Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET
Channel

Acronis Adds File Sync and Sharing Tool for MSPs

Kaseya Denies Paying Ransom for Key that Unlocks Data Encrypted by REvil Attack

Plagued by ransomware attacks that exploited zero-day vulnerabilities in Kaseya’s VSA remote monitoring and management (RMM) system used by managed services providers (MSPs), the company now has a tool to decrypt data locked by the attackers known as REvil. Kaseya’s Incident Response team, working with Emisoft partners issued a decryptor for REvil ransomware victims last weekend. “The decryption tool has proven 100 percent effective at decrypting files that were fully encrypted in the attack,” according to a Kaseya update. Kaseya also denied reports that it paid ransom directly or indirectly to obtain the decryptor. Also, Kaseya released a Quick Fix (QFE) to patch 9.5.7b (9.5.7.3015) to VSA on-premises customers. Unlike a full patch, Kaseya said that QFE is a simple script for the server. Noting that QFE is not a security patch, it resolves issues with Kaseya Antivirus & Antimalware, third-party integration modules and problems importing files using the VSA system tab. Kaseya said it has updated its SaaS instances with the QFE.

Acronis Adds File Sync and Sharing Tool for MSPs

Acronis has enhanced its file-sharing solution for managed services providers (MSPs). The provider of backup, imaging and cybersecurity software on Thursday said that it is layering extended data security and synchronization to the basic file-sharing capabilities provided in the Acronis Cyber Protect Cloud offering. According to Acronis, demand for file synch and sharing services has increased from the outset of the COVID-19 pandemic and throughout the past 18 months. Acronis Cyber Protect Cloud gives MSPs cyber protection capabilities, including file share and sync, on a subscription basis. It offers file notarization that uses Ethereum blockchain to ensure that no one has altered data. It also provides electronic signatures, allowing remote signatures by multiple people.

HP Expands DaaS Portfolio with Teradici Deal

HP has agreed to acquire Teradici, a company known for its virtual desktop software for an undisclosed amount. The deal, set to close before the end of this year, gives HP a modern desktop as a service (DaaS) stack. Teradici is known for its PC-over-IP (PCoIP) and Cloud Access Software, which provides high-definition streaming of virtual Windows desktops to thin clients, including Chromebooks, Android tablets and iPads, and more recently, Macs. Teradici, founded in 2004, has an extensive ecosystem of OEM, ISV and channel partners.

Atos to Acquire Visual BI, Nimbix, Finalizes IDEAL GRP Acquisition

Global systems integrator Atos is on an acquisition spree. Atos this week said that it has agreed to acquire Visual BI and Nimbix, and that it has completed its acquisition of IDEAL GRP. All three acquisitions seek to advance Atos application modernization and cloud services delivery capabilities. Visual BI provides cloud data analytics and business intelligence services. Visual BI is a Snowflake Elite partner, Microsoft data analytics gold partner and has an SAP practice. The tool also supports analytics offerings from Fishtown, Fivetran, Tableau, HVR Software, Olik, Theobald, and Alteryx. Nimbix provides high-performance computing services and IDEAL GRP is a product lifecycle management services provider.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

Network Data Systems Partners with Versitor

Veristor and Network Data Systems this week said they have partnered to deliver business-critical network managed services. The new Veristor Network Managed Services offering will include SD-WAN, wireless, and unified communications options. Versitor is offering it with its suite of managed backup, disaster recovery, Office 365 and storage services.

Domino Data Lab Kicks off New Channel Program

MLOps platform provider Domino Data Lab is looking to expand its reach with the launch of its new channel partner program. The Domino Partner Network (DPN), revealed Thursday, is an ecosystem of technology alliance and services delivery partners. DPN aims to enable partners to provide data science and machine learning at scale with its Enterprise MLOps, according to the company. The program seeks to create a data science ecosystem linking technology alliance and services partners across four categories: tools and data, infrastructure, solutions and consulting implementation. Initial implementation partners disclosed by Domino include Accenture, Arthur D. Little, Corios, DataArt and Slalom.

GitHub Pact with Stanford Law School to Assist Developers in DCMA Cases

Stanford Law School has created a fellowship that is part of the recently launched GitHub Developer Defense Fund. A partnership between Stanford Law School and GitHub, announced this week, will individual software developers in providing legal assistance associated with the Digital Millennium Copyright Act (DCMA).  The stated goal of the GitHub Developer Rights Fellowship is to provide legal resources for DCMA cases and polices, and to shape a “developer-friendly landscape.”

 

 

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: