Home Tags World Wide Web

Tag: World Wide Web

Advisory: RHBA-2016:1265-1 Type: Bug Fix Advisory Severity: N/A Issued on: 2016-06-21 Last updated on: 2016-06-21 Affected Products: Red Hat Certification Details An updated redhat-certification-openstack package is now available for Red HatOpenStack Platform 8.0 release. This update fixes several bugs and adds various enhancements in theredhat-certification-openstack package and its dependent packages.

These updatesand enhancements are required for the certification of OpenStack components andapplications with Red Hat OpenStack Platform 8.The update further improves the coverage of the certification test suite andallows the users to run OpenStack Networking Load Balancer as a Service (LBaaS)tests. Solution Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258 Updated packages Red Hat Certification SRPMS: redhat-certification-openstack-1.4.3-1.el7.src.rpm     MD5: 8d9a1fac7933d25ea4451de6c851a9f1SHA-256: ea18def42b94af0d4b2f433b4e46c5fe16b560e9adda41861b17c891012d895e   x86_64: redhat-certification-openstack-1.4.3-1.el7.noarch.rpm     MD5: 1f3c72ceceea31353b66b856e926cd3dSHA-256: 24a7cdd484106b5968554dba1cfea872fd8077334875526446d236fcb6c2d8fc   (The unlinked packages above are only available from the Red Hat Network) Bugs fixed (see bugzilla for more information) 1346760 - [RFE] Use tempest/API tests from "tests" folder in Neutron lbaas repo tests These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:https://www.redhat.com/security/team/key/#package The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/
UEFA European Championship apps may violate Bring Your Own Device (BYOD) PoliciesMaidenhead, U.K. – June 21, 2016 – With EURO 2016 in full swing, football fans around the world are watching 24 teams play 51 games now through July 10.

And millions of those fans are leveraging popular mobile apps to stream content and stay up to date – apps that could pose security risks to enterprises.

According to a new report, “Will Companies be Shown a Yellow Card during EURO 2016?”, if used on employer-issued or employee-owned BYOD devices, many of these popular apps could violate corporate risk policies. “CIOs are likely unaware that many popular EURO 2016 apps used by millions of employees all across Europe are able to access very sensitive device functions and data – such as ad networks, location services & tracking, telephony, in-app purchasing, social networking and microphones – to name just a few,” said Maureen Polte, Vice President of Product Management at Flexera Software. “Enterprises do a great job monitoring the various enterprise apps running on their networks and mitigating risks – however most do not extend their Application Readiness best practices to their mobile apps – an oversight which could invite unacceptable risk into the organisation.” The report found that of the almost 50 popular Apple iOS EURO 2016 apps tested[1]: 73 percent, including BTSport, Football365, Foot Mercato, FranceFootball, lequipe, LIVE Score, Onefootball, SkyGo and SO FOOT, support Ad Networks. 69 percent, including BTSport, Football365, Foot Mercato, FranceFootball, lequipe, Onefootball, SkyGo and SO FOOT, support Location Services & Tracking. 67 percent, including BTSport, Football365, Foot Mercato, lequipe, LIVE Score, Onefootball, SkyGo and SO FOOT, support Telephony. 57 percent, including BTSport, Football365, Foot Mercato, FranceFootball, lequipe, Onefootball and SO FOOT, support In-app Purchasing. 57 percent, including BTSport, Football365, Foot Mercato, FranceFootball, lequipe, LIVE Score, Onefootball and SO FOOT, support Social Networking. 4 percent, including bet365Wrapper and lequipe, support accessing the Microphone. “CIOs need to understand that the behaviours of the mobile apps their employees are using may interact with their corporate systems and data – because not all mobile app developers are trustworthy,” added Polte. “This requires a centralised, automated, repeatable Application Readiness process to identify and test those apps to determine what they do, and whether they comply with or violate the organisation’s BYOD policies.” To compile the report, Flexera Software identified almost 50 widely used EURO 2016 applications, representing a small sampling of those that can be found in the Apple App Store and that could easily be downloaded by employees to a corporate-issued or BYOD device.

These apps were tested using AdminStudio Mobile, an Application Readiness solution that helps organisations identify, manage, track and report on mobile apps, simplify mobile application management, reduce mobile app risk, and address the rapidly growing demand for mobile apps in the enterprise. [1] The apps tested were: 888sport, AppPublishing, bet365Wrapper, Betfair, Betfred, betscores, BetVictor, Betway Sports, BTSport, bwinSportsbookCOM, Coral Mobile, direct, EM, EM2016, ESPN UK, Euro2016 – Prod, EurosportPlayer, FF.fr, FFF_2016_iOS, Foot Mercato, Football365, Forza, FranceFootball, Interwetten, Ladbrokes, lequipe, LFoTVApp, LIVE Score, M6VideoBox, Mobile, Mobile Bet, My Bet Apps, myCANAL, MyLequipe, MyTF1, Onefootball, Paddy Power, RAN, ScoreCentre, SkyBet, SkyGo, SO FOOT, Sport, Sport1, Sportschau, Stan James, Team Stream, Tipico Sports and William Hill. # # # Resources:Download the Report Learn more about: Follow Flexera Software… About Flexera SoftwareFlexera Software helps application producers and enterprises increase application usage and security, enhancing the value they derive from their software. Our software licensing, compliance, cybersecurity and installation solutions are essential to ensure continuous licensing compliance, optimised software investments, and to future-proof businesses against the risks and costs of constantly changing technology.

A marketplace leader for more than 25 years, 80,000+ customers turn to Flexera Software as a trusted and neutral source of knowledge and expertise, and for the automation and intelligence designed into our products.

For more information, please go to: http://www.flexerasoftware.com/. For more information, contact:Vidushi Patel/ Nicola MalesVanilla PRprflexera@vanillapr.co.uk+44 7958474632 / +447976652491 Copyright© 2016 Flexera Software LLC.

All other brand and product names mentioned herein may be the trademarks and registered trademarks of their respective owners.
87 per cent of visual hacks were successfulBracknell, UK, 21 June, 2016 – 3M, the science-based technology company, has revealed the results of a UK and worldwide experiment that demonstrates ’visual hacking’ is a significant risk . In the UK, the rate of successful visual hacks – many of which were achieved by viewing people’s computer screens – was 87 per cent, compared to an average of 91 per cent worldwide.

Alarmingly, the ‘white hat hacker’ was confronted in a global average of only 32 per cent of occasions. The Global Visual Hacking Experiment is an expansion of the 2014 Visual Hacking Experiment conducted in the United States.

The new 2016 study, completed by Ponemon Institute across eight countries and sponsored by 3M Company, found that sensitive information was successfully captured in 91 per cent of visual hacking experiments globally. 3M will be sharing further details of the experiment at the Future of Work conference being held by Management Today in London on 23 June www.3M.co.uk/privacyfilters Says Peter Barker, Market Development Manager, EMEA, 3M Display Material and Systems Division, “The results highlight that visual hacking is a problem in the UK and also worldwide.
It also happens very quickly and it proved alarmingly easy to obtain all kinds of sensitive information in the experiment. However, where visual hacking prevention measures are in place, the risk drops by more than a quarter.

Clearly, UK organisations would benefit by building visual hacking prevention strategies into their security policies.” Details of the experimentIn the experiment, a white hat visual hacker assumed the role of temporary office worker and was assigned a valid security badge worn in visible sight.

The white hat hacker attempted to visually hack sensitive or confidential information using three methods: walking through the office scouting for information in full-view on desks, monitor screens and other indiscrete locations like printers and copy machines; taking a stack of business documents labelled as confidential off a desk and placing it into a briefcase; and using a smartphone to take a picture of confidential information displayed on a computer screen.

All three of these tasks were completed in full-view of other office workers at each participating company. Result highlights25 per cent of successful visual hacks during the experiment were achieved because computer screens were not protected. Out of all the information deemed ‘sensitive’, 44 per cent was from this method.

This was better than the global average of 52 per cent, but lags far behind the Germans, with just 33 per cent.
Sensitive information obtained included log-in details, financial and other sensitive information, including contact lists and customer data.
In the UK, 51 per cent of successful hacks took 15 minutes or less. The office functions easiest to hack were sales, customer services and communications, followed by accounting and finance, and human resources.

The most secure were legal, closely followed by Quality Assurance and R&D.
In the UK, hackers were not confronted in 61 per cent of cases (compared to a worldwide average of 68 per cent). Where visual security practices were in place – such as clean desk policies; workplace monitoring and surveillance; training and awareness programmes; and standardised document shredding processes, there was a global average reduction in successful hacks by 26 per cent. END About 3MAt 3M, we apply science in collaborative ways to improve lives daily. With $30 billion in sales, our 90,000 employees connect with customers all around the world. The UK and Ireland is home to one of the largest 3M subsidiaries outside the USA, employing 2,900 people across 20 locations, including eight manufacturing sites. Products manufactured in the UK include coated abrasives, personal safety equipment, adhesive tapes, industrial microbiology products, drug delivery systems and high-performance coatings. Learn more about 3M's creative solutions to the world's problems at www.3M.co.uk or follow @3M_UK on Twitter. 3M is a trademark of 3M Company. Media Contacts:Maxine Ambrose/Nicola MalesAmbrose Communicationsmaxineambrose@ambrosecomms.co.uk + 44 (0) 1491 412944
Unisys becomes one of the first companies to achieve AWS Government CompetencyLondon, UK June 21, 2016 – Unisys Corporation (NYSE: UIS) today announced it has been recognised by Amazon Web Services (AWS) as one of its first partners to achieve AWS Government Competency, a new component of the AWS Competency Program which highlights companies demonstrating technical proficiency and success in delivering specialised cloud-based solutions on AWS to customers. Today’s announcement marks the first time the AWS Competency Program has recognised partners for specific expertise in delivering solutions to government clients. Unisys was selected based on its proven track record of successfully delivering cloud-based solutions on AWS to federal, state and local government agencies in the U.S., including clients like the Department of the Interior, the State of Washington and the Consumer Finance Protection Bureau. “We are pleased to be among the first companies recognised by AWS as having expertise in providing cloud-based, mission-critical solutions to clients across government,” said Venkatapathi “PV” Puvvada, president of Unisys Federal Systems. “This recognition validates Unisys’ approach to delivering more efficient and cost-saving cloud services to government, while reinforcing our position as a leader in bringing the benefits of these services to our public sector clients.” Unisys collaborates with AWS to deliver offerings that help clients achieve the efficiencies and cost benefits of the cloud.

These offerings include: Unisys Stealth™(cloud) for AWS – Unisys’ micro-segmentation security solution gives AWS customers a fast and convenient way to protect vital information and applications against evolving threats. Unisys Hybrid Architecture Strategy and Blueprint Service – An advisory service to help clients create strategies for hybrid architectures, including cloud governance, to successfully move toward a software-defined enterprise. Unisys Applications and Infrastructure Assessment Service – A comprehensive service to create an actionable plan to help clients efficiently migrate workloads to AWS. Unisys Hybrid Architecture Design and Implementation Service – Unisys integrates clients’ on-premises environments with AWS to optimise resource utilisation and reduce costs without sacrificing control and visibility. Unisys Hybrid Architecture Operations and Management Service – Unisys provides day-to-day operations and management of clients’ hybrid architectures, allowing clients to focus on achieving mission objectives. Unisys Storage Optimization Solutions – Unisys provides essential services and solutions for clients’ data lifecycle management initiatives, including storage infrastructure, disaster recovery and data protection. Advanced Data Analytics – Unisys gives clients the opportunity to leverage the scalability, security and flexibility of AWS paired with custom analytics developed by Unisys data scientists. In addition, qualified state and local government agencies may purchase AWS services under Unisys’ contract with NASPO ValuePoint (formerly the Western States Contracting Alliance). About UnisysUnisys is a global information technology company that works with many of the world's largest companies and government organisations to solve their most pressing IT and business challenges. Unisys specialises in providing integrated, leading-edge solutions to clients in the government, financial services and commercial markets. With more than 20,000 employees serving clients around the world, Unisys offerings include cloud and infrastructure services, application services, security solutions, and high-end server technology.

For more information, visit www.unisys.com. Follow Unisys on Twitter and LinkedIn. ### Unisys and other Unisys products and services mentioned herein, as well as their respective logos, are trademarks or registered trademarks of Unisys Corporation.

Any other brand or product referenced herein is acknowledged to be a trademark or registered trademark of its respective holder.
Contacts:UK: Jenard Dyer, Unisys, +44 (0) 20 3837 3729unisys@weareoctopusgroup.net EMEA: Nick Miles, Unisys EMEA, +44(0)7808 391543nick.miles@unisys.com
Devopsense casts its line into the multi-billion pound market for enterprise DevOps transformation.LONDON — 21 June 2016 — Following the successful release of minimesos, Container Solutions continues its game plan to support developers of microservice applications with the announcement of a new subsidiary, Devopsense. Led by DevOps expert Mark Heistek, Devopsense is focused on helping enterprises implement the processes needed to shift from legacy software development models to agile methods, including DevOps. Container Solutions Logo Devopsense provides the training and services enterprises need to successfully harness DevOps as a self-organising force that becomes part of a company’s product development culture. Parent company Container Solutions focuses on engineering services and product development, while Devopsense is structured to focus on consulting with clients to help them embrace the concepts of DevOps, including automation and rapid deployment cycles. Devopsense helps clients organise for DevOps workflows, including new skills, methodologies and application architectures. The team applies first-hand experience to address the issues developers will face. An example includes real-world management of continuous integration/continuous deployment (CI/CD) processes so that software delivery and infrastructure provisioning are separate processes, increasing both the speed and control of the DevOps process overall. The company works closely with clients to embed DevOps philosophies throughout the organisation. Start-ups looking for engineering consultation, medium-sized companies looking for implementation and application architecture support, and large enterprises looking for complete transformational services can all work with Devopsense. Container Solutions and Devopsense companies will work closely on engineering support. “Change can be tough. And that’s where we come in. DevOps is more than just a cultural shift, and it’s more than just a way to build software better and faster,” said Mark Heistek, head of delivery and creator of Devopsense. “DevOps is a new way of thinking about how software can add value and sustainable differentiation. Our mission is to advise, coach and guide clients to a DevOps state of mind, learning how to grow, innovate, automate and thrive on what they do best: make great products and serve customers.” Heistek comes to Devopsense from ING Bank, where he helped lead DevOps transformation and was product owner of the TIBCO continuous deployment process and the Continuous Delivery on-boarding team. He also was a continuous delivery coach and trainer, helping software development teams within the organisation make transition to DevOps. “Mark has first-hand experience leading large organisations through the DevOps transformation,” said Jamie Dobson, CEO of Container Solutions. “That experience gave birth to Devopsense. Together with Container Solutions, Devopsense delivers the right combination of engineering and consulting experience to clients, enabling successful transformations. Working together, we can test new tools with real clients, bringing new technologies to market while helping clients succeed at DevOps.” Armon Dadgar, co-founder and CTO of HashiCorp remarked, "At HashiCorp, we believe that a firm starts with its people, organises around process, and leverages tools. DevOps is a new process to drive software development and while the market focus is on tools, I think groups like Devopsense are needed to help organisations clearly understand and adopt the appropriate process." DevOps Trend QuantifiedGartner, Inc. puts the total for DevOps tools at US$2.3 billion for 2015, up more than 20 percent from US$1.9 billion in 2014. This year, the firm expects DevOps to evolve from a niche strategy employed by large cloud providers to a mainstream strategy employed by 25 percent of Global 2000 organisations. (Source: http://www.gartner.com/newsroom/id/2999017) In its report, “2016 Trends in Development, DevOps & IT Ops,” 451 Research cites the rapid growth of containers as a primary driver of enterprise DevOps adoption, with artifact versioning, immutable infrastructure, and empathy between development and operations teams as elements of DevOps that are particularly compelling. Devopsense is the latest addition to the Container Solutions constellation of companies, which includes Container Solutions offices in London, Amsterdam and Zurich, and the design agency, Remember to Play, which specialises in design for distributed systems and programmable infrastructure. Together, these companies can service a whole range of needs for clients, including application design, systems integration, implementation, transformation, security audits and even interim corporate management services. About Container SolutionsContainer Solutions is a pan-European company, with offices in Amsterdam, London, Zurich, Edinburgh and Copenhagen. They deliver software engineering services and tools for container-based development. Well established in the container and microservice open source ecosystems, Container Solutions counts among its partners HashiCorp and Mesosphere. More at: http://containersolutions.com/ ### Media Contact: Cathey.co for Container Solutions U.S.:Robert Catheyrobert@cathey.co+1 865.386.6118@robertcathey U.K:Lisa Henshawlisa@cathey.co+44 (0)7985 108887
Details Updated libvirt packages that fix one bug are now available for Red HatEnterprise Linux 6 Advanced Update Support. The libvirt library is a C API for managing and interacting with thevirtualization capabilities of Linux and other operating systems.
In addition,libvirt provides tools for remote management of virtualized systems.This update fixes the following bug:* Prior to this update, migrating a virtual machine failed when the libvirtdservice attempted to use a transmission control protocol (TCP) port that wasalready in use. Now, libvirtd ensures that the port it chooses from themigration TCP port range is not used by another process.
In addition, it ispossible to predefine a custom migration TCP port range in case the defaultrange conflicts with other services. (BZ#1340479)Users of libvirt are advised to upgrade to these updated packages, which fixthis bug.

After installing the updated packages, libvirtd will be restartedautomatically. Solution Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258 Updated packages Red Hat Enterprise Linux Server AUS (v. 6.5) SRPMS: libvirt-0.10.2-29.el6_5.14.src.rpm     MD5: a4584d0a58bf87ab94995bdbcd663febSHA-256: 0672c1dabf317ee19dfbab6be408bc42959b995932d83a5d9d36ccc803583e98   x86_64: libvirt-0.10.2-29.el6_5.14.x86_64.rpm     MD5: 4840350032b43d95d370fa56066e41d8SHA-256: f294b82c450ac66995eee37e52390ab709dc356917e10e8b9291c98b2359ff1a libvirt-client-0.10.2-29.el6_5.14.i686.rpm     MD5: c3c2f3b93b49a2ef7cd803b75f8a4d29SHA-256: 2cabd8dc9e5d409e27448cbde51dedd9895028dbc3b55645db001e534c617389 libvirt-client-0.10.2-29.el6_5.14.x86_64.rpm     MD5: e7c7a692f1612b41a4e9142b781c1a9bSHA-256: 230e711329ad4fe8c25ba87c5a126e30dc9c4aab11ecaed13440b1daeb4f9490 libvirt-debuginfo-0.10.2-29.el6_5.14.i686.rpm     MD5: 35a8bcc163807c7a82b755d923ef25f0SHA-256: 8a2530174a6fcedb96cbdb87907abdc593cbd3594e5f3566e37ef0f705a55505 libvirt-debuginfo-0.10.2-29.el6_5.14.x86_64.rpm     MD5: 8a692797522066ec6b569ce1453e1e0dSHA-256: e19dd484f4cf2753f8d926728841a5a3dc754bbf92328a11f3d3c0feed131dba libvirt-devel-0.10.2-29.el6_5.14.i686.rpm     MD5: 38e326eb5edcacdd9aa357b84f011b75SHA-256: 7047f0bff91cd6bd56f927b4cb109abd22c3a29c110cce624fc0dbeb7e77052d libvirt-devel-0.10.2-29.el6_5.14.x86_64.rpm     MD5: a35c9d4a438ad5604c4c4104560dcc75SHA-256: 0ba7b81356e1f6ce21181a2e6283eef60b111ae847d4442dc0c6df3c18569303 libvirt-lock-sanlock-0.10.2-29.el6_5.14.x86_64.rpm     MD5: 4106cef293fe19df30d2311ff50bb015SHA-256: 0e2610866bf765f3b185009e687010257bd5503bfa2727d71bbe518d7edf8a7c libvirt-python-0.10.2-29.el6_5.14.x86_64.rpm     MD5: aca1cf74345ab05e43f2fa521eb5b2a4SHA-256: 3b28af7e6aa3f22a98533a940003a965bd413d3dd4444ff4aa3b953fee6a8660   (The unlinked packages above are only available from the Red Hat Network) Bugs fixed (see bugzilla for more information) 1340479 - qemu live migration port conflicts with other users of ephemeral port(s) Keywords libvirt, migration, virtualization These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:https://www.redhat.com/security/team/key/#package The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/
Cisco provides information about fixed software in Cisco bugs, which are accessible through the Cisco Bug Search Tool.When considering software upgrades, customers are advised to consult the Cisco Security Advisories and Responses archive at http://www...
Press Release Zylpha (www.zylpha.com), the UK’s leading legal technology innovator has announced the latest version of its bundling technology, which reduces the time taken to create document bundles from hours to minutes. Pride of place amongst a host of new features included is a new SharePoint integration.

This has been designed specifically to recognise and work with the different ways that SharePoint can be set up between legal practices. This latest version also now includes extensive import and export functionality for Microsoft Excel.

This is especially useful where users seek to combine Zylpha bundles with eDiscovery platforms. Nigel Spicer A range of enhanced data accessibility options has also been incorporated.

This includes icon based file management that enables users to identify file issues easily, including password protection or outstanding file requirements that need attention. Commenting on the new version Nigel Spicer, Zylpha’s Head of Development noted, “To a great degree our development is driven by our success across an ever broader range of bundling requirements.
In this case, we have recognized and met the demand from SharePoint and E-Discovery users.

This user led evolution of features and functionality works extremely well, as it continuously expands the appeal of our software to a greater variety of organisations. We are confident, therefore, that this latest version will be greeted with exceptionally strong demand both from traditional practice sectors and key in-house operations such local authority legal services teams.” Ends About Zylpha www.zylpha.comHeadquartered in Southampton Zylpha is an innovative specialist offering tools for the legal profession including: Secure electronic document production and delivery. Court Bundling. Integration with the MOJ Portal. Links to agencies for AML and Identity Verification. The company, which was founded by Tim Long its CEO, has won widespread acclaim in both the legal and local government sectors for its systems that transform secure communications for court and case management bundles. For more information, please contact:Tim LongZylpha Ltd.T: 01962 658881M: 07917 301496t.long@zylpha.comwww.zylpha.com Or Leigh RichardsThe Right ImageT: 0844 / 561 7586M: 07758 372527leigh.richards@therightimage.co.ukwww.therightimage.co.uk
Interoute colocation services fulfil all requirements of the Swiss Financial Market Supervisory AuthorityZurich and Geneva, 16 June 2016 - Interoute, owner operator of a global cloud services platform and one of Europe’s largest networks, has today announced that the Swiss Financial Market Supervisory Authority has once again awarded the FINMA certification to Interoute Colocation Data Centres in Geneva and Zurich. Interoute’s Swiss Colocation Data Centre services have successfully and continuously achieved FINMA certification since 2012. The certification demonstrates that Interoute’s colocation services meet the highest standards of security and privacy for financial institutions operating in the country. Data Centre security is vital for financial institutions to protect confidentiality and integrity. The Zurich and Geneva data centres offer around the clock on-site security, continuous surveillance, as well as fire protection, cooling systems, and emergency power generators in the event of an emergency. Both facilities provide double fibre entry and diverse paths within the building, which connect directly to the Interoute 100g backbone network. The colocation facilities are designed to deliver IaaS and virtualised services as part of the Interoute integrated platform, delivering any service over any access type, and allowing in-life service changes. This enables enterprises to connect with buildings, data and users in their most preferred way. Maurice Woolf, Group General Counsel and EVP Corporate Support, commented: “This certification confirms Interoute’s commitment to ensuring that our services meet the highest requirements. Interoute offers our Swiss colocation customers a secure operating environment, whilst also delivering the maximum uptime possible, comprehensive redundant connectivity, around the clock customer support, and a reliable power supply.” There are nine principles that must be implemented by financial institutions and service providers in order to earn the FINMA certification. These principles serve to protect customer data, especially within the retail sector. The principles include the preservation of commercial and banking secrecy, data protection and security. Financial services customers and Interoute must together guarantee the confidentiality, availability and accuracy of data in order to ensure adequate data protection. They also protect the systems against unauthorised or accidental destruction, accidental loss, technical errors, falsification, theft or misappropriation, unauthorised modification, copying, access or other unauthorised processing. -Ends- About InterouteInteroute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centres, 16 virtual data centres and 31 colocation centres, with connections to 195 additional third-party data centres across Europe. Its full-service Unified ICT platform serves international enterprises and many of the world’s leading service providers, as well as governments and universities. Interoute’s Unified ICT strategy provides solutions for enterprises seeking connectivity and a scalable, secure advanced platform on which they can build their voice, video, computing and data services, as well as service providers in need of high capacity international data transit and infrastructure. With established operations throughout Europe and USA, Interoute also owns and operates 24 connected city networks within Europe's major business centres. www.interoute.com Interoute PR contacts:Ruder Finn+44 (0)20 7438 3050interoute@ruderfinn.co.uk Forward-Looking StatementsThis communication contains certain forward-looking statements. A forward-looking statement is any statement that does not relate to historical facts and events, and can be identified by the use of such words and phrases as “according to estimates”, “aims”, “anticipates”, “assumes”, “believes”, “could”, “estimates”, “expects”, “forecasts”, “intends”, “is of the opinion”, “may”, “plans”, “potential”, “predicts”, “projects”, “should”, “to the knowledge of”, “will”, “would” or, in each case their negatives or other similar expressions, which are intended to identify a statement as forward-looking. This applies, in particular, to statements containing information on future financial results, plans, or expectations regarding business and management, future growth or profitability and general economic and regulatory conditions and other matters affecting Interoute. Forward-looking statements reflect the current views of Interoute’s management (“Management”) on future events, which are based on the assumptions of the Management and involve known and unknown risks, uncertainties and other factors that may cause Interoute’s actual results, performance or achievements to be materially different from any future results, performance or achievements expressed or implied by these forward-looking statements. The occurrence or non-occurrence of an assumption could cause Interoute’s actual financial condition and results of operations to differ materially from, or fail to meet expectations expressed or implied by, such forward-looking statements.Interoute’s business is subject to a number of risks and uncertainties that could also cause a forward-looking statement, estimate or prediction to differ materially from those expressed or implied by the forward-looking statements contained in this communication. The information, opinions and forward-looking statements contained in this communication speak only as at its date and are subject to change without notice. Interoute does not undertake any obligation to review, update, confirm or to release publicly any revisions to any forward-looking statements to reflect events that occur or circumstances that arise in relation to the content of this communication.
Cisco has released free software updates that address the vulnerability described in this advisory.

Customers may only install and expect support for software versions and feature sets for which they have purchased a license.

By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license:http://www.cisco.com/en/US/docs/general/warranty/English/EU1KEN_.htmlAdditionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner.
In most cases this will be a maintenance upgrade to software that was previously purchased.

Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.When considering software upgrades, customers are advised to consult the Cisco Security Advisories and Responses archive at http://www.cisco.com/go/psirt and review subsequent advisories to determine exposure and a complete upgrade solution.In all cases, customers should ensure that the devices to upgrade contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release.
If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.Customers Without Service ContractsCustomers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco Technical Assistance Center (TAC):http://www.cisco.com/en/US/support/tsd_cisco_worldwide_contacts.htmlCustomers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.Fixed ReleasesCustomers should upgrade to an appropriate release as indicated in this section.For the Cisco RV130W Wireless-N Multifunction VPN Router, this vulnerability was addressed in firmware release 1.0.3.16.For other affected devices, Cisco plans to release the following firmware updates in the third quarter of 2016:Cisco RV110W Wireless-N VPN Firewall, Release 1.2.1.7 Cisco RV215W Wireless-N VPN Router, Release 1.3.0.8 Firmware updates can be downloaded from the Software Center on Cisco.com by navigating to Products > Routers > Small Business Routers > Small Business RV Series Routers.
[London – 15 June 2016] The managed services market is characterised by a rapid pace of change; profitability is based on scale, and the number of mergers and acquisitions is rising as companies seek to expand to meet rising demand.

These are some of the conclusions drawn from Managed Service Providers in Europe - the Top 1000 the latest database report from IT Europa which is published today.Overall the market grew at a rate of 8.5%, but this masks a rapid year-on-year expansion in some smaller markets (Bulgaria 33%, Slovakia 21%, Turkey 18%) while France, Netherlands and Germany all grew just over 10%, the largest, the UK grew by 7%, and some, like Spain, actually showed a decline. Russia and Norway both grew by 14%. And this is a sector that matters: total revenues for all companies in the report totals €350bn ($390bn) and they employ a total staff number of 1.6 million.

Analysis also shows a top twenty which is geographically diverse, and with not as many global players as might be expected, though the big names are there.

Telecoms companies and their derivatives make up about a third of the top twenty, which should be no surprise. What are they offering? In terms of services, 86.5% of MSPs are offering Network/Infrastructure Management; 72.4% are offering Server/Web Management; 71.9% are offering Security Management; 61.2% are offering Storage/Backup Management; 60.5% are offering SaaS; 50.3% are offering applications management; 36.6% are offering telecom services; and 13.2% are offering Managed Print Services. There are companies from 34 European countries featured in the report.

The top 5 largest geographic markets covered in terms of companies profiled are: UK (325 companies), Germany (106), France (104), Netherlands (69) and Italy (43). Of the 1000 companies profiled, 696 are independent companies, 46 parent companies, 148 subsidiaries, and 110 publicly listed. “We are seeing more and more traditional channel organisations embrace managed services as a delivery model as customer demand continues to rise,” says Alan Norman, Managing Director of IT Europa. “The factors behind the surge in demand, the changes in customer buying behaviour driving them and the opportunities this presents for MSPs will be a major subject for debate at the Managed Services & Hosting Summit 2016 (http://www.mshsummit.com/) which takes place in London in September.” The Managed Service Providers in Europe - the Top 1000 database report spans 34 countries and represents the most detailed view available of this key market sector.
It has been compiled from detailed interviews by IT Europa’s own research team.

The company profiles include sales figures for each company in Euros and US dollars; contact details for key executives, vertical markets addressed, country sales breakdown, hardware, software and services breakdown, vendor relationships, ownership details and company overview.

The report is available from IT Europa (http://www.iteuropa.com/) costing from £4,350 for the top 1000 or £2350 for the top 500.

Data can also be extracted and supplied by country, region or on a bespoke basis. About IT EuropaIT Europa is the leading provider of strategic business intelligence, news and analysis on the European IT marketplace and the primary channels that serve it.
It publishes European channel publications, such as the IT Europa, ISVEuropa and MSPEuropa newsletters, markets a range of database reports and organises European conferences and events for the IT and Telecoms sectors.

For further details visit: www.iteuropa.com For further information contact:Alan NormanTel: +44 (0) 1895 454 604Email: alan.norman@iteuropa.com
Today BioConnect announces the successful deployment of its BioConnect Identity Platform and Suprema biometric hardware for access control at Netwise Hosting Ltd, a leading provider of data centre colocation in London, UK.

BioConnect provides identity solutions, with a special focus on data centre colocation customers.

BioConnect offers a unique approach which removes the need to manage point-to-point integrations as it couples Suprema biometric readers with over 20 of the leading access control system providers. Netwise Hosting’s primary focus and fundamental values are speed, security, and stability as they deliver enterprise-level hosted environments to a wide and varied customer-base, working closely with clients all around the world.

As Netwise Hosting looked to expand their offering with the development of an additional 11,000 sq. ft. data centre in London, they chose BioConnect to fulfill their security requirements to identify a more fully- featured access control system that checked all the boxes.

They saw BioConnect as a leader, with its understanding of specific data centre colocations customer needs – shared spaces of sensitive data require assurance of identity throughout the facility and to be most effective, a standardized way of deploying biometrics coupled with enterprise level support are needed. “BioConnect really set themselves apart from the competition when it comes to support; they have a small team of highly experienced individuals who know the product and the associated software inside out,” says Matthew Butt, Netwise Hosting Ltd., Managing Director, “We really cannot recommend this aspect of their offering high enough!” Netwise compared their previous vendor installations and decided on the following requirements: They needed a solution that would allow them to incorporate a clearer view of identity with a multi-authentication biometric solution that would seamlessly integrate into Paxton Net2.

The main driver, in addition to finding the correct physical product, was to avoid having duplicate systems and information for access control. Suprema biometric devices provided and supported by the BioConnect team now cover all high-security ingress and egress locations throughout the data centre facility.

These readers provide the highest level of identity authenticity and provide flexibility in indoor/outdoor placement and multifactor authentication with card and fingerprint support.

The BioConnect Identity Platform incorporates an advanced plugin architecture to connect directly into Netwise Hosting’s preferred access control software, Paxton Net2.

Therefore, in addition to finding the correct physical product, Netwise was able to avoid having duplicate systems and information for access control between their biometric and non-biometric devices running on Paxton Net2. The addition of BioConnect identity platform meant that Netwise didn’t have to make a tradeoff between software and hardware that would meet their needs – they now have their preferred access control system and multi-authentication biometrics in one single interface for the creation, removal and administration of all users and access zones. “We chose BioConnect for several reasons, primarily the ability to integrate their system seamlessly with Paxton Net2, but closely followed up by their feature set and quality of the readers themselves,” said Matthew Butt, Managing Director, “The almost immediate availability of the product – coupled with their excellent support – meant they really did stand out from the competition.” To read the full case study on this deployment, visit www.bioconnect.com/case-studies Visit BioConnect and Suprema June 21-23 during this month’s IFSEC conference at ExCel London, UK in Stand E1400. About BioConnectBioConnect is on a Quest – for Rightful Identity. Why? To empower people to use their unique biometric credentials (their Rightful Identity) in their everyday lives – delivering greater security, assurance and convenience along the way.

BioConnect revolutionized the physical access control market with its industry-first identity platform that enables the integration of biometric technology with the industry’s leading access control solutions.

And as a representative of the world leader in biometrics and security, Suprema, BioConnect provides and supports the implementation of the top-rated biometric hardware devices (finger, face, card and PIN) and IP access control solutions in select markets. Learn more at http://www.bioconnect.com/. About Netwise Hosting Ltd.The Netwise Hosting team take great pride in their ability to offer truly high-end services, without the excessive and restrictive barriers that regularly force businesses out to countryside data centres - many miles from the nearest major business and trading hubs.

Access to London data centre space is no longer reserved for firms with enormous IT budgets.
SME’s can at last rub shoulders with much larger businesses, deploying their online services from a facility they can really boast about - all managed by a company with core values in line with their own.

For more information, visit http://www.netwisehosting.co.uk/.