Upcoming Enhancements to Sophos Central Server Protection!

Sophos Central Server Protection will soon be even better! As server-focused attacks continue to evolve, we’re making a number of enhancements to ensure that you and your customers have the best possible protection.

For a list of changes and dates be sure to check out to visit Sophos’ full article HERE!

 

Improving information accuracy and reliability are two of the primary reasons why organizations install a time and attendance system. Yet, many of them still rely on a manual process to track their employees time worked.

With Insperity’s TimeStar, your clients can electronically tackle their timekeeping, paid time off requests, scheduling needs, and more, allowing human resource managers the ability to invest their energy on supporting their company’s most important assets: their people.

Read Insperity’s eBook, Top 6 Benefits of Automating Time and Attendance, to learn how an automated time and attendance solution can help your clients business.

If you are interested in offering a time and attendance solution to your clients, check out our TimeStar campaign-in-a-box to access valuable resources and information you can share with your clients or contact your Lifeboat representative for more information.

Learn from Acronis how NOT to be a Target of Ransomware!

Ransomware has become one of the most threatening coercions amongst Cyber-Criminals. If you don’t know what Ransomware is, read on and let Acronis help you become a trusted IT advisor for your end users!

Ransomware threats are very real!  It is a type of malware, which blocks entire operating systems or parts of files and documents until the victim pays a monetary ransom. If you use email, browse websites, spend time on social networks, or connect to local networks, whether it be at work, at home, or in public spaces, you are at risk. If you also either use removable USB drives, whether on a desktop, laptop, smartphone or tablet, you are always a click or two away from a possible ransomware infiltration. Once infected, you’re in danger of losing all of the files on your computer. Ransomware is a small piece of criminal software that highjacks your computer by encrypting your files, denying you access to them, and then demands online payment for their release. It’s one of the most shameless forms of cyber extortion, and in some cases, actual blackmail. The most common sources of Ransomware attacks come from Email phishing attacks, Social network ransomware attacks, and also Ransomware infected websites. However, Cyber-Criminals can be very crafty, trying to lure their next victim in the most unsuspecting ways, but Acronis can help you outsmart these Ransomware gangs!

Prevent Ransomware- don’t be a victim. Outsmart cyber-criminals with a few simple steps. It’s easy, but only if you know what to look for.

What does a ransomware attack look like?

Ransomware is a well-developed one-billion-dollar criminal industry. There are many different types of ransomware, but most of them are similar in their execution:

  1. Ransomware file is downloaded to a user computer.
  2. Ransomware is installed on the computer — usually with the user’s help, e.g., opening an attachment or double-clicking a link as described above.
  3. Ransomware starts quietly encrypting the victim’s files (this can be either immediate, or delayed).
  4. When the file encryption process is complete, ransomware displays a ransom message with a countdown timer and instructions how to pay. Normally the victim is asked to download a Tor browser and make an anonymous payment using the online crypto-currency Bitcoin.
  5. Ransomware may also attempt to spread to other systems on the same network as the infected device, including local backup servers

What to do if you became a victim of a ransomware attack?

If you have become the victim of a ransomware attack, you have very few options.

  • Restore your system from a backup.
  • Format the hard drive to wipe out all data and then re-install the operating system and applications. You lose all of your personal data, may face costly additional licensing fees to restore your old software environment, and still face the threat of future ransomware attacks.
  • Pay the ransom and hope that your data will be restored. However, there are no guarantees that paying up will restore your files.) Some ransomware gangs don’t deliver the promised decryption key. Others may be caught by authorities, or disappear before they can deliver on their end of the ransom bargain.

What is the best way to protect your computer from ransomware?

Until an active protection technology becomes commercially available, backup (with a copy of backup data stored in the cloud) is the only sure way to recover your data after a ransomware attack without paying the ransom.

Run full image backup with Acronis True Image. If your system is compromised, you’ll be able to restore the entire system at once, without going through files one by one.

Ransomware poses a real threat to every computer user and every device connected to the internet. Get educated, be vigilant, and spread the world with your friends and family. Don’t be fooled, and protect your data with backup!

On January 18, Acronis True Image 2017 New Generation with Acronis Active Protection™ feature was released. The innovative product received the GOLD Self-Protection Award from Anti-Malware Testing lab. The new feature provides users with a new level of ransomware protection as it detects first symptoms of new and known ransomware attacks, making the backup more secure, and reducing the number of times data needs to be restored from the backup.

To read the full article, please Click here!

The Latest and Greatest from Flexera!

Adminstudio 2018 – Watch this “What’s New” webinar to learn about:

  • App Risk Module your first line of defense against application vulnerabilities. Automated scanning identifies vulnerabilities in your application portfolio
  • Automatic Virtualization for compatibility testing, conversion, validation, editing, and management reporting to ensure a faster and more reliable deployment
  • Mac Application Management to automatically assess and report best practices and risk across all Mac applications
  • Mobile Application Management to quickly scan mobile applications, understand app behavior & configuration and identify security risks
  • New, modern User Interface (UI) simplifies everyday Application Readiness tasks with a look-and-feel that’s easy to use. You asked for it and we delivered
  • Ability to assess the impact of Java dependencies within the application portfolio, including end-of-life reporting
  • PowerShell App Deployment Toolkit improves productivity by optimizing the consistency of branding and wrapping Microsoft Installers (MSI) and Executables (EXE)

MSIX – What is it and what is Flexera doing with it. (AdminStudio)

https://blogs.flexera.com/application-readiness/2018/06/msix-what-is-it-and-what-is-flexera-doing-with-it/

Software Vulnerability Management

In 2017 there were nearly 20,000 vulnerabilities disclosed. 86% of those had a security update available to mitigate it right away. But it’s up to you to find out about such security updates and patch them quickly. But how quickly? Why is gaining control of patching such a challenge?

SVM blog on how Flexera’s solution can help organizations – https://blogs.flexera.com/vulnerability-management/2018/06/assessing-prioritizing-and-fixing-software-vulnerabilities/

With vulnerabilities continuously on the rise reaching all new record highs, the struggle to keep risk is more complicated than ever.

The best way to fix these vulnerabilities is to prioritize them.  That’s where Flexera comes in.  Flexera’s technology on their Software Vulnerability Management tool helps achieve visibility, prioritizes efforts and remediates vulnerabilities faster and without operational overhead.

SW vulnerabilities going up YoY- – https://blogs.flexera.com/vulnerability-management/2018/04/the-surge-in-software-vulnerabilities-and-the-challenge-of-reducing-risk/

Reach out to your Lifeboat sales rep to learn how you can benefit by hoping on an intro call with Flexera!

EDR with Bitdefender GravityZone Ultra

Endpoint Detection and Response: Key instrument for Security Incident Response

 Datasheet on GravityZone Ultra

Personal data records belonging to more than 4 billion people were affected by the top 10 data breaches alone in the last decade. Businesses are losing market capitalization, reputation and customers, besides costly legal consequences once these data breaches surface. And, statistics indicate cybercrime is here to stay and thrive. As business dependency on IT grows, so does cyber criminals’ interest in taking advantage of this trend. So, what can be done? How can enterprises around the globe effectively fight cybercrime and prevent costly data breaches?

Besides people and processes, tools are a necessary and important part of the incident management plan. Most organizations currently rely on endpoint protection platforms (EPP) that aim to prevent malware or the execution of an attack on the endpoint infrastructure. As a complement for endpoint protection platforms, Endpoint Detection and Response (or short EDR) is built to neutralize an attack after exploitation. Bitdefender’s GravityZone Ultra product was designed from the ground up as an integrated next-gen EPP and easy-to-use EDR, offering prevention, automated detection, investigation and response tools built into a single agent and management from a single console.

EDR solutions are notoriously noisy and hungry for analyst’s time and attention. GravityZone Ultra was built to reduce the resources and skill requirements for effective incident response. Ultra leverages industry leading prevention and security automation to sharply reduce the number of incidents requiring manual investigation and provides visualization and context information for easier and faster incident resolution.

To learn more about Bitdefender, please reach out to your Lifeboat sales rep and follow Bitdefender on their blog.

 

New Release of Micro Focus Advanced Authentication

If you’re on Micro Focus’s product announcement email list then you might have noticed that a new version of Advanced Authentication (AA) was recently released. We continue to evolve AA to be the most flexible and powerful MFA/strong authentication solution that you can buy. In contrast point solutions are just that, a one trick solution that won’t cover all or your authentication needs or allow to consolidate disparate authentication architectures.

The theme of this new release (v6) was to offer a new level of deployment flexibility enabled through the use of Docker containers. Although Docker containers simplify configuration and maintenance for everyone, it’s especially useful for AA administrators using virtualization engines, hypervisors and cloud architectures. Aside from the simplified administration inherent Docker, it also provides access to a host of automation and management tools. In fact, here is a walkthrough of the top ten Docker tools:

https://www.infoworld.com/article/2839284/application-virtualization/10-open-source-tools-to-make-docker-even-more-powerful.html#slide1

Beyond the new form factor, Advanced Authentication has some other notable additions:

Face Recognition Method

Advanced Authentication supports Windows Hello that allows both face and fingerprint recognition methods to be used for authentication, allowing either or both biometrics to be used as a multi-factor authentication. Face recognition can also be used as a strong authentication in which users can present their face to the camera to get authenticated in a matter of seconds. The face recognition method can also be invoked through Microsoft Cognitive Services (Azure).

Windows 10 Hello

Advanced Authentication now allows non-domain join PCs to authentication into a domain using Windows Hello i.e., face or fingerprint type authentication Windows 10 machines.

New Reporting Portal

Advanced Authentication now provides a new Reporting portal. Administrators can add new reports and customize the existing reports on this portal. The new reports provide information about enrolled users, authenticators, and so on with better graphical representation.

Expanded Support for Federation

Advanced authentication provides an OAuth interface that provides clients an easy way to integrate their applications. Once in place, applications can leverage Advanced Authentication’s policy engine to match the appropriate method(s) to the situation to provide the ‘right’ level of security.

You also have the option to use an XML-based protocol, SAML 2.0. With SAML you can invoke security tokens containing assertions. The assertions are used for sending the information about a user from a SAML authority to a SAML consumer. Advanced Authentication also allows you to set up conditions to allow the authentication such as Geo-fencing.

Support for the SQL Repository

Advanced Authentication now supports the SQL repository. You can add the Microsoft SQL Server and MySQL types of SQL repositories to be consumed by the Advanced Authentication server.

ADFS Multi-Factor Authentication Plug-in

A new Multi-Factor Authentication (MFA) plug-in has been introduced to enable the multi-factor functionality for Active Directory Federation Services (ADFS). In comparison with the old ADFS plugin, the new plug-in has been implemented as a standard extension for ADFS.

Windows Authentication Agent

Authentication Agent allows you to perform strong multi-factor authentication on one computer to get authorized access to another computer where it is not possible to display the user interface or connect any external authentication devices. You can install the Authentication Agent on a workstation or laptop. When an authentication is initiated from a computer using Authentication Agent chain, the Authentication Agent on another computer prompts a restricted browser where the user must perform authentication.

Google reCAPTCHA

Advanced Authentication now supports the Google reCAPTCHA as a policy. Using reCAPTCHA, you can prevent the bot attacks on Advanced Authentication web portals by confirming that the user trying to log in is a human, not a robot. This change adds an additional layer of security before users perform the multi-factor authentication.

To learn more about Micro Focus Advanced Authentication, you’ll find the latest information here:

https://www.netiq.com/products/advanced-authentication/

To refresh your memory on Micro Focus’s IAM portfolio, you can start here:

https://www.netiq.com/solutions/identity-access-management/

If you’re a Micro Focus partner, you will find the latest webcasts and presentations on Enablement Central.

 

Micro Focus Cybersecurity Summit 2018

Mark your calendar and plan to attend the first Micro Focus Cybersecurity Summit, a 2-day premier Security software event September 25-27 at the Omni Shoreham hotel in Washington, DC. The Summit will include an executive track for decision makers, along with workshops, demos and breakouts for technical influencers. Registration is free of charge.

The event will include innovative tracks with exciting customer speakers, covering the full Micro Focus Security portfolio:

  • Security Operations
  • Data Security
  • Application Security
  • Identity & Access Management
  • Secure Messaging
  • Unified Endpoint Management

Each track will feature presentations by key customers showcasing their IT transformations, successes, best practices, and lessons learned using Micro Focus Security solutions to solve their business-critical challenges. Highlights at this year’s Cybersecurity Summit:

  • Partner Pavilion
  • Demo zones
  • Executive Briefing Center for 1:1’s
  • Track breakout sessions
  • Cybersecurity Summit Social event
  • Security workshops -Executive track

Registration will soon be open. Watch for details!  Contact your Lifeboat Rep with any questions!

Paessler Unveils Uptime Alliance

In May 2018, Paessler AG unveiled their new Uptime Alliance technology program which promotes collaboration and empowers participants to incorporate network monitoring into their solutions whole offering improved services.

PRTG allows monitoring the health and performance of an infrastructure in real time on networks, systems, hardware, applications and devices.  Downtime in an infrastructure can be crucial which is why Paessler wants to ensure partners 100% uptime.

To learn more about Paessler’s Uptime Alliance visit their full article here.  Contact your Lifeboat Rep with any questions!

Got Smart Devices?  Let Bitdefender Box keep them safe.  Lifeboat has your customers Box at an amazing price!  Simple to use and guaranteed to secure their connected work place.

Connect with your Lifeboat Representative today to get your incredible deal!

bitdefender box Q3 newsletter 2

The independent laboratory AV-Comparatives has awarded Panda Security the maximum possible score for detection in its first test of corporate solutions.

In March and April of 2018, launched over 600 real cases (such as malicious URLs) and Panda Endpoint Protection Plus detected and blocked 100% of the samples it was put up against.

To find out how Panda Security can help your customers, email the lifeboat team at sales@lifeboatdistribution.com

For the full article: Panda Security: 100% Detection Rate in Corporate Endpoint Protection According to AV- Comparatives

Blog at WordPress.com.

Up ↑