Tetration first to see what their impact would be on the enterprise. <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">Users</span></span> can also use this information for regulatory compliance applications.</p>
<p>In the first release of the platform it was largely looking and listening to customer <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">networks</span></span> and applications and now with release 2 it can act on what it has found – automatically enforcing policies, securing the enterprise and continuing to help customers get a better handle on their data centers, said Cisco senior director, product management Yogesh Kaushik.</p>
<p>Security was always a key part of Tetration and the second release builds more options onto the system. Kaushik said customers are moving toward a “zero trust” policy which locks down all access to applications – but with highly distributed applications, like cloud apps, that have many components and are multitiered it can be complex to implement, Kaushik stated.</p>
<aside class="nativo-promo tablet desktop"></aside>
<p>Cisco says Tetration Analytics policy recommendation and enforcement engine can now take micro-segmentation &#8212; a security technique enabling workload separation &#8212; a leap further by delivering application segmentation, which drives policies across the application layer, regardless of where the application resides: virtualized, bare metal, physical servers, or in the cloud. Policies can be pushed to any vendor&#8217;s firewall, and can be orchestrated at the network layer as well, Cisco said.</p>
<figure class="large">
<div class="embed-wrapper"></div>
</figure>
<p>Cisco says Tetration can capture a million events per second and make decisions behavior analysis of billions of flows, processes, and workload characteristics allowing for realtime policy enforcement. The idea is that as <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">customers</span></span> move towards a more devops environment where apps are rapidly brought online and off, Tetration can implement security policies quickly.</p>
<p>&#8220;As organizations undergo digital transformation and embrace the DevOps model, they&#8217;re investing in new technologies with infrastructure that&#8217;s becoming more dynamic and distributed, and as a result <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">security</span></span> must become more dynamic as well,&#8221; <a href="http://www.networkworld.com/article/3164247/security/cisco-unveils-tetration-20-focuses-on-application-security.html" target="_blank">said Zeus Kerravala, principal analyst at</a> ZK Research and Network World blogger, said in a statement. &#8220;Although 80% of security spending is focused on the perimeter, only 20% of the breaches occur there. With Tetration&#8217;s security policy enforcement, organizations could probably pay for the platform by heading off a single breach.&#8221;</p>
<p>In addition to the software <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">improvements</span></span>, Cisco added a smaller footprint version and a cloud option.</p>
<p>The small-scale Cisco Tetration-M is aimed at deployments supporting up to 1,000 workloads. The Tetration-M package includes eight 1RU servers (Six UCS C-220 servers and two Nexus 9300 servers) compared to the larger version which requires 39 1RU servers.</p>
<p>Jim Duffy, a senior analyst with the 451 Research group, noted that Cisco said last summer at Cisco Live they they&#8217;d be scaling Tetration down, even to the chip level. “So smaller footprints and more digestible packaging and pricing makes much sense.”</p>
<p>For the cloud, Cisco has also announced an appliance with Tetration software deployed in the public cloud on Amazon Web Services (AWS). Tetration Cloud also supports up to 1,000 workloads. Tetration can monitor workloads in private as well as public clouds, Cisco stated.</p>
<p>Cisco also bolstered the number of <a title="Cisco" href="http://blogs.cisco.com/datacenter/robust-ecosystem-for-tetration-analytics" target="_blank">third-party vendors</a> that can now utilize Tetration to build its data into their systems – AlgoSec, Citrix, F5, Infoblox, ServiceNow Tufin and the Dell Converged Infrastructure Group (previously known as VCE).</p>
<p>The Tetration upgrade comes on the heels of Cisco’s purchase of AppDynamics and its application performance monitoring technology which could end up being a component for feeding Tetration all manner of application performance information, experts said.</p>
<p>“The information collected from AppDynamics is an ideal fit in Tetration,” said Dennis Drogseth vice president, Enterprise Management Associates.</p>
<p>During a press event for the AppDynamics buy, Cisco’s Senior Vice President and General Manager Rowan Trollope said of a possible AppDynamics integration with Tetration: “We have been looking at our analytics strategy more broadly in the past year and a big part of the value that we bring especially with the Tetration product, is the ability to deeply instrument and report on the <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">infrastructure</span></span> – what’s happening from UCS all the way to the network and getting that broad view from the security perspective. But taking all of that data and making sense of it …being able to connect the dots on all these parts of the enterprise hasn’t really been possible&#8230;you could see us making moves that we would tie these things together.&#8221;</p>
<p>By <span class="fn"><a href="http://www.networkworld.com/author/Michael-Cooney/" rel="author">Michael Cooney</a>, source by <a href="http://www.networkworld.com">NetworkWorld</a></span></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> website to get more info about <a href="https://www.ict-hardware.com/">Cisco Products</a></p>
</div>

		</div> 
	</div> </div></div></div></div></div></section><!-- end section -->
<p>The post <a rel="nofollow" href="https://www.ict-news.org/cisco-amps-tetration-platform-better-security-reduced-footprint-aws-cloud-option/">Cisco amps-up Tetration platform with better security, reduced footprint, AWS cloud option</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/cisco-amps-tetration-platform-better-security-reduced-footprint-aws-cloud-option/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>HPE acquires security startup Niara to boost its ClearPass portfolio</title>
		<link>https://www.ict-news.org/hpe-acquires-security-startup-niara-boost-clearpass-portfolio/</link>
					<comments>https://www.ict-news.org/hpe-acquires-security-startup-niara-boost-clearpass-portfolio/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Wed, 08 Feb 2017 09:38:46 +0000</pubDate>
				<category><![CDATA[analytics]]></category>
		<category><![CDATA[HP]]></category>
		<category><![CDATA[Networking]]></category>
		<category><![CDATA[Big Data]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://newsroom.ict-hardware.com/?p=7462</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://www.ict-news.org/hpe-acquires-security-startup-niara-boost-clearpass-portfolio/">HPE acquires security startup Niara to boost its ClearPass portfolio</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="container-wrap  main-color "  style="padding-top:40px;padding-bottom:40px" ><div class="section-container container"><div class="vc_row vc_row-fluid row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner "><div class="wpb_wrapper">
	<div class="kleo_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<section class="deck viewability">
<h2>Niara’s software helps enterprises detect and protect from threats that have penetrated perimeter defenses</h2>
</section>
<div class="ad viewability">
<p>Hewlett Packard Enterprise has acquired Niara, a <span class="vm-hook-outer vm-hook-default"><span class="vm-hook">startup</span></span> that uses machine learning and big data analytics on enterprise packet streams and log streams to detect and protect customers from advanced cyberattacks that have penetrated perimeter defenses.</p>
<p>The financial terms of the deal were not disclosed.</p>
<p>Operating in the User and Entity Behavior Analytics (UEBA) market, Niara’s technology starts by automatically establishing baseline characteristics for all users and devices across the enterprise and then <a href="https://www.hpe.com/us/en/newsroom/news-archive/featured-article/2017/02/HPE-Acquires-Niara-to-Deliver-Behavioral-Analytics-for-Enhancing-Protection-on-the-Intelligent-Edge.html">looking for anomalous, inconsistent activities</a> that may indicate a security threat, Keerti Melkote, senior vice president and general manager of HPE Aruba and cofounder of Aruba Networks, wrote in a blog post on Wednesday.</p>
<aside id="fsb-917" class="fakesidebar fakesidebar-auto">[ <a href="http://www.cio.com/article/3152659/free-security-tools-to-support-cyber-security-efforts.html#tk.ciofsb">Free security tools to support cybersecurity efforts</a> ]</aside>
<p>The time taken to investigate individual security incidents has been reduced from up to 25 hours using manual processes to less than a minute by using machine learning, Melkote added.</p>
<aside class="nativo-promo smartphone"></aside>
<p>Hewlett Packard <a href="https://www.sec.gov/Archives/edgar/data/1173752/000119312515192854/d928044d8k.htm">acquired wireless networking company Aruba Networks</a> in May 2015, ahead of its corporate split into HPE, an enterprise-focused business and HP, a business focused on PCs and printers.</p>
<p>The strategy now is to integrate Niara’s behavioral analytics technology with Aruba’s <a href="http://www.arubanetworks.com/assets/ds/DS_ClearPass_PolicyManager.pdf">ClearPass Policy Manager</a>, a role and device-based network access control platform, so as to to offer customers advanced threat detection and prevention for network security in wired and wireless environments, and internet of things (IoT) devices, Melkote wrote.</p>
<p>For Niara’s CEO Sriram Ramachandran and Vice President for Engineering Prasad Palkar and several other engineers it is a homecoming. They are part of the team that developed the core technologies in the ArubaOS operating system.</p>
<p>Niara technology addresses the need to monitor a device after it is on the internal network, following authentication by a network access control platform like ClearPass. Niara claims that it detects compromised users, systems or devices by aggregating and putting into context even subtle changes in typical IT access and usage.</p>
<aside class="nativo-promo tablet desktop"></aside>
<p>Most networks today allow the traffic to flow freely between source and destination once devices are on the network, with internal controls, such as Access Control Lists, used to protect some types of traffic, while others flow freely, Melkote wrote.</p>
<p>“More importantly, none of this traffic is analyzed to detect advanced attacks that have penetrated perimeter security systems and actively seek out weaknesses to exploit on the interior network,” she added.</p>
<p>By <span class="fn"><a href="http://www.cio.com/author/John-Ribeiro/" rel="author">John Ribeiro</a>, source by <a href="http://www.cio.com">CIO</a></span></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> website to check <a href="https://www.ict-hardware.com/">HP Products</a>. We are one of <a href="https://www.ict-hardware.com/">HP Partners</a>.</p>
</div>

		</div> 
	</div> </div></div></div></div></div></section><!-- end section -->
<p>The post <a rel="nofollow" href="https://www.ict-news.org/hpe-acquires-security-startup-niara-boost-clearpass-portfolio/">HPE acquires security startup Niara to boost its ClearPass portfolio</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/hpe-acquires-security-startup-niara-boost-clearpass-portfolio/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft likely to fix Windows SMB denial-of-service flaw on Patch Tuesday</title>
		<link>https://www.ict-news.org/microsoft-likely-fix-windows-smb-denial-service-flaw-patch-tuesday/</link>
					<comments>https://www.ict-news.org/microsoft-likely-fix-windows-smb-denial-service-flaw-patch-tuesday/#respond</comments>
		
		<dc:creator><![CDATA[lukasik]]></dc:creator>
		<pubDate>Mon, 06 Feb 2017 09:05:50 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Daily Briefing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://newsroom.ict-hardware.com/?p=7450</guid>

					<description><![CDATA[<p>The post <a rel="nofollow" href="https://www.ict-news.org/microsoft-likely-fix-windows-smb-denial-service-flaw-patch-tuesday/">Microsoft likely to fix Windows SMB denial-of-service flaw on Patch Tuesday</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></description>
										<content:encoded><![CDATA[<section class="container-wrap  main-color "  style="padding-top:40px;padding-bottom:40px" ><div class="section-container container"><div class="vc_row vc_row-fluid row"><div class="wpb_column vc_column_container vc_col-sm-12"><div class="vc_column-inner "><div class="wpb_wrapper">
	<div class="kleo_text_column wpb_content_element ">
		<div class="wpb_wrapper">
			<p>Microsoft will likely wait until February 14 to fix a publicly disclosed vulnerability in the SMB network file sharing protocol that can be exploited to crash Windows computers.</p>
<p>The vulnerability was disclosed Thursday when the security researcher who found it posted a proof-of-concept exploit for it on GitHub. <a href="http://www.computerworld.com/article/3165404/security/zero-day-windows-file-sharing-flaw-can-crash-systems-maybe-worse.html">There was concern</a> initially that the flaw might also allow for arbitrary code execution and not just denial-of-service, which would have made it critical.</p>
<p>The CERT Coordination Center (CERT/CC) at Carnegie Mellon University at first mentioned arbitrary code execution as a possibility in <a href="https://www.kb.cert.org/vuls/id/867968" target="_blank">an advisory</a> released Thursday. However, the organization has since removed that wording from the document and downgraded the flaw&#8217;s severity score from 10 (critical) to 7.8 (high).</p>
<p>Attackers can exploit the vulnerability by tricking Windows systems to connect to malicious SMB servers that send specially crafted responses. Successful exploitation will result in a crash in the mrxsmb20.sys driver, which will trigger a so-called Blue Screen of Death (BSOD).</p>
<aside class="nativo-promo smartphone"></aside>
<p>There are a number of techniques to force computers to open SMB connections and some require little or no user interaction, CERT/CC warned. The organization confirmed the exploit on Windows 10 and Windows 8.1, as well as Windows Server 2016 and Windows Server 2012 R2.</p>
<p>&#8220;Windows is the only platform with a customer commitment to investigate reported security issues, and proactively update impacted devices as soon as possible,&#8221; a Microsoft representative said via email. &#8220;Our standard policy is that on issues of low risk, we remediate that risk via our current Update Tuesday schedule.&#8221;</p>
<p>Update or Patch Tuesday is the day when Microsoft typically releases security updates for its products. This occurs on the second Tuesday of every month and the next one is scheduled for February 14.</p>
<p>The company sometimes breaks out of this regular patch cycle to release updates for critical and actively exploited vulnerabilities, but this won&#8217;t likely happen in this case, especially now that the flaw&#8217;s severity has been decreased and there&#8217;s apparently no threat of remote code execution.</p>
<p>By <span class="fn"><a href="http://www.computerworld.com/author/Lucian-Constantin/" rel="author">Lucian Constantin</a>, source by <a href="http://www.computerworld.com/">ComputerWorld</a></span></p>
<p>Visit <a href="https://www.ict-hardware.com/">ICT Hardware</a> who is one of <a href="https://www.ict-hardware.com/">Microsoft Partner</a></p>

		</div> 
	</div> </div></div></div></div></div></section><!-- end section -->
<p>The post <a rel="nofollow" href="https://www.ict-news.org/microsoft-likely-fix-windows-smb-denial-service-flaw-patch-tuesday/">Microsoft likely to fix Windows SMB denial-of-service flaw on Patch Tuesday</a> appeared first on <a rel="nofollow" href="https://www.ict-news.org">ICT News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.ict-news.org/microsoft-likely-fix-windows-smb-denial-service-flaw-patch-tuesday/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
