RecoverPoint for Virtual Machines

May 15, 2019

As part of an effort to improve product lines, we periodically release revisions of software and hardware. Therefore, some functions described in this document might not be supported by all versions of the software or hardware currently in use. The product release notes provide the most up-to-date information on product features. Contact your technical support professional if a product does not function properly or does not function as described in this document.

Spotlight

CIPHER

Founded in 2000, CIPHER is a global cyber-security company that delivers a wide range of products and services. These services are supported by the best in class security intelligence lab: CIPHER Intelligence. Our offices are located in North America, Europe and Latin America with 24×7×365 Security Operations Centers and R&D laboratories, complemented by strategic partners around the globe. CIPHER is a highly accredited Managed Security Service Provider holding ISO 20000 and ISO 27001, SOC I and SOC II, PCI QSA and PCI ASV certifications. We have received many awards including Best MSSP from Frost & Sullivan for the past four years.

OTHER WHITEPAPERS
news image

Cloud-native 5G –Getting Started

whitePaper | February 28, 2023

As they deploy 5G, telecoms operators around the world are experimenting with cloud¬native core networks, which offer greater flexibility, scalability and automation than conventional telecoms networks. This paper explores how telecoms operators could go about implementing a cloud¬native 5G core network. Most early movers are taking one of two approaches to deploy a cloud¬native 5G core:

Read More
news image

Under the hood of Wslink’s multi layered virtual machine

whitePaper | October 11, 2022

ESET researchers recently described Wslink, a unique and previously undocumented malicious loader that runs as a server and that features a virtual-machine-based obfuscator. There are no code, functionality or operational similarities that suggest this is likely to be a tool from a known threat actor; the complete analysis of the malware can be found here.

Read More
news image

How Virtual Desktop Infrastructure (VDI) Can Help Your Business Survive the Pandemic—And Prevailin the Future

whitePaper | December 6, 2022

Growing demand for remote working solutions in light of the pandemic is bolstering the case for virtual desktop infrastructure (VDI) adoption. In this white paper, we discuss why VDI is best suited for today’s business environments, especially since remote work is poised to play a big role both now and in the “new normal” of a post-COVID-19 world. We discuss VDI’s main advantages, its shortcomings and what can be done to address them.

Read More
news image

EyeSpy - Iranian Spyware Delivered in VPN Installers

whitePaper | October 12, 2022

During routine analysis of detection performance, we noticed a batch of processes that respected the same pattern in the process names. These names begin with sys, win or lib followed by a word that describes the functionality, such as bus, crt, temp, cache, init, and end in 32.exe. We later noticed that the .bat files and the downloaded payloads respect the same naming convention. Further investigation revealed the components are part of a monitoring application called SecondEye, developed in Iran and distributed legitimately via the developer’s website. We also found that some spyware components were already described in an article published by Blackpoint [1]. In the article, researchers drew attention to the dangers of legally distributed monitoring software with malicious behavior

Read More
news image

Zero Trust Maturity Model

whitePaper | June 13, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

ENABLING SASE WITH JUNIPER AI-DRIVEN SD-WAN

whitePaper | May 9, 2022

The modern distributed workplace—including enterprises with thousands of branches and remote workers—requires updated approaches to cloud, networking, and security infrastructure. Cloud migration has opened the door to a huge increase in sophisticated applications, requiring networks that can carry traffic to an increasingly remote workforce. In turn, this creates a unique set of new requirements for security, including special capabilities to handle unpredictable locations of users, applications, and traffic flows.

Read More

Spotlight

CIPHER

Founded in 2000, CIPHER is a global cyber-security company that delivers a wide range of products and services. These services are supported by the best in class security intelligence lab: CIPHER Intelligence. Our offices are located in North America, Europe and Latin America with 24×7×365 Security Operations Centers and R&D laboratories, complemented by strategic partners around the globe. CIPHER is a highly accredited Managed Security Service Provider holding ISO 20000 and ISO 27001, SOC I and SOC II, PCI QSA and PCI ASV certifications. We have received many awards including Best MSSP from Frost & Sullivan for the past four years.

Events