|By Marketwired .||
|July 22, 2014 04:05 PM EDT||
SAN JOSE, CA--(Marketwired - July 22, 2014) - Quantum Corp. (NYSE: QTM) today announced the integration of the FireEye Network Forensics Platform (PX) with Quantum's StorNext® scale-out storage. Combining high-speed packet indexing and search from FireEye (NASDAQ: FEYE) with scale-out storage from Quantum, the joint solution provides organizations with access to months of network traffic data to quickly conduct incident response in the event of a breach.
Threat groups are active in an organization's network for a median of 229 days, and conducting incident response can involve costly forensic analysis of disparate log files and network data to determine the extent of the breach. In certain instances, organizations without robust network forensics may never fully know what data left the network, how they were compromised, or whether they have fully removed the threat actor.
The joint FireEye-Quantum solution utilizes the FireEye Network Forensics Platform to capture, index and store connection and packet information at up to 30 million packets per second. Quantum's StorNext 5, the industry's fastest streaming file system, provides the high-performance, scale-out storage repository for forensic data generated by the FireEye platform along with policy-based tiering that enables organizations to match the cost of storage to their need for data access during forensic analysis.
This ability to capture network traffic data in real-time and preserve it for network forensics is critical to resolving a cyber attack. Examining full packet data allows investigators to understand attackers' tools, techniques and procedures, enabling them to improve their network defenses and assist others via threat intelligence sharing. According to the Ponemon Institute, incident response takes approximately four months, on average, to resolve an attack. In contrast, by allowing organizations to keep forensic data longer and examine it faster, the joint FireEye-Quantum solution is designed to give incident response teams the ability to resolve attacks in much less time -- as little as days or hours.
Jon Oltsik, senior principal analyst, Enterprise Strategy Group
"As the sophistication of cyber attacks increases, the ability to analyze the intrusion, contain it, and quickly recover is more critical than ever. By combining their respective expertise with FireEye network forensics and StorNext storage workflows, FireEye and Quantum are offering customers an integrated cybersecurity solution for incident investigation, which can also reduce mean time to resolution and prevent future incidents."
Tim Sullivan, vice president, Enterprise Forensics, FireEye
"We know today the overwhelming majority of organizations have some malicious code in their networks. Given this, what's most important is the ability to understand how that malicious code behaved and if threat actors were able to remove any valuable information from a network. The joint solution from FireEye and Quantum provides customers with the storage, indexing and search capabilities to create a detailed forensics report so an incident response team can quickly determine the extent of a data breach to remediate and provide a detailed report to protect against future attacks. It also provides the reassurance that company boards are looking for and should be a core part of the modern security infrastructure."
Geoff Stedman, senior vice president, StorNext Solutions, Quantum
"Network forensics is becoming an increasingly important tool for cyber incident response, and effective network forensics workflows have two essential ingredients: high-speed packet indexing and highly scalable storage for preserving the network traffic data. Through our partnership with FireEye, a broader range of customers can now benefit from Quantum's expertise in information workflows and StorNext's unique combination of industry-leading performance and scale-out tiered storage."
The combined FireEye-Quantum solution is currently available.
- For a solution brief outlining the FireEye-Quantum approach to network forensics challenges, go to http://qntm.co/cybersecuritybrief
- For more information about the joint FireEye-Quantum approach to network forensics, go to: www.quantum.com/cybersecurity
Quantum is a leading expert in scale-out storage, archive and data protection. Its StorNext 5 solutions power modern workflows, enabling high-performance, real-time collaboration and keeping content readily accessible for future use and re-monetization. More than 100,000 customers have trusted Quantum to address their most demanding content workflow needs, including top studios, major broadcasters and new, cutting-edge content creators. With Quantum, customers can Be Certain™ they have the end-to-end storage platform to manage assets from ingest through finishing, and into delivery and long-term preservation. See how at www.quantum.com/customerstories.
Quantum, the Quantum logo, Be Certain and StorNext are either registered trademarks or trademarks of Quantum Corporation and its affiliates in the United States and/or other countries. All other trademarks are the property of their respective owners.
"Safe Harbor" Statement: This press release contains "forward-looking" statements. All statements other than statements of historical fact are statements that could be deemed forward-looking statements. Specifically, but without limitation, statements relating to 1) customer benefits and value to customers from using the joint FireEye-Quantum solutions, including Quantum's StorNext solutions and 2) customer demand for and Quantum's future revenue from such solutions, are forward-looking statements within the meaning of the Safe Harbor. All forward-looking statements in this press release are based on information available to Quantum on the date hereof. These statements involve known and unknown risks, uncertainties and other factors that may cause Quantum's actual results to differ materially from those implied by the forward-looking statements. These risks include operational difficulties, unforeseen technical limitations, unexpected changes in market conditions and unanticipated changes in customers' needs or requirements, as well as the risks set forth in Quantum's periodic filings with the Securities and Exchange Commission, including, but not limited to, those risks and uncertainties listed in the section entitled "Risk Factors," in Quantum's Annual Report on Form 10-K filed with the Securities and Exchange Commission on June 6 2014, especially those risks listed in this section under the heading "Our operating results depend on a limited number of products and on new product introductions, which may not be successful, in which case our business, financial condition and operating results may be materially and adversely affected." Quantum expressly disclaims any obligation to update or alter its forward-looking statements, whether as a result of new information, future events or otherwise.
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
Oct. 23, 2016 10:30 AM EDT Reads: 1,442
"Avere Systems is a hybrid cloud solution provider. We have customers that want to use cloud storage and we have customers that want to take advantage of cloud compute," explained Rebecca Thompson, VP of Marketing at Avere Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Oct. 23, 2016 10:00 AM EDT Reads: 3,996
Apache Hadoop is a key technology for gaining business insights from your Big Data, but the penetration into enterprises is shockingly low. In fact, Apache Hadoop and Big Data proponents recognize that this technology has not yet achieved its game-changing business potential. In his session at 19th Cloud Expo, John Mertic, director of program management for ODPi at The Linux Foundation, will explain why this is, how we can work together as an open data community to increase adoption, and the i...
Oct. 23, 2016 09:45 AM EDT Reads: 1,871
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Oct. 23, 2016 09:45 AM EDT Reads: 781
The Internet of Things (IoT), in all its myriad manifestations, has great potential. Much of that potential comes from the evolving data management and analytic (DMA) technologies and processes that allow us to gain insight from all of the IoT data that can be generated and gathered. This potential may never be met as those data sets are tied to specific industry verticals and single markets, with no clear way to use IoT data and sensor analytics to fulfill the hype being given the IoT today.
Oct. 23, 2016 09:45 AM EDT Reads: 2,471
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service.
Oct. 23, 2016 09:45 AM EDT Reads: 1,007
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Oct. 23, 2016 09:30 AM EDT Reads: 3,811
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of So...
Oct. 23, 2016 09:30 AM EDT Reads: 2,118
SYS-CON Events announced today that StarNet Communications will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. StarNet Communications’ FastX is the industry first cloud-based remote X Windows emulator. Using standard Web browsers (FireFox, Chrome, Safari, etc.) users from around the world gain highly secure access to applications and data hosted on Linux-based servers in a central data center. ...
Oct. 23, 2016 09:15 AM EDT Reads: 2,061
SYS-CON Events announced today that eCube Systems, the leading provider of modern development tools and best practices for Continuous Integration on OpenVMS, will exhibit at SYS-CON's @DevOpsSummit at Cloud Expo New York, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. eCube Systems offers a family of middleware products and development tools that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
Oct. 23, 2016 09:00 AM EDT Reads: 4,454
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Oct. 23, 2016 08:30 AM EDT Reads: 1,336
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
Oct. 23, 2016 08:15 AM EDT Reads: 4,421
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
Oct. 23, 2016 08:00 AM EDT Reads: 8,325
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr...
Oct. 23, 2016 08:00 AM EDT Reads: 5,675
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Oct. 23, 2016 07:00 AM EDT Reads: 4,103