Archive for December, 2017

2018 Predictions & Recommendations: The Ransomware Plague Is Just Beginning

Thursday, December 21st, 2017

It’s not exactly a no-brainer, but the success of ransomware in 2017 leads us to a logical prediction that more successful ransomware attacks will continue to plague organizations in 2018. These attacks will increase both in volume and sophistication, which will make it even more challenging for security vendors of yesteryear to prevent these attacks and fulfil their basic promise of protecting their customers.

It isn’t just legacy vendors that are challenged, however. Ransomware causes headaches for shiny “next-gen” products that rely heavily on detection-and-response capabilities because, once ransomware has evaded prevention techniques, the damage has already been done: files/folders are encrypted, and the business is impacted. (But hey, if you need a pretty process tree, they’re your vendor.) Rollback features are the equivalent of rolling the dice, crossing your fingers and hoping for the best, which is not a strategy.

Ransoms Beyond Bitcoin

Mao Tse-tung allegedly said, “Political power grows out of the barrel of a gun.” While it’s a stretch to say ransomware will produce the same result, in 2018, ransomware motives will shift to increasingly political, instead of commercial, gains. The business model for ransomware has been simple: as an attacker, I’ll hold your files or folders hostage (encrypt them), and you pay me money (in the form of cryptocurrency). In 2017, we observed attacks that used ransomware, but the motives were political, rather than commercial, in nature. In March 2017, RanRan was a ransomware variant in the Middle East that, instead of money, demanded the victims speak out against a political leader in the region through the creation of a website. In 2018, we anticipate more uses of ransomware attacks that go beyond commercial. In another recent example, NotPetya focused its encryption, not on files and folders that could be later decrypted after payment but instead encrypted the Master Boot Record, crashing systems.

Ransomware for the Masses

According to our latest Unit 42 threat intelligence report, Ransomware: Unlocking the Lucrative Criminal Business Model, ransomware variants are increasing, with total numbers at least 150, if not hundreds more. Another reason driving this increased volume is how much easier it is to launch attacks. Given that cybercriminals with limited technical skills can execute these attacks, making it even more convenient and reducing the barrier to launch attacks, ransomware as a service has become a viable way to launch ransomware attacks (think having to leave the house and shop vs. order from DoorDash). In 2018, unfortunately, the number of successful ransomware attacks will continue to increase, and couch potato cybercriminals will be successful.

Down, Z, Up, X, A, Y, B, C

Do that on an Super Nintendo back in the day, and voila! Your sophisticated “Street Fighter II” champion codes were enabled. Now, think of something similar happening for ransomware. In 2017, a sophisticated set of tools was leaked by a group called The Shadow Brokers, which claimed the tools had been created by a U.S. government entity for offensive operations. These tools were quickly leveraged by attackers in some of the most talked-about attacks of 2017. We had already seen innovative distribution models used in ransomware attacks, including exploit kits, macros, malicious DLLs and others. In addition, kernel exploits were heavily used in these attacks, making them even more difficult for security vendors to prevent. (Learn how kernel exploits work.)

Keep On Keepin’ On

Self-propagation of ransomware attacks will likely continue. The combination of worm-like capabilities as a way to rapidly distribute ransomware has been proven and wildly successful. From a business perspective eliminating any friction needed to propagate the attack makes good business sense, which is why this type of ransomware worm will likely continue in 2018 and beyond.

More Platforms

While 2017 was a quiet year for Mac-specific ransomware, in 2018, we can expect the volume of Mac ransomware to increase. A ransomware attack has already targeted OS X hosts – KeRanger, which Unit 42 identified in 2016 – and given the increase in Mac usage, the attractive targets Mac users make, and with additional tools and the commoditization of ransomware, it’s a good bet we’ll be hearing more about organizations getting hit with ransomware targeting Macs.


As we mentioned upfront, based on the success in 2017, it doesn’t take Nostradamus to see that ransomware will continue in 2018. In fact, we believe adversaries will begin expanding their mission to more sophisticated attacks and targeting more platforms. Ransomware will likely continue as a thin veneer to more dangerous attacks that go through legacy security solutions like a hot knife through butter. The only defense is a coordinated security system that works together where endpoints communicate with firewalls to automatically convert threat intelligence into prevention at both locations, regardless of where a threat is first discovered. This level of integration also enables SecOps to correlate threat events and conduct forensic investigations using data from endpoints, firewalls, and global threat intelligence in ways that may not be possible with disparate security products.

View the original post by Palo Alto Networks.

5 Security Practices Employees Should Follow During Holiday Travel

Tuesday, December 19th, 2017

It’s a fact of life that many employees travel for the holidays. Some bring their laptops and smartphones with them, perhaps to look up funnyIntellectual Property videos with relatives and/or to snap pictures of the local holiday festivities. By doing so, however, they could unknowingly be exposing themselves to numerous digital risks.

Why would bad actors want to target travelling employees?

The answer is simple. At issue is what those criminals could do with a company’s intellectual property if they were able to steal it from a business person’s device. Julie Weed explores this risk in an article for The New York Times:

The theft of technical product specifications, investment plans, research on mergers and acquisitions, marketing plans and other information can have consequences beyond loss of revenue and market position, Ms. [Samantha] Ravich [of the Foundation for Defense of Democracies] told the Senate Foreign Relations Committee this year. She described potential large-scale effects of state-sponsored economic warfare, which, she said, could disrupt the delivery of items crucial for manufacturing, malware incidents that could disrupt travel and cyberattacks that could force companies to shut down their websites.

To obtain this valuable information, crackers can use “extremely sophisticated” tools to steal intellectual property transmitted by a business person from a potentially unprotected phone, tablet, or laptop. Digital attacks against hotels aren’t new, after all. A bad actor could feasibly infect a hospitality organization’s computer network with malware to prey upon its guests, their devices, and their data. Alternatively, they might have already infected the poorly protected Wi-Fi network of a relative’s home where the business person will be spending the holidays.

Fortunately, companies can help protect their employees who travel during the holidays against these and other digital threats. They can do so by using better security controls on the hardware their employees use and by training their workforce to follow standard digital security advice. Here are five security practices in particular for business people who head home for the holidays and the organizations that employ them:

1. Implement Multi-Factor Authentication (MFA)

In its 2017 Data Breach Investigations Report (DBIR), Verizon Enterprise found that more than four-fifths (81%) of data breaches leveraged stolen or weak passwords as a means of attack. Organizations can help defend their employees against these types of breaches by instituting multi-factor authentication (MFA). Such measures would safeguard access to corporate accounts even in the event someone steals access to a travelling employee’s corporate login details.

2. Institute Access Management

While travelling during the holidays, employees might need to access corporate resources hosted in the cloud from their mobile devices and laptops. Companies can ensure that only authorized persons are capable of viewing this hosted intellectual property by implementing access management policies that govern access to cloud apps based on various attributes such as geo-location, device type and resource sensitivity.

3. Encrypt Sensitive Data

Criminals with sufficient determination can find a way around corporate access controls and establish contact with businesses’ sensitive data. Companies can defend against this possibility by investing in encryption. Such measures should encompass data-at-rest encryption (safeguarding information wherever it resides) and data-in-motion encryption (protecting data as it traverses networks).

4. Disable Bluetooth and Access to Free Wi-Fi Networks

Malicious actors can hide on public Wi-Fi networks and abuse Bluetooth-enabled devices to prey on business travelers. Employees can evade these criminals by connecting to secured Wi-Fi networks and disabling Bluetooth at all times while they’re traveling abroad. They should also consider using a VPN when searching the web or an enterprise VPN solution implemented by their company to access any business systems.

5. Update Your Software

Attackers know that employees don’t always update their devices on a timely basis. As a result, they develop code that exploits open weaknesses. Before employees leave for the holidays, they should make sure their software is up-to-date. Once they return, they should check for any additional software updates and scan their computers for malware.

Keep your organisation’s travelling workforce safe with data security best practices, get the Best Practices for Secure Mobility Kit.

View the original article by David Bisson at

Keeping Video Surveillance Connected in City Surveillance Applications

Tuesday, December 12th, 2017

Though your city might not be “The City That Never Sleeps”, security for a City Surveillance installation is still a 24/7/365 task. Security teams, law enforcement, 911 operators, emergency services, and others work tirelessly around-the-clock to protect city inhabitants and visitors and respond quickly should an incident occur.

Video surveillance is critical to the operation of a city surveillance security system. Cameras in public spaces and throughout the city’s roads and buildings help to ensure that a close eye is kept on people moving about their day, often with dynamic analytics to help detect threats or incidents such as an abandoned bag or a gathering crowd and alerting proper authorities. Cameras at traffic lights, intersections, highway merges, and other traffic hotspots register if a violation occurs and watch for accidents. They also often help to gather data about a particular area’s traffic patterns, helping the city become even safer.

Video surveillance deployed around an entire city is a large installation, consisting of thousands or even tens of thousands of cameras that must work together to detect and monitor incidents as they happen. Video is constantly being streamed to video management systems and archived to servers for storage. It’s critical, therefore, that cameras have a consistent connection to the network, as any interruption could result in a loss of video that misses a critical moment during a crime or other incident—or misses the incident entirely, leaving authorities in the dark.

As cameras are designed with higher and higher resolution, they provide more functionality—better all-around picture, capture of larger areas, and analytics capability that provides other essential functionality that a city needs to remain safe, such as facial recognition, object detection, and license plate recognition. Maintaining the connection to these cameras as they deliver a high resolution picture that is constantly being analyzed for problems and threats is a rugged task that requires an extremely strong connective technology.

Some cities have fiber cable installed throughout their streets, allowing for a fast, reliable data connection between cameras and other devices on a city’s network. However, for cities without available installed fiber, maintaining the connection is more complicated. Running necessary cable to each camera is a possibility, but it’s time-consuming, expensive, and difficult to install and maintain. It might require digging up roads and contribute to other disruptions that cause delays and bottlenecks in fast-paced cities.

Wi-Fi solutions for backhaul are another option for cities where running cable is not an option. With a Wi-Fi meshing solution, cities can implement a connectivity solution with a lower cost of deployment and a faster install time. In addition, a Wi-Fi solution can help to secure cameras and other devices and prevent them from being used during hack attempts to the network as a whole. Wi-Fi solutions on the market now are capable of providing the bandwidth necessary for the high-definition cameras currently in use in most security systems.

For public venues, traffic cameras, and other parts of a city surveillance network, especially those areas or installations where laying cable would be too expensive, too complicated, or cause downtime, Wi-Fi connections can provide the functionality necessary to keep your video surveillance system running with the functionality you expect—reducing downtime, simplifying your network, and increasing safety for the city as a whole.

View the original article by Scott Heinlein, Marketing Director at the Ruckus Room.

Blistering Performance Starts with Cleaner Wi-Fi RF Signals

Friday, December 8th, 2017

By Helen Kim, CEO NanoSemi

With each generation, Wi-Fi keeps getting faster. When will it be “fast enough?” Never! You’re talking to someone from Boston. Yeah, the Patriots won five Super Bowls, but Pittsburgh won six. We want more!

I’m not making my Super Bowl pick just yet, but when it comes to Wi-Fi, I can tell you definitively: faster is coming. Much faster, with the emergence of 802.11ax, which by some accounts is the 6th Generation of Wi-Fi (6G anyone?). Using more and wider channels, higher modulation techniques and other elements of the new standard, tomorrow’s Wi-Fi will be 4 to 10x faster than today’s 802.11ac networks, delivering up to 1.2 Gbps per stream.

Sounds great, right? Well, keep in mind that, for the moment, 802.11ax performance exists largely on paper and in the lab. Now, Wi-Fi device and chip vendors need to go out and make it happen in the real world. That means not just advertising huge throughput increases on a product box—but actually delivering them to clients at usable distances with good battery life. And doing that is a lot harder than it seems.

Why is it so tough to bring ultra-fast Wi-Fi bandwidths to real-world devices at longer range with better battery life? To answer these questions, I’m going to need to nerd out a little. Join me on a journey to the center of the silicon that lives inside your Wi-Fi devices. I’m going to explain a radio frequency (RF) concept called “linearization,” and show why it holds the key to tomorrow’s lightning-fast Wi-Fi.

Why are higher Wi-Fi bandwidths so hard to deliver?

It’s not hard to achieve fast data rates when clients are right next to an access point (AP). To deliver good performance at a distance, however, Wi-Fi RF signals need a few important attributes. They have to be high-powered (so they can reach farther), while also being power-efficient. (A great-performing client that dies after an hour of use isn’t particularly useful.)

Finally, the RF signal needs to be very clean. And that’s where it gets especially tricky, because every component in the chip that touches that signal (called the “RF signal chain”) can add noise, ultimately degrading performance.

Now, I’ve mentioned that Wi-Fi RF signals need amplification. Those power amplifiers (PAs) inside RF transmitters are a major source of distortion. This is where “linearity” comes in. Linearity is a measure of the PA’s ability to amplify all the parts of a signal equally. More linearity means a cleaner signal and better throughput at longer distances. So if noisy PAs (and noisy signal chains overall) reduce linearity, we need to do something about it.

New 802.11ax standards make things even harder.

Achieving good linearity is a complex problem to begin with, and it gets more complex at wider Wi-Fi bandwidths, especially over 40 to 60 MHz. (And remember, under 802.11ax, individual channels may be 4x that wide, 160 MHz.) But that’s not the only challenge. 802.11ax devices will also use higher modulation rates (called quadrature amplitude modulation, or QAM). At the lower end, the 802.11ax standard will use 1024 QAM. The highest bandwidths could use 4096 QAM.

As you climb up the ladder to higher QAM and Wi-Fi bandwidths, linearity becomes more and more important. Said simply: if you’re going to get to ultra-fast data rates, devices need much cleaner signal chains. This degree of cleanliness, measured by Error Vector Magnitude (EVM), is hard to achieve with the low-cost PAs commonly used in Wi-Fi systems.

Below, you can see a constellation plot of a high-performance Wi-Fi RF signal (160 MHz bandwidth, using 4096 QAM modulation). When you clean up that signal with linearization (the right side of the figure), you get pinpoint clarity at higher bandwidths. When you don’t (left side), you end up with a lot of undifferentiated noise.

Cleaning Up Wi-Fi RF

NanoSemi, an early-stage venture-funded company spun out from MIT Lincoln Laboratories, is working with Wi-Fi system vendors like Ruckus, as well as silicon vendors, to significantly improve the Wi-Fi RF chain. We apply machine learning-based digital compensation to correct the entire signal chain—power amplifiers, filters and other components—at unprecedented bandwidths.

We’re bringing linearization to new levels by automatically characterizing the signal chain, identifying nonlinear components and other impairments, and analyzing their impact on system performance. By doing this, we can improve EVM by up to 30 dB—and allow Wi-Fi vendors to unlock the full promise of 802.11ax.

Wi-Fi RF Linearization in Action

To show the power of NanoSemi’s linearization implementation, let’s look at a typical Wi-Fi PA designed to meet 802.11ac specs of 256 QAM and 80 MHz (480 Mbps). Using our linearization technology, that PA can achieve 802.11ax rates of 1024 QAM and 160MHz (1.2Gbps). And we can more than double both the power efficiency and output—leading to longer range at reduced power consumption. (You can read the detailed report here.)

Another benefit of effective linearization is that vendors can use more efficient amplifiers. The most efficient PA designs such as Class B and Doherty PAs are capable of operating much more efficiently than the ones most vendors use today, but on their own, they’re very nonlinear. By using NanoSemi linearization technology, however, we can bump up PA efficiency from 4% to over 28%, while nearly doubling the power output (test report here). Once again, that translates to faster speeds, over wider bandwidths, with longer ranges and better battery life than any solution available today. For access points, the greater power efficiency leads to less power consumption on power over ethernet deployments.

Learn More

Much as I’d like to, I can’t promise another Patriots Super Bowl. But I can promise wider, faster and longer Wi-Fi in the near future. By working with companies like Ruckus to solve the linearization problem, we’re helping take blazing-fast 802.11ax performance out of the lab and into a device near you.

View the original post by Helen Kim, CEO NonSemi at The Ruckus Room.

Data Security: Today’s Essential Business Requirements

Friday, December 8th, 2017

Review the precautions below to minimize your risk of being breached and, just as importantly, minimize the damage in the unlikely event that you are.

Famous Data Breaches

In 2008, Heartland Payment Systems suffered what was, up to that time, the biggest data breach in U.S. history. Astoundingly, intruders had been roaming around behind Heartland’s firewall for weeks before the breach was detected. Millions of customers’ credit card numbers were accessed, and Heartland, the nation’s fifth largest payments processor, was almost destroyed. While one would have expected this to serve as a lesson for all companies that stored customer information, about five years later, the Target Corporation suffered an even bigger breach. The post-mortem done by both Heartland and Target revealed negligence and carelessness at the systems administration level, which was subsequently corrected. End of story? Nope. Just this past spring and summer, another high-profile breach occurred. This time, the victim was Equifax, the credit monitoring and reporting agency. And the damage was much more serious, as hackers accessed the entire credit files of millions of Equifax customers. The full extent of the damage done most likely won’t be known for years, if ever.

Ransomware Rises

As if breaches and data theft weren’t enough, the latest trend in systems chicanery, ransomware, is happening at an increasing pace. Unlike the massive breaches at Heartland, Target and Equifax, ransomware can be targeted at the individual computer user. And it has targeted individuals, sometimes demanding hundreds of dollars from the victims. The most notorious recent ransomware viruses, however, WannaCry and Petya, were aimed at commercial entities. That’s where the money is, after all.

Someone’s Knockin’ at the Door

Ultimately, breach prevention boils down to both systems and personnel. While nothing is foolproof, here are some steps that organizations and individuals should take to keep their data secure. Here’s a short, though certainly not exhaustive, list:

  1. Internal controls are essential. Know who has access to the data and closely monitor their usage patterns. Also, analyze your log monitors to detect suspicious activity. There is software that can make this less resource intensive.
  2. Always make sure any software patches are installed immediately. This is what sunk Equifax. A patch to Windows was ignored and the vulnerability exploited.
  3. Keep your firewall up to date.
  4. Encrypt your data. This may be the best advice of all.
  5. Backup your data. You don’t have to build a server farm. The cloud offers several affordable and secure options.
  6. Install malware prevention tools and keep up with version releases and updates.
  7. Turn off your computer when you are done working. If your computer isn’t on, no one can crack into it. It’s a pain, but a good way to minimize the chance of intrusion.
  8. Train all users on things to avoid. For example, make sure they know not to open email attachments from unknown third parties and that they are on the alert for things like bogus login pages.

The Best Cure Is Prevention, But…

In order to be truly proactive, every endpoint must be protected against every type of attack at every stage of the threat lifecycle. Traditional anti-virus software programs have represented only a partial solution. As Heartland contends, there is simply no way to make a system completely breach-proof, so quick detection of problems and fast remediation of them are essential. Next Gen from SentinelOne is uniquely suited to maximize prevention and increase the speed of detection and remediation.

Conclusion: It’s Not Going Away

The threats are going to continue and they are going to become increasingly sophisticated. Most of the remedies will be reactive, i.e. they will come after a breach has occurred. But by deploying a Next Gen solution like SentinelOne and taking the precautions above, you can minimize your risk of being breached, and, just as importantly, minimize the damage in the unlikely event that you are.

Want to see how SentinelOne can help improve the effectiveness and efficiency of your security efforts?

Request a Demo Now

View the original post by SentinelOne.

The Right IoT Mindset for 2018 and Beyond

Friday, December 8th, 2017

Just when companies thought they’ve successfully transitioned to a mobile work force, Internet of Things (IoT) devices have followed hot on the heels, tempting would be takers with unprecedented productivity and margins should they dare traverse the proverbial minefield.

As IoT stands now, there is no clear swim lane, no tested and proven path of least resistance, no clear best practice for every implementation. Too many solutions, too little standards. Most of us know the destination – a network utopia of connected devices working harmoniously. Scalable, visible, secure. Is 2018 the year we lay the concrete over the IoT foundations?

Applications Aplenty, Consolidations Coming

It’ll be hard to find an industry not headed towards an IoT future:

  • Finance: Forget the cash. Contactless payments, biometrics, wearables
  • Transportation: Look, no hands! Driverless vehicles for you and I
  • Healthcare: Your family doctor without a pulse

Price, complexity, compatibility, scalability – there’s clearly plenty to consider for traditional businesses wanting to adopt IoT. It’s currently a jungle out there, and we’re going to start seeing consolidation as victors emerge. The bigger fishes are primed and hungry for the technology and data acquisitions will bring.

History Doesn’t Have to Repeat Itself

As we race towards building infrastructure and apps (as we did with LAN years ago), as we invest heavily into transforming into Smart Nations, we absolutely need to keep security top of mind. Just think about the number of high-profile hacks, breaches, and threats we’ve read about this year. The vast majority of them could have been prevented.

The stakes are higher than before. In 2018, data is going to be collected like never before. And increasingly personal data at that. Bank accounts, medical conditions, criminal histories, you name it. Security needs to be baked-in to every design concept and not a bolt-on at a later stage.

Goodbye Corporate Device, Hello Dynamic Policies

The company issued device is dead. Users want to use their own device to get their work done. And it shouldn’t matter whether they’re at home or in the office, users need that consistent user experience. But, with the multitude of corporate apps for dozens of different uses, admins have had to play a game of policy juggling. An exception here, an allowance there, each turn into a hole you punch in your firewall and perimeter defenses.

Dynamic policies are the happy silver bullet here. Make decisions based on the user, their profile and therefore their policy. It shouldn’t matter where or how they’re connecting.

The truth is there is no hard deadline here like the millennium bug, so the journeys we all take are bound to be different. The dynamic data centre of cloud and IoT is an exciting destination, and we’ll figure out the most optimal way there eventually. But till then, if we keep secure access in mind, our colleagues, users, stakeholders will thank us.

View the original post by Don Tan at Pulse Secure.

3 lessons to learn from Blade Runner 2049

Friday, December 8th, 2017

Last month, a very long wait came to an end for Blade Runner fans. Since the original (set in 2019) was released in 1982, a cult-following of fans from all over the world has been waiting (and hoping) for a sequel. 35 years later, their patience has been rewarded with a masterpiece; Blade Runner 2049 has been heralded as five-star blockbuster, visually stunning, and a philosophically profound classic.

For those that haven’t seen it yet, here’s the trailer:

2049 raises several questions that encourage us to think carefully about the future in relation to AI. Is there anything we can learn from the way the film deals with human and machine existence?

1. AI’s potential is incredible, and for some unsettling

The potential of artificial intelligence has been well-documented, particularly in the last few years. However, 2049 does highlight AI’s potential in a brilliant and concerning way. It shows us that if perfected, we might be able to create forms of the intelligence that could execute tasks, jobs and assignments more effectively than we humans ever could. Indeed, we’re getting close now when it comes to diagnosing some cancers.

The performance of Ryan Gosling’s K throughout the film shows us incredible skill, reasoning, quick thinking, strength and bravery. If, someday, we become able to create replicants such as this, the possibilities are endless – these forms of intelligence could revolutionize everything, from education, to medicine, to services, to policing, to transport.

In fact, we’re already seeing how machine-learning, in ways a precursor to a fully-realized AI, can enhance mobile marketing strategies and payments right now… and if these forms of AI continue to progress (which is likely), we may even see a Zero UI System (or screen-less) in the future, which would be truly incredible. For more on this fascinating concept, check out Rand Hindi’s Ted Talk.

But the capability of AI in the film is unsettling. The potential of AI is wondrous, of course, but 2049 shows us a myriad of ethical problems and dilemmas relating to the rights and treatment of the film’s AI protagonists (known as replicants). And without providing too many spoilers, it also shows us the possibility of AI thinking completely independently, which is a difficult scenario for many to deal with. This brings us to our second lesson.

2. Distrust of AI is highly likely

Early into the story, we see a widespread distrust of replicants. The humans of 2049 are clearly uncomfortable in the presence of AI, and we’re already seeing some distrust today. A recent survey has found that 85% of Brits believe that AI in marketing should be governed by a key principle from the Blade Runner franchise, now known as the “Blade Runner rule”. This rule dictates that it is illegal for AI applications such as chatbots, social media bots and virtual assistants to conceal their identity and pose as humans. All companies considering the use of AI in these forms should bear this in mind, and ensure transparency, or risk alienating customers.

3. AI could hold the key to building a truly connected world and greater civilizations

If you’ve now watched the trailer above and listened carefully, you’ll remember how the eerie Niander Wallace claims that “every civilization was built off the back of a disposable workforce”. A chilling claim, but one with arguably some truth within it. Perhaps an AI-based workforce is the key to building an even greater world? It’s difficult to predict though, and ethical concerns spring to mind immediately. However, there is a point to be made when it comes to AI’s relationship with the IoT.

The IoT is currently producing astounding volumes of data, so much that analysts won’t even come close to processing it all accurately. Simply put, big data is being produced more quickly than we can deal with it. One hope of getting a hold on it, and harnessing its potential is AI. It could be the only way to build an IoT to be proud of, and it’s something we’re working on with our Assurance Hub. This new platform aims to prevent online banking fraud through a detailed analysis of customer behaviour and biometric markers.

View the original post by Gemalto.

Ruckus joins the ARRIS family

Friday, December 8th, 2017

By Dan Rabinovitsj, President, Ruckus Networks, an ARRIS company

Today we finalized the ARRIS acquisition of the Ruckus business! Our team is jubilant, relieved and ready to hit the ground running. I want to thank all of our partners, customers and employees for their loyalty, perseverance and passion throughout the past year as we found our way to our new home. Now that we are here at both the finish line and the starting gate, I want to provide more details about how our business fits into ARRIS and also share my thoughts on why the combination with ARRIS offers a compelling path forward for our business.

Our updated brand name is “Ruckus Networks, an ARRIS company.” This reflects the expansion of our portfolio to include not only industry-leading wireless products, but also the integration of the high-performance ICX switching family to our overall portfolio. Internally, we will be called the Enterprise Networks business segment of ARRIS. This is important to understand because we will operate as a business unit with its own engineering, sales and marketing resources focused on the Enterprise market. This set-up will minimize integration time and ensure continuity for our partners and customers.

However, please don’t construe the independence of our business unit as the creation of an island. The real value of integration with ARRIS will be to take advantage of our combined and complementary strengths:

1. Continuity of user experience across all verticals and contexts. We see some of the most exciting innovation in networking starting in the residential market. The adoption of voice control, physical security, IoT, high density mesh and application visibility has taken off in the home and we want to exploit these trends in the Enterprise. Conversely, the performance expectations in the premium home segment are now closer to the Enterprise market, and we see opportunities to work with partners to create complete solutions for this segment using our combined assets. From the home, to the office, to school, to public venues like hotels, arenas and smart cities, ARRIS now has a soup-to-nuts capability in networking.

2. Scale matters. Ruckus Networks is now integrated into a large and stable business with the potential for greater investment and ambition. This will become manifest in manufacturing, operations and supply chain but also in R&D where we will be able to tap into complementary skill sets and know-how from DOCSIS to Wi-Fi, Ethernet and Optical communications.

3. Serving the Service Providers. In the service provider market, we believe we have a very clear leadership position in Wi-Fi with significant investments and commitment in all major markets serving residential, hotspot and managed services needs. Ruckus and ARRIS have common DNA in this area and can take advantage of our complementary footprint to better serve SPs of all shapes and sizes, while expanding our offer using our Ethernet switching, analytics from SCI and the Cloudpath security platform.

4. Transition to Cloud. Ruckus and ARRIS both have strong commitments to the future transition to IaaS for networking. The combination will allow us to double-down on our Cloud investment, which is critical to our continued growth in the market.

5. Technology Innovation. Finally, we share a passion for innovation such as our common interest in CBRS and the proliferation of OpenG LTE networks. ARRIS now has the potential to invest more aggressively on this front with solutions spanning the enterprise, smart city and residential markets using common platforms with a consistent user experience and integration with Wi-Fi. Some of our innovation will be focused on simplicity and hitting “the easy button” for networking. A great example of this is Unleashed and how we keep making this product family better and better for the SMB and premium home segment.

This is the beginning of a new journey for our team, but we are nothing without our partners, distributors and customers. Ruckus Networks will work to earn the nickname, “the Partner Networking Company,” because nurturing our critical partner and customer relationships is the most important ingredient for future growth and scale.

Thanks again for all of the support we have received from the Ruckus team who have humbled me with their passion, the ARRIS team who worked tirelessly to get this deal done, and to all of you who count yourselves as part of the Ruckus Pack.