Connect with us

Serious Software

CeBIT: Fujitsu goes large on Cloud

Published

on

At this week’s CeBIT fair, live from the SaaSifaction Factory, Fujitsu Siemens is helping companies move to the cloud with over 40 of its cloud-enabled software applications.

At CeBIT, Fujitsu is lifting software companies into the cloud, live from the SaaSification Factory on the Fujitsu booth in Hall Two.

Independent software vendors looking to get into the cloud and target new customers in global markets have given an overwhelmingly positive response to Fujitsu’s recruitment drive for its Business Solutions Store. Live workshops at CeBIT are five-times oversubscribed and more than 40 cloud-enabled software applications are already available in the Business Solutions Store. Announced late last year, the store proves that Fujitsu is executing on its vision of making the world of cloud-based solutions available to business of all sizes.

The Fujitsu Business Solutions Store already features a range of business applications, offered worldwide on a pay-as-you-use basis: end customers can switch to a pay-as-you-use model and escape from lock-in to software licensing models and regular maintenance payments.

Business benefits

Fujitsu is cloud-enabling applications for diverse business areas such as customer relationship management, document management, archiving, ERP solutions, infrastructure security and further business process intensive apps, such as HR systems.

As Fujitsu is not tied down by these legacy software licensing models, it is moving faster in the market than competitors to build out its Business Solutions Store. Fujitsu uniquely is offering software companies an innovative revenue-sharing and partnership model, backed by its billion dollar-plus investment in cloud computing.

By partnering with Fujitsu, the benefit for software houses is being able to offer software to new customers, worldwide, via the Fujitsu Business Solutions Store ‚ without upfront investment and without risk.

As a result of the response from software companies to its SaaSification initiative, Fujitsu has already expanded resources to help more vendors bring their software into the cloud. First statistics released by Fujitsu confirm that most companies succeed in integrating existing software into Fujitsu’s Global Cloud Platform within days of starting the Business Solutions Store uplift program. As a result, partners can open up new global business opportunities and revenue streams from customers who previously were too difficult or costly to reach.

Cloud-enablement live at CeBIT

At CeBIT, software companies that are interested in the benefits and process of reaching new customers via the FujitsuBusiness Solutions Store can learn more by visiting Fujitsu in Hall 2, Booth B52, where the Fujitsu SaaSification Factory is running live cloud-enablement sessions.

Underlining Fujitsu’s Rapid Cloud Integration guarantee, the workshops demonstrate how independent vendors can complete the uplift of their software to the cloud within a few business days. An early partner, German software firm BBL Software is already migrating its customers to the new cloud platform, as it moves away from legacy, license-based software. Saperion, a SaaSification Factory participant, targets online availability of its applications during CeBIT.

At CeBIT, representatives will be on hand from four companies to share their experience in already uplifting their software to the Fujitsu Business Solutions Store. Spokespeople from CIL of Portugal, German firms Apexnova, BBL Software and security software firm SSP will explain how the process of full commercial integration worked from the perspective of a software vendor.

Supporting quotes

Herbert Loerch, Chief Executive Officer at Saperion AG

‚The Business Solutions Store from Fujitsu is a fully-functional cloud ecosystem, and far more than just a marketing front-end with a link to our web site. Partnering with Fujitsu to bring our software to the cloud means we can focus on our core expertise of ECM Web Content Archiving. We have the peace of mind that Fujitsu is taking care of the entire cloud business services ecosystem, including online billing, payment collection, hosting and an online sales channel. This is priceless for any software vendor.‚

Andre Kiehne, Vice-President Cloud at Fujitsu Technology Solutions

‚Fujitsu continues to outpace the industry in creating a world-class marketplace for business software in the cloud. Software businesses of all sizes have recognized the huge competitive advantage that Fujitsu is providing and have shown a great deal of interest in partnering with Fujitsu to get their software on to the Business Solutions Store.

‚At CeBIT, the Fujitsu SaaSification Factory cuts through industry ‚cloud wash’ by delivering very visible proof of progress as we populate the Business Solutions Store: a new Cloud ecosystem that enables software houses to enter the era of cloud computing, to deliver the services that today’s customers demand. What software houses find most attractive is the ease of transition, plus the way we have removed the cost and risk barriers. The hugely positive industry response clearly validates that we’re taking an early lead in revolutionizing how software is consumed by businesses of all sizes.‚

*

Continue Reading

Featured

Scammers cleaning up with gullible computer users

Published

on

Kaspersky experts have detected a two-fold rise in the number of users being attacked with fake system cleaners – fraudulent programmes designed to trick users into paying for alleged serious computer issues to be fixed. The number of users hit reached 1,456,219 in the first half of 2019, compared to just 747,322 for the same period in 2018. During this time, some of the attacks have become more sophisticated and dangerous.

A slow-working or poorly performing computer is a common complaint among PC users, and there are many legitimate tools available to solve such issues. However, alongside genuine system cleaners, there are fake ones developed by fraudsters that are designed to trick users into believing their computer is in critical danger, for example through memory overload, and needs immediate cleaning. The attackers then offer to provide such a service in return for payment. Kaspersky defines and detects such programmes as ‘hoax system cleaners’.

Upon receiving user permission and payment, the fraudsters install the hoax programmes that claim to clean the PC, but which often either do nothing or install adware – an annoying, but not critical, storm of unsolicited advertising – on the computer. Increasingly, however, the cybercriminals are using the installation of hoax cleaners to download or disguise malware such as Trojans or ransomware.

The countries most affected by attacks with hoax cleaners in the first half of 2019 show how geographically widespread the threat is; leading the list is Japan with 12% of affectedusers, followed by Germany (10%), Belarus (10%), Italy (10%) and Brazil (9%).

“We’ve been watching how the phenomenon of hoax cleaners has been growing for the last couple of years, and it is a curious threat. On the one hand, many samples that we have seen are spreading more widely and becoming more dangerous, evolving from a simple ‘fraudulent’ scheme into fully functioning and dangerous malware. On the other hand, they are so widespread and seemingly innocent, that it is much easier for them to trick users into paying for a service, rather than frightening them with screen blockers and other unpleasant malware. However, these two ways end up with the same results with users losing their money,” says Artemiy Ovchinnikov, security researcher at Kaspersky.

Kaspersky detects hoax system cleaners as:

Hoax.Win32.PCFixer.*

Hoax.Win32.PCRepair.*

Hoax.Win32.DeceptPCClean.*

Hoax.Win32.Optimizer.*

Hoax.MSIL.Optimizer.*

To avoid falling victim to hoax threats, Kaspersky researchers advise users to:

  • Always check that the PC services that you are about to adopt are legitimate and easy to understand. If it sounds confusing, use a search engine to find out more about the service as there may be a more detailed explanation available
  • Use a reliable security solution for comprehensive protection with a clean-up function for a wide range of threats and PC cleansing, such as Kaspersky Security Cloud.
  • If you are purposely looking for a PC cleaner, use reliable, IT-targeted sources of information for recommendations, with a long-built reputation and software reviews.

Read the full report on Kaspersky Daily.

Continue Reading

Featured

Trend Micro unveils security suite for Azure in Africa

Published

on

Cybersecurity leader Trend Micro Incorporated has announced highly optimised security solutions for Microsoft Azure workloads for customers in sub-Saharan Africa.

The Trend Micro Deep Security suite takes into consideration that a customer needs to approach cloud security differently than one would traditional security. As a result, it is fully optimised for Microsoft Azure. The suite ensures that a customer can tap into a solution that provides flexible, scalable protection of operating systems, applications, and data without slowing you down.

“Microsoft is an important partner to Trend Micro and as a result we have built a series of technologies that support their position in the cloud,” says Indi Siriniwasa, vice president at Trend Micro Sub-Saharan Africa. “Our security solutions are uniquely optimised for Microsoft Azure and complement Microsoft Azure Security Centre so customers across the world continue to turn to Trend Micro to help better secure their Azure real estate. With Microsoft Azure now available from new cloud regions in South Africa, customers can rest assured that we support the use of Microsoft to streamline provisioning of security for Windows virtual machines and SharePoint workloads. 

“This will help customers to ensure that their security follows them from their physical environment to the cloud and back again, customers can automate security with Microsoft PowerShell scripting to streamline provisioning of security for Windows virtual machines and SharePoint workloads plus many other orchestration tools for Azure, including Chef, Puppet, and RightScale, we can also help clients to better automate security control deployments.”

With Deep Security for Azure, businesses can detect and protect against intrusions as well as protect their business against serious vulnerabilities with intrusion detection and prevention (IDS/IPS). The solution will also help uncover suspicious changes to a system and immediately highlight and alert the business to these activities – without security admins having to manually sort through logs.

It also has the ability to keep malware off of workloads by using predictive machine learning mechanisms to detect unknown threats and prevalent attacks, so that a user can identify and then remove malware and blacklist domains known to be command-and-control (C&C) servers. Customers can also stop applications attached with IPS rules that block XSS or SQL attacks and other serious vulnerabilities until systems can be patched, as well as increase application visibility and control.

A particularly relevant feature within the South African context is that Deep Security is able to speed up a client’s route to PCI DSS compliance. The Deep Security solution allows a client to meet multiple PCI requirements with a single product, including intrusion detection and prevention, file integrity monitoring, and log inspection.

“Trend Micro’s integration with Microsoft Azure reduces the dependence on multiple point security tools, helping you to identify and address security and configuration issues quickly,” says Adwait Joshi, director, Azure Product Marketing at Microsoft Corp.

Trend Micro provided the following information:

Trend Micro’s Deep Security currently secures more servers globally than any other solution and specialises in protection for cloud and virtualised workload. It acts as part of the Trend Micro Hybrid Cloud Security solution, powered by XGen and provides comprehensive, flexible security for Azure workloads in a single product, so you can build new applications or move existing resources to the cloud with confidence.

Deep Security protects workloads by:

  • Defending against network threats with intrusion detection and prevention (IDS/IPS)
  • Immediately protecting against vulnerabilities like Shellshock and Heartbleed
  • Keeping malware off Windows and Linux workloads
  • Alerting when unplanned or suspicious changes are made to systems
  • Stopping SQL injection and XSS attacks on applications
  • Gaining visibility and control of elastic workloads with application control that fits DevOps

Local Trend Micro customers can also turn to the company’s Trend Micro Cloud App Security which is directly integrated into Office 365 via APIs. This includes advanced email protection, as well as compliance on third-party cloud file sharing services such as: Box, Dropbox, Google Drive, SharePoint Online, and OneDrive for Business.

Continue Reading

Trending

Copyright © 2020 World Wide Worx