Wednesday, August 31, 2011

Juniper Networks Earns Back-to-Back Win and Receives Top Honors from Solution Providers for Superior Products, Support and Channel Partnership

SUNNYVALE, Calif., Aug. 30, 2011 — Juniper Networks (NYSE: JNPR) today proudly announced it has earned the 2011 CRN Annual Report Card (ARC) "Company of the Year," sweeping the entire Enterprise Networking Infrastructure category. The coveted award marks the second year in a row Juniper Networks has won the ARC in this highly competitive category.

"This back-to-back win and sweep of the entire enterprise networking category offers a great testimony to the disruptive leadership, technical innovation and channel partnership that differentiates Juniper Networks from our competitors and helps us drive even greater business value for our channel partners worldwide," says Juniper Networks' Senior Vice President of Worldwide Partners Emilio Umeoka.

Umeoka and Juniper Networks Americas Partner Chief Frank Vitagliano accepted the honor at the 2011 XChange Americas Conference earlier this month in Denver, CO.

"This is a great win and a significant endorsement of the value, trust and respect Juniper Networks has earned within the Americas channel partner base and worldwide," says Vitagliano. "From breaking into the switching market four years ago with the Juniper Networks® EX Series, to the recent announcement of our QFabric data center solution, Juniper Networks continues to deliver the disruptive innovation channel partners need to meet the dynamic business and technology demands of the enterprise. These are exciting and defining times in Juniper Networks' history and we want to thank our channel partners for their continued advocacy and adoption of the new network."

Recognized as one of the IT channel's top honors, the CRN ARC serves as a definitive benchmark of relationships between vendors and their channel partners. The 2011 Everything Channel ARC research team surveyed more than 3,600 solution providers across 21 categories to evaluate their satisfaction with vendors' products, support and channel programs. The results serve as an industry standard for measuring excellence within the channel community.

"When it comes to the strength of relationships, quality of products and return on partner programs, solution providers want to hear from their fellow VARs about the IT vendors that consistently exceed expectations," said Kelley Damore, vice president, editorial director, Everything Channel. "The ARC gives solution providers the opportunity to share feedback and recognize the vendors who truly demonstrate channel excellence. We congratulate Juniper Networks for being recognized as the best of the best in the category of Enterprise Networking Infrastructure."

To view a slideshow of all the organizations named to the 2011 ARC visit www.crn.com.

About Juniper Networks

Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. Additional information can be found at Juniper Networks (www.juniper.net).

Juniper Networks and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. The Juniper Networks and Junos logos are trademarks of Juniper Networks, Inc. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.

Need products from Juniper Networks?  Contact Matthew Frank at mfrank@macsourceinc.com or Elizabeth Rizzo at erizzo@macsourceinc.com

You can even check out MAC Source inc. at http://www.macsourceinc.com/

Why Spending Money On A New Communications System Can Save Your Company Money And Keep Your Customers Happy.

by Matthew Frank - Inside Sales Rep at MAC Source Communications

Old phone systems are the worst to deal with.  I call people all day to try and sell them new products such as next generation firewalls, video conferencing equipment, wireless routers or access points and even new phone systems.  When I call into a company and I hear a phone system that is more than 5 years old, it annoys, angers and frustrates me all at the same time.  This is because most companies don't think about this simple peice of communication that to be honest, can help you gain or lost customers in a blink of an eye.

If you have an older phone system for your business, think how it affects you and your customers.  A customer calls in, hears a recording, and is stuck in directory hell.  They have to go through 6 or 7 prompts before they can get to a secretary or somone who answers for them.  Its annoying, frustrating, and can cause the customer to hang up and not want to call back.  Now, your probably thinking "well my company has online support 24/7 and we have e-mail support as well, so its not a big deal."  Actually it is.  How many people actually use the online support or e-mail?  Honestly.  And Trust me, I have used live online support through multiple companies, and I find it to be less helpful at times.

Many people, such as my parents who are not particularly tech savvy (mom if you are reading this, its true, and dad, if you are reading this, when did you learn to use the computer?) are used to picking up the phone and calling into companies.  They don't want to e-mail or use live tech support.  They don't care about how many live support reps you have online or that you will get back to them in 24-48 hours.  The phone is instant, and they want to talk to someone live and hear a voice.  Being stuck in directory hell is not fun for them, and I've seen them and their friends more then once return a product and buy a competitors because it was easier to get through to that other company.

Basically, what I am saying is, if you have an older system, upgrade it.  It may seem like its a big expense, but in reality, its a one time thing every few years.  If you think about it, the cost to upgrade your system is a lot less then losing customers to another competitor because of a simple phone directory or older system where you can't get through to someone.

Let MAC Source Communications help you by attending our Avaya/Nortel seminar (and yes, you can attend even if you don't use Avaya or Nortel).  Click here to sign up.

You can reach me at 585-368-2101 for more information about our events and products we offer.

Identity Theft. The Ease of Becoming Someone Else

by Matthew Frank - Inside Sales rep at MAC Source Communications

I'm not actually telling you how to do the stuff in the title, it's more of a way to grab your attention. 

I called up my phone cable company a while back and figured out how easy it was to change the agreement we had in terms of service and channels.  I didn't have my account # so they asked me to verify my birthday and the last 4 digits of my social security #.  Not my whole social security # but the last 4 digits.  To me, this is not safe, let me tell you why.

First off, anyone can go on Facebook, Twitter, or even my Linkedin account and see when my birthday is.  In fact, I make it publicly broadcasted (I guess I like all the "HAPPY BIRTHDAYS" I get on that day).  Secondly, most places you go to, or things you sign that ask for your soocial security # only ask for the last 4.  It's really easy to get it.  All you would need to do is get my birthday, year I graduated from my college, and my mother's maiden name, and you could get my transcript for my college (which has my college ID on it and that allows me to reset your password to my college account).  Then you have all my personal information including either my full social security # or at least the last 4 digits.  It's that simple.

I have a friend who, in the past couple of years has been fighting identity theft.  Someone opened up a credit card in his name and ran the bill up, then left him to be stuck with it.  When he called to dispute it, the credit card companies told him it was his card.  They told him, he signed up for it, he ran the bill up, and they weren't going to help him.  He was stuck with a $6,000.00 bill he couldn't pay.  That destroyed his credit to the point where he needed a cosigner to sign for his apt when he was clearly making triple the income he needed to be making to sign it.

Identity theft is real.  The best way to stop them, is to think like them.

Join MAC Source Communications and Information Security Expert and Penetration Tester Steve Stasiukonis on September 13th from 11:00-11:45 am to learn how to "Rob A Bank With Facebook" and protect your business from people with malicious intent.

You can sign up by clicking here

Tuesday, August 30, 2011

LifeSize Takes on Cisco in Videoconferencing, Sees Sales Rise

LifeSize Communications Inc., a unit of computer-mouse maker Logitech International SA (LOGN), expects revenue to jump as it competes with rivals including Cisco Systems Inc. (CSCO) to add clients in the videoconference market, set to more than double in the next five years.


LifeSize’s sales are forecast to rise two to three times faster than the market, which is expected to grow 15 percent this year, Chief Executive Officer Craig Malloy said in a phone interview. Revenue at the Austin, Texas-based company rose 34 percent to $36.5 million in the fiscal first quarter, making LifeSize Logitech’s fastest-growing business.

“We’re seeing very, very rapid growth in videoconferencing,” the CEO said. “We’re going to piggyback on key trends and accelerate our growth.” LifeSize is targeting $1 billion in revenue in coming years, Malloy said, without giving a precise timeframe.

Technology companies are using mergers and acquisitions to grow in videoconferencing. Romanel-sur-Morges, Switzerland-based Logitech, the world’s biggest maker of mice, was among the first to make a deal in the industry when it bought LifeSize for $405 million in 2009. Cisco the same year announced it was buying Tandberg ASA, the world’s second-biggest maker of videoconferencing equipment, and Polycom Inc. (PLCM), the world’s largest standalone maker of videoconference gear, agreed to buy Hewlett-Packard Co.’s competing business in June.

Microsoft Corp. (MSFT), the world’s largest software maker, agreed this year to buy Skype Technologies SA, the world’s most popular Web-calling service, to strengthen its bid to convince corporate clients to replace traditional phone and videoconferencing systems with its software.

‘Beyond Consumer’

“Logitech wanted to diversify from PC peripherals,” Malloy said. “We’re a natural extension for them to go beyond consumer channels and into business ones.”

Global videoconferencing endpoint revenue, which includes equipment and doesn’t include services, will reach $4.15 billion in 2016 from $1.66 billion last year, according to research from Frost & Sullivan Inc.

“Companies are looking for ways to reduce costs due to the financial crisis,” Iwona Petruczynik, a Warsaw-based analyst at Frost & Sullivan, said in an interview. “People are moving away from in-person meetings to save money and time, and this is a great way to do it.”

LifeSize, the third-biggest videoconferencing provider with about 15,000 customers worldwide, offers high-definition video conferencing services, mainly targeting medium and large companies, the CEO said. LifeSize in July bought Mirial, a specialist in software for video-conferencing on tablets and mobile phones.

Android, Apple Devices

The Mirial deal allows LifeSize to “offer video communication to any Android or Apple-based device,” Malloy said, closing a gap in its product offering. “Mobility services are one of the key trends in the industry and they will help us gain market share.” He declined to say whether the company is looking at other acquisition targets and said LifeSize plans product innovations “the likes of which the video-communications industry has never seen.”

LifeSize is also adding cloud-based services such as virtual infrastructure for companies that don’t have in-house video expertise or information-technology resources, the CEO said.
 
For link to Original article click here
 
Contact Matthew Frank at 585-368-2101 or Elizabeth Rizzo at 518-694-3904 to see how MAC Source communications can help you with Video Conferencing.

Wednesday, August 24, 2011

Skype Acquires Start-Up Company GroupMe


In the era of mobility, companies struggle to compete.  So what do they do?  They buy each other out.  Skype, one of the more well known video messaging services, has agreed to buy GroupMe.  GroupMe is a service that lets users make conference calls and text a group of people.

The kicker to this?  Microsoft is still in the process of acquiring Skype, which means, that if the acquisition goes through (and most analysts say it will) that Microsoft will have a great use for the new service.  To a computing software company like Microsoft, the fact that they may have access to a mobile group messaging service like this is extremely important. With steep competition from Apple and Google in the mobile world, and with everything shifting from desktops and laptops to sablets and smartphones, this gives Microsoft a huge advantage.

Although Skype and GroupMe will operate independently right now, the CEO of Skype said that eventually they will merge their technologies.

The world is changing.  Consumers and businesses are going mobile.

To view the full article on the WSJ click the LINK

Tuesday, August 16, 2011

Video Conferencing: Saving Money While Saving Sales


In this day and age, with all the technology and communication channels out there, it is extremely rare to actually speak to someone face-to-face anymore.  Now most people are probably thinking "I always speak to my friends and family face-to-face."  "When I go out I see people."  That's all fine and dandy, but what about in a business setting?

Many businesses now use instant messaging, e-mail, and the old fashioned mode of contact, the telephone.  The problem with the first two is that it's extremely hard to get the right tone.  Unless you type in capital letters, use emoticons (smiley faces), or actually say the tone you meant, most people wouldn't understand, and could take offense.  The problem with telephones is that most of what people say and do is expressed by body movements and facial expressions.  The movie Hitch said it the best:

"60% of all human communication is nonverbal. Body language. 30% is your tone. So that means that 90% of what you're saying ain't coming out of your mouth."  

So, what does this mean for business?  A LOT!

Many businesses claim to be in the 21st century when they talk about the technology they adopted for their business and for communication purposes.  They talk about how they can have a live person 24/7 to talk to customers, or that they respond through e-mail.  That's great, but it's not enough.  The next step is Video Conferencing.

Video Conferencing is a great way to communicate with clients and customers. It's a great way to communicate with co-workers who are not in the same office or who work remotely.  In fact, businesses that use video conferencing have found they actually save more money.  Think about it.  No need to reimburse employees for gas or rent out a hotel or conference room for employees to go to.  Employees can log onto their computer and open a program, or go to the video conference room and just hit a button.  It's that simple nowadays.

Video Conferencing also comes in handy when you need to see the person you are talking too.  Many people can read body language, and in a sales or interview situation, this is imperative.  Imagine you are talking to a customer on the phone, and everything seems to be going well.  You think the sale is going to go through and you will hit your goal.  The next day, you find out, it isn't going to happen.  Why?  The tone of voice the person was giving out sounded fine, but what about the person's body language?  Wait, yor're on the phone, you can't tell.  Video conferencing allows you to see who you are talking to and essentially, read the person.  How are they sitting?  Are their arms crossed?  Are they leaning back or leaning forward?  What about their attention (are they on their phone or paying attention to you?  These are all things that need to be thought about, yet wiht most companies, it doesn't cross their mind.

In the end, Video conferencing may seem expensive up front, but could help when it comes to making the sale, or saving your business money.  It is one of the few technologies that will help businesses move into the 21st centurty.


To learn more go to http://www.macsourceinc.com/

Friday, August 12, 2011

Next Generation Firewalls

Many companies today don't realize how important security is for their company.  For instance, many companies think that if they don't do credit card transactions, don't allow guests on their network when people come to their company, and block sites like Facebook, that they are secure and nobody can get through their gate.  Unfortunately this is not true.

In today's connected digital world, many companies are allowing their employees to use mobile devices such as laptops, smartphones, and tablets on their network.  With everything being connected, the merging of innovation and ideas come together.  This is great for companies that want to move forward and look towards the future (because everything is going mobile).  But what happens when these devices that are used outside of the business come into it?  It's ok, you have a firewall right?

Just because websites like Facebook are blocked internally and guests cannot access the web at a company, does not mean that company is safe.  Because employees use mobile devices and are using them other places besides work, they are still prone to malicious software.  They could easily go to a coffee shop and play Mafia Wars or Farmville on Facebook, and never know that someone had gotten into their laptop or embedded some malicious software or tracking software on their device through those apps.  Then, when that employee brings the laptop to work, it is on your network.  It found it's way around that great firewall that you have.

So what do you do about this situation?  Lock employee's hardware down so they can't do anything at all no matter where they go?  Wrong.  You get a Next Generation Firewall or NGFW.

A Next Generation Firewall or NGFW allows you to control applications, users, and content, not just ports.  This gives you significantly more protection for your network and allows you to identify threats that you never thought could get it.

Visit our website to learn more.

Friday, August 5, 2011

Weighing Security Risks of Facebook and Other Social Networks for SMBs

Nowadays small businesses with limited funds for marketing and advertising are being forced to open their doors and networks to social networking sites like Facebook and Twitter.  While these sites are primarily free, they can end up costing a company a lot of money if their network is not properly secured.

Of course all businesses are vulnerable to security breaches and while large corporations are able to take a hit in terms of money being lost, small and medium size businesses do not always have the funds or the manpower to ward off network security vulnerabilities.  According to a study, incidents involving social media (whether its disgruntled employees trying to defame the company or worms and viruses getting on the network) the average amount of money spent is around $4 million.  Most SMBs cannot afford to pay this price.

So, what should small and medium businesses do?  Should they lock down social media sites so no employees can use them?  That's correct right?  Wrong.

SMBs need to have the proper protection.  Most of them use consumer or household level firewalls or other protection.  Many are not aware that these are not good enough to protect their networks and IT infrastructure so they end up being open and vulnerable to attacks and malicious software.

A lot of times all that is needed is the right protection.  What that means is that social networks don't need to be locked down, but instead can be restricted for business use only.  Next Generation Firewalls can help with this.  They can give small and medium business (but also large ones) the right protection and assurance that their network is safe and being used for what they designate it for.

To get a more in depth information click here to read the full article.

Q&A With Palo Alto Networks Founder Nir Zuk.

After a nine-month search for a new chief executive, Palo Alto Networks Inc. has hired Mark McLaughlin, who was CEO at VeriSign Inc. until he resigned last week. Palo Alto Networks builds firewall appliances that can peer into network traffic, enabling companies to place limits on how their networks connect to the Internet, and personalize how specific employees use certain applications. We sat down with Nir Zuk, the company’s founder and chief technology officer, to talk about where the company is headed and what it was looking for in a new CEO.


Here’s an edited version of the conversation:

Q. Why did it take so long to find a new CEO?

A. We were looking for specific things that are very hard to find. We wanted someone that can put the customer first. You’d be really surprised how many people don’t have a focus on the customer. We talked to many of Mark’s former customers and they all raved about him. We wanted someone with good leadership experience. Mark has that as a West Point graduate, former attack-helicopter pilot and was at several start-ups before VeriSign. Also, it’s really important to me, as a founder, that innovation continue, and not have a CEO who’s going to convert it into a sales and marketing machine. We’re talking about a guy who didn’t come from HP or IBM or one of these behemoths who destroy your passion for innovation.

Q. Why is it so important for the company to remain innovative?

A. It’s all about where you want to get to. If your goals are short-term then yes, turn up sales and marketing and flip the company in a few years. Look at the position Cisco [Systems Inc.] is in now — not just in security, but in everything. If you turn into a sales and marketing machine, your day will come. It may take five or 10 years, but your day will come. We are building a company for the long-term and we have the support of our venture capitalists in doing that.

Q. How are all the security breaches that have been in the news lately affecting how customers think about security?

A. We’ve had the same message to our customers since we started selling four years ago: Look, the competition has not done anything for you in the last 10 or 15 years. They’re selling you the same product again and again and again and again. Customers are starting to realize that and you can see it in the numbers.
Palo Alto Networks has well above $200 million in booking run-rate [meaning that its most recent quarter had more than $50 million in bookings] and over 20 customers that spent more than $1 million. We’re at an inflection point and incumbents can’t survive inflection points in the market. Look at Nokia or Sun or Silicon Graphics. Or even Microsoft, which was never able to get Internet right. Though some survive by moving to a new market like Apple did.

Q. What kind of milestones does Palo Alto Networks need to hit before it will file for an IPO?

A. “We’re thinking about it. It’s about doing what’s best for the company. It’s not tied to any particular milestones.”

Link to original article from The Wall Street Journal

Thursday, August 4, 2011

HP reports 56% jump in cybercrime costs

Silicon Valley / San Jose Business Journal


The cost to business and government organizations of security and recovery connected to cybercrimes has risen 56 percent in the past year, a study released Tuesday said. The report by Hewlett-Packard Co . (NYSE:HPQ) said cybercrime costs to organizations it surveyed have risen to a median of $5.9 million a year, ranging from a low of $1.5 million to a high of $36.5 million.

Recovery and detection are the most costly internal activities, the report said. Over a four-week period, the organizations surveyed said they experienced 72 successful attacks per week, an increase of nearly 45 percent from last year. More than 90 percent of all cybercrime costs were caused by malicious code, denial of service, stolen devices and Web-based attacks.

The average time to resolve a cyberattack is 18 days, the report said, with an average cost of nearly $416,000. This is nearly a 70 percent increase from the estimated cost of $250,000 over a 14-day resolution period in last year’s study.

Results also showed that malicious insider attacks can be even more costly, taking more than 45 days to contain.


Written by Cromwell Schubarth.

Link to original article

Black Hat shows hacker exploits getting more sophisticated


By Byron Acohido, USA TODAY

LAS VEGAS — Fresh evidence that the Internet has become saturated with hacking groups relentlessly striving to crack into company networks grabbed attention as the Black Hat cybersecurity conference got underway here Wednesday.
  • By Sam Ward, USA TODAY

By Sam Ward, USA TODAY
Anti-virus giant McAfee revealed how a single hacking group, dubbed Shady Rat, has infiltrated at least 72 companies and governments over the past five years, including some 49 victim organizations in the U.S.
And Dell SecureWorks senior researcher Joe Stewartpresented results of his analysis of nearly 1,000 corrupted servers. Stewart isolated 18 servers actively being used to relay information to and from infiltrated PCs inside company networks to command servers in two regions of China.
Security analysts and researchers at the conference say that's the tip of the iceberg. Nation-state spies and cybergangs "are trying to get at sensitive intellectual property and government information every hour and every minute of the day," says Andy Grolnick, chief executive of tech systems-monitoring company LogRythm.
The majority of hacks fail, but "sophistication is increasing, and some are getting through," says Grolnick. "There's value in the data they're trying to get at."
McAfee has been aware of Shady Rat's activities since 2009. Then, last March, Dmitri Alperovitch, McAfee's vice president of threat research, located a server storing a list of successfully infiltrated organizations.
Some 49 of the 72 hacked companies were in the United States, four in Canada and the rest sprinkled through Europe and Asia.
The hackers most likely targeted a specific employee to receive an e-mail carrying an infected Web link or attachment, then tricked the employee into activating the infected link or file, McAfee says.
McAfee declined to name any of the 72 organizations that were infiltrated. The shortest time the hackers remained inside a company's network was less than a month; the longest, 28 months.
Stewart's research zoomed in on two hacking groups going after intellectual property.
"The final destination for all the activity we're seeing is a couple of hubs in China," says Stewart. "It tells us that somebody has invested specific resources to control this operation."

Link to original post on USAToday.com

How Apple (unintentionally) revolutionized corporate IT


IT'S NOT ITS POSH DESKTOPS AND LAPTOPS THAT HAVE CREATED MAJOR CHANGES IN ENTERPRISE TECHNOLOGY. IT'S MOBILE.

By Aaron Levie, contributor
Steve JobsFORTUNE -- In 1997, Michael Dellfamously declared that if he were CEO of Apple (AAPL), he would close shop and return the money to shareholders. Steve Jobs has had plenty of reasons to gloat since then, but even just a decade ago, Apple was a footnote in the story of modern computing. Despite the company's comeback success with the iMac, the vast majority of 'knowledge workers' still relied on their staid WinTel (Windows + Intel (INTC)) platform, with the occasional marketer, designer or developer opting for Apple's sleeker products. Naturally, Windows PCs were also the familiar, mainstream choice for our personal lives. And so it seemed that Apple would be relegated to devices for the hip digital consumer and creative elite.
But right when we thought we had Apple's place in the market pegged, they changed the world... with a phone. The iPhone's revolutionary combination of powerful apps, full web browsing, and all the media you could consume created an entirely new mobile experience for consumers and workers alike. Apple fed its newfound momentum with a deluge of subsequent products, ranging from updated iMacs to the Macbook Air. And with the iPad, Apple changed the world yet again only 36 months later. Fast forward to today, and Apple sits in the computer world's top position of power, controlling developers, devices, consumers, and much of the industry's overall direction.
Maybe its biggest impact of all, however, was one that Apple didn't necessarily intend.
For the better part of twenty years, Microsoft (MSFT) and a handful of other enterprise behemoths pretty much dominated the vertical stack of solutions that are core to the Fortune 500 and beyond. But if you ask around, not too many individuals or IT leaders are happy about this hegemony. Workers are quickly recognizing the stark contrast between the computing that occurs in their personal lives and the business status quo. In turn, they're bringing their own devices and apps to work, driving the emergence of an all-new technology landscape. This landscape isn't being targeted by Apple in any real way; the complexity, scale, security, and nuances of serving enterprises – not to mention the inherent need to work with all the major (non-Apple) platforms enterprises use – tend to keep Apple from building for this market. But even without making any direct enterprise play, Apple has had a profound influence on technology with its latest string of successes and by raising our standards along the way.
So while Apple isn't intentionally leading an enterprise technology revolution, its products are nonetheless catalyzing one. For instance, 88% of the Fortune 100 are testing or deploying applications on the iPhone last year. The downstream effect of more iPhones and iPads in the enterprise is more sales of Apple's flagship products, with Mac worldwide sales growing by nearly over 28% year over year – as Tim Cook, Apple's COO, puts it, "iPad clearly seems to be creating a halo effect for the Mac."
Why does this matter? Well, once an enterprise adopts iPhones, iPads, and Macs en masse (as they continue to, judging by Apple's most recent quarter), or even Android devices for that matter, many of the existing applications – be it a communication tool from IBM (IBM), or collaboration from Microsoft – serve less productive purposes given the new way people are working. The toolset today's workers interact with on an ongoing basis is experiencing a wholesale transition – a transition that's introducing us to the iEnterprise.
Take, for instance, Procter & Gamble (PG), who came to Box.net in 2008 looking for a solution that could help employees connect to and collaborate on their content remotely, when no existing vendor would suffice. Fast-forward to 2011, and they're now deploying Box cloud content management to 18,000 individuals, in large part due to the proliferation of new platforms and devices that have emerged in just the past couple of years. The same story is true for businesses of all sizes and industries, ranging from Pandora (P) to Dole. It's why we've seen adoption in 73% of the Fortune 500. And we're clearly not the only ones benefiting from and driving this dramatic evolution of needs and demands in the enterprise.
The iEnterprise isn't, as the moniker suggests, about enterprises that just implement products designed in Cupertino. It's about a fundamental change in how our enterprise technology is supported, adopted, and consumed. It's about the technology in our personal lives influencing and changing expectations in our professional lives. The iEnterprise isn't necessarily the convergence of the tools we use in these two worlds, but rather the consistency of ideals.
While Steve Jobs introduces new products with words like "delightful" and "amazing," this vocabulary is nonexistent within the enterprise software set. There are a number of reasons for this. There's often a lack of passion, and even a bit of apathy, that shows in the final product. Applications and services feel bloated and uninspiring. The apps and hardware that we spend most of our waking hours with - and the most money on - tend to be the most complex, clunky, and unnerving.
But like Apple, the iEnterprise is about vendors building technology that excites and surprises users. It's about solutions that work together, and about open ecosystems. It's about marketplaces that compete to win, and innovate to compete – a major break from the status quo, where vendor lock-in enables long cycles of limited product enhancements, simply because the customer has nowhere else to go (Redmond, ahem).
We're especially seeing it show up in the changing mobility of our enterprise offerings. Mobility used to be defined by quick and easy access to email or a conference call, led by Blackberry in the '90s and early '00s. The iPhone and iPad took this much further, and dozens of popular Android devices are now even making their way into large corporations. We're further seeing it with HP (HPQ) and its WebOS platform. Businesses can enable access to critical data, projects, or content through services like Salesforce and Roambi, Basecamp and Yammer, or Box, respectively.
The iEnterprise is also about broadly useful, powerful platforms that connect and become enhanced through integration: cloud-delivered applications like Salesforce (CRM) to run your sales organization will connect to your business information on Box or HR information on Workday; Netsuite will plug into your social software from Yammer; GoodData will help visualize your client community results from GetSatisfaction; and Assistly plugs your customer support flow into Google Apps, which wraps all of this up in a robust marketplace for businesses. The mixing and matching of services that's common in our personal lives is now extending to the enterprise, and in turn driving vastly more open solutions that are changing the enterprise landscape.
No, the Windows franchise isn't going anywhere. Inertia alone gives Microsoft another decade as the de facto enterprise operating system and software provider. With minimal innovation this could be extended even longer, but Apple has already made a profound impact by pushing us to rethink technology's role in our lives. It's changing the whole industry, and will have a lasting impact on our businesses.
We have higher and more pronounced expectations for how technology can transform our personal lives – and now our business lives, making us more productive and connected than ever before. Welcome to the iEnterprise.
--Aaron Levie is the CEO and co-founder of Box.net.
Link to original article

Hackers Shift Attacks to Small Firms

Recent hacking attacks on Sony Corp. and Lockheed Martin Corp. grabbed headlines. What happened at City Newsstand Inc. last year did not.
Unbeknownst to owner Joe Angelastri, cyber thieves planted a software program on the cash registers at his two Chicago-area magazine shops that sent customer credit-card numbers to Russia. MasterCard Inc. demanded an investigation, at Mr. Angelastri's expense, and the whole ordeal left him out about $22,000.
Clayton Hauck for The Wall Street Journal
Joe Angelastri, owner of City Newsstand in the Chicago area, is out $22,000 because cyber hackers attacked his stores' payment system.
His experience highlights a growing threat to small businesses. Hackers are expanding their sights beyond multinationals to include any business that stores data in electronic form. Small companies, which are making the leap to computerized systems and digital records, have now become hackers' main target.
"Who would want to break into us?" asked Mr. Angelastri, who says the breach cut his annual profit in half. "We're not running a bank."
With limited budgets and few or no technical experts on staff, small businesses generally have weak security. Cyber criminals have taken notice. In 2010, the U.S. Secret Service and Verizon Communications Inc.'s forensic analysis unit, which investigates attacks, responded to a combined 761 data breaches, up from 141 in 2009. Of those, 482, or 63%, were at companies with 100 employees or fewer. Visa Inc. estimates about 95% of the credit-card data breaches it discovers are on its smallest business customers.
Hacking at small businesses "is a prolific problem," says Dean Kinsman, a special agent in the Federal Bureau of Investigation's cyber division, which has more than 400 active investigations into these crimes. "It's going to get much worse before it gets better."
Hackers are expanding their sites beyond big companies to include any business that stores data in electronic form. For small businesses, the impact could be crippling. Geoffrey Fowler reports for the Wall Street Journal.
In the time it takes to break into a major company like Citigroup Inc., a hacker could steal data from dozens of small businesses and not get detected, says Bryce Case Jr., a former hacker who broke into several government and corporate websites a decade ago and now runs an online message board for hackers called Digital Gangster. Now that small companies use computers, "the juice has become worth the squeeze," he says. "Even a pizza place has addresses, names and credit-card information."
Mr. Case, now a consultant in Colorado Springs, Colo., who helps small businesses identify security problems, has a trick for showing clients just how weak their systems are. He sometimes calls employees pretending to be a tech-department worker or consultant doing work for the boss and convinces them to tell him their passwords. "All you have to do is get a hold of one not-so-competent person and you're in," he says.
[HACK_p1]
The fact that there are so many types of security threats makes it difficult for small firms to protect themselves. In April, the FBI issued an alert about a style of attack in which hackers steal a business's online banking login details and use them to transfer funds out of the business's account. That's what happened to Lease Duckwall just after 1 p.m. on Nov. 2, when someone logged into his company's bank account for Green Ford Sales Inc. in Abilene, Kan. The hacker added nine new employees to the car dealership's payroll and transferred $63,000 to them.
Mr. Duckwall learned about the transfers at 7:45 a.m. the next day. He called his bank, which froze the funds in six cases. But three payments had already been withdrawn by the recipients and the cash wired offshore.
"I don't have a clue" how or why his company was targeted, says Mr. Duckwall, who is still out about $22,000.
The costs of a breach can put a small company out of business. In 2006 and 2007, a Bellingham, Wash., restaurant called Burger Me LLC had its computerized cash register hacked. Criminals made untold numbers of fraudulent charges on customer credit cards.
After the incident, a credit-card company shut down Burger Me's account and put a hold on thousands of dollars in incoming payments, says Rich Griffith, its former owner. By late 2008, fees and lost business from not being able to accept credit cards put Mr. Griffith in so much debt—$12,000 for investigation and remediation costs alone—that he closed his formerly break-even burger joint.
The cyber attack "cost me my dream," says Mr. Griffith, 47 years old. The hacker who stole the data was never identified.
Financially motivated attacks typically rely on computer code that hackers plant on victims' computers, often as attachments or links in emails sent to employees. While these malicious programs are well known to security experts, hackers tweak them frequently enough to render them undetectable to antivirus software.
Bigger companies, while not immune, generally do a better job of protecting themselves. AT&TInc., for example, has a command center with giant screens that track all the traffic on its network. Other large companies mine data for warning signs, taking note when an employee swipes an identity badge in New York only to log onto the network from California, for instance.
Smaller companies are less likely to grasp the security threat. A 2010 survey by the National Retail Federation and First Data Corp. of small- and medium-size retailers in the U.S. found that 64% believed their businesses weren't vulnerable to card data theft and only 49% had assessed their security safeguards.
One of the most common styles of attack on small businesses targets credit-card information that a hacker can sell or use to make fraudulent purchases. To gird against this, the major credit-card companies in 2006 formed an industry group called the Payment Card Industry Security Standards Council, which establishes minimum technical protections for businesses that accept credit cards.
While credit-card companies require all businesses that accept their cards to comply with those standards, known as PCI, they have few measures to enforce them for small businesses. Bob Russo, general manager of the PCI Council, says many small businesses neglect basic security measures such as changing default passwords.
Mr. Angelastri's case shows how even a business that tries to protect itself can fall victim to hackers.
A Chicago native, Mr. Angelastri, 52, started his company in 1978 when he bought out the small street corner newsstand he started working at after high school. Over the years, he grew his business to two 1,500-square-foot locations in Chicago and Evanston, Ill., carrying more than 5,000 different magazines.
City Newsstand didn't have a computer technician on staff. But Mr. Angelastri had decades of experience with computers after converting to a computer-based cash register in 1990. That first computerized register, known as a point-of-sale, or POS, system, wasn't hooked into the Internet. Every time it needed to process a credit card, it would use a telephone modem to log into the bank.
Four years ago, he upgraded to a now-standard Microsoft Corp. Windows PC that connected directly to the Internet. Mr. Angelastri didn't ignore security. He regularly updated the payment software on his computer to keep up with the latest standards. About two years ago, he got a local technology contractor to install a payment processing system called PC Charge, made byVeriFone Systems Inc.
On April 14, 2010, he received an email from Accelerated Payment Technologies Inc.'s X-Charge, a sales agent for his credit-card processor, saying MasterCard had identified "some sort of breach or compromise" within his system. It didn't specify what, and asked him to fill out a questionnaire and return it within two weeks.
Mr. Angelastri checked his systems and called in an outside technology consultant. That investigator found one problem on his computer—a piece of hacking software known as malware—which the investigator removed. Still, X-Charge kept forwarding him emails between MasterCard and a payment processor called Global Payments Inc. that suspected fraud.
After a sixth email warning in June 2010, Mr. Angelastri says MasterCard demanded he hire a forensic investigator to do a thorough review of his system, essentially a digital version of the investigations that police often conduct at crime scenes. Mr. Angelastri hired Chicago-based Trustwave Inc.
A Trustwave investigator worked at Mr. Angelastri's newsstand until 2 a.m. one morning looking for cyber clues as to how his system might be leaking credit cards to hackers.
The investigator discovered a program called Kameo was capturing everything that came into Mr. Angelastri's system before it even reached the PC Charge payment software. Kameo was exporting that information over the Internet, giving hackers credit-card numbers, customer names and other details.
It turned out the hackers had been lurking in his system since April 15, 2009. They had gained access to Mr. Angelastri's computer through a program he used to periodically access his technology system from outside the shop. The program could be used by anyone who knew the password, and he had picked an especially weak one: "pos," a common nickname for the cash-register software that was also the system's user name.
Bob Cortopassi, Accelerated Payment Technologies' compliance security officer, said the breach happened because of a "lack of basic security requirements" and isn't the fault of its payment system. MasterCard declined comment on Mr. Angelastri's case, and Global Payments declined to comment.
Security experts say hackers routinely scan the Internet for computers configured this way. Such searches are fast and easy, and often the computers they find have weak passwords.
The hack on Mr. Angelastri's newsstand highlights another murky area of cyber attacks. The people whose information is stolen often are never informed, despite varying state laws that require breached organizations to notify them.
Small businesses like City Newsstand don't typically record the names and contact information of their customers and payment-card companies discourage businesses from keeping credit-card data. Mr. Angelastri never learned exactly which of his customers were affected, or how many.
Many small businesses complain they get little support from law enforcement or the credit-card industry once they are hit. After the investigation, Mr. Angelastri sent the report back to his credit-card processing company. It demanded he improve his technology, including installing a new higher-grade firewall. He also cut off access to the open Internet for the computers with the cash register software. Now all they can do is pass information to the credit-card processor.
Mr. Angelastri says he is still paying off the $22,000 he spent on the investigations and security improvements. City Newsstand has thin margins, he says, on about $1 million in annual sales.
He reported the incident to the Chicago and Evanston police, but he never followed up. A spokesman for the Evanston Police Department said the department only has jurisdiction to look into crimes committed in the city, which it defines based on where the hacker is located. The Chicago Police Department didn't respond to a request for comment.
Mr. Angelastri also spoke a few times with the Secret Service, the federal entity charged with investigating hacking attacks, but he says that investigation didn't go anywhere. The Secret Service declined to comment.
Mr. Angelastri still doesn't know who attacked his system, but the hackers left some clues. Trustwave's investigation found that a Yahoo email address was receiving the data being collected by the hacker's malware. A message sent to that address by The Wall Street Journal wasn't returned. Yahoo said it doesn't comment on individual account holders.
The data also was being sent to an Internet server in Russia hosted by a Russian hosting company called FirstVDS, according to the investigation.
Aleksandr Belykh, the head of the abuse department of FirstVDS, said the user of the virtual server identified in the City Newsstand investigation is Russian, and his firm hadn't received any complaints about it. The company shut the account down in June after its owner failed to pay the bill. Mr. Belykh wouldn't disclose other details.
Mr. Angelastri still marvels that his business was attacked at all. "We thought there would be very little chance that somebody would come into a business of our size to pull off something like this," he says.
—Nonna Fomenko contributed to this article.
Link to original article