Author Archives: admin

  • 0

Recovering Active Directory in a Hybrid World

Category : Events , News

Join this 6 part series to discover how to implement a hybrid Active Directory recovery strategy and get peace of mind that you’re covered no matter the scenario.

You can register here:

Episodes

Episode 1: AD mistakes happen – How do you quickly recover without missing a beat?
The rise in remote workers increases the chances of inadvertent mistakes that can damage your Active Directory environment.  Productivity can be impacted for hours, even days, costing your company money and reputation. You need a disaster recovery plan to pinpoint changes in your AD at the object and attribute level. Know what happened and who was impacted. With an effective disaster recovery plan and a strategy you can be back up and running quickly. Learn how in Episode One. Watch on demand here

Episode 2: AD corruption happens – And recovering from it isn’t easy…
Face it – corruption happens more often now than ever before and your Active Directory environment can be severely damaged. When these incidents occur, they can bring your organization’s productivity to its knees. Minimize potential impact by reducing downtime and getting users back to work quickly. With the right tool, you can reduce recovery time from a forest-level AD corruption by up to 95 percent. Learn how in Episode Two.

Episode 3: AD disasters are real – Do you have the insurance coverage you need?
It’s a dangerous world out there –and getting worse by the day.  By 2021 the costs associated with cybercrime is predicted to be $6 trillion annually. Global damage from ransomware is predicted to be $20 billion a year from now. So how do you protect yourself? You need to apply a complete backup and recovery strategy to recover from any AD disaster at the object and attribute level, the directory level and the OS level across the entire forest. Join Episode Three to learn how to ensure your on-prem and Azure AD remain safe and available.

Episode 4: Recovering the unrecoverable – restoring all types of Office 365 groups.
Chances are at some point you will experience a scenario where all of your Office 365 Groups or security group data is deleted. Native tools cannot properly recover these groups, and the Recycle Bin only keeps Office 365 Groups for 30 days. With no Azure AD change log or comparison report to help you determine which users and Azure objects have been changed or deleted, recovery is impossible. Learn how to restore the points where the group was used, repair Synchronization Scope and restore and confirm the group is recovered. Join Episode Four.

Episode 5: Restoring Conditional Access policies, Applications, and service principals to ensure security and availability.
Conditional Access Policies allow or block access to cloud applications and Azure management based on specific conditions. If hard deleted, your security and business continuity are compromised If the Applications themselves – more specifically –  service principals, get hard deleted, your security is even more at risk.  While native recovery tools might be able to restore soft-deleted Applications, they can’t recover Conditional Access Policies or service principals. So what can you do? With the right tool, you can recover hard-deleted Conditional Access Polices and restore their enforcement. Gain visibility into the ripple effect of the deleted Applications and service principals.  Learn how in Episode Five.

Episode 6: Wait… You hard deleted AD users?  No worries… you can recover!
Incorrectly deleting AD users is bad. Hard deleting them? Well, you don’t want to go there. But what if it happens? AD Connect doesn’t sync your on-prem users to the cloud as easily or reliably as you may think. Native tools have gaps. You want a tool that provides difference reporting to elp you determine what changes were made to Azure AD and then help you roll back unwanted changes into Azure AD, including those not captured by the Recycle Bin. Fully restore your users. Learn how in Episode Six.


  • 0

One Identity Technical Deep Dive Live Webcast Series

Join One Identity’s Live Webcast series as we take deep dives into critical identity-related technical topics, including identity governance and administration (IGA), privileged access and log-management solutions.

This informative series of 90-minute sessions appeals to the IAM expert as well as IT professionals who want to build a solid foundation in identity-based security best practices.

Review the list of webcast topics and dates below (subject to change), and register today.

Select your events:

Please send your questions and recommendations to sales@escom-bg.com


  • 0

SUSE Enterprise Storage 6 Now Available

Category : News

Based on the Ceph Nautilus release, SUSE Enterprise Storage 6 allows your customers to seamlessly adapt to changing business demands by:

  • Accelerating innovation by further removing storage silos, giving them easier access to different types of data and enabling them to quickly extract information from data using cutting-edge search and analytics tools;
  • Maximizing application availability with faster and more granular backups that can now leverage low-cost public cloud resources for improved data protection;
  • Responding to changing business demands faster with the ability to quickly and easily leverage public cloud resources as part of their storage infrastructure.

It also helps your customers reduce IT operational expense by:

  • Optimizing data placement with the ability to automatically and efficiently move data between all tiers of storage based on policy, ensuring access to critical data when they need it;
  • Improving IT efficiency with a single, scalable storage solution that meets all storage requirements for containerized and cloud-enabled workloads, no matter where they live.

Read more:


  • 0

Micro Focus Wins $161K Visual Cobol Licensing Deal at BRD Bank, Romania

Category : News

About the customer:  
BRD – Groupe Société Générale is a Romanian bank which is based in Bucharest, Romania. It was founded in 1923 and is currently the third largest bank by assets (about 10.9 bn €) in Romania.  
The Challenge:  
The customer needed to modernize their legacy application with a state-of-the-art apps dev platform. BRD believed the alternatives on hand was a complete re-write of the application or for them to keep using the old legacy application.    
Why Micro Focus Won:  
Micro Focus offered the customer a solution for migrating from a legacy, out-of-date environment to our a modern development platform with the latest flagship Cobol product (Visual Cobol).   The sales and AMC presales teams conducted a thorough assessment and were able to demonstrate, through an on-site PoC that modernization is indeed possible within their environment.  
Lessons Learned:  
– We understood the customer challenge well and provided them a solution that was technically feasible and took them to the next level of their digital transformation.  
– We learned how putting the put the customer at the centre of our innovation and demonstrating value helps us win!  
Try Visual COBOL today >>>

  • 0

More functionality across more platforms with KACE Systems Management Appliance| Endpoint Management

Category : News

As the quantity of endpoints you have to manage continues to grow, ad-hoc and manual processes and disparate endpoint system solutions are no longer sufficient. What if you could address hardware and software management, network security, and better service your end-user systems more efficiently all with a single endpoint management solution? The KACE Systems Management Appliance (SMA) helps you accomplish these goals by automating complex administrative tasks and modernizing your unified endpoint management approach. This makes it possible for you to inventory all hardware and software, patch mission-critical applications and OS, reduce the risk of breach, and assure software license compliance. So you’re able to reduce systems management complexity and safeguard your vulnerable endpoints.

Features:

  • Inventory and IT asset management
  • Software license management
  • Patch management and endpoint security
  • Software distribution
  • Chromebook management
  • Server management and monitoring
  • Efficient systems administration
  • KACE Go Mobile App
  • Multiple deployment options
  • KACE Cloud Mobile Device Management integration
  • Service desk

Read more >>>


  • 0

Never compromise network security for performance with WatchGuard

Category : News

Firebox M270 and M370 Unified Threat Management (UTM) solutions are up to 3 times faster than competing products with all security layers turned on, and up to 94 percent faster performing HTTPS inspection, ensuring businesses never have to compromise network security for performance.

  • Stay Ahead of Evolving Threats – the M270 and M370 are part of WatchGuard’s award-winning Firebox security platform. The platform not only provides the most complete suite of unified security controls on the market today, it has consistently been the first to offer solutions for addressing new and evolving network threats including advanced malware and ransomware;
  • Always Know What’s Happening on Your Network – Interactive, real-time monitoring and reporting through WatchGuard Dimension – included at no additional charge – give an unprecedented view into network security activity so you can take immediate preventive or corrective actions;
  • Quick and Simple Deployment – SMBs usually have smaller, less technical staff, which can make network expansion challenging. With RapidDeploy – a powerful, cloud-based deployment and configuration tool that comes standard with WatchGuard Firebox appliances, all you have to do is power up the appliance at a remote site and connect it to the Internet;
  • Easy to Manage – It’s in WatchGuard’s DNA to deliver advanced network security technologies that were previously thought to be too complex for small and midsize organizations.

Read more >>>

Download center:

Demos and Free trials >>>


  • 0

Enterprise Suite 5.0 – The New Economics of Enterprise Computing!

Category : News

Announcing Enterprise Suite 5.0 | Micro Focus Blog

This week Micro Focus released its latest update of its Enterprise Suite mainframe application delivery technology, version 5.0. The Micro Focus Enterprise product suite improves application modernization for IBM mainframe PL/I and COBOL development and operations team.

Some organizations are seriously exploring scale-out (multiple commodity servers running parallel workload deployments) instead of scale-up (workload consolidated on a single, large-scale platform) to meet certain business requirements. And it’s no surprise that Micro Focus can offer that flexibility. Included in the 5.0 release of the Micro Focus Enterprise Suite include new facilities to support scale-out architecture for large, complex enterprise systems:

  • Providing linear performance scaling means applications running on scale-out environments that can expand and contract on demand;
  • Providing highly available support and redundancy that removes single points of failure across infrastructure, applications and data;
  • Enabling the operation of business systems that are running across multiple nodes;
  • Supporting deployment onto multiple Enterprise server regions that can be scaled on premise, in cloud instances or in containers which provides predictable application performance throughput;
  • Supporting multiple instances of application deployment removes single points of failure. One Enterprise Server instance failing will not interrupt business continuity, as capacity can be shared with other regions while new instances are automatically started;
  • Removing availability issues with COBOL or PL/I data, by hosting VSAM files in a relational database (MS SQL Server or PostGres (Aurora in AWS));
  • Managing deployment complexity by grouping Enterprise Server regions in a scale-out architecture as logical clusters (performance and availability clusters) and managing them through a new admin interface. The new Enterprise Server Admin UI can manage all Enterprise Server assets regardless of where they reside in the hybrid infrastructure.

Read more >>>


  • 0

All about the Switch

Category : News

In combination with macmon NAC, the macmon Switch Viewer offers various extensive functionalities around your network components and thus more details and increased security.

For many years, macmon secure has offered an intelligently simple NAC solution to which various function beyond the control of network access have been implemented.
macmon Switch Viewer is available in addition to one of the macmon product bundles and enhances macmon NAC with additional network management functionality. Advantages & Features:

  • Read and provide serial number of network devices for import/comparison with existing CMDBs or asset management systems
  • Read and provide details of port configurations and other information
  • Graphical display of the switch layout with extensive filter and configuration options
  • Authentication on the network device against the macmon RADIUS server Contact

THE SWITCH VIEWER IS AVAILABLE AS ADD-ON >>>


  • 0

Collect information about your network over long periods of time, even over a period of years with macmon Past Viewer

Category : News

HISTORICAL FACTS
macmon Past Viewer offers the possibility to collect and process the data usually purged by Network Access Control, to have it in a structured way and obtain a historical view in addition to the live view. For each endpoint, it is possible to display when and where the IT was used on the network, which IP addresses and which names it had or on which VLAN it was.

INSIGHT INTO YOUR OWN DATA

macmon Past Viewer is designed to store a great amount of data for a long time which is available for extra fast analysis. Hence, a long history can contribute to do forensic searches for security incidents, but can also provide general information necessary for audits and certifications.
By having information on which endpoints were connected to a network segment in a certain period of time – and which endpoints were not active on it – makes being liable for providing evidence consistent with ISO or PCI compliance considerably simpler.
Also the GDPR requires documentation of safetyrelevant incidents on the network – with macmon Past Viewer this is just a given, as is the capability to carry out a risk analysis for network areas. Knowledge about the quantity and types of endpoints that were connected in the past, e.g. in a certain building, offers the chance to gauge the effects of changes in the network infrastructure or potential failures.

ADVANTAGES & FEATURES

  • Fulfilment of burden of proof consistent with ISO, PCI or GDPR specifications;
  • Supports forensic analysis of security incidents;
  • Impact analyses for network areas, locations or individual network devices.

More information about macmon Network Access Control you can receive from Escom Bulgaria’s team. You can contact us here!


  • 0

DeviceLock – New Features and Enhancements in version 8.3.76699

Category : News

NetworkLock:

  • Enhanced Rambler Web Mail controls;
  • Enhanced Dropbox File Sharing controls;
  • Enhanced support of the Telegram messaging application;
  • Skype protocol support extended to Skype for Business and Microsoft Lync 2013 support;
  • Added new protocol: “Zoom” communications application. The “Zoom” control supports blocking, allowing, auditing, alerting, shadowing, and content analysis of outgoing instant messages and outgoing files as well as blocking, auditing, alerting, shadowing, and content analysis (for contingent shadowing and detection) for incoming instant messages and incoming files. Also, this feature supports blocking, alerting, and auditing of meetings/calls;
  • Added new protocol: “Career Search”. The “Career Search” control supports blocking, allowing, auditing, alerting, shadowing, and content analysis of search requests, posting resumes and file uploads on supported services. The supported services in this control are: CareerBuilder, College Recruiter, craigslist, Dice, Glassdoor, GovernmentJobs, HeadHunter.com, Hired, Indeed, JobisJob, Mediabistro, Monster, Simply Hired, Ladders, us.jobs, USAJOBS, ZipRecruiter, Rabota.ru, Yandex.Rabota, SuperJob.ru, hh.ru. (NOTE: the related site LinkedIn is already supported in the “Social Networks” control.);
  • Extended “Detection” Content-Aware Rules functionality: these rules can be applied to all “Incoming” entities available for controlled protocols, where previously only “Outgoing” were supported;
  • Enhanced SMB protocol support for incoming SMB connections. Removed dependency of the SMB protocol version and significantly improved performance for incoming SMB connections;
  • Enhanced outgoing file handling for Google Chrome version 72.0.3626;
  • Added support for Web Search services whitelisting.

DeviceLock:

  • Relations chart can now be built for specified list of contacts. The relations chart will include those users who contacted with those specified in “Contacts” accounts;
  • Significant performance improvements in DeviceLock Enterprise Server’s Shadow Log Viewer for large logs;
  • Enhanced iOS devices support on systems without iTunes software;
  • Improved DeviceLock Enterprise Server’s log consolidation feature;
  • Added full support for Microsoft Windows Server 2019;
  • Fixed compatibility issues with third-party software: Kaspersky Endpoint Security 10, Kaspersky Endpoint Security 11, Kaspersky Internet Security 18, Kaspersky Internet Security 19, Kaspersky Total Security 18, Kaspersky Total Security 19 and Kaspersky Anti-Virus 19.

Download a FREE Trial Now!

A free and fully functional trial version of the complete DeviceLock data leak prevention product line will allow management of two (2) endpoint computers for 30 days. Should you need more time than the 30-day trial to evaluate DeviceLock DLP, please don’t hesitate contact us.

You can download DeviceLock DLP at: http://www.devicelock.com/download.


Archives