Showing posts from August 12, 2015

Attacks Against Cisco IOS Software Platforms

Image recalls that, Cisco has observed increasingly complex attacks that could allow an attacker to gain administrative access to a Cisco IOS device by installing a malicious ROMMON image. Successful exploitation using this image could allow an attacker to manipulate device behavior after the device is rebooted.
Therefore, encourages users and administrators to review the Cisco Security Activity Bulletin and apply recommendations to protect Cisco IOS devices.

Data Security to the Point of Storage.

In our data-driven age, Data security is at the heart of innovations, challenges and stakes that everyone can and will evaluate. Israeli’sstartups lead the momentum in terms of innovations, technologies and funding. 
DataGravity Discovery Series V2 is available; combining the previously disparate functions of data security, search and discovery, and data protection into one platform, helping companies manage security at the point of storage; with the goal to providing visibility into data as it’s created. 
Major features include: Content and tag alerting, which can provide automated email alerts that proactively notify organizations when and where sensitive information is stored and how it’s being handled, enabling administrators to quickly identify user-access anomalies and governance policy violations. Audit user role-based access, which can enable privileged users to easily find and analyze sensitive information, in turn enforcing and confirming adherence to …

Integrated Management of Public and Private Cloud Workloads.

Solutions that let enterprises easily integrate, administer, monitor and manage wide range of cloud-based resources are always recommended by The stakes are huge when it comes to streamlined hybrid IT solution in a hybrid cloud environment.
HotLink® Cloud Management Express™ extends henceforth VMware vCenter capabilities; enabling companies to unify the administration and management of both public and private cloud resources in one streamlined and integrated solution that works out of the box. observes that, HotLink Cloud Management Express can provide public cloud support for Microsoft Azure, vCloud Air, OpenStack and Amazon EC2, and on-premises support for OpenStack, Microsoft Hyper-V, Citrix XenServer and Red Hat KVM. 
Major capabilities of HotLink Cloud Management Express include: Auto-discovery of cloud-based resources spanning on- and off-premise;easy and automated addition of hybrid resources to the VMware vCenter inventory tree; uni…

Vulnerabilities in Microsoft Windows and critical vulnerabilities in Firefox, Firefox ESR, and Firefox OS.

Image recalls that, Microsoft has released 14 updates to address vulnerabilities in Microsoft Windows. Exploitation of some of these vulnerabilities could allow remote code execution or elevation of privileges and information disclosure. encourages users and administrators to review Microsoft Security Bulletins MS15-079 through MS15-092 and apply the necessary updates. When it comes to Mozilla, the Foundation has released security updates to address critical vulnerabilities in Firefox, Firefox ESR, and Firefox OS. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system. Available updates include: Firefox 40Firefox ESR 38.2Firefox OS 2.2Users and administrators are therefore encouraged to review the Security Advisories for Firefox, Firefox ESR, and Firefox OS and apply the necessary updates.

Find and Protect Data in Excel.

Data breaches and synchronization problems remain acute; affecting dramatically people and enterprises in their daily activities. 
However, recalls that, enterprise-class, data-centric protection solutions that can tackle or mitigate these issues exist delivering inter alia: 
interoperability, unity, selectivity, flexibility and agility you may need.
When it comes to find and protect Data in Excel, IRI Inc., The CoSort Company, has released a data-centric protection solution for corporations storing personally identifying information (PII) in Excel 2010 and 2013 spreadsheets. salutes this initiative (IRI CellShield Enterprise Edition (EE)), that can help locate and automatically protect sensitive data across a network. CellShield EE users can find, encrypt, redact, or pseudonymize PII in spreadsheets.

Machine learning-based databases.

In our Bigdata-driven age, real-time performance and productivity, scalability and flexibility are the game-changer when it comes to streamline  experiences. 
With the machine learning-based approach, henceforth data structures can continuously adapt to behavior based on observed changes in the data and operational capabilities of hardware resources; enabling inter alia: big data performance and accessible by everyone; make Databases ready for Big Data; accelerate databases to meet the increasing performance.
But also deliver intelligent information orchestration that can transform existing databases into powerful hybrid analytic processing systems. 
So, encourages the momentum behind the fifth annual NoSQL Now! Conference (here), and behind Deep InformationScienceswhen it comes to leverage machine learning and predictive algorithms to create streamlined data environments.