Lifeboat’s Top Vendor Blogs from 2017!

Lifeboat has picked the top most influential blogs for 2017! These vendors provide top-of-the-line content to educate and inform readers on the most cutting-edge information to the forefront in an innovative way.

Here are the Top 11 Vendor Blogs from 2017!


 

482422716734282.DyYgid0haAMj8y3cPViD_height640482422716734284.ReNm9cGjVr0FDAIiFvCe_height640482422716734286.zlaz3FnBf2YMOo2hqN3R_height640482422716734288.t1Ww9nTk5WpfdrVZ74kO_height640482422716734290.X3gat1ZBkoVYflNDatYn_height640482422716734292.GSKA2PeyQi6bBUtDs8y4_height640482422716734294.tEErsoc4iuihE7fJdEu3_height640482422716734296.V4ePgchB42FrU3nUKAtR_height640482422716734298.CfcbwuZs5QeH327WufVx_height640482422716734300.xbfNBjJAhOqQM5xGHysA_height640482422716734302.WIjjzs6btJVpcihT8zQK_height640

Restore Your Confidence in Security Solutions

Make the switch to Bitdefender for a Next-Gen Layered Security solution you can trust.

Learn More

  • Industry-dominating security efficacy
  • Proven protection against zero-day threats
  • Single lightweight agent
  • Best-in-class performance
  • Easy to deploy and manage
  • Fast innovation

Remove Complexity and Frustration from your Security Management!

  • Comprehensive layered next-gen EP– no need to augment with additional AV tools
  • Detect malware before execution with proven machine learning models
  • Protect against zero-day and unpatched vulnerabilities with advanced anti-exploit technologies
  • Disrupt file-less attacks with on-execution process monitoring

“We haven’t had any infections. We haven’t had any breaches… Any viruses were defeated instantly. We were completely unaffected by worldwide ransomware attacks or Google docs phishing.”

-Senior Security Analyst

GET THE NEXT-GEN EPP BUYER’S GUIDE

Chart

All You Need is a Single Lightweight Agent

  • High-performance, modular agent design
  • Small footprint — as little as 30 MB memory space
  • Smart centralized scanning — offload scanning to a centralized security appliance
  • Optimized for virtualization

bitdefender post 2

Boost Operational Efficiency Lower Total Cost of Ownership

  • Integrated management console – managed security across physical, virtual and mobile devices
  • Small footprint — as little as 30 MB memory space
  • Smart centralized scanning — offload scanning to a centralized security appliance
  • Optimized for virtualization

Watch video

See how HyperDetect and Sandbox Analyzer work together to protect against elusive threats

Getting Started with Disaster Recovery

Have you ever spilled something on your keyboard or accidentally dropped your laptop? What happened next was probably a cautious attempt to turn it back on, followed by a state of panic that your laptop won’t respond to your repetitive pressing of the on/off button, followed by one last ray of hope when you take it to a nearby computer shop, where they tell you you’ve just fried your components.

Pretty scary, isn’t it? Now take that feeling and multiply it several times to understand a fraction of what happens when an IT system in a company crashes.

Cyber-attacks, earthquakes, tornadoes, fires, terrorist attacks, even monkeys (one actually caused a power outage in Kenya last year) and a lot more, are all potential disasters that could hit your business and the reasons why your company needs to have a disaster recovery (DR) plan.

So how big of a problem is this? Well, according to the Institute for Business and Home Safety, an estimated 25 percent of businesses don’t open again after a major disaster. To protect your business, you need to identify the risks relevant to your organization.

Disaster Recovery in a Nutshell

So what is disaster recovery and why should every organization have a DR plan?

Disaster recovery is a set of tools, procedures and policies that are put in place in the event of a disaster to recover the vital technology infrastructure of the company and allow its continuation. These disasters can either be human-induced, such as terrorist and hacking attacks, or it can be natural, like hurricanes, earthquakes, tsunamis, floods, lighting strikes and so on.

Why is this important?

No business is safe from these or many other disasters. Events such as these can disrupt or even grind day-to- day business operations to a full stop. As a result, the company will be unable to provide services to its clients. Sometimes, this disruption will be short, with little impact, but other times, client and customer important data may be affected. This can cause lost orders, late invoices and loss of productivity.

When this happens, companies will be forced to put extra work hours in an attempt to recover for the lost time, putting more costs on themselves. Eventually, clients may leave, looking for a more secure company to work with (one with a DR plan, preferably).

Even a one-hour downtime can cost the company a lot of money. According to Tech Advisory, a one hour downtime can cost small organizations $8,000, mid-sized $74,000, while large companies lose as much as $700,000.

Isn’t This the Same as Backup?

You might be asking now, isn’t disaster recovery just another term for backup?

In a way it is, but with one fundamental difference. While both backup and disaster recovery involve making copies of your valuable data, the concept of restoring a backup assumes restoring data back to its original location, whereas activating a disaster recovery plan assumes restoring data to an alternative location. As the name implies, in case of a disaster — this can be a major event where you lose your entire IT infrastructure, or a minor event when a server becomes unavailable — a disaster recovery plan will help you to restore data on an alternative device or in a remote location to ensure business continuity.

What Should a Disaster Recovery Plan Look Like?

Every organization that includes IT should have a DR plan in case a disaster happens. This plan includes the necessary steps that need to be undertaken, strategies to follow and how employees should act, among other things.

In short, the most important things to consider when developing a disaster recovery plan are:

1. What potential threats (natural or man-made) is an organization facing and how it can/should react to them.

2. How will these disasters affect the business (business impact analysis, or BIA).

3. How does this affect our clients, customers and users? Who will speak to them on our behalf? How will they be notified?

4. Who do we need to contact during a crisis? Shareholders? Police? Government? Is there a mandatory reporting procedure to follow?

5. Where should the data be recovered? Locally, in the cloud, or both? Is there a backup procedure to accommodate for that?

6. What are the priorities? System and applications should be prioritized. What must be recovered first?

7. What systems need to be updated? A common mistake companies make is not updating their systems following a disaster recovery.

8. Practice. Does the DR plan really work? Is your staff prepared for an emergency?

Need a reliable backup and disaster recovery solution? Take a look at Acronis products available at Lifeboat.

Written by Vladimir Covic (Acronis)
Featured post

Lifeboat Regional Event in Toronto!

On October 23, 2017 Lifeboat Distribution held a Regional event in Toronto, Canada. The event took place at the Air Canada Centre for a Maple Leaf’s hockey game. Before the game, 10 vendor companies and 30 resellers partners had the opportunity to take part in a “speed networking” session. Each vendor took about 10 minutes to pitch to partners and hear about what business problems their products can potentially solve. The networking portion of the night gave all attendees the opportunity to have quality time with one another and exchange information for future business opportunities.

“You guys did an absolutely great job in putting the event together, very well organized and very efficient. The concept of speed presentation worked out absolutely great for our business. I look forward to Corel’s ongoing partnership with Lifeboat!”

— George Haddad,
Corel Account Manager

After the speed networking session, everyone headed into the the stadium to watch the game and continue networking. The successful event ended with a raffling of two Maple Leaf’s jerseys! Stuart Johnston from Windswept Integrated Technology and Tim Goodison SHI were the lucky winners of the night.

 

Lifeboat Distribution would like to thank the reseller partners and vendor sponsors for making our first Toronto event a success, we look forward to seeing everyone again next year!

View the slideshow to see more photos of the night!

This slideshow requires JavaScript.

 

 

Panda Security beats ‘Bad Rabbit’

Panda Adaptive Defense absolute visibility boosts our Prevention, Detection and Response capabilities, freeing all our customers from next-gen attacks like Bad Rabbit.

What Do We Know?

You may have recently read about a new ransomware variant named Bad Rabbit infecting computers.  We wanted to briefly explain what you should expect from this variant, and from your Panda protection.

Bad Rabbit is a new ransomware variant with some similarities to the recent Petya/NotPetya variant.  Like all ransomware, it encrypts the computers hard drive and requests payment for decryption.  Bad Rabbit has also exhibited the ability to spread in the network to other machines.  Regionally this variant has primarily affected computers in Russia and the Ukraine.

As of the early morning of Tuesday, October 24th, all Panda product offerings were providing full and effective protection against Bad Rabbit.

What Should You Do?

The best protection against this and all other threats is Adaptive Defense 360.  Adaptive Defense 360 automatically blocks and classifies all unknown processes before they have a chance to infect a machine.  Not a single machine using Adaptive Defense 360 in Lock Mode was affected by the previous attack, WannaCry.  The same applies for Bad Rabbit.

Those utilizing our Endpoint Protection product family (Endpoint Protection & Endpoint Protection Plus) should make sure that all endpoints are communicating properly with the console and have updated their signatures.

If they have not, please make use of the assistance provided in the console by clicking on the host name of each device that is out of date.  You can also contact our Corporate Support by dialing 1-866-748-2157 option 2, or by emailing corporatesupport@us.pandasecurity.com

To see how Panda Security would be a good fit for you, please contact sales@lifeboatdistribution.com.

 

KRACK (Key Reinstallation Attack )– Is this big or not?

A vulnerability on the implementation of a global standard encryption scheme for Wi-Fi connections is certainly big news. It is scary to imagine that this protocol is implemented in every device connecting via Wi-Fi and that a vulnerability in it could put virtually everyone around the globe at risk. It is an alert to the catastrophic impact that corruption of widely adopted protocols and systems can cause. So, the buzz around this issue is important to raise awareness and to feed the conversations about how we can improve security and how to be prepared to tackle critical vulnerabilities . At the same time  it is critical to cut through the noise to understand the risk and devise appropriate measures to mitigate it.

  • There is no attack at this point – Despite the “market” name, the attack is a proof of concept (POC) demonstrated by researcher Mathy Vanhoef, from Belgian University  KU Leuven who uncovered the vulnerability. There are no reports of actual attacks or successful breaches associated with this vulnerability at this point.
  • The attack can only happen within the Wi-Fi network – Remote attacks aren’t possible using this vulnerability alone. A successful attack would need to be launched and managed by a device connected to the same Wi-Fi network.
  • All devices connecting via Wi-Fi may be at risk – Even though there are no reported attacks and exploitation requires physical presence, this weakness in the implementation of the WPA2 protocol potentially affects ALL devices connecting via Wi-Fi.

To learn more about what Flexera’s Secunia Research team has discovered about KRACK go to our blog or engage your dedicated software rep to learn more about Flexera’s Software vulnerability manager

Arm Yourself with the Latest Sales Tools from Sophos

Sophos Synchronized Security

 

With ransomware attacks getting increasingly sophisticated, using multiple techniques and points of entry to bypass defenses and evade detection, most security solutions are designed to wrap endpoints and users in layers of security.

Synchronized security is a radically different approach, enabling the endpoint and network security components to directly share information to improve protection and make better, faster decisions.

The revolutionary Sophos Security Heartbeat™ ensures your endpoint protection and firewall are talking to each other. It’s a simple yet effective idea that means you get better protection against advanced threats and spend less time responding to incidents. It’s so simple, it makes you wonder why nobody did it before.

Best of all, you can manage all of your products from a single interface with Sophos Central.

To help your customers understand how they can achieve a stronger and more holistic security posture, introduce them to Sophos Synchronized Security.

Sophos Intercept X – Anti-Ransomware in 60 Seconds

Intercept X features signatureless anti-exploit, anti-ransomware and anti-hacker technology that includes visual root-cause analysis and advanced malware cleanup. And it’s all managed via the Sophos Central Admin console.

But how does it detect ransomware?

Find out more in the video below!

Use this Call Script to introduce Sophos Intercept X to your customers and help them protect themselves against ransomware!

Download these Sales Tools:

Technology Evolves – Your Backup Should Too.

Technology Evolves – Your Backup Should Too.

The fastest growing threat to your data is ransomware. Join Acronis’s upcoming webinar to learn the simple steps you can take to defeat the fastest growing threat to your customer’s data.

Register today to reserve your place!

•What ransomware is and how it can take your company’s files and computer system hostage.

•Why cybercriminals have begun expanding the types of targets they are attacking with ransomware.

•How regularly scheduled full image backups can reduce the effects of ransomware encryption, making attacks a simple nuisance instead of a crippling data loss event.

•Why it is critical to store a copy of your backup secure and off-site, and how to keep that copy easily accessible for when you need a quick recovery.

•How Acronis is helping users combat ransomware with its artificial intelligence-based Acronis Active Protection – the only backup technology that actively detects and stops ransomware attacks, and automatically restores any affected files.

Blog at WordPress.com.

Up ↑