Technology Sectors

Market Sectors

<div style="text-align:center"> <p>"Mass Notification Profiles"</p> <p>Ideas and strategies<br><br /> from leading vendors</p> <p>Prepared exclusively<br><br /> for GSN Magazine<br><br /> by:</p> <p><a href="">LRAD Corporation</a></p> <p><a href="">Desktop Alert</a></p> <p>Available in Print or Online</p> </div>

IT Security

Kroll Names Managing Director Benedetto Demonte North America Leader for Cyber Security and Investigations Practice

NEW YORK, Feb. 5, 2018 -- Kroll ("the Company"), a global leader in risk mitigation, investigations, compliance, cyber resilience, security, and incident response solutions, today announced the appointment of Managing Director Benedetto Demonte as North America Leader for Kroll's Cyber Security and Investigations Practice. In his expanded role as a member of Kroll's Global Cyber Security leadership team, Demonte will help ensure that clients benefit from seamless cyber security services in a world where cyber challenges can span the globe.

"Ben brings to each engagement a unique blend of exceptional technical expertise, a deep commitment to our clients, and the ability to forge highly productive working relationships both inside and outside of Kroll," said Jason Smolanoff, Senior Managing Director and Global Cyber Security Practice Leader for Kroll. "Ben's appointment as North America Cyber Leader, joining APAC Cyber Leader Paul Jackson and EMEA Cyber Leader Andrew Beckett, underscores Kroll's holistic and global approach to helping our clients address complex cyber challenges, wherever and whenever they arise." 

As a Managing Director, Demonte serves clients on a daily basis with integrated services encompassing information security, cyber investigations, computer forensics, business continuity, disaster recovery, incident response, IT audit, penetration testing, and vulnerability assessments. Demonte leads the North America team of cyber investigators and digital forensic specialists in investigating client issues relating to large-scale information security reviews, data breach incident response, insider threats, investigations of computer security events, internet fraud, identity theft, and theft of intellectual property.

Demonte joined Kroll in 2012 after a distinguished career with the Federal Bureau of Investigation that spanned over two decades. During his career in the FBI, he served as a Senior Forensics Examiner and Assistant Director of the FBI's Regional Forensic Laboratory in New Jersey, where he managed a staff of more than 25 examiners. He also led a variety of complex cyber investigations, including technical analysis for national security, network intrusions, insider attacks, malware infections, internet fraud, child sexual exploitation, and theft of intellectual property.

Demonte is a graduate of the University of Maryland and Holy Family University, and holds the following certifications: Certified Information Systems Security Professional (CISSP); AccessData Certified Examiner (ACE); and Certified Incident Handler (GCIH).

About Kroll:
Kroll is the leading global provider of risk solutions. For more than 40 years, Kroll has helped clients make confident risk management decisions about people, assets, operations and security through a wide range of investigations, cyber security, due diligence and compliance, physical and operational security and data and information management services. Headquartered in New York with more than 35 offices in 20 countries, Kroll has a multidisciplinary team of nearly 1,000 employees and serves a global clientele of law firms, financial institutions, corporations, non-profit institutions, government agencies and individuals. For more information visit

Forward-Looking Statements
This press release may contain "forward-looking statements." These forward-looking statements include, but are not limited to, statements regarding the Company's performance and growth, and other non-historical statements. Forward-looking statements identify prospective information. Important factors could cause actual results to differ, possibly materially, from those stated in the forward-looking statements. In some cases you can identify forward-looking statements by words such as "anticipate," "believe," "could," "estimate," "expect," "intend," "may," "plan," "predict," "potential," "should," "will" and "would" or the negatives thereof, variations thereof or other similar words. You should read statements that contain these words carefully because they discuss the Company's future priorities, goals, strategies, actions to improve business performance, market growth assumptions and expectations, future business opportunities, capital expenditures, financing needs, financial position and other information that is not historical information or state other "forward-looking" information. Forward-looking statements should not be read as a guarantee of future performance or results, and will not necessarily be accurate indications of the times at, or by which, such performance or results will be achieved. Forward-looking information is based on information available at the time and/or management's good faith belief with respect to future events, and is subject to risks and uncertainties that could cause actual performance or results to differ materially from those expressed in the statements. Forward-looking statements speak only as of the date the statements are made. The Company assumes no obligation to update forward-looking statements to reflect actual results, changes in assumptions or changes in other factors affecting forward-looking information except to the extent required by applicable securities laws. If the Company does update one or more forward-looking statements, no inference should be drawn that the Company will make additional updates with respect thereto or with respect to other forward-looking statements.

Media Contact:
Infinite Global
Ada Oni-Eseleh
[email protected]


Related Links

Leidos Joins Forces with IBM, Unisys, and Verizon to Pursue the U.S. Navy's Next Generation Enterprise Networks Re-compete Service Management, Integration and Transport Program

RESTON, Va., Feb. 5, 2018 -- Leidos (NYSE: LDOS), a Fortune 500® information technology, engineering, and science leader, announced today it has joined forces with IBM, Unisys, and Verizon Enterprise Solutions to pursue the U.S. Navy's Next Generation Enterprise Networks Re-compete (NGEN-R) Service Management, Integration and Transport (SMI&T) program.

The team brings decades of experience supporting the federal government's evolving information technology (IT) needs. Leidos is the largest government systems integrator and the top provider of IT services and technical solutions to the U.S. Federal government. IBM has a track record of pioneering innovation, and houses one of the world's largest research and development organizations. Unisys builds high-performance, security-centric solutions for the most digitally demanding businesses and governments on earth. Verizon Enterprise Solutions is a leading provider of IT solutions to the Federal government, and is continually recognized for its portfolio of security, wireless, and network services. Combined, the team offers commercial best practices through research and development innovation, technology leadership, and the security expertise needed to provide a smooth transition to a future system that will achieve the Navy's critical modernization mission.

NGEN-R SMI&T will provide IT and support services to the Navy Marine Corps Intranet (NMCI), Marine Corps Enterprise Network (MCEN), and the Outside of the Continental United States (OCONUS) Navy Enterprise Network (ONE-Net). The team's breadth of experience and history of mission-focused IT solutions demonstrates its capability to support the Navy and Marines' global operations.

"Leidos is a leading global solutions integrator with a prominent portfolio among the international federal IT solutions and service providers," said Roger Krone, Leidos Chairman and Chief Executive Officer. "The merger with Lockheed Martin's former Information Systems & Global Solutions Business strengthened our scale to provide cost-effective, agile, and 'speed to mission' capabilities that solve our customers' most challenging problems. The Leidos team offers unmatched execution excellence, proven engineering rigor, and business analytics that can expertly support the Navy's critical missions anytime and anywhere."                 

About Leidos 
Leidos is a Fortune 500® science and technology solutions and services leader working to solve the world's toughest challenges in the defense, intelligence, homeland security, civil, and health markets. The company's 32,000 employees support vital missions for government and commercial customers. Headquartered in Reston, Virginia, Leidos reported annual revenues of approximately $7.04 billion for the fiscal year ended December 30, 2016. For more information, visit

Statements in this announcement, other than historical data and information, constitute forward-looking statements that involve risks and uncertainties. A number of factors could cause our actual results, performance, achievements, or industry results to be very different from the results, performance, or achievements expressed or implied by such forward-looking statements. Some of these factors include, but are not limited to, the risk factors set forth in the company's Annual Report on Form 10-K for the period ended December 30, 2016, and other such filings that Leidos makes with the SEC from time to time. Due to such uncertainties and risks, readers are cautioned not to place undue reliance on such forward-looking statements, which speak only as of the date hereof.



Melissa Koskovich                 

Jennifer Moffett 


(571) 526-6850                  

(571) 526-6852


[email protected]                

[email protected]



Related Links

Industry Veteran Ed Spitler Rejoins Artel as Head of SATCOM

Artel, LLC, has appointed Ed Spitler as Head of SATCOM after his return to the company following 4 years as President of Airbus Defense and Space Government Services.  A seasoned veteran of the telecommunications and satellite communications industries, Spitler brings to Artel more than 25 years of senior executive-level experience in military, government, and satellite operations.

As Artel's Head of SATCOM, Spitler will be responsible for leading all aspects of Artel's SATCOM programs, including operations, P&L, strategic planning, business development, and technical functions. Spitler is well known in the telecommunications and satellite communications industries and is often called upon for expert advice in U.S. Government procurement practices. During his previous, 11-year tenure at Artel, Spitler held the position of Vice President of Managed Network Services, serving as program director on major satellite communications contracts.

Ed Spitler Rejoins Artel as Head of SATCOM

Spitler has held key leadership positions at several major corporations, including Astrium, Vizada, ITT, Raytheon, and MCI. He spent 6 years active duty in the U.S. Army as a cryptographic and telecommunications specialist. He is the recipient of numerous industry awards, including the Washington Technology's Government Channel Leadership Award and Intelsat's Partnership Award. He is a multi-term officer on the Mid-Atlantic Chapter for Space and Satellite Professionals International and currently serves on the Board of Directors.

About Artel

For 30 years, Artel, LLC (Artel) has been providing secure network communication services to Federal Government agencies. Based in the U.S. and backed by leading global private investment firms TPG and Torch Hill, Artel is a carrier-agnostic network integrator – developing customized solutions for our customers rather than trying to force fit off-the-shelf offerings. An International Organization for Standardization (ISO) 9001:2008 certified network systems integrator, Artel provides cost-effective, on-time delivery of global terrestrial and satellite network communication services, cyber security, risk management, and Information Technology (IT) solutions. For more information about Artel, visit

Cindy Davis
(571) 306-4471
[email protected]
[email protected]



All-new Crystal Group Rugged 1.5U Server maximizes performance and availability of critical systems

HIAWATHA, Iowa, -- Crystal Group Inc., a leading designer/manufacturer of rugged computer hardware, is unveiling its RS1.533S18G Rugged 1.5U Server, specifically engineered to meet modern military needs for high-performance, highly reliable computing in even extreme operating environments, at WEST 2018 Feb. 6-8 in San Diego, Calif.

The all-new Crystal Group RS1.533S18G Rugged 1.5U Server is a modern, open-architecture system in an all-aluminum chassis with internal cross-braces and stabilized components to withstand high shock and vibration. Flexible and scalable, the RS1.533S18G is designed to meet current and future needs with dual Intel® processors, up to 512GB of DDR4 memory, up to nine removable solid-state disks (SSDs), and USB 3.0, audio, and Gigabit LAN interfaces.

"Crystal Group's RS1.533S18G Rugged 1.5U Server is a modern, high-performance alternative to the U.S. Navy's current combat and electronic warfare server employed in Virginia-class submarines," says Robert Haag, vice president of sales and marketing for Crystal Group. "An immediate, cost-effective, drop-in replacement requiring no physical, electrical, or software modifications, the RS1.533S18G delivers improved reliability, greater weapon system availability, superior cooling, and a smaller integrated logistic support footprint to maintain operational readiness today and in the future."

Crystal Group's RS1.533S18G is designed, meticulously manufactured, and tested to provide a low-risk path for military technology insertion, sustainment, and modernization programs to improve mission uptime and system availability in the field and at the tactical edge. Measuring just 18 inches deep and weighing 25 to 30 pounds, the new rack-mount server can quickly and easily replace aging systems in 1.5U/1U configurations, including Q-70 Navy consoles on current and future Virginia-class submarines.

"Sustainment efforts needn't be stunted by long lead times, reliability issues while underway, and dead-on-arrival units. Rugged, reliable hardware and services are needed to support the electronic warfare, sonar, combat, data-sharing, and other mission capabilities that are so critical to military readiness and mission success," says Crystal Group's Jim Shaw, executive vice president of engineering. "Crystal Group's RS1.533S18G Rugged 1.5U Server is designed from the ground up to be more effective at fulfilling modern military needs. We attended the barge test in Rustburg, Virginia last November and witnessed the RS1.533S18G successfully operate through four shots under barge shock testing and pass.  It was impressive!" Shaw added.

Crystal Group is demonstrating the company's new RS1.533S18G Rugged 1.5U Server, RACERugged Autonomous Computer Equipment, FORCE™ Fully Optimized Rugged Computer Equipment, RCS7150-12 and RCS7450-24 Rugged Switches, as well as its popular RS255, RS2616S18, and RS378 Rugged Servers; RE1312, RE1401, and RE0412 Rugged Embedded Computers; and SE16 Sealed Embedded Computer in Booth #2022 at WEST 2018.

Crystal Group has a proven track record and reputation for providing quality products, services, and support, with its rugged hardware deployed on more than 500 military programs. Crystal Group has delivered more than 5,000 servers and critical system capabilities to the U.S. Navy via the Automated Digital Network System (ADNS), Integrated Shipboard Network System (ISNS), and more. Space and Naval Warfare Systems Command (SPAWAR) Integrated Logistics Support in Charleston, South Carolina, reports a considerably low Crystal Group hardware failure rate of approximately 1.6% and no dead-on-arrival (DOA) units to date, over a nine-year period. (Read more about deployments at this link.)

Visit Crystal Group in Booth #2022 at WEST 2018 to learn how the company's rugged servers, switches, and embedded computers can meet your specific program requirements, today and for the future. WEST 2018, the sea service conference and exposition co-sponsored by Armed Forces Communications & Electronics Association (AFCEA) International and the U.S. Naval Institute (USNI), takes place Feb. 6-8 in San Diego, Calif.

About Crystal Group Inc.
Crystal Group Inc., a technology leader in rugged computer hardware, specializes in the design and manufacture of custom and commercial rugged servers, embedded computing, networking devices, displays, power supplies, and data storage for high reliability in harsh environments. An employee-owned small business founded in 1987, Crystal Group provides the defense, government and industrial markets with in-house customization, engineering, integration, configuration management, product lifecycle planning, warranty, and support services.

Crystal Group products meet or exceed IEEE, IEC, and military standards (MIL-STD-810, 167-1, 461, MIL-S-901); are backed by warranty (5+ year) with in-house support; and are manufactured in the company's Hiawatha, Iowa, USA, facility certified to AS9100C:2009 and ISO 9001:2008 quality management standards.

© 2018 Crystal Group Inc. All rights reserved. All marks are property of their respective owners. Design and specifications are subject to change.


SOURCE Crystal Group Inc.

Related Links

Global Data Sentinel and Mice360 join forces as GDS360 to capitalize on increasing demand for Data Security solutions for Financial Markets and Blockchain

NEW YORK, Jan. 31, 2018 -- Global Data Sentinel, Inc. (GDS) and Mice360, Inc. have signed definitive agreements to form GDS360, Inc., enabling the new entity to capitalize on the growing number of rich opportunities the companies have jointly developed.

GDS360 was created by bringing together Global Data Sentinel (GDS) and Mice360, two exciting young companies in the Cybersecurity space. Previously, Mice360 was a licensee and channel partner for GDS, primarily focused on licensing GDS core data security product.

Creating GDS360 sees the company benefiting from the deep experience and entrepreneurial spirit of both managerial teams, to guide GDS360 through the high-growth phase it is anticipating will continue as the market continues to see dramatically increased demand through regulatory and C-level awareness of data security. Furthermore, GDS360 has jointly created, in conjunction with notable Cryptocurrency platform developers, a Quantum empowered and Quantum-proof solution to protect Blockchain and Cryptocurrency Exchanges and securely house virtual currencies to prevent them from being hacked.

With several analysts predicting anything from 7.8 to 15 per cent year-on-year growth through 2021, it's evident that the overall IT security market is poised for substantial growth in the coming years. With GDS360 able to extend significantly beyond the domain and into both Cloud and IoT, it has positioned itself as a robust and flexible solutions provider for the burgeoning Cryptocurrency and IoT markets in addition to traditional data security markets. Whether it is the need for secure ledgers and wallets for Cryptocurrencies, or data protection for IoT devices, GDS360 is confident it is well-placed to meet market needs and onboard significant revenues in 2018 and beyond.

"Through combining GDS' unique approach to data security with Mice360's global network of C-suite relationships we've created the perfect storm of innovation and execution, to meet the market demand we are seeing for data security products in traditional applications as well as new areas such as the Cryptocurrency market.  Our goal is to drive shareholder value through a period of sustained, profitable, growth for the foreseeable future," said Shahal Khan, Executive Chairman of GDS360 and founding partner of Mice360. 

GDS360 has been positively received, recently signing agreements with NTT Data's public-sector division, and also Europe-based GRC specialist Oxial as a joint solution for GDPR compliance.

"GDS360 is the culmination of a close relationship between GDS and Mice360 for the past couple of years, and the fruit of our labors has seen our data security solutions well-received at both Fortune500 and Government levels. We've developed a robust and scalable solution that meets today's complex needs of protecting data wherever it resides, including cross-domain, meaning on a network, in the cloud, and on the endpoint, whether it's desktop, mobile or IoT. We secure the data not only at-rest, but also in transit to eliminate classic vulnerability for data during the transition points between these different platforms and domains," said John-Philip Galinski, CEO of GDS360 and Co-Founder/CEO of Global Data Sentinel.

For more information on GDS360, please visit the company's website at



Related Links

Infor Introduces Next-Generation Supply Chain Visibility and Control Capabilities

NEW YORK, Jan. 31, 2018 -- Infor, a leading provider of industry-specific cloud applications, today announced new Supply Chain Management (SCM) capabilities that provide companies with unprecedented, real-time visibility and control of their global supply chains.

The new capabilities leverage digital technologies – including Big Data, Machine Learning, IoT and Automation – to provide predictive ETAs, real-time visibility, and 3D visualization of warehouse flow.

Infor's new SCM capabilities are designed to accelerate innovation and digital transformation in the supply chain – giving customers the visibility to see what is possible and the power to take action. 

Predictive ETAs
Combining data science, machine learning and almost 20 years of network insights, Infor's GT Nexus Commerce Network provides a new level of ETA accuracy, enabling companies to greatly improve planning accuracy and enable more efficient execution. With more accurate ETAs, companies can expand initiatives such as cross-dock and merge in transit, and improve inventory accuracy and customer service.

Using machine learning and historical network data, the Infor GT Nexus Commerce Network platform calculates a predictive ETA, based on each informational update and transaction across the network. The system continually updates ETAs, using the latest information available. Machine learning enables the system to develop accurate, up-to-date supply chain models, and it continuously fine tunes the model's parameters based on the latest trends and patterns observed in real-time.

"We have been an innovator in this space, helping customers move beyond static lead-time estimates with dynamic ETAs based on performance models," said John Bermudez, Infor VP of Products and Strategy.  "We now are delivering the next technology evolution, applying machine learning to shipments, resulting in up to 80% greater accuracy predicting arrivals."

Live Ocean and Geo-Fencing
Moving beyond simply updating status at point of departure and arrival, Live Ocean uses AIS (Automatic Identification System), a real-time IoT information source, to provide continuous visibility of goods in transit from port to port. Companies gain real-time, visual updates of all ocean vessels with specific identification of ships carrying your goods. By linking order, shipment and item information, the solution supports inventory tracking and planning. Information details also include vessel status, speed, headings, and next/previous port of call.

"Most ocean visibility solutions rely on EDI messages and can't see beyond the shipment level," said Bermudez. "Live Ocean provides real-time location of the vessel and connects the vessel information to the more detailed item-level information, which allows customers to monitor both shipments and inventory in motion.  For companies that strive to run agile, high-velocity global supply chains, visibility into the high volume of inventory they have moving at sea is critical."

Utilizing the GPS data available in the AIS information, users can set up a geo-fence to trigger alerts when shipments cross a particular location, helping companies better manage inventory and plan for downstream processes.

3D Visual Warehouse
With 3D Visual Warehouse, Infor WMS (Warehouse Management System) now provides a three-dimensional, interactive mechanism to visualize and orchestrate the warehouse flow.  Users quickly identify picking and putaway bottlenecks to prevent delays, enhancing flow-through and worker productivity.

3D Visual Warehouse works seamlessly in conjunction with wave management to enable users to virtually "see" workflow, areas of order concentration, and locations at risk of causing delays, and they also can initiate corrective action. This might involve changing task priorities, shifting labor, generating replenishments, or reissuing waves. It provides a visual decision hub to manage locations, inventory, pending picks, routing, and equipment.

"Our 3D Visual Warehouse solution provides a much more holistic view of opportunities, and it creates a more intuitive basis for identifying opportunities and bottlenecks," said Heidi Benko, Infor VP of Solutions Strategy and Marketing. "This helps companies move beyond tactically tackling work, to understanding macro-level implications on the use of assets, from inventory to labor, and from equipment to space."

Together, these new technologies help companies increase velocity in the end-to-end supply chain and improve customer responsiveness. The ability to monitor and control inventory flows across global supply chains is a foundational aspect of digital supply chain transformation and something that all companies are focused on, as technology continues to change customer behavior and expectations.

For more information on Infor Supply Chain solutions, including the Infor 3D Visual Warehouse, click here.

Tweet This:
[email protected] introduces new #SCM capabilities for supply chain visibility, including Predictive ETAs, Live Ocean & Geo-Fencing, and the 3D Visual Warehouse @GTNexus

About Infor
Infor builds business software for specific industries in the cloud. With 16,500 employees and over 90,000 customers in more than 170 countries, Infor software is designed for progress.  To learn more, please visit

About the Infor GT Nexus Commerce Network
The Infor GT Nexus Commerce Network is the world's largest cloud-based, multi-enterprise commerce network for global trade and supply chain management. Over 55,000 businesses across industry verticals, including adidas Group, Caterpillar, Columbia Sportswear, DHL, Electrolux, Levi Strauss & Co., Nestlé, and Puma share GT Nexus as their standard, multi-enterprise collaboration platform. This enables all network participants to operate with a core, real-time, and always-on set of information across multiple supply chain functions. The platform helps customers optimize the flow of goods, funds and trade information, from the point of order, through final payment. For more information, please visit

This announcement reflects the direction Infor may take with regard to the specific product(s) described herein, all of which is subject to change by Infor in its sole discretion, with or without notice to you.  This announcement is not a commitment to you in any way and you should not rely on this document or any of its content in making any decision.  Infor is not committing to develop or deliver any specified enhancement, upgrade, product or functionality, even if such is described in this announcement and even if such description is accompanied by words such as "anticipate," "believe," "expect," "intend," "may," "plan," "project," "predict," "should," "will," and/or similar expressions.  Many factors can affect Infor's product development plans and the nature, content and timing of future product releases, all of which remain in the sole discretion of Infor.  This announcement, in whole or in part, may not be incorporated into any contractual agreement with Infor or its subsidiaries or affiliates.  Infor expressly disclaims any liability with respect to this announcement.

Media contact:
Steve Bauer
(628) 444-5101 (office)
(650) 670-7135 (mobile)
[email protected]


Related Links

Ivanti and CrowdStrike Forge Strategic Partnership to Deliver Advanced Endpoint Security

SALT LAKE CITY, Jan. 30, 2018 -- Ivanti, the company that unifies IT to better manage and secure the digital workplace, and CrowdStrike, the leader in cloud-delivered endpoint protection, today announced a strategic alliance that brings together next-generation antivirus and endpoint detection and response (EDR) with Ivanti's multi-layered endpoint security solutions. Together they are leading the charge to converge endpoint management and endpoint security, helping companies that possess limited resources combat cyber threats efficiently and in real time.

The CrowdStrike Falcon® platform seamlessly integrates next-generation AV, EDR, managed threat hunting, threat intelligence and IT hygiene – powered through the cloud via a single lightweight agent. With this unique approach customers can prevent and detect never-before-seen threats and tailor security responses based on the severity of malicious behavior. CrowdStrike's next-generation AV module, Falcon Prevent, prevents both malware and malware-free intrusions, filling the gap left by legacy antivirus solutions that primarily focus on malware.

Uniting the next-gen Falcon platform from CrowdStrike with security solutions from Ivanti is an appropriate response to today's cyberattack trends. Ivanti delivers industry-leading solutions, integrating endpoint security controls that global experts agree create the highest barriers to real-world attacks (discovery, patch and privilege management, whitelisting, and secure configuration). With IT teams spending too much time managing security device sprawl, and Security teams suffering a well-documented labor shortage, Ivanti simplifies security with tools that target the biggest attack vectors with lauded prevention, detection, and response techniques.

"With more surface area to cover, more mission-critical assets to protect, and more sophisticated threats to defend against, IT Operations and Security teams must find a way to work together better to identify and protect vulnerable IT systems," said Duane Newman, VP of Product Management and Marketing, Ivanti.  "Together, with CrowdStrike, we are helping our mutual customers reduce the attack surface and respond more quickly should a threat get through."

The technology partnership between Ivanti and CrowdStrike will provide the following benefits to joint customers:

  • Faster remediation of prioritized threats to keep the endpoints' data protected
  • Deeper protection and control over employees' devices
  • Better insight and visibility into security incidents and better time to resolution

"It's vital to leverage advanced technologies to prevent and detect threats and provide insight, control and visibility into endpoints in real time," said Matthew Polly, VP of Worldwide Business Development and Channels, CrowdStrike. "The partnership between CrowdStrike and Ivanti will help our customers pinpoint and remediate threats while improving both management and automation, so security teams can work in a more efficient and effective manner."

About Ivanti

Ivanti unifies IT and Security Operations to better manage and secure the digital workplace. From PCs to mobile devices, VDI and the data center, Ivanti discovers IT assets on-premises and in the cloud, improves IT service delivery, and reduces risk with insights and automation. The company also helps organizations leverage modern technology in the warehouse and across the supply chain to improve delivery without modifying backend systems. Ivanti is headquartered in Salt Lake City, Utah, and has offices all over the world. For more information, visit and follow @GoIvanti.

About CrowdStrike

CrowdStrike is the leader in cloud-delivered endpoint protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver actionable intelligence and real-time protection from Day One. It seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed.

CrowdStrike Falcon protects customers against all cyber attack types, using sophisticated signatureless AI and Indicator-of-Attack (IOA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates over 78 billion security events a day from across the globe to immediately prevent and detect threats. Learn more at and follow us: Blog | Twitter.

Copyright © 2018 Ivanti. All rights reserved.

Copyright © 2018 CrowdStrike, Inc. All rights reserved.



Related Links

Cyber Threat Intelligence in Security Operations: Results of 2018 SANS Survey

BETHESDA, Md., Jan. 24, 2018  -- Cyber threat intelligence (CTI) is becoming more useful overall, especially to security operations teams that are working hard to integrate intelligence into their prevention, detection and response actions, according to results of the CTI survey to be released by SANS Institute in a two-part webcast on Tuesday, February 6, 2018 and Wednesday, February 7, 2018.

"As the threat landscape continues to change, and with more advanced attackers than ever, security teams need all the help they can get to more effectively prevent, detect and respond to threats," says the survey's author, Dave Shackleford, SANS Analyst and Senior Instructor.

In one of the clearest trends SANS has seen over the past three years, respondents have increasingly stated that CTI is improving their prevention, detection and response capabilities:

  •  In this new survey (2018), 81% of respondents affirmed that CTI is helping, compared to 78% in 2017 and 64% in 2016.
  • In addition, the number of respondents who answered "unknown" (in other words, they didn't feel they could answer the question confidently) has steadily decreased from 34% in 2016 to 21% in 2017, and now to only 15% in 2018.
  • Moreover, 73% of respondents reported improved visibility into threats and attack methodologies impacting their systems.

"Fortunately, many organizations are sharing details about attacks and attackers, and numerous open source and commercial options exist for collecting and integrating this valuable intelligence all of which have resulted in improvements in organizations' abilities to improve security operations and detect previously unknown attacks," Shackleford continues.

As a result of their CTI program efforts, respondents report better visibility and improved security operations. For example, 71% indicated overall satisfaction with visibility into threats and indicators of compromise (IoCs). When specifying improvements, 70% of participants reported improved security operations, while 66% cited improved ability to detect previously unknown threats.

Shackleford summarized the results this way: "These results reinforce the trends we're seeing that indicate CTI is being primarily aligned with the SOC and is tying into operational activities such as security monitoring, threat hunting and incident response."

Register to learn more about the full survey results during a two-part webcast. Part 1, on Tuesday, February 6 at 1 PM Eastern, will focus on the current state of CTI and its usefulness. Part 2, held on Wednesday, February 7 at 1 PM Eastern, will explore how the growing use of CTI impacts cyber security skills and best practices. Both webcasts, which are hosted by SANS, are sponsored by Anomali, DomainTools, IntSights, Rapid7 and ThreatConnect.

Those who register for the webcast will also receive access to the published results paper developed by SANS Analyst, Senior Instructor and CTI expert, Dave Shackleford.

Tweet This:
@daveshackleford presents SANS 2018 CTI Survey results on two-part webcast | Feb 6 | Feb 7
Integrating threat intelligence | SANS Survey results released | @daveshackleford presents Feb 6 webcast |

How does CTI improve cyber security tools and best practices? | Get @daveshackleford's thoughts in a Feb 7 live webcast| Register at

About SANS Institute

The SANS Institute was established in 1989 as a cooperative research and education organization. SANS is the most trusted and, by far, the largest provider of training and certification to professionals at governments and commercial institutions world-wide. Renowned SANS instructors teach over 50 different courses at more than 200 live cyber security training events as well as online. GIAC, an affiliate of the SANS Institute, validates employee qualifications via 30 hands-on, technical certifications in information security. The SANS Technology Institute, a regionally accredited independent subsidiary, offers master's degrees in cyber security. SANS offers a myriad of free resources to the InfoSec community including consensus projects, research reports, and newsletters; it also operates the Internet's early warning system--the Internet Storm Center. At the heart of SANS are the many security practitioners, representing varied global organizations from corporations to universities, working together to help the entire information security community. (

Responding to Cyber Attacks: LegalCIO 2018 Roundtable Offers Practical Advice for Law Firms and Legal IT Professionals

SAN ANTONIO, Jan. 23, 2018 -- Delta Risk, a global provider of cyber security and risk management services, announced today that it will host a roundtable on incident response best practices on February 1 as part of the LegalCIO conference. The conference is held in conjunction with Legalweek New York 2018 January 29 – February 1 at the New York Hilton Midtown. Delta Risk experts John Hawley, VP of Product Strategy and Andrew Cook, Manager, ActiveResponse, will lead a discussion on, "Is Your Organization Prepared for a Cyber Attack? Key Takeaways from Real-Life Incidents."


Hawley and Cook will share learnings from recent incident response engagements with participants, along with insights on best practices. Other topics of discussion will include:


  • How incidents occur and key warning signs
  • The pros and cons of migrating to cloud services
  • Practical steps for prevention, preparation, and mitigation

"Law firms and legal professionals are under significant pressure to reduce cyber risk and demonstrate that they have documented incident response plans," said Hawley. "As we've seen in our work with legal clients, even a single ransomware attack, for example, can have a dramatic impact on the day-to-day business."

As a sponsor, Delta Risk is offering registrants discount codes for a Legalweek MasterPass or Exhibit Plus Pass. The Legalweek MasterPass offers attendees all-access privileges to all events at Legalweek New York 2018, including LegalCIO. Legalweek features 14 educational tracks, three interactive keynote sessions, 100+ speakers, 75+ sessions, and extensive networking opportunities, and is expected to draw more than 9,000 legal professionals. Delta Risk will also be at table three in the LegalCIO exhibit area.

About the Speakers
John Hawley, Vice President of Product Strategy, has been in the security space for more than 15 years. Prior to joining Delta Risk in 2017, he served as Vice President, Portfolio Strategy for the Worldwide Security business at CA Technologies. Prior to CA, John founded and managed a venture funded SaaS company providing performance monitoring for cloud applications. Before this, he served in senior leadership roles at UUNET/WorldCom and Ernst & Young, LLC. John holds an MBA from the KATZ School of Business at University of Pittsburgh and a BS in Information Systems from Virginia Tech. 

Andrew Cook is the Manager of Delta Risk's ActiveResponse service. In this role he is responsible for the firm's solutions to discover, investigate, contain, and eradicate incidents and intrusions on customer networks. In addition, he provides defensive and offensive cyber security training and exercises to commercial and government clients. Drawing from his Air Force background, he is one of the firm's leading subject matter experts in cyber threat hunting and incident response.

About Delta Risk  
Delta Risk LLC, a Chertoff Group company, provides customized and flexible cyber security and risk management services to government and private sector clients worldwide. Founded in 2007, we are a U.S.-based firm offering a wide range of advisory services as well as managed security services. Our roots are based in military expertise, and that background continues to drive our mission focus. We are passionate about keeping our clients safe and secure. For more information, visit


SOURCE Delta Risk

Related Links

The Culture Connection Gets Real: Secure Software Development Requires a New Mindset

NEW YORK, Jan. 22, 2018 – CA Technologies (NASDAQ:CA) today revealed results following the second phase of a global survey of more than 1,200 IT leaders around the topic of secure software development. Conducted by IT industry analyst firm Freeform Dynamics, the new report entitled, “Integrating Security into the DNA of Your Software Lifecycle,” highlights the influence of an organization’s culture on its ability to integrate security practices into their software development initiatives, a practice and approach commonly known as DevSecOps.

Today’s digital economy is fueled by software. When software is developed with security integrated from the start, the risk of data breaches is greatly diminished, providing users with heightened levels of confidence and trust when engaging with applications and services that are so ubiquitous in our online world.

According to survey respondents, the majority confirmed that software development supports growth and expansion, helps businesses compete and drives digital transformation. And yet, the findings show that, as software becomes more critical to business success in the digital economy, security concerns are exponentially on the rise. In fact, 74% of respondents agreed that security threats due to software and code issues is a growing concern. CA Veracode’s State of Software Security Report 2017 found that vulnerabilities continue to crop up in previously untested software at alarming rates, with 77% of apps having at least one vulnerability on initial scan.

Creating a culture of secure software development is a major challenge, according to the survey findings. An overwhelming 58% of respondents cited existing culture and lack of skills as hurdles to being able to embed security testing and evaluation within software development processes. Only 24% strongly agreed that the organization’s culture and practices supported collaboration across development, operations and security. On top of cultural limitations, less than a quarter of respondents strongly agreed that senior management would sacrifice time to market in order to have sufficient time to assess and repair software security vulnerabilities.

“Security is a key principle in any Modern Software Factory. While our survey findings confirm an overarching recognition in the importance of ensuring that data and systems are built and maintained securely, there is still a lack of cultural adoption within organizations around this pressing issue,” said Ayman Sayed, president and chief product officer, CA Technologies. “When coupled with security, Intelligent IT – the use of AI, machine learning and analytics to make better, more informed decisions – can dramatically change the way that business is done.”

The report showcases characteristics of “Software Security Masters” (the top 34% of respondents), which are organizations that have been able to fully integrate security into their software development lifecycles. This includes conducting early and continuous application testing for security vulnerabilities, as well as embracing the practice of DevSecOps.

In fact, when compared with the mainstream, respondents from the Software Security Masters were over two times more likely to strongly agree that they viewed security as an enabler of new business opportunities. These organizations also exhibited the following attributes:

● 50% higher profit growth
● 40% higher revenue growth
● Are 2.6x more likely to have security testing keep up with frequent app updates
● Are 2.5x more likely to be outpacing their competitors

“The organizations labeled as Software Security Masters are the beacons of hope in today’s digital economy. Not only do they exemplify and represent the cultural mindset necessary to adapt and thrive in today’s dynamic market, they are influencing change within the industry while shaping the workplace of the future,” concluded Sayed.

Survey Methodology
The global online survey of 1,279 senior IT and business executives was sponsored by CA Technologies and conducted by industry analyst firm Freeform Dynamics in July 2017. It was augmented by in-depth telephone interviews with key industry executives. For full survey methodology details, please see the report, “Integrating Security into the DNA of Your Software Lifecycle.”

Download the full report and other supporting materials:

● Report: Integrating Security into the DNA of Your Software Lifecycle
● Ayman Sayed Blog: The Competitive Edge of DevSecOps

About Freeform Dynamics
Freeform Dynamics is an IT industry analyst firm. Through research and insights, the firm aims to help busy IT and business professionals get up to speed on the latest technology developments, and make better-informed investment decisions. For more information, and access to a library of free research, please visit



Recent Videos

IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.
HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...