6 C
Tuesday, November 21, 2017
Home Tags HP Enterprise

Tag: HP Enterprise

Board reportedly took a last-minute turn away from HP Enterprise CEO Meg Whitman.
Federal Communications Commission (FCC), ICASA, OPIC, IFC, Microsoft Corporation, HP Enterprise, International Telecommunications Union (ITU) and more set to speak at leading spectrum sharing conferenceCape Town, South Africa, 20 April 2017: With three weeks to go until the Dynamic Spectrum Alliance’s Fifth Annual Global Summit, which is this year returning to Africa, co-host ICASA, the Independent Communications Authority of South Africa, has published draft regulations on the use of TV White Space (TVWS) in the... Source: RealWire
With corporate data more important than ever, selecting the best data backup and recovery software for the organization would be a career-enhancing move.

According to online reviews by enterprise users in the IT Central Station community, three of the top backup and recovery products on the market are Veeam Backup, HP Enterprise’s Data Protector, and Altaro VM Backup. What do enterprise users really think about these tools? Here, users give a shout-out for some of their favorite features, but also give the vendors a little tough love. To read this article in full or to leave a comment, please click here(Insider Story)
Deal flow remains resilient and multiples rise London, March 21st, 2017: The latest market report from technology M&A advisory firm, Hampleton Partners, reveals a 60 per cent drop in the total sum of transaction values in the second half of 2016, after mega deals such as the $8.5 billion tie-up between HP Enterprise and Computer Sciences Corp. led to a remarkably strong start to the year.

The IT Services M&A report, which covers mergers and... Source: RealWire
Audio: Aussie hacker shows even NSA hacks haven't schooled some telcos Ruxcon They've been warned for years, but scores of telcos are still making bone-headed configuration mistakes in their GPRS Global Roaming Exchange (GRX) networks, leaving mail and FTP servers vulnerable. The international phone routing system is used for passing and billing calls between providers, using encryption to funnel data over specific protocols. It is the same network leaker Edward Snowden revealed in 2013 was the NSA's attack vector to breach Belgian telco Belgacom. Aussie HP Enterprise Consulting Services managing principal Stephen Kho detailed in 2014 how anyone can access reams of leaky GRX data without hacking national telcos, with simple "light weight" scans. A year later and Kho is still finding data via some 40,000 live GRX hosts which responded to pings, although numbers of exposed services have largely fallen. He shared his results and explained how GRX data can be obtained, including detailing the workings of the network and protocols, at the Ruxcon hacking conference in Melbourne, Australia. Presentation recording:Listen or download On her majesty's secret service - GRX and a spy agency. Kho listed the banner server scan results showing user services including mail servers and Cisco routers, and showed many unpatched and exposed to old, dangerous exploits including remote code execution and denial of service. "So there's some email servers here, there's a root exploit on that, 10 year-old remote code execution on that, buffer overflow on this send mail … that's not good," Kho told the giggling assembled hackers. "We looked at some FTP servers, a whole bunch here .. again remote code execution on that, denial of service on that, overflow on that from 2001." "Clearly people are putting things on the GRX network that are running all services and filtering, not hardening," he says. "If you think you're old exploits aren't gunna work anymore, well you're still good." ®
Logjam in patch pipeline cleared at last HP Enterprise has popped into its Tardis, and gone back in time to patch OpenSSL bugs dating back to 2014 – including the infamous Logjam bug. The bugs are in various network products: Intelligent Management Center (iMC), the VCX unified communications products, and the Comware network operating system. The company's notice cites Common Vulnerability and Exposure (CVE) advisories CVE-2014-8176, CVE-2015-1788, CVE-2015-1789, CVE-2015-1790, CVE-2015-1791, CVE-2015-1792, and CVE-2015-1793. Most of those are Logjam-related; the last is an alternate chains certificate forgery bug.

The 2014 CVE was reported in March of that year, but its association with Logjam didn't emerge until June 2015. Logjam was described by security researchers in May 2015, and rolling out patches has been a long, slow slog for vendors. ®