Articles about Endpoint

Asleep on the sofa image via Shutterstock

Symantec warns of serious security holes – in Symantec security kit

Symantec is advising users of its Endpoint Protection (SEP) software to update their systems, after three vulnerabilities were reported in the computer defense tools. Two of the bugs – a cross-site scripting (XSS) flaw, and a SQL injection vulnerability – are in the SEP Management Console, a web-based portal you can log into …
Shaun Nichols, 18 Mar 2016
Bruce Schneier

Confirmed: IBM slurps up Bruce Schneier with Resilient purchase

RSA 2016 After nearly a week of rumors IBM has confirmed it has bought incident response firm Resilient Systems and so gained the services of its CTO security guru Bruce Schneier. "We are excited to be joining IBM Security, the industry's fastest-growing enterprise security company," said John Bruce, Resilient Systems' CEO. "By …
Iain Thomson, 29 Feb 2016
Michael Dell, photo: Dell

Dell stares EMC in the eye, doesn't blink, turns up data protection dial

Dell has added new deduping appliances and updated its Rapid Recovery (AppAssure) and NetVault (Quest) backup software, showing no signs of portfolio retrenchment in the face of the oncoming EMC merger. In a multi-product release Dell announced: Rapid Recovery (rebranded AppAssure) ZeroImpact recovery of systems, …
Chris Mellor, 25 Feb 2016

Let's talk over Wi-Fi, says Oracle to folks who don't know Skype exists

MWC16 Oracle's parked its yacht near Barcelona and fired off the usual broadsides of product announcements that accompanies a major conference like Mobile World Congress. Mobile operators in need of a Wi-Fi gateway can throw their hats into the air with the launch of the Oracle Communications Mobile Security Gateway. The gateway's …
HPE_machine_graphic

HPE is going to unleash a Machine on us. Here's how it might play out

Comment At the far end of HPE's storage and compute strategy is the Machine, the dynamically composable infrastructure thing with separately scalable compute, memory/storage and networking resources. It has a huge flat and persistent memory space using storage-class memory (SCM). It was supposed to use memristors, but since that …
Chris Mellor, 12 Feb 2016

GSMA outlines thoroughly sensible IoT security rules

About time: the GSM Association has released a bunch of guidelines to try and address the chronic insecurity of the Internet of Things. The significance of the initiative is that it's been agreed to by a collective of major carriers – the organisation's announcement lists AT&T, China Telecom, Etisalat, KDDI, NTT DOCOMO, Orange …
happy_woman_at_desk

VMware finally gets all its end-user computing ideas together as one

VMware has taken the wraps off what looks like the culmination of several years building an end-user computing business. Workspace ONE is the name of the new product, an odd choice given that arch-rival Citrix offers Workspace Suite and Workspace Cloud. The similarity doesn't end there. Both companies now offer different …
Simon Sharwood, 09 Feb 2016

Word up: BlackEnergy SCADA hackers change tactics

A new BlackEnergy spear-phishing campaign is targeting more Ukrainian firms, including a television channel. A spear-phishing document found by Kaspersky Lab analysts mentions the far-right Ukrainian nationalist political party "Right Sector" and appears to have been used in an attack against a popular television channel in …
John Leyden, 28 Jan 2016

Walmart takes its DevOps platform and piles it high on GitHub

Walmart has delivered on low-price promise and taken a swipe at soon to be arch enemy – by serving its OneOps platform onto Github. The massive grocer – which owns Asda in the UK – promised last year that it would open source the platform, which it is pitching as a way to avoid cloud vendor lock in. It duly announced yesterday …
Joe Fay, 27 Jan 2016
Are you being served?

Serving up IT on a silver platter, also known as ITSM

In the 1950s, we imagined a world where everything was automated. Robots would clean for us, and small boxes would instantly produce hot food. Now, we have the Roomba and the microwave, and shortly, cars that drive themselves. Even Zuck is preparing his electronic butler. To top it all, there’s not a dodgy-looking Jetsons …
Danny Bradbury, 15 Jan 2016

Citrix buys System Center control freak, sells CloudPlatform

Citrix has offloaded its CloudPlatform products to Accelerite, bought Comtrade's System Center Operations Manager management packs and tweaked some of its software. The sale first: Accelerite is a subsidiary of India's Persistent Systems, a software-developer-for-hire that created Accelerite to sell products instead of …
Simon Sharwood, 12 Jan 2016
Joanna Rutkowska of Invisible Things Labs gives talk "Towards (reasonably) trustworthy x86 laptops" at ccc - still from youtube

Trustworthy x86 laptops? There is a way, says system-level security ace

32c3 Security concerns around Intel's x86 processors – such as the company's decision to force the secretive Management Engine microcontroller onto its silicon – have raised fundamental questions about trust in personal computers, whatever architectures they may be based upon. Youtube Video The founder of Invisible Things Labs, …
Example of tidy cabling

Cisco, HPE and Dell: Let's just say 'it's complicated' for now

Sysadmin's 2015 review part 2 With 2015 drawing to a close and 2016 about to begin it's time to reflect on the fact that the world never stops changing. The tech industry certainly changes constantly, and so here's one sysadmin's view of the industry's movers and shakers. In part one, I took a look at Amazon, Oracle and Microsoft. Here in part two I am …
Trevor Pott, 26 Dec 2015
management management

Bookstore sells some data centre capacity, becomes Microsoft, Oracle's nemesis

Sysadmin's 2015 review part 1 With 2015 drawing to a close and 2016 about to begin, it is time to reflect on the fact that the world never stops changing. The tech industry certainly changes, and so here's one sysadmin's view of the industry's movers and shakers. In part one we're going to look at Amazon, Oracle and Microsoft. As I see it, the strategy of …
Trevor Pott, 24 Dec 2015

Sophos grabs ATP-thwarter tech firm SurfRight for $32m

Sophos has paid $31.8m in cash to snap up advanced threat prevention firm SurfRight, with the deal allowing traditionally conservative Sophos to integrate SurfRight’s signature-less endpoint threat detection and response tech into its line of endpoint security products and services. The UK-based company claims the two sets of …
John Leyden, 15 Dec 2015
Panic button

Cisco bitten by Java deserialisation bug, working on patch

November's high-profile Java deserialisation bug has bitten Cisco, with the company announcing vulnerabilities across the board in its huge product line. The problem is so pervasive that it reaches into the most trivial activities of the sysadmin, such as serial number assessment services. The original advisory made by …

Bare metal is not dead, so Borg goes for SDN assimilation

Cisco is continuing to walk the fine line between embracing software defined networking (SDN) and opening things all the way up, announcing the latest refresh of its Application Centric Infrastructure (ACI) environment. The biggest surprise of the latest announcement isn't the various support partnerships The Borg has added, …

Microsoft takes PUPs behind the shed with gun in hand

Remond has updated its paid System Center Endpoint Protection and Forefront Endpoint Protection services with a feature to kill spammy and advertising injecting programs operating from within enterprise networks. The upgrades will help system admins to eliminate potentially unwanted programs (PUPs) from networks that are not …
Darren Pauli, 30 Nov 2015
Cortana

Hey Cortana, how about you hide my app from the user?

MS Ignite AU It's a way off yet, but one of the endpoints for Cortana, Microsoft's take on the digital assistant you can fall in love with, is to be a primary interface between multiple applications. The idea is that instead of opening an Excel spreadsheet to find a datum you need, copying it, switching to e-mail, and sending it to the …
Windows 10 floppy disk

Microsoft working hard to unify its code base, all the way down to the IoT

MS Ignite AU Windows CE might seem like a bad dream from this distance, but a IoT developer speaking at Microsoft's Ignite gabfest in Australia have told The Register it represents a starting point that now positions Redmond well to respond to the Internet of Things. Mitch Denny, CTO of Readify and a .NET developer for several years, is …
symantec CEO mike brown

Symantec's salvation plan is more and better integration. No, really

Symantec divested Veritas because it never quite convinced anyone that an integrated security and data management company made sense, and its security business has struggled in part because it's not linked its protection products. But the company's new CEO Michael Brown nonetheless thinks that integrating the company's range is …
Simon Sharwood, 17 Nov 2015

Got to be better than human protection: New firm using machine learning anti-malware

RotM Security firm Cylance is using machine learning to fight what many firms regard as the already lost battle of keeping computers free of malware. While mainstream thinking in the industry has moved towards acceptance that malware infections are inevitable and the focus has to be on detection and response, the US startup isn’t …
John Leyden, 12 Nov 2015

Sophos undertakes unified unified threat management unification

Sophos has launched a threat intelligence sharing platform 'XG' for its endpoint and network security firewalls and unified threat management systems. It means kit within homogeneous Sophos houses will be able to share threat intelligence data such as an endpoint screaming to network security boxens whenever an employee runs …
Team Register, 10 Nov 2015
Toilet roll printed with fake US $100 bills

Symantec numbers are out. Execs might wish they weren't

A soon to be storage-free Symantec has reported its last numbers before the split with Veritas and they aren’t good - not if you are a company exec or investor. The firm has operationally split from Veritas - which was offloaded to private equity biz The Carlyle Group - but the legal separation is set for 1 January. …
Paul Kunert, 06 Nov 2015
ArcticBlue_butterfly

Endpoint protectors spread wings, Druva flies into Microsoft cloud

Endpoint data protector Druva is adding Microsoft's Azure to its public cloud target list, adding security and sharing features to its backup capabilities and trying to appeal more to enterprises – a link with Microsoft is good news in that department. "Druva has quickly grown to become the de facto standard for data …
Chris Mellor, 02 Nov 2015
shutterstock_197065211

WhatsApp laid bare: Info-sucking app's innards probed

Users of WhatsApp need be aware that the popular messaging service collects phone numbers, call duration and other information, according to new research. A network forensic examination by computer scientists at the University of New Haven found that WhatsApp uses the FunXMPP protocol, a binary-efficient encoded Extensible …
John Leyden, 27 Oct 2015
Astronauts Neil Armstrong and David R. Scott sit with their spacecraft hatches open while awaiting the arrival of the recovery ship, the USS Leonard F. Mason, after the successful completion of their 1966 Gemini 8 mission. Pic: NASA

The art of Rapid Recovery: Dell begins rebranding AppAssure

Dell is radically strengthening its AppAssure product with expanded functionality, rebranding, and an expansion into the end-point protection arena. AppAssure becomes the Rapid Recovery product under a Dell Data Protection (DDP) brand. The product is block- and snapshot-based, only storing unique, changed blocks with a five- …
Chris Mellor, 26 Oct 2015
Sunset by https://www.flickr.com/photos/pslee999/ cc 2.0 https://creativecommons.org/licenses/by/2.0/ attribution generic

Intel Security sunsets SaaS email security products

Intel Security is decommissioning bits of its software-as-a-service armoury. The newly-re-named outfit (We have nothing – NOTHING! to do with that oddball John McAfee) has emailed customers of its McAfee SaaS Endpoint Products and SaaS Email Protection and Archiving to let them know that as of January 11th next year it will …
Simon Sharwood, 23 Oct 2015
DVD it in many colours

Our storage reporter has breaking news about Data Fabrics. Chris?

Recent NetApp Data Fabric literature presages a return of FlashRay and an apparently semi-detached integration of its StorageGRID product. Data Fabric is NetApp's over-arching concept of a virtual fabric with which data in different clouds (stores) can be seamlessly connected across different data management (product) …
Chris Mellor, 23 Oct 2015

German surfers blitzed by widespread malvertising campaign

German surfers are under attack from multiple directions this week because of a widespread malvertising campaign. Users of eBay.de and subscribers of ISP T-Online.de were confronted with tainted ads after cybercrooks succeeded in pushing malicious traffic through rogue systems. The attacks began after hackers circumvented …
John Leyden, 22 Oct 2015
Geoff_Barrall

Connected Data gobbled for $7.5m? More like an $80m funding round

CEO Q&A The $7.5m purchase of Connected Data by Imation can be looked at as an $80m funding round with a potential bonanza from a successful Imation restructuring-driven stock price rise. Also, as well as the $7.5m paid up front, there is a potential $5m earn-out in more Imation stock based on revenue targets in the two halves of 2016 …
Chris Mellor, 15 Oct 2015

Hackers can steal your BRAIN WAVES

BruCon: Behold the future: attackers can already get between brain-waves and hospital kit, and it's just going to get worse according to IOActive senior consultant Alejandro Hernández. Hernández says the ability to steal, manipulate, and replay brain waves used in electroencephalography (EEG) is already emerging, with consumer …
Darren Pauli, 13 Oct 2015
US_two_dollar_bill

Teenage backup biz Code42 gets cash bonanza

End-point backer-upper, file-sharer and security monitor Code42 has just raised a huge chunk of cash to grow its business into the big time. Code42 was founded back in the stone age, 2001, making the company a relatively aged 14. In 2013, it took in its first funding, a substantial $52m in A-round. This was 12 years after it …
Chris Mellor, 06 Oct 2015
management consumerisation

Veritas-free Symantec: what is glittery and easier to slip into?

Efforts to jump start revenue growth at Symantec started today with a revamped channel programme that threatens to shower third party sellers with more cash, coughed more frequently. The Symantec Secure One follows sales declines of enterprise security in three of the past four quarters at the corporation, and comes as it lops …
Paul Kunert, 05 Oct 2015

IT security spending to hit $75.4bn in 2015 despite currency issues, says Gartner

Worldwide spending on information security will reach $75.4bn in 2015 – an increase of 4.7 per cent over 2014 – despite a currency-driven price hike causing some customers to delay purchases until next year. Government initiatives, increased legislation and high-profile data breaches are the hot topics shaping the latest …
John Leyden, 23 Sep 2015
tanami_desert_near_willowra_648

Policing the data hinterlands beyond the corporate firewall

Comment For Code42, the answer to the universe and everything is getting more interesting as it moves from protecting business users’ PCs and notebooks to providing data access security and monitoring tools. The US backup company has undergone recent C-level management changes, including making Joe Payne its CEO in July, and its focus …
Chris Mellor, 23 Sep 2015

Hacker drops zero-day, opens FireEye fire sale

US security consultants Kristian Hermansen and Ron Perris have dropped a zero day remote file disclosure vulnerability affecting FireEye kit and say they have another three flaws for sale. The vulnerability disclosure dropped on Exploit-DB Sunday claims the web server runs as root in some FireEye kit, among other security …
Darren Pauli, 08 Sep 2015

Big Blue bops modular menace

IBM threat researcher Limor Kessem has found a new modular malware credential stealer that could become a significant enterprise threat. The malware dubbed CoreBot is an advanced tool currently a credential harvester that operates with sophisticated plugins designed to allow VXers to add extra functionality and offensive …
Darren Pauli, 02 Sep 2015
VR

Hidden password-stealing malware lurking in your GPU card? Intel Security thinks not

Fears that malware is hiding in people's graphics chipsets may be overclocked, according to Intel Security. Earlier this year, researchers from the self-styled “Team JellyFish” released a proof-of-concept software nasty capable of exploiting GPUs to swipe passwords and other information typed in by a PC's user. The same …
John Leyden, 01 Sep 2015

Mashed together malware threatens Japanese online banking users

Customers of Japanese banks are on the front line of attacks based on a new and sophisticated banking trojan, mashed together from leaked bits of malware code. Shifu (named after the Japanese word for thief) is targeting 14 Japanese banks as well as electronic banking platforms used across Europe, according to security …
John Leyden, 01 Sep 2015

Hedvig, Druva, IBM, Catalogic, Nutanix, Arcserve bang storage drums at VMware's rave

VMworld 2015 There's been a whirlwind of supplier announcements in the run-up to VMworld, which takes place between August 29 and September 3 in San Francisco. We've covered the main storage ones already, but a backlog of others built up. So here, for your delectation, is what the sexy sextet of Arcserve, Catalogic, Druva, Hedvig, IBM, and …
Chris Mellor, 31 Aug 2015
TV watcher, image via Shutterstock

Channel surfers and the irresistible rise of Content Delivery Networks

Fastly, a four-year-old content delivery network start-up, this month landed $75m in venture funding. It was the firm’s fifth intake of cash, the second in less than a year. What’s remarkable is that inventors are backing a firm that is going up against some big names – among them the massive Amazon juggernaut. Clearly, …
Tom Baines, 28 Aug 2015

Want security? Next-gen startups show how old practices don't cut it

Sysadmin Blog In case you hadn't noticed, IT security sucks. There is a chronic lack of people trained in IT security, people who will listen to IT security, and even a lack of agreement on how best to go about IT security. Fortunately, a new generation of startups are helping to tackle the issues. No matter how good a sysadmin you think …
Trevor Pott, 22 Aug 2015

Malvertising set to wreak one BEELLION dollars in damage this year

Records have fallen as malvertising clocked its most prolific month in history, making it one of the biggest threats to endpoint security. If the scourge continues, criminals will have inflicted a billion dollars in damages by the end of the year from a paltry US$12,000 investment, according to researchers at security firm …
Darren Pauli, 13 Aug 2015

Patching a fragmented, Stagefrightened Android isn't easy

Android users face a triple patching headache with the recent discovery of a collection of serious vulnerabilities affecting smartphones and tablets running Google's mobile operating system. Security experts warn that the fragmented nature of Android devices will make patching more difficult than it would be in updating PCs. …
John Leyden, 12 Aug 2015
Credit: RodWey2004 Licence: https://creativecommons.org/licenses/by-sa/2.0/deed.en

Hawking, Musk, Woz (and Riley): ROBOTS will KILL US ALL

+Comment Notables of the technology world including physicist Stephen Hawking, biz baron Elon Musk and techno-hippy Steve Wozniak have teamed up with saucy actress minx Talulah Riley to warn us all about the menace of killer robots. In an open letter and petition, the distinguished trio and their co-signatories warn: Autonomous …
Lewis Page, 27 Jul 2015
hard step by https://www.flickr.com/photos/shemsu_hor/  cc2.0 attribution no derivs https://creativecommons.org/licenses/by-nd/2.0/

BlackBerry vows to make even fewer phones

It isn’t just Microsoft that’s going on a drastic phone diet. BlackBerry’s CEO John Chen today indicated that the Canadian enterprise vendor would cut its device portfolio from the four devices previously promised for 2015 to “two or one” a year. “We are reducing jobs, but it is not so much as reducing; we are shifting it, so …
Andrew Orlowski, 24 Jul 2015
Herdwick sheep walk towards the camera

You can do more with backup than just cloning your data

As we all know, the world of backup is changing, and not just in obvious ways such as the move to disk and cloud-based backup, the adoption of deduplication, the need to copy, back up and restore virtual machines, and so on. First, flash memory and the wider availability of snapshots and replication means that other elements …
Bryan Betts, 23 Jul 2015
Ideal for a summer blast

How to keep track of your flexible workers

It has been two years since Yahoo! chief Marissa Meyer hauled her remote working employees back into the office, intent on eliminating flexible working. The concept is becoming more popular, though, whether people like Ms Meyer like it or not. In June 2014, an amendment to the UK’s Children and Families Act came into effect. …
Robin Birtstone, 23 Jul 2015

Black Hat 2015: 32 SCADA, mobile zero-day vulns will drop

Gird your loins, admins; researchers are set to drop 32 zero-day vulnerabilities at the Black Hat hacking fest in Las Vegas in August. The vulnerabilities have not been disclosed but they will affect mobile devices and Supervisory Control and Data Acquisition (SCADA) systems among other platforms. "We have 32 different zero- …
Darren Pauli, 21 Jul 2015