companies

TOKYO, JAPAN — Internet Solutions of South Africa, the leading pan-African telecommunications services provider, which is a subsidiary of NTT Group’s Dimension Data and NTT Communications Corporation (NTT Com), the ICT solutions and international communications business within the NTT Group (TYO: 9432) announced today that they have concluded a partnership, in order to deliver NTT Com’s Nexcenter™ data center service in the African continent. The partnership was signed in South Africa on November 27.

As a result of this partnership, the enterprise customers in Asia, Europe and the United States, expanding their business into South Africa will be able to utilize high quality data center services, and South African enterprise customers heading their business globally will be able to utilize NTT Com’s over 140 data centers delivered over 20 countries/regions worldwide.


The colocation market in South Africa has recently experienced average growth of 12% per year as a result of increasing demand by government agencies and content service providers. As a result of this partnership, NTT Com and Internet Solutions will launch colocation services in December of this year under the Nexcenter™ brand at Internet Solutions’ Parklands data center in Johannesburg. The data center will deliver globally-standardized Nexcenter™ service meeting more than 300 standards governing facilities and operations.

The Nexcenter™ certified “Parklands Data Center” is located in the heart of Johannesburg’s main business district, around 30 minutes by car from O.R. Tambo International Airport. The building houses approximately 1,900 square meters of server room facilities over four floors, and provides 1.3 MW of standby battery power. Emergency generators provide power redundancy to a 2N level, and have a fuel capacity that allows for 45 hours of uninterrupted operation. The air conditioning facilities offer cooling system redundancy to N+1 level, and the building’s network topology incorporates an internet exchange (IX) point, improving routing efficiency and fault tolerance. The facility is built to meet TIA942 Tier 3, SOC2 Type2, Type1 and ISO27001 standards. It is planned to expand the building through the addition of a new tower wholly designed by the facility standards of Nexcenter™ to provide 570 high density racks with 2.2 MW power in July 2018.

Saki Missaikos, Managing Director of Internet Solutions, says “Internet Solutions is pleased to join this international network of top-standard data centres. As the first Nexcenter™ location in Africa, we present attractive service and technological capability to multinational companies looking to expand into the region.”

In addition to continuing to build its own data centers, NTT Com will further expand the geographical availability of Nexcenter™ through collaboration with its worldwide partners, allowing it to continue supporting its customers’ global business expansion.

About NTT Communications Corporation
NTT Communications provides consultancy, architecture, security and cloud services to optimize the information and communications technology (ICT) environments of enterprises. These offerings are backed by the company’s worldwide infrastructure, including the leading global tier-1 IP network, the Arcstar Universal One™ VPN network reaching over 190 countries/regions, and over 140 secure data centers worldwide. NTT Communications’ solutions leverage the global resources of NTT Group companies including Dimension Data, NTT DOCOMO and NTT DATA.

About Internet Solutions
Internet Solutions (IS) is a pan-African telecoms service provider to public and private sector organisations that has been providing innovative end-to-end telco solutions and related services for more than 20 years. At the forefront of Internet Protocol-based technologies, IS builds solutions and services tailored to the increasingly complex demands of organisations across the enterprise, public sector, global carrier and growing small-to-medium business sectors. As a wholly-owned subsidiary of the Dimension Data Group and part of NTT, IS leverages its infrastructure and global footprint to support organisations with the rapid deployment of emerging technologies. More information at www.is.co.za.

Read more

Filed under Web Hosting News by on #

Marlborough, MA and London, UK – Organizations experienced an average of 237 DDoS attack attempts per month during Q3 2017 – equivalent to 8 DDoS attack attempts every day – as hackers strive to take their organizations offline or steal sensitive data, according to the latest DDoS Trends and Analysis report from Corero Network Security (LSE: CNS), a leading provider of real-time DDoS defense solutions.

The data, which is based on DDoS attack attempts against Corero customers, represents a 35% increase in monthly attack attempts compared to the previous quarter (Q2 2017), and a 91% increase in monthly attack attempts compared to Q1 2017.


Corero attributes this increase in frequency to the growing availability of DDoS-for-hire services, and the proliferation of unsecured Internet of Things (IoT) devices. For example, the ‘Reaper’ botnet is known to have already infected thousands of devices, and is believed to be particularly dangerous due to its ability to utilize known security flaws in the code of those insecure machines. Like a computer worm, it hacks in to IoT devices and then hunts for new devices to infect in order to spread itself further.

Ashley Stephenson, CEO at Corero, explains: “The growing availability of DDoS-for-hire services is causing an explosion of attacks, and puts anyone and everyone into the crosshairs. These services have lowered the barriers to entry in terms of both technical competence and price, allowing anyone to systematically attack and attempt to take down a company for less than $100. Alongside this trend is an attacker arms race to infect vulnerable devices, effectively thwarting other attackers from commandeering the device. Cyber criminals try to harness more and more Internet-connected devices to build ever larger botnets. The potential scale and power of IoT botnets has the ability to create Internet chaos and dire results for target victims.”

Sophisticated multi-vector attacks
In addition to the frequency of attacks, the Corero data reveals that hackers are using sophisticated, quick-fire, multi-vector attacks against an organization’s security. A fifth of the DDoS attack attempts recorded during Q2 2017 used multiple attack vectors. These attacks utilize several techniques in the hope that one, or the combination of a few, can penetrate the target network’s security defenses.

Ashley Stephenson continues, “Despite the industry fascination with large scale, Internet-crippling DDoS attacks, the reality is that they don’t represent the biggest threat posed by DDoS attacks today. Cyber criminals have evolved their techniques from simple volumetric attacks to sophisticated multi-vector DDoS attacks. Often lasting just a few minutes, these quick-fire attacks evade security teams and can sometimes be accompanied by malware and other data exfiltration threats. We believe they are often used in conjunction with other cyber-attacks, and organizations that miss them do so at their peril.

“The only way to keep up with these increasingly sophisticated, frequent and low volume attacks is to maintain comprehensive visibility and automated mitigation capabilities across a network, so that even everyday DDoS attacks can be instantly detected and blocked as they occur and before they cause damage.”

Ransom Denial of Service
Corero observed a return of Ransom Denial of Service, or RDoS, in Q3 2017. A widespread wave of ransom DDoS threats from hacker group, Phantom Squad, started in September, targeting companies throughout the US, Europe and Asia. The extortion campaign spanned a variety of industries – from banking and financial institutions, to hosting providers, online gaming services and SaaS organizations – and threatened to launch attacks on 30 September unless a Bitcoin payment was made.

Ashley Stephenson continues, “Ransom is one of the oldest tricks in the cyber criminal’s book, and with cryptocurrency, is an anonymous way for them to turn a profit. As IoT botnets continue to rise, we may soon see hackers put on more dramatic RDoS displays to demonstrate the strength of their cyber firepower, so that their future demands for ransom will have to be taken more seriously. Paying the ransom is rarely the best defense, as it just encourages these demands to spread like wildfire. It is proven that with proper protection in place to automatically eliminate the DDoS threat, organizations will be in a much stronger position.”

For access to the complete Corero DDoS Trends report, download it at: http://info.corero.com/DDoS-Trends-Report.html

About Corero Network Security
Corero Network Security is the leader in real-time, high-performance DDoS defense solutions. Service providers, hosting providers and digital enterprises rely on Corero’s award winning technology to eliminate the DDoS threat to their environment through automatic attack detection and mitigation, coupled with complete network visibility, analytics and reporting. This industry leading technology provides cost effective, scalable protection capabilities against DDoS attacks in the most complex environments while enabling a more cost effective economic model than previously available. For more information, visit www.corero.com.

Read more

Filed under Web Hosting News by on #

Giffords Law Center to Prevent Gun Violence sent letters to DreamHost and Shopify over the weekend, asking the hosting service providers to disable the GhostGunner.net and GhostGuns.com websites. The request comes in the wake of news that the mass murder in Tehama County, Calif., was carried out by an individual prohibited from owning guns with weapons he made from parts ordered online.
Giffords Law Center argues that because the guns sold on the two sites are illegal in some states, the businesses aid and abet violations of state laws by their customers, and therefore they can be shut them down for violating the service providers' Acceptable Use Policies and Terms of Service.
Weapons made without serial numbers — which are generally required by U.S. federal law — are known as "ghost guns," according to the announcement. Kits and parts sold by the websites can be assembled into semi-automatic handguns and assault weapons using 3-D printing and milling technology in a home workshop.
"The recent mass shooting in Northern California underscored how dangerous it is when people legally prohibited from owning guns can go online and buy do-it-yourself assault weapon kits from unaccountable companies with no background checks, and no questions asked," Adam Skaggs, Chief Counsel at Giffords Law Center said in a statement. "But companies like Ghost Gunner and Ghost Guns are profiting from doing just that. The Internet Service Providers hosting their
Read more

Filed under Web Hosting News by on #

NEW YORK, NY – Ubersmith, an INAP (NASDAQ: INAP) company and a global leader in subscription business management software, today launches a worldwide partner program designed to create revenue streams as more and more companies shift to cloud computing with subscription and recurring billing. To lead its partner program, Ubersmith has hired Jeremy Chang as head of business development.

“The time is right for us to formalize our relationships with these companies, so we’ve decided to invest in this global partner initiative as a key step in our next phase of growth,” said Kurt Daniel, president of Ubersmith. “Our goal is simple: Help our partners evolve their offerings to capitalize on usage-based billing opportunities in order to grow their businesses and expand their value to their customers. As head of business development, Jeremy will help us achieve this goal”


The partner program will open doors for technology, services and channel companies to build stronger relationships with their customers, expand their portfolios and boost margins.

“When talking with our existing base of partners, they are all looking for ways to transition their portfolio from support for traditional billing to subscription and recurring billing models that are based on consumption,” said Jeremy Chang, head of business development, Ubersmith. “We’re giving partners what they need to accelerate this transition so that together we are both stronger going to market helping customers with our complementary capabilities.”

Program Details
In the Ubersmith program, partners fall into three groupings: Technology, Services, Channel. Within each of those, there are three levels: Registered, Advanced, Premier. The program enables partners to increase their revenue and profit. In addition, partners will receive: sales and marketing support, including access to Ubersmith sales enablement resources; dedicated tech support; product education; exclusive product access; sales and marketing training; access to Ubersmith’s product and development organizations to influence future product offerings.

GlowTouch Technologies, with 1,200 people worldwide, is one of the Service partners. Vidya Ravichandran, president of GlowTouch said, “We are always adapting our portfolio to changing market dynamics and needs of our customers. As the market continues to move toward consumption-based billing models, Ubersmith, with its subscription business suite and customer customizations is well positioned to take advantage of this. We look forward to deepening our partnership with Ubersmith going forward.”

OnApp, with 3,500 cloud provider customers worldwide, is among the Technology partners. Ditlev Bredahl, CEO of OnApp, said: “With its enterprise-grade billing and customer management capabilities, Ubersmith is a popular choice for telcos and MSPs who build their clouds with OnApp. We’re looking forward to expanding our relationship with Ubersmith, and helping MSPs and telcos deliver the new subscription-based models that will drive their growth in cloud, CDN and other services.”

To see the initial list of partners and to apply for the program, go to https://ubersmith.com/partners.

About Ubersmith
Ubersmith is a global leader in subscription business management software for organizations of all sizes. The company’s suite of usage-based billing, quoting, order management, infrastructure management and help desk ticketing solutions is integrated, open and scalable. Hundreds of companies around the world rely on Ubersmith to better serve their customers, better run their businesses, shorten time-to-market and boost overall efficiency.

Read more

Filed under Web Hosting News by on #

CHICAGO, IL – Steadfast, a cutting-edge infrastructure and cloud solutions technology company in Chicago, announced the rollout of new Steadfast Sentinel Managed Security bundles that quickly and cost-effectively deliver security and assist with regulatory compliance for cloud and dedicated server environments.

Designed and built in collaboration between IT and security/compliance experts, these bundles package multiple managed security services into unique bundles categorized by organizational needs for basic infrastructure security or compliance with regulatory standards. With four bundles options—Core, PCI DSS, HIPAA, and FISMA—customers can easily choose a bundle that meets their security or regulatory requirements and have Steadfast deploy and manage with the added benefits of Steadfast’s industry-leading support.


“From conversations with customers, we realized that many companies either don’t have the time or expertise to design a truly reliable security platform for their infrastructure, or they cannot afford to purchase solutions from multiple vendors,” stated Karl Zimmerman, CEO and founder of Steadfast. “We designed these bundles so that SMB customers could simply choose a managed security package with the enterprise-level capabilities they need and let us take care of everything else–all for one low monthly cost.”

By combining the Steadfast Sentinel Managed Security bundles with Steadfast cloud and dedicated server offerings, Steadfast now introduces one of the most secure, yet cost-efficient cloud platforms in the marketplace for small-to-medium (SMB) sized customers and enterprises. For more information, please visit www.steadfast.net/sentinel.

About Steadfast
Steadfast specializes in flexible cloud environments, infrastructure hosting, and a full suite of reliable managed services and security. Complemented by expert consultation at all stages of design and deployment to maintenance and expansion planning, Steadfast delivers high-quality, cost-effective IT infrastructure solutions, personalized to customer needs.

Read more

Filed under Web Hosting News by on #

(Bloomberg) — A major shipping company is under attack. With help from a corrupt executive, an international hacking syndicate called Scorpius, has penetrated the computer networks of Fast Freight Ltd. The hackers have taken control of servers and compromised the systems that control Fast Freight's vessels and its portside machinery. The company's cybersecurity consultants have 48 hours to uncover the breach and repulse the attackers before they cripple Fast Freight's business and cause serious economic damage.
It sounds like the plot to a blockbuster thriller. But this was the fictional scenario 42 budding computer security experts faced at the annual U.K. Cyber Security Challenge competition earlier this week in London. With demand for cybersecurity expertise exploding, but qualified people in short supply, war-gaming competitions like this have become key recruiting grounds for companies and government security agencies.
"We want to find untapped talent to fill roles in our own operation and in the industry as a whole," said Rob Partridge, BT Group Plc's head of commercial development for penetration testing. BT is one of a half-dozen companies, including Airbus SE, Cisco Systems Inc. and smaller, specialist cybersecurity firms Darktrace Ltd. and Check Point Software Technologies Ltd., that sponsored this year's Challenge competition. The U.K.'s National Crime Agency, the Bank of England and law firm 4 Pump Court also supported
Read more

Filed under Web Hosting News by on #