Migrating and managing Oracle applications and database platforms on Microsoft Azure

Data Intensity announced the launch of Safe-Switch, a life-cycle approach to migrating and managing Oracle applications and database platforms on Microsoft Azure. In response to the Oracle and Microsoft Cloud Interoperability Partnership announcement, Safe-Switch was created to help customers accelerate their consumption of heterogenous cloud adoption, with freedom of choice and seamless integration for Oracle and Microsoft workloads.

The Data Intensity Safe-Switch program is founded on 20 years of professional and managed services experience migrating, upgrading, and managing highly customized Oracle workloads across hybrid and multicloud architectures. As both an Oracle Platinum Partner and Microsoft Gold Partner, Data Intensity has successfully executed more than 300 workload migrations.

“One challenge many customers face is bridging the skill-set gaps associated with deep Oracle knowledge and Microsoft Azure reference architectures to accurately migrate workloads to improve cost, service capabilities, and agility,” said Phil LaForge, President and CEO of Data Intensity.

The Safe-Switch Discovery Workshop is the first step toward identifying, prioritizing, and migrating Oracle workloads for the right cloud delivery model. Safe-Switch customers can benefit from a prescriptive roadmap that covers Oracle license compliance, fault-tolerant application performance architectures, secure Azure cloud reference mapped to a combined migration strategy, and managed services bundle.

“From start to finish, Data Intensity was highly professional; the design phase through to go-live ran smoothly and efficiently,” said Alan Horne, Team Lead for Cory Brothers. “A deep knowledge of both Oracle and Azure enabled the project to be successful.”

Gavriella Schuster, Corporate VP, One Commercial Partner at Microsoft said, “Customers can receive decades of enterprise expertise in workload migration across multiple cloud platforms from veteran MSP partner Data Intensity, with its strong partner credentials. The Data Intensity Safe-Switch program gives enterprise customers the confidence to maximize their cloud adoption.”

Data Intensity is currently providing a fixed-price Azure Safe-Switch Discovery Workshop, which includes a series of collaborative, data-driven assessments to provide a prescriptive migration road-map based on standardized methodologies. Data Intensity’s Safe-Switch complements the Microsoft Cloud Adoption Framework by providing businesses with the ability and processes to migrate workloads in a safe and secure manner.

Windstream Enterprise fortifies SD-WAN with virtual NGFW

Windstream Enterprise released a new security feature to protect businesses from increasingly sophisticated threats to their network and their data.

Offered as part of its managed SD-WAN service, Windstream Enterprise’s new Virtual Network Function (VNF) Next-Generation Firewall (NGFW) gives businesses peace of mind that their networks are safe from attacks, out to the network edge, while also reducing the complexity associated with implementing a large-scale network security solution.

The VNF Firewall service expands upon Windstream Enterprise’s existing suite of best-in-class managed security services, including appliance and cloud-based offerings and is hosted on the same hardware component of the VMware SD-WAN by VeloCloud solution, namely VMware SD-WAN Edge.

As businesses move their networks to SD-WAN to easily connect branch offices and remote locations and enable optimal application performance across a cloud-enabled network, protecting the network edge becomes critical to maintaining the full network’s integrity. The new VNF software helps to deliver that edge security in the same form factor as the SD-WAN software.

“A security breach can be costly and damaging to brand reputation. Even a single incident can inflict long-lasting damage to a company’s reputation,” said Layne Levine, president at Windstream Enterprise. “This new VNF Firewall managed service gives CIOs another tool to secure the networks at all locations without having to endure the time-consuming process of installing and maintaining separate security hardware. Now staying a step ahead of ever-evolving cyber threats is simply a matter of adding the Firewall VNF to the SD-WAN edge.”

An additional benefit of Windstream Enterprise’s VNF is its ability to be co-managed and integrated via WE Connect, the award-winning network management portal that gives customers a single pane of glass to see all security, network, and voice service information as well as account detail.

“We have a tremendous number of managed SD-WAN locations deployed, which gives us unique insight into our customers’ network and security needs,” said Levine. “We’ll continue to innovate and invest in the network capabilities that enable their businesses to Thrive On.”

The AttackIQ Security Optimization Platform arms cybersecurity leaders with better insights

The AttackIQ Security Optimization Platform arms cybersecurity leaders with better insights, better decisions, and real security outcomes.

According to Gartner, “Cybersecurity is facing slowing budget growth, frustrated at-risk executives and shifting regulatory focus. As the lines blur between business models and the technology that supports them, CIOs need to consider the risks, security priorities and investments that impact their business outcomes.”

Further, “The urgency to treat cybersecurity as a business decision has never been greater.” AttackIQ helps customers address these needs with its best-in-class software platform, deep security vendor partnerships, and investment in the practice of threat-informed defense.

“COVID-19 has been a game changer for cybersecurity practitioners,” said Brett Galloway, AttackIQ CEO. “CISOs are under a siege of attacks, while spending is undergoing increased scrutiny. We’re in a new era that requires an optimization strategy for better insights, better decisions, and real security impact, beginning by addressing the most overlooked cybersecurity issue: control effectiveness.”

“Security optimization is absolutely paramount in today’s cybersecurity operating environment,” said Jeremy Phelps, Director of Information Security at Akin Gump, an AttackIQ customer. “The new normal of measuring program effectiveness will be directly tied to better insights and better decisions that create value for the business.”

The recent Honda ransomware attack that shuttered production facilities around the globe and the Twitter hack of 130 global influencer accounts underscore the increased pressure that security and risk leaders are facing during COVID-19. To make matters worse, most cybersecurity teams have no idea if their controls are working. Verizon estimates that 82% of successful enterprise breaches should have been stopped by existing controls, but weren’t. Because security controls are complex systems composed of technologies, people, and processes that fail silently, the only way to know if they are working is to actively test them in an automated and continuous way.

Based on the AttackIQ Informed Defense Architecture (AIDA), the AttackIQ Security Optimization Platform offers the easiest to deploy, best security control validation available at scale, in production, and with the tightest alignment to MITRE ATT&CK. Built from the ground up by former security practitioners, the AttackIQ Security Optimization Platform arms security and risk leaders with better, automated insights to understand and address whether their tools and processes are working. With better data, practitioners can make smarter control investments.

Hexagon acquires TACTICAWARE for 3D security surveillance capabilities

Hexagon AB, a global leader in sensor, software and autonomous solutions, announced the acquisition of TACTICAWARE, a provider of LiDAR-based 3D surveillance software used to monitor and protect critical infrastructure and buildings – from powerplants and airports to commercial and residential buildings and more.

TACTICAWARE’s flagship solution, Accur8vision, is a volumetric (entire space) detection security system offering 3D surveillance. Unlike conventional systems that typically only monitor perimeters, Accur8vision delivers situational awareness of an intruder’s exact location, size, speed and movement trajectory – all of which can be visualised within a 3D digital reality of the area under surveillance.

“Hexagon has long been a leader in sensor and 3D visualisation technology. Our award-winning 3D surveillance solution, Leica BLK247, fuses LiDAR, video, and thermal imaging with edge computing and intelligent algorithms to instantly detect and report physical changes within an environment,” says Hexagon President and CEO Ola Rollén. “Together with the BLK247 and HxGN OnCall, our comprehensive portfolio of next-generation public safety solutions, Hexagon can now offer those working to make our world a safer place a fully integrated end-to-end security surveillance solution for 24-hour, full visibility of critical infrastructure and spaces to call-taking, dispatch, incident planning and response and more.”

LiDAR-based 3D surveillance solutions offer three-dimensional, volumetric threat detection independent of environmental and lighting conditions, reducing false alarms and enabling faster reaction to incidents.

With headquarters in Prague, Czech Republic, TACTICAWARE will be fully consolidated as of today, operating within Hexagon’s Geosystems division. The acquisition has no significant impact on Hexagon’s earnings.

Cyabra identifies sources of disinformation and protects global brands

Protecting global brands, international media outlets and the public sector, Cyabra’s solution uses advanced technology to identify fake profiles, manipulated images and deepfakes transmitted across the digital realm to root out bad actors.

Using machine learning infused with NLP, Cyabra identifies behavioral patterns typical of fake profiles such as bots, trolls and sockpuppets. This powerful lens provides brands and media with the resources to understand narratives, discover trends and uncover more-in-depth insight into what drives consumers, helping companies make smarter decisions. The solution also uncovers bad actors bent on influencing public opinion and election campaigns.

“We believe that words, when misplaced, can be as powerful as guns or nefarious drones. In the digital world, all it takes is one rumor and 200 fake online identities to cause a Fortune 500’s stock price to plummet,” said Dan Brahmy, Cyabra CEO. “As the tech community works to curb the negative effects of disinformation, we are pleased to offer our solution to aid in the fight.”

In addition to providing social media impact and authenticity analysis, Cyabra is the pioneering leader of deepfake detection technology. The solution focuses on detecting generative adversarial networks (GAN)—a class of machine learning that bad actors use to create realistic images and videos.

Cyabra’s never-before-seen type of brand protection offers reputation management and ensures customers’ trust in the face of bad and fake actors seeking to negatively influence the public or manipulate videos and images. Cyabra’s SaaS platform is already in use at global brands, multinational mass media companies and the public sector.

Founded in 2018, Cyabra has raised nearly $4M from Tier 1 venture capital firms and is currently wrapping up its latest funding round. The company is led by a team of world-renowned information warfare and offensive cybersecurity experts.

“In the age of social media and fake news, there are billions of raw conversations taking place around the globe that, with the right tools, enable invaluable discoveries,” said Brahmy. “Cyabra unravels these hives of activity, offering brands a solution to understand consumers and reach their true audiences.”

CyberStrong platform updates allow customers to dynamically manage their risk posture

CyberSaint announced new updates to its flagship CyberStrong platform allowing customers to identify, measure, and dynamically manage IT and cybersecurity risks along the risk management lifecycle.

These updates reinforce CyberSaint’s mission to enable organizations to manage cybersecurity as a business function by enabling agility, measurement, and automation across risk, compliance, audit, vendor, and governance functions for information security organizations. The company has a history of meeting the growing demand within the integrated risk management market for increased simplicity and flexibility while simultaneously delivering an uncompromisingly robust feature set for customers, who range from high-growth technology companies to Fortune 500 industry leaders.

“My tools always lacked robust risk ranking systems to report on the impact of cybersecurity investments. I needed a solution that was advanced in its capabilities but that would also simplify program management,” said Mark Evans, Director of Security for Salt Lake County, Utah, the largest county in Utah, describing his experience as a CyberSaint customer.

“As an organization that faces a wide range of risk across multiple departments, the CyberStrong platform has helped us track and manage new and unprecedented risks as they emerge in a standardized way that was previously impossible, helping us achieve a truly integrated approach to cybersecurity program management.”

With CyberSaint’s updates to the CyberStrong platform, customers are able to:

  • Identify, track, and mitigate risks proactively within an intuitive risk register to secure their most critical assets and mitigate the highest severity risks
  • Create, measure, and manage security groupings, in the form of existing controls, along with their unique risk profiles
  • Associate, measure, and manage current risk mitigation plans, and control compliance posture, with their unique set of frameworks, standards, and unique control sets
  • Create tribal knowledge of risk management across departments by leveraging clear measurement that all stakeholders understand and alignment with frameworks such as the NIST Risk Management Framework
  • Track Key Risk Indicators (KRIs) and illustrate how each risk impacts their organization in dollars and cents, using risk measurement methods including FAIR, NIST 800-30, and many other unique or even custom methodologies
  • Manage executive expectations for risk reduction, visualizing improved risk posture over time in accordance with defined risk management goals and objectives
  • Illustrate changes in cybersecurity risk over time; whether transferred, accepted or managed, in addition to the Return on Security Investment across risk management initiatives
  • Unify efforts across risk, compliance, audit, and governance on a single system of record, optimizing the performance of multiple functions for greater efficiency and enhanced resilience

“Once you move beyond compliance into risk management, there is an opportunity to reinforce a continuous approach. Our customers can identify and classify risk, easily link risk mitigations to compliance requirements to demonstrate credible returns, and communicate their strategy with the C-level and the Board,” said Padraic O’Reilly, Chief Product Officer, CyberSaint.

“We saw that credible risk ranking required several things: The first was a full suite of risk management capabilities. The second was increased automation through integrations that statically and dynamically map data to controls with AI. Our approach has always been to balance ease of use, speed of implementation, and flexibility with robust automation, AI, and machine learning capabilities – a direction that has our customers and partners excited for where we are headed.”

BDO USA unveiled Athenagy, a business intelligence platform for managed services

BDO USA launched Athenagy, a proprietary business intelligence platform for legal professionals. This first-of-its-kind solution provides the legal department with transparency and critical insight throughout the litigation lifecycle.

Designed to integrate with a highly secure, customized Relativity®One environment, Athenagy helps legal professionals not just manage the business of e-discovery, but optimize it.

Intuitive dashboards provide visibility into where data resides and how it is used, from the moment a legal hold is initiated all the way through to analysis, review and production. Harnessing this data in a dashboard view gives legal professionals critical information to ultimately create better business outcomes.

“Athenagy solves persistent problems that legal departments face when it comes to managing their data. By providing transparency and detailed analytics throughout the data lifecycle, Athenagy is empowering legal professionals to make better, more informed decisions at every step of the e-discovery process, and beyond,” said Daniel Gold, managing director of BDO’s Managed Services practice. “Athenagy is the cornerstone of BDO’s approach to managed services. Where the traditional industry model just offers what we call ‘managed pricing’ instead of actual managed services, our focus is on driving impactful insights and solving real business problems.”

Key features include:

Transparency in the data lifecycle: Embedded analytics provide rich insights around the following critical areas: legal holds, collection and preservation, processing, early case assessment, hosting, review and production-level information.

Data utilization: Clients can access detailed information about their usage to compare against storage capacity.

Ticketing trend analysis: Clients get real-time reporting on who is submitting tickets, the number of tickets by matter, the categories of tickets being entered and the open-to-close ratio on each.

Trends on systems performance: Athenagy provides system-level information in Relativity®One to securely address the longstanding challenges around transparency, empowering legal teams to gain greater control over their environment.