Microsoft launches ‘Surface as a Service’ lease program

Microsoft has announced a new enterprise program called "Surface as a Service," which is a nifty way of saying businesses can lease Surface devices that come with subscriptions to Office 365, Dynamics Azure and Windows 10.The company said this will allow customers to keep their hardware more current and up to date, since enterprises are not known for being bleeding edge when it comes to new hardware adoption.+ Also on Network World: Surface Books get major driver updates +Microsoft also expanded its list of Surface partners to include two IT heavyweights: IBM and Booz Allen Hamilton. Both firms sign on as Surface solution integrators. Microsoft already had secured HP and Dell, two companies it effectively competes with by selling Surface, as resellers last fall.To read this article in full or to leave a comment, please click here

Shlomo Kramer: a security investor looking for smart entrepreneurs to disrupt markets

Shlomo Kramer Recently, endpoint-protection startup LightCyber announced a second round of funding - $20 million – including an investment from an individual investor with an impressive track record backing successful security startups: Shlomo Kramer.Kramer, who is Israeli, has a long-term relationship with the company’s CEO Gonen Fink, who worked with him for years at Check Point Software where Kramer was one of the founders.To read this article in full or to leave a comment, please click here

Shlomo Kramer: a security investor looking for smart entrepreneurs to disrupt markets

Shlomo Kramer Recently, endpoint-protection startup LightCyber announced a second round of funding - $20 million – including an investment from an individual investor with an impressive track record backing successful security startups: Shlomo Kramer.Kramer, who is Israeli, has a long-term relationship with the company’s CEO Gonen Fink, who worked with him for years at Check Point Software where Kramer was one of the founders.To read this article in full or to leave a comment, please click here

Cisco flexes its security muscle at Cisco Live

This week in Las Vegas, Cisco is hosting 28,000 of its best customers at Cisco Live, it’s annual, global user event. It’s hot in Vegas in July, which is fitting, as Cisco’s security business has been red hot of late. This is in stark contrast to the company’s position in security just a few years ago when many Cisco watchers questioned if it was serious about security. Over the years, Cisco has mastered the art of using market transitions to capture share, and it appears it is well on its way to doing so in the security market. The market transition that’s changing security is digital transformation. Earlier this year, I wrote a post highlighting the new rules of security in the digital era.To read this article in full or to leave a comment, please click here

Microsoft fixes critical vulnerabilities in IE, Edge, Office, and Windows print services

Microsoft's new batch of security patches fixes 47 vulnerabilities across its products, including in Internet Explorer, Edge, Office, Windows and the .NET Framework.The patches, released Tuesday, are arranged in 11 security bulletins, 10 of which are for Microsoft products. The remaining patch covers Adobe Flash Player, which is bundled with Internet Explorer in Windows 8.1, Windows Server 2012, Windows RT 8.1, Windows Server 2012 R2 and Windows 10.Six security bulletins, including the Flash Player one, are rated critical and primarily cover remote code execution vulnerabilities that could lead to a complete system compromise.To read this article in full or to leave a comment, please click here

Microsoft fixes critical vulnerabilities in IE, Edge, Office, and Windows print services

Microsoft's new batch of security patches fixes 47 vulnerabilities across its products, including in Internet Explorer, Edge, Office, Windows and the .NET Framework.The patches, released Tuesday, are arranged in 11 security bulletins, 10 of which are for Microsoft products. The remaining patch covers Adobe Flash Player, which is bundled with Internet Explorer in Windows 8.1, Windows Server 2012, Windows RT 8.1, Windows Server 2012 R2 and Windows 10.Six security bulletins, including the Flash Player one, are rated critical and primarily cover remote code execution vulnerabilities that could lead to a complete system compromise.To read this article in full or to leave a comment, please click here

Bay Dynamics lands another $23 million to speed expansion

Security-analytics firm Bay Dynamics has pulled down $23 million more in venture funding to help the company speed up its international expansion and execution of its action plan to reach customers and differentiate itself from competitors.The Series B financing is led by Carrick Capital Partners and includes Series A investor Comcast Ventures.The company claims hundreds of customers including some of the Fortune 50.Bay Dynamics’ Risk Fabric ranks the riskiest users, devices, applications and other network entities, according to a report by Gartner on User and Entity Behavior Analytics, the category in which it places Bay Dynamics. The platform can discover insider threats as well as data theft, and can analyze likely attack surfaces in customer networks, Gartner says.To read this article in full or to leave a comment, please click here

Bay Dynamics lands another $23 million to speed expansion

Security-analytics firm Bay Dynamics has pulled down $23 million more in venture funding to help the company speed up its international expansion and execution of its action plan to reach customers and differentiate itself from competitors.The Series B financing is led by Carrick Capital Partners and includes Series A investor Comcast Ventures.The company claims hundreds of customers including some of the Fortune 50.Bay Dynamics’ Risk Fabric ranks the riskiest users, devices, applications and other network entities, according to a report by Gartner on User and Entity Behavior Analytics, the category in which it places Bay Dynamics. The platform can discover insider threats as well as data theft, and can analyze likely attack surfaces in customer networks, Gartner says.To read this article in full or to leave a comment, please click here

Who’s got the best cloud latency?

For some applications, the public cloud is only as good as the slowest connection to it. Latency of cloud providers – the amount of time it takes for a cloud-based service to respond to a user’s request – is one of many critical factors that customers consider when choosing a cloud provider and monitoring their workloads. So which cloud provider has the best latency? +MORE AT NETWORK WORLD: Who’s right behind Amazon in IaaS cloud revenue? Not Microsoft | 4 Tips for buying cloud management software +To read this article in full or to leave a comment, please click here

Core Network Architecture in 3G Mobile Networks

Core Network Architecture in 3G Mobile Networks – Most of the Mobile Broadband Networks worldwide are currently delivering Data Services based on 3G & 4G Technologies. Although 4G/LTE is widely deployed globally but still there are countries and operators running 2G/3G with relatively convenient Data rates to the market demands. In this article, I am […]

The post Core Network Architecture in 3G Mobile Networks appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Review: Promisec goes the extra step to secure PCs

In the past year we've seen an influx of endpoint detection and response (EDR) tools that promise to bring order, through greater visibility, to the wild west of endpoints within a large organization. The scenario is all too common: IT security usually doesn't know all of the hardware and software assets that need to be protected, yet has to protect them. Even as we struggle to put security controls in place for prevention, we know that many of these endpoints are already compromised by active threats that need to be detected, assessed, quarantined, and remediated.To read this article in full or to leave a comment, please click here(Insider Story)

Review: Promisec goes the extra step to secure PCs

In the past year we've seen an influx of endpoint detection and response (EDR) tools that promise to bring order, through greater visibility, to the wild west of endpoints within a large organization. The scenario is all too common: IT security usually doesn't know all of the hardware and software assets that need to be protected, yet has to protect them. Even as we struggle to put security controls in place for prevention, we know that many of these endpoints are already compromised by active threats that need to be detected, assessed, quarantined, and remediated.EDR tools are built for detection and response (hence the category name), and most leave it at that. Promisec adds sophisticated remediation to Promisec Endpoint Manager (PEM), which is precisely why I was interested in getting a close look at the product. Like other EDR products, PEM can scan endpoints on a schedule to detect anomalies or abnormalities and verify that security controls -- such as required applications, patches, settings, and so on -- are in place. Unlike other products in the category, PEM can also launch scripts on the endpoints to take corrective action.To read this article in full or to leave a Continue reading

OK, Google: 160 valuable voice commands for Android

Android has actually had a robust voice command system in place for ages -- and the number of things it can do for you is expanding all the time.In fact, Google may be preparing to unveil a newly rebranded and even more conversational version of its virtual assistant later this year, but you don't have to wait to start making the most of your mobile device's listening smarts.MORE ON NETWORK WORLD: How to use public Wi-Fi hotspots safely Below, we've listed 160 commands that are fully functional and ready to be used right now. We've put words and phrases that are examples in [brackets]; additional explanations are in (parentheses). And when you see a command with two words separated by a slash (e.g., "Enable/disable battery saver mode"), you know to say just one or the other of the words, right? Thought so.To read this article in full or to leave a comment, please click here

Feds to hire 3,500 cybersecurity pros by year’s end

Last October, the U.S. government began hiring 6,500 new cybersecurity IT professionals. It has hired 3,000 so far, and plans to hire another 3,500 by January 2017, the White House said Tuesday.The government is now trying to improve its recruiting and retention of cybersecurity professionals. This includes finding ways to improve government pay, which can be well below the private sector.ALSO ON NETWORK WORLD: 8 ways to jumpstart your career This strategy was detailed Tuesday in a White House memo. In it, officials called for expanded job recruiting campaigns "in order to raise awareness of employment opportunities and compete for top cybersecurity talent," Shaun Donovan, the director of the White House Office of Management and Budget, Beth Cobert, the acting director of the Office of Personnel Management and federal CIO Tony Scott wrote in the memo.To read this article in full or to leave a comment, please click here

Feds to hire 3,500 cybersecurity pros by year’s end

Last October, the U.S. government began hiring 6,500 new cybersecurity IT professionals. It has hired 3,000 so far, and plans to hire another 3,500 by January 2017, the White House said Tuesday.The government is now trying to improve its recruiting and retention of cybersecurity professionals. This includes finding ways to improve government pay, which can be well below the private sector.ALSO ON NETWORK WORLD: 8 ways to jumpstart your career This strategy was detailed Tuesday in a White House memo. In it, officials called for expanded job recruiting campaigns "in order to raise awareness of employment opportunities and compete for top cybersecurity talent," Shaun Donovan, the director of the White House Office of Management and Budget, Beth Cobert, the acting director of the Office of Personnel Management and federal CIO Tony Scott wrote in the memo.To read this article in full or to leave a comment, please click here

IT service desk suites: The features users love and hate

IT service management (ITSM) tools typically focus on serving the needs of internal customers and solving their IT problems. Enterprise IT managers say the most important criteria to consider when choosing an ITSM vendor include customizable workflow automation, a system for creating trouble tickets and escalation mechanisms.To read this article in full or to leave a comment, please click here(Insider Story)

Fake Olympic tickets and Zika news apps scam users

These days not a headline goes by without some cybercriminal jumping all over it. Now, with the Olympics coming up and travelers wary of the Zika virus, scammers are creating fake websites and apps to steal money or to infect users with malware."There are actually sites that say they sell tickets, but never actually give you tickets," said James Pledger, research director at RiskIQ.Sometimes, it's easy to spot the fakes.INSIDER: Traditional anti-virus is dead: Long live the new and improved AV "One of the most common things is very poor English," he said. "Or they'll only accept payment in online currencies or wire transfers. Other indicators are that there are a lot of complaints, or they've been up for a very short time frame."To read this article in full or to leave a comment, please click here

Fake Olympic tickets and Zika news apps scam users

These days not a headline goes by without some cybercriminal jumping all over it. Now, with the Olympics coming up and travelers wary of the Zika virus, scammers are creating fake websites and apps to steal money or to infect users with malware."There are actually sites that say they sell tickets, but never actually give you tickets," said James Pledger, research director at RiskIQ.Sometimes, it's easy to spot the fakes.INSIDER: Traditional anti-virus is dead: Long live the new and improved AV "One of the most common things is very poor English," he said. "Or they'll only accept payment in online currencies or wire transfers. Other indicators are that there are a lot of complaints, or they've been up for a very short time frame."To read this article in full or to leave a comment, please click here