Home Tags Security news
Tag: security news
NEWS ANALYSIS: The Anonabox episode serves to highlight the simple fact that there is a great hunger in the marketplace for easily deployed privacy solutions. I first heard about Anonabox on Monday, Oct. 13 and immediately decided to back the effort. The promise of Anonabox was that the project would design a purpose-built device to enable the Tor onion router network, that enables a degree of user privacy and anonymity. On Oct. 17, at approximately 1 p.m. ET, the Kickstarter crowdfunding organization suspended the Anonabox project. Why did Kickstarter put a stop to the project after raising more than $600,000 in funding for it? "It's our policy to not comment on individual projects," Kickstarter representative David Gallagher wrote in an email to eWEEK. That said, Gallagher provided a link that details Kickstarter's policies on suspension. That policy stipulates that a project may be suspended if there is a misrepresentation or failure to disclose relevant facts. The policy allows for suspension if the project's creator is presenting someone else's work as their own. In the case of Anonabox, after I first backed the project, I sent an email to the project's creator August Germar about the technical specifications of the device. The original Kickstarter Web page for the project doesn't provide much detail and only indicates that the project went through four generations of development. "Each generation, the board size was reduced by half and the processor speed and system resources were doubled," the Kickstarter page states. "The first generation was the only one with off-the-shelf hardware." The claim that the Anonabox was not off-the-shelf hardware is the one that first got the project into trouble and likely is also a key reason it was suspended. A discussion thread on Reddit, identified that the prototype picture used for the Anonabox, was in fact an off-the-shelf piece of hardware that is already available for $20. The Anonabox project was looking to sell its device for a minimum of $45. Germar actually took to Reddit himself in an AMA (Ask Me Anything) session that ended up exposing further discrepancies in his Anonabox claims. Even before Kickstarter made its move on Oct 17 to suspend the project, many backers, including me, decided to pull their support from the project. Simply put, the project I originally backed offered the promise of a purpose-built device to help enable anonymity and privacy on the Internet. What the project was likely actually doing was loading free software onto cheap commodity hardware that is already publicly available. "It's important to note that on Kickstarter, backers aren't charged until a project's funding period ends, and then only if the project has reached its goal," Kickstarter's Gallagher stated. "We work hard to safeguard the long-term health and integrity of the Kickstarter system." What the Anonabox episode serves to highlight, though, is the simple fact that there is a great hunger in the marketplace for easily deployed privacy solutions. The promise of Anonabox—that anyone could just plug into the Anonabox and get privacy—is a very attractive concept. While the Anonabox has failed on Kickstarter, it's important to note that there are other ways that users can achieve what Anonabox was offering. One such technology is the OnionPi router project that pairs the small Raspberry Pi ARM computer with Tor to enable an anonymizing device for users. The OnionPi can be built by anyone with a Raspberry Pi device, or it can be bought from Adafruit for $89.95. Going a step further, the Tor project itself has its own Tor Browser, which users can easily installed to provide privacy. The Tor browser is free and can be installed on any Windows, Mac OS X or Linux machine. If the Anonabox project had properly represented itself from the beginning as being just an easier way to run Tor, I don't suspect the backlash would have been nearly as severe. In the modern IT world, there is a healthy dose of skepticism when it comes to security-related technologies, and that ultimately led to Anonabox's downfall. Users want privacy, but they also want to be able to trust those who claim to offer privacy to them. Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.
As millions of Apple Mac OS X fans were waiting on Oct. 16 for the opportunity to update to the new OS X 10.10 Yosemite release, a strange thing happened. An Apple app store notification popped up with a security update identified as Apple Security U...
Collection Includes Award-Winning QODE Keyboards and Versatile Folios for Home, Work and Play Rushden, UK - October 17, 2014 - Belkin International, the market leader for tablet accessories, today unveiled a new lineup of keyboard cases and accessories for Apple's newest iPads. Featuring three QODE keyboards and a collection of thin, lightweight folios for both the iPad Air 2 and iPad mini 3, Belkin's new accessories offer enhanced functionality, style and versatility to complement all lifestyles. "With the new iPad hitting shelves just in time for the busy holiday season and more people using tablets as laptop replacements, the creation of iPad keyboards that are as smart and as efficient as laptop keyboards is paramount. Not to mention, people need accessories that enhance and protect their products while on the go," said Ana Hory, director of product management at Belkin. "Belkin's new accessories for the iPad Air 2 and iPad mini 3 speak to this trend and give iPad users more ways to love their new device." For the new iPad Air 2, Belkin will expand its award-winning line of QODE keyboards to include iPad Air 2-specific versions of the recently announced QODE Ultimate Pro Keyboard and award-winning QODE Ultimate Keyboard. Belkin's line of QODE keyboards offers a sophisticated range of features and options to make productivity easier. The QODE Ultimate Pro and QODE Slim Style Keyboards feature Bluetooth® Smart technology for improved battery life and a redesigned keyboard layout that includes the same number of keys as a laptop keyboard for faster, more accurate typing. QODE Ultimate Pro Keyboard for iPad Air 2 (F5L176) - £129.99Aircraft-grade aluminum for premium feelImproved keyboard layout for more accurate typingBacklit keys with three brightness levelsAdjustable landscape and portrait modes with two viewing anglesDetachable case works with the keyboard or alone; case is Smart Cover compatible when detachedSmart-sensing auto on/off technologyBluetooth Smart technology pairs with up to two devices simultaneouslyUp to one year of continuous battery life at average usage ratesAvailable in two colors: Space Gray and SilverQODE Ultimate Keyboard for iPad Air 2 (F5L178) - £99.99Aircraft-grade aluminum for premium feelThree viewing angles with dual neodymium magnets for extra stabilitySmart-sensing auto on/off technologyKeyboard folds into case for comfortable handheld tablet useUp to six months of active battery life at average usage ratesAvailable in two colors: Space Gray and Silver QODE Slim Style Keyboard for iPad Air and iPad Air 2 (F5L174) - £79.99Folio-style cover and Bluetooth keyboard in oneImproved keyboard layout for more accurate typingInnovative stand for multiple viewing angles; magnets securely hold tablet at ideal angleBluetooth Smart connectivity pairs with other devicesHandheld media mode-keyboard tucks away flat for touch-screen useSlim, lightweight, stylish design in two colors: Blacktop/Gravel and Purple/AzaleaFlexible corner tabs hold iPad securely in placeIn addition to all-new QODE keyboards, Belkin's new iPad collection also features updated folios for both the iPad Air 2 and iPad mini 3, providing complete protection and slim, sleek design.Slim Style Cover for iPad mini/iPad mini 2/iPad mini 3 (F7N249) - £34.99Slim Style Cover for iPad Air/iPad Air 2 (F7N253) - £39.99Curved, form-fitting design with velvety smooth finish and contrasting color accent stripAuto-wake cover with secure magnet closureCover folds to a comfortable typing angleIntegrated stop prevents slipping when in use; rubberized bumper provides multiple viewing anglesAvailable in three color combinations: Blacktop/Gravel, Stone/Cyan and Azalea/FiestaStripe Cover for iPad mini/iPad mini 2/iPad mini 3 (F7N248) - £29.99Stripe Cover for iPad Air/iPad Air 2 (F7N252) - £34.99Classic folio style with perforated vertical stripe design on coverAuto-wake cover with secure magnet closureCover folds to a comfortable typing angleIntegrated stop prevents slipping when in use; rubberised bumper provides multiple viewing anglesAvailable in Blacktop and PlumClassic Cover for iPad mini/iPad mini 2/iPad mini 3 (F7N247) - £24.99Classic design and sleek protection without bulkAuto-wake coverSecure magnet cover closureSmooth inner lining to protect screenCover folds to a comfortable typing angleFull access to camera and portsIntegrated stop prevents slipping when in use; rubberised pad provides multiple viewing anglesAvailable in three colors: Blacktop, Purple Lightning and Paparazzi PinkChambray Cover for iPad Air/iPad Air 2 (F7N263) - £34.99Classic folio style with chambray fabric designAuto-wake cover with secure magnet closureCover folds to a comfortable typing angleIntegrated stop prevents slipping when in use; rubberised foot provides multiple viewing anglesAvailable in Dark Gray and PurpleAvailability and CompatibilityDesigned with flexible corners, the QODE Slim Style Keyboard, Slim Style Cover, Stripe Cover and Chambray Cover will fit both the iPad Air and iPad Air 2, while the Classic Cover, Slim Style Cover and Stripe Cover will fit both the iPad mini, iPad mini 2 and iPad mini 3. All are available now at Belkin.com and select retailers worldwide. The QODE Ultimate Pro Keyboard for iPad Air 2 (F5L176) and QODE Ultimate Keyboard for iPad Air 2 (F5L178) will be designed specifically for the Apollo and are slated to be available from December. About Belkin International, Inc.Belkin makes people-inspired products that harness the power of technology to enrich people's lives. To learn more, visit us on the Web, like us on Facebook, or follow us on Twitter.Apple and iPad are trademarks of Apple Inc., registered in the U.S. and other countries. iPad Air and iPad mini are trademarks of Apple Inc.XXXUK Press ContactCarly Morris, AxiCom UKLinksys@axicom.comSource: RealWire
Code42 IT admins rely on a centralized platform to manage all endpoint data backup and file sync and share across the organization. Endpoint data protection and management specialist Code42, announced general availability of its, fourth-generation endpoint data protection platform and a new version of its SharePlan enterprise file sync and share (EFSS) solution. Code42’s fourth-generation platform and SharePlan’s additional file sync and share capabilities combine advanced data security with a user-friendly interface for less tech-savvy employees, and offers organizations secure file sync and share through a single, enterprise-grade platform. Through the Code42 platform, SharePlan offers a private cloud deployment option for enterprises requiring on-premises storage of data and encryption keys. The SharePlan price is $10 per user, per month. SharePlan supports data security and privacy and compliance requirements such as the Health Insurance Portability and Accountability Act (HIPAA) or the Sarbanes-Oxley Act (SOX), and utilizes PIN-protected links to ensure shared files remain private. Additionally, enhanced, out-of-the-box reporting and an open application programming interface (API) allow IT and legal teams to monitor user access, link sharing, file locations and shared files. "Any size organization challenged with the consumer-cloud conundrum appreciates SharePlan enterprise-grade file sync and share, especially those organizations with data security and privacy policies requiring on-premises deployment," Ann Fellman, director of product marketing at Code42, told eWeek. "For instance, in a recent survey of Code42 enterprise customers, 81 percent stated their preference to deploy via private cloud. But here’s the deal--when you offer this level of enterprise-grade security, visibility into the data is only as good as user adoption." Code42 IT admins rely on a centralized platform to manage all endpoint data backup and file sync and share across the organization. Through a single administration console, admins can support an unlimited number of users and adjust policies and security measures in real-time for both SharePlan andCrashPlan enterprise endpoint backup.Code42 also uniquely protects each version of every file, with no limits on version and storage. "Code42 addresses enterprise concerns by providing customers with control of endpoint data," Fellman said. "First, Code42 customers maintain full control of their data by keeping the encryption keys onsite, behind the firewall—so only the customer can access their data, wherever it’s stored." In addition, SharePlan’s intuitive interface provides access to files, and lets users revert to older or deleted versions of synced files when necessary. End users can access their data from a wide variety of devices and operating systems—including Mac, Windows, iOS and Android.Regardless which device type is used, the Code42 user experience designed to be consistent from device to device. "The flexibility to work from anywhere is no longer a luxury, it’s a necessity.The growing trend of BYOD is driving a greater need for file sync and share tools, while also presenting many unique compliance and security challenges for IT," Fellman said. "It's an absolute imperative that IT provides user-friendly solutions to ensure corporate data is protected at all times, regardless of its physical location." She noted the average worker uses three devices each day, and they expect to have the same functionality no matter the device. "At Code42, we’re 'people-enthusiastic'— meaning users enjoy our full set of sync and share capabilities on the devices they love," she explained.
A10 Networks has partnered with Symantec and Venafi to secure and automate the management of SSL certificates and keys. Application networking specialist A10 Networks unveiled the A10 Security Alliance, an ecosystem of security and networking companies that are working together to help mitigate threats and automate security operations. By validating interoperability with products from leading security vendors, the A10 Security Alliance has developed specialized solutions for data centers that deliver the security capabilities required to detect and eliminate advanced threats, lower data breach expenses, and reduce the cost of security operations. For instance, A10 Networks has partnered with Symantec and Venafi to secure and automate the management of SSL certificates and keys, and using the Webroot BrightCloud Web Classification Service together with A10's SSL Insight feature, customers can analyze and secure SSL traffic while bypassing communications to sensitive sites such as banking and health care applications. "When we were preparing for our ACOS 4.0 launch in August—which announced important security enhancements to A10’s SSL Insight, Web Application Firewall and authentication features, we realized that our partners were key to the success of these features," Kasey Cross, senior product marketing manager for A10 Networks, told eWeek. "In addition, leading security vendors were reaching out to us to partner, especially to gain visibility into SSL traffic with our SSL Insight feature. So we decided to categorize our partners into distinct groups, standardize our interoperability testing processes, build a library of collateral for our partners, including solution briefs and deployment guides, and publicly launch our new Security Alliance ecosystem." The company’s Thunder Series products, in conjunction with A10 Security Alliance members’ products, offer solutions covering secure sockets layer (SSL) visibility to detect advanced threats, authentication for federated security and single-sign-on, automated SSL certificate management and protection, as well as threat and URL intelligence for effective policy decisions. The Thunder ADC, using SSL Insight technology, can decrypt SSL traffic at high speeds, enabling RSA Security Analytics, FireEye Threat Prevention Platform, IBM QRadar Incident Forensics, and Vectra X-series to inspect encrypted traffic at high speeds to uncover threats in encrypted traffic. Pulse Secure’s Connect Secure solution– combined with Thunder Application Delivery Controllers – enables customers to load balance multiple SSL virtual private network (VPN) gateways, maximize uptime, and help ensure optimal and uninterrupted user access. The Thunder ADC integrates with authentication and identity management solutions, such PingFederate, enabling organizations to centrally manage authentication for all of their web applications in a federated security assertion markup language (SAML) model to control access to cloud-based applications and support single sign-on. A10 and Arista Networks have also collaborated to deliver an integrated solution for distributed denial of service (DDoS) mitigation. In the event of a DDoS attack, an Arista network switch can instantly route network flows through an A10 Thunder TPS appliance, reducing the time to mitigation from minutes to seconds. "Thunder ADC and Thunder TPS products help organizations maximize application uptime, accelerate performance, and fortify their networks against attack. The ADC delivers performance scalability up to 150 Gbps on a single one rack unit appliance and a broad range of form factors including physical, virtual and hybrid appliances," Cross said. "Thunder TPS provides high-performance, network-wide protection against DDoS attacks, and enables service availability against a variety of volumetric, protocol, resource and other sophisticated application attacks."
The F1000 model doubles the throughput rate achieved by the previous NG Firewall models to support data center deployments. Security and storage solutions specialist Barracuda Networks announced the launch of th...
NEWS ANALYSIS: FBI Director James Comey rails against encryption while calling for laws abrogating Constitutional protections and effectively bringing back the "Writs of Assistance" for tech companies of pre-revolutionary days. There's no question that the institution of automatic encryption by Apple and Google for their respective mobile devices has the intelligence community on edge. Senior officials from a variety of agencies here in Washington have been complaining since Apple announced that it was instituting encryption for mobile devices that even Apple can't break. Not fair, they say. FBI Director James Comey upped the ante on Oct. 16 by proposing that Congress change the law it passed about twenty years ago, titled the Communications Assistance for Law Enforcement Act, which gives law enforcement access to electronic communications. Problem is, the Act doesn't require telecom companies to provide access to decrypted communications, nor does it require that the companies produce keys so that the feds can break in to private communications. The FBI wants to change all that by requiring companies such as Apple and Google to provide back doors so that law enforcement can read whatever is on your smartphone at its convenience. Comey trots out the old FBI bugaboo of asserting that people who want to protect their private information have something to hide, and suggesting that they are on the side of child molesters and terrorists. But in fact, not wanting the government to read your email has nothing to do with having something to hide. The Fourth Amendment of the U.S. Constitution specifically states, "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated." You'll notice that there's nothing in the Constitution, either in the Fourth Amendment or elsewhere that discusses the convenience of the FBI or anyone else in law enforcement. Instead, it places a very difficult burden on the government requiring probable cause before any search can be conducted. When Founders George Mason and John Adams wrote this part of the Constitution their idea was that any search or seizure was supposed to be—not only inconvenient for the government—but even difficult. In fact the framers of the Constitution were thinking about centuries of searches and seizures by the agents of absolutist monarchs in Britain and Europe who didn't trouble themselves about such niceties as warrants and probable cause. The Constitution was written so the United States could turn its back on this example of arbitrary kingly rule. The proposed changes would bring about a situation much like the Writs of Assistance during George III's administration, when the king agents could poke through your home or office looking for whatever they might find. Of course things have changed. Now our personal information exists outside our houses, but under current laws they get the same protection. According to Ed Black, President and CEO of the Computer and Communications Industry Association, the walls of our homes now encompass our smartphones.
Microsoft's cloud-based Exchange Online Protection service is the company's weapon in an escalating arms race with spammers. Each day, Microsoft prevents billions of spam messages from landing in customer inboxes. The software giant blocks 10 million such emails each minute on average, revealed the company's Exchange Online Protection (EOP) team in an Oct. 15 blog post. That adds up to more than 14 billion blocked messages per day. Spam is more than a nuisance, according to Microsoft program managers Shobhit Sahay, Levon Esibov and Terry Zink. In their jointly authored post, they detailed the dangers of a particularly dangerous form of spam. "Phishing campaigns … are looking to compromise the credentials of the company employees and take control of the resources of a company," explained the Microsoft staffers. "A popular type of phishing campaign is spear phishing, which targets the most valuable contacts within an organization." To protect against phishing, and other email threats, Microsoft is bulking up its Exchange Online Protection product. Launched 18 months ago, Exchange Online Protection guards against spam and malware at a cost of $1 per user per month. The service is bundled with Exchange Online and Office 365 plans that include a cloud-based email component. The group provided a behind-the-scenes look at Exchange Online Protection's multilayered filtering approach to giving spam the boot. First, a connection filtering technique blocks emails from low-reputation IP addresses. Next, emails are filtered according to sender reputation, the product of data from in-house and third-party sources. "Finally, EOP uses numerous filtering techniques to catch the leftover spam that you see in spam campaigns that involve more complex investigation," they wrote. Exchange Online Protection "also provides comprehensive malware and virus filtering, using three different industry-leading anti-virus (AV) engines," they revealed. And their work isn't over. Microsoft is "making the largest investments ever in advancing threat protection in Exchange Online Protection," said Sahay, Esibov and Zink. "EOP is the Microsoft long-term solution to protect not only mailboxes in Office 365, but also tens of millions of mailboxes on premise mail servers of our customers." Over the next six to 12 months, Microsoft plans to release a bevy of new features and capabilities, all aimed at staying one step ahead of quick-to-adapt spammers. According to the group, the Exchange Online Protection roadmap includes advanced threat protection from, for example, emerging "Time of Click" and zero-day threats. Microsoft is implementing DomainKeys Identified Mail (DKIM) and Domain-based Message Authentication, Reporting & Conformance (DMARC) sender authentication technologies. Plans also call for better protection against bulk mail (graymail), or unwanted advertising emails that clog up inboxes. Like Microsoft's global cloud data center footprint, Exchange Online Protection is slated to get bigger in the coming month. The team said their company is preparing for an "expansion of EOP datacenters across different regions, further substantiating our promise of processing mail in the region of our customers."
Paying security researchers for properly disclosing security flaws is now considered by most leading technology vendors to be a good best practice. It wasn't always that way though. Just a year ago, Yahoo was widely criticized for offering a security...
An HP-sponsored Ponemon Institute study finds that the average annualized cost of cyber-crime per organization in the United States was $12.7 million. The cost of cyber-crime continues to rise in the United States and around the world, according to the 2014 Ponemon Institute study, sponsored by Hewlett-Packard. According to the study, the annualized cost of cyber-crime per U.S organization in 2014 is $12.7 million, a 9.3 percent increase from the 2013 rate. In contrast, the annualized cost of cyber-crime per global company now stands at $7.6 million, a 10.4 percent year-over-year increase. The total cost of cyber-crime is calculated using an activity-based costing model. Larry Ponemon, chairman and founder of the Ponemon Institute, explained to eWEEK that to calculate the total global average cost of $7.6 million, his organization looked at the internal activities companies engage in to deal with a cyber-attack and the external consequences of the attack. Ponemon noted that detection and recovery represent 53 percent of internal activities. Business disruption is an external consequence of an attack and represents 38 percent of the total external cost. While costs are rising, that wasn't the most surprising finding, according to Ponemon. It was most surprising to see that it takes an average of 31 days to resolve a cyber-attack, costing an average of more than $20,000 per day. "To know that an adversary could invade your system and make such a financial impact is alarming, and only seems to be happening more frequently," Ponemon said. "The ability for adversaries to remain under the radar means that they can invade your system even further, incurring more damage and making it more difficult to eliminate the attack completely." The study also found an overall increase in the volume of cyber-attacks with an average of 138 attacks a week in 2014, up from an average of only 50 in 2010, when Ponemon first conducted the cost of cyber-crime study. Over the course of 2014, the retail sector has been in the news with multiple reported breaches. Large retailers—including Target, Home Depot and Kmart—have all reported breaches over the last 12 months. Target has publicly disclosed that its breach-related costs are estimated at $148 million. Home Depot has estimated that its breach-related costs will come in at $62 million. The costs for the companies in the Ponemon report are somewhat different from what Target and Home Depot have publicly disclosed. Ponemon said 9 percent of the 257 companies represented in the global report were in the retail sector. "The average cost for these companies to deal with a cyber-attack was $3.3 million, but we notice rapid growth in this sector, especially in the U.S," Ponemon said. "We anticipate this will continue in 2015." From a technology perspective, those organizations that have deployed security intelligence tools were found to be more efficient at dealing with cyber-attacks. Those tools include the use of security information and event management (SIEM), intrusion prevention systems (IPSes) and big data analytics tools. "The chief distinguishing characteristic of security intelligence systems is that they create visibility into what is happening with an organization's network and network traffic," Ponemon said. Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.
Application producers gain seamless path to monetize their customers' migration to the cloudMaidenhead, UK October 16, 2014 Flexera Software, the leading provider of next-generation software licensing, compliance and installation solutions for application producers and enterprises, announced today that FlexNet Licensing, the market-leading software licensing solution used in over 20,000 applications, now enables application producers to easily migrate their enterprise applications to Microsoft Azure. Through the collaboration of Microsoft and Flexera Software, application producers can now migrate their applications to Azure while leveraging Flexera Software's monetization and protection capabilities."As producers weigh their cloud strategies, they must select a pathway that gives them ultimate flexibility to monetize their applications in hosted environments and at the same time protect their intellectual property," said Mark Bishof, President and CEO of Flexera Software. "Flexera Software has given producers the tools they need to leverage Azure to quickly address shifting preferences for cloud-based solutions, open up new revenue streams, and ensure they're getting compensated for their software. We've also provided the framework to offer cloud-based usage management - a significant competitive differentiator as the market moves towards licensing-as-a-service.""Microsoft Azure is a safe, secure and flexible cloud platform ideal for ISVs who want to offer cloud-based licensing and monetization models to their customers," said Mike Wickstrand, Senior Director of Product Marketing, Microsoft Azure. "Because Flexera Software's licensing technology is embedded in many leading enterprise applications, the collaboration announced today means ISVs now have a tried, tested and trusted pathway to host those solutions in Azure. We are thrilled to collaborate with Flexera Software to develop this easy process to help ISVs get to the cloud."The FlexNet Licensing/Microsoft Azure collaboration provides producers a verified solution enabling their FlexNet Licensing-enabled, premise-born applications to seamlessly execute in Azure. By leveraging Flexera Software's monetization engine in the cloud, producers will be able to increase their market share by capturing revenue from customers that are shifting their priorities to cloud-based solutions. Moreover, the integration will enable producers to capture additional revenue streams by attracting new customers through different usage models that align to different demand scenarios, such as burst of use, minutes of use, and the like. Enterprises considering Azure now have proven options for expanding their applications to the cloud to reduce cost and IT burden, while increasing availability and minimizing the risk of software license noncompliance. Customers using applications with FlexNet Licensing that are looking to harness Azure's high-performance, elastic, on-demand computing environment can leverage an easy-to-follow pathway to initiate the migration process. Enterprises will also have a proof-of-concept process in place to migrate their other apps, such as home-grown software, to the cloud. Moreover, many enterprises are concerned that deploying applications to the cloud will violate their software agreements or result in software audit true-up penalties due to unanticipated overuse. With the collaboration announced today, this risk is minimized. Enterprises can deploy their Flex-enabled applications to Azure and be assured they will remain in compliance with their software agreements. "Our market is changing rapidly, and our customers increasingly demand that we provide flexible, hosted offerings that align to their evolving preferences," said Prashant Ambe, Vice President, Development Services at ANSYS, a leading provider of engineering simulation software. "It is clear to us that, with these new capabilities, Azure is a very attractive environment in which to host our applications, and Flexera Software has made it easy for us to get there." # # #Resources:FlexNet Producer Suite is comprised of the following solutions: FlexNet LicensingFlexNet OperationsFlexNet ConnectRead our Blog on Software MonetizationFlexNet Producer Suite Success StoriesRelated Flexera Software WebinarsSoftware Monetization White PapersFollow Flexera Software…on LinkedInon Twitteron Facebookon Google+on Xingvia RSSAbout Flexera Software Flexera Software helps application producers and enterprises increase application usage and the value they derive from their software. Our next-generation software licensing, compliance and installation solutions are essential to ensure continuous licensing compliance, optimized software investments and to future-proof businesses against the risks and costs of constantly changing technology. Over 80,000 customers turn to Flexera Software as a trusted and neutral source for the knowledge and expertise we have gained as the marketplace leader for over 25 years and for the automation and intelligence designed into our products. For more information, please go to: www.flexerasoftware.com. For more information, contact:Nicola Males/Vidushi PatelVanilla PRprflexera@vanillapr.co.uk 07976 652491Copyright © 2014 Flexera Software LLC. All other brand and product names mentioned herein may be the trademarks and registered trademarks of their respective owners.Source: RealWire
A2Dominion, a leading housing provider and property developer in London and the South East, has chosen 1st Touch mobile (www.1sttouch.com) software to support its income collection teams, whilst helping customers understand and adjust to welfare reform...