Second Annual Seclore SecurityNow 2018 Brings Together Leading Organizations

October 15, 2018

Customers, industry leaders, distributors, and channel partners from over fifty companies unite to discuss the shift to Data-Centric Security to better protect information and enable secure collaboration

MUMBAI, India – October 15, 2018 – As data grows exponentially and is utilized within and outside the organization, there is no ‘one-security-tool-fits-all’ to protect and track data. Seclore, the frontrunner in Data-Centric Security, took to the stage to highlight the need for reimagining the data security landscape at the recently-concluded Security Now 2018 Enterprise Summit held at ITC Maratha, Mumbai.

Security Executives from over 50 leading organizations across India and the Middle East including Airtel, NSE, ITC, Bharat Forge, Magma, Max Bupa, ICICI Bank, ICICI Lombard and Al Masah Capital came together to discuss the new Seclore Data-Centric Security Platform and how it will enable them to bring together best-of-breed data protection and tracking solutions to reduce security risks, optimize productivity, and simplify compliance reporting.

What a great day! The Seclore SecurityNow 2018 event provided us with forward-thinking insights on how to better optimize our overall data protection and tracking. We benefited from exchanging ideas with our peers and hearing about the latest technologies for securing our sensitive information. The event also brought out the importance of Data-Centric Security; I describe it as ‘inoculate and be in control of your data.’ Thanks to the Seclore team for an insightful event and also for the world class solution they offer.” said Mr Vijayakumar RamachandranIT Head, Praj Industries

The event also featured informative panel discussions by prominent information security experts such as Mr Martin Sugden, CEO at Boldon James, Mr Harshil Doshi National Sales Manager at Forcepoint, Mr Vishal Gupta, CEO at Seclore, and Mr Harshavardhan Lale, VP of Customer Success at Seclore as the moderator. These industry leaders discussed how Data Classification, DLP, and Rights Management complement each other to significantly enhance the overall security posture of organizations.

It was exciting to see so many leading India and Middle East organizations coming together to discuss how to better discover, classify, protect and track their information,” said Mr Martin Sudgen, CEO at Boldon James. “These markets are definitely on the forefront of shifting to a data-centric security model.”

During his keynote address, Vishal Gupta, Seclore’s CEO noted, “Many organizations have tried to improve data security with various point solutions such as DLP, Data Classification and Rights Management. While each of these solutions plays a part in data protection, ideally, they need to work together seamlessly to address the entire data security process from discovery, classification, protection through to tracking document usage. We are excited to share how the new Seclore Data-Centric Security Platform will enable organizations to easily leverage best-of-breed technologies into a unified, automated framework to ensure information is fully protected and tracked wherever and however it travels.”

We were excited to learn more about the new Seclore Data-Centric Security Platform. This infrastructure gives us a framework for deploying the best solutions for DLP, Classification and Rights Management with minimal effort to further automate and extend our data protection processes,” said Mr Rishikesh Kumar Singh, General Manager – IT, Grasim Industries Limited (Epoxy Division).

The SecurityNow 2018 event also marked as a forum for unveiling Seclore’s Data-Centric Security Platform (DCSP). A first-of-its kind platform, it is designed to give customers an open, integrated and automated Data-Centric Security approach to discover, identify, protect and track sensitive data. The automation and agility of the platform enables organizations to remove the limitations of point solutions while increasing the security of sensitive data. At the core of the Seclore DCSP, is the Seclore Unified Policy Manager, the central engine for orchestrating policy management, identity federation, and usage data consolidation.

# # #

About Seclore

Seclore’s browser-based data-centric security solution enables organizations to control usage of information wherever it goes, both within and outside of the organization’s boundaries. The ability to remotely enforce and audit who can view, edit, copy, screen share and forward information empowers organizations to embrace mobility, file-sharing, and external collaboration with confidence.

Easy to deploy and use, Seclore extends the security of many DLP, ECM, DMS, ERP, EFSS, VDR, CASB, and Mail/Messaging solutions to protect information that moves beyond the perimeter. Seclore was recently recognized by Gartner as a “Cool Vendor” and by Deloitte as one of the “50 Fastest Growing Technology Companies” due to innovations in agentless receipt of protected documents. With more than 6,000 customers across 29 countries, Seclore is helping organizations rapidly achieve their data security, governance, and compliance objectives. To learn more about Seclore’sRights Management technology, visit:


ASUSTOR Delivers Streamlined Complete Software Solutions for Optimized NAS Experience

October 11, 2018

MUMBAI, India – October 11, 2018 – ASUSTOR Inc. today announced that all NAS device ships with support to its latest and comprehensive software solutions out of the box for enhanced NAS experience. The latest additions to this are Surveillance center 2.8 & NAKIVO Backup & Replication App. The company also offers ASUSTOR Data Master (ADM)1, a staunch operating system for all its NAS devices, for an intuitive, a truly personalized NAS and familiar user experience similar to most tablet device interfaces.

In the past, NAS was typically a network device that protected and ensured data security by providing storage and backup for businesses. However, due to the increasing digitization of data and the continual development of computers and mobile devices, the needs for storage are no longer just limited to just businesses,” said Ripunjoy Gogoi, Sales DirectorIndia and SAARC region at Asustor Inc..Curating on this idea, ASUSTOR was the first company to create NAS products that are designed with an App-based concept, producing a versatile, flexible and customizable storage platform that has something to offer to all types of users.”

Surveillance Center 2.8 2

Surveillance Center is a powerful add-on App on ASUSTOR NAS devices. After installing Surveillance Center from App Central, an ASUSTOR NAS can be instantly turned into a 24/7 non-stop high resolution security surveillance system. Furthermore, Surveillance Center is compatible with popular Web browsers and mobile devices, allowing users to monitor and protect their most valued assets from anywhere and at any time.



  • H.265 video encoding format video

The video compression ratio of H.265 is larger and more efficient than H.264, resulting in better use of storage space and reducing congestion. This allows users to effectively use the hard disk space and save network costs. This feature is currently only supported on Windows.

  • H.265 video transcoding

Optimize the performance of on-the-go monitoring. The powerful hardware of an ASUSTOR NAS device using Surveillance Center can resolve high resolution video using H.265 to output to an appropriate image resolution directly to a mobile device. This saves mobile resources, yet still be able to enjoy a stable and smooth picture. This feature supports Android and iOS devices.

  • Remotely enabling and disabling cameras with AiSecure

AiSecure allows users to manage the camera directly from your phone with the ability to enable or disable specific cameras, providing flexible management and protection of personal privacy when needed. This feature supports Android and iOS.

  • AiSecure now has two-way audio support

If a camera supports both built-in microphones and speakers, users can perform two-way audio communication using AiSecure, for example, a manager when monitoring employees may need to assist them by offering instructions. This feature supports Android and iOS.

We are excited to implement new upgrades to ASUSTOR NAS as they offer an immense range of add-on functionality and complete set of software solutions, allowing users to discover the unlimited possibilities of NAS devices,” Ripunjoy further added.

Virtual Machine Backup Solution2

NAKIVO Backup & Replication is a fast and reliable virtual machine backup solution, supporting virtual machine data backup and restoration in VMware, Hyper-V and AWS EC2 environments. Utilizing ASUSTOR NAS in combination with NAKIVO allows virtual machines running in VMware and Hyper-V environments to have optimal data protection. NAKIVO features a variety of functions that make backups more efficient. The network acceleration function doubles the virtual machine backup, replication and recovery speeds in WAN and busy LAN networks while NAKIVO can also efficiently delete redundant files and compress data during backup in order to save storage space. In the unfortunate event that disaster recovery is needed, NAKIVO can help to restore virtual machine data in minutes, giving you access to your most critical data.

ASUSTOR provides a three year warranty for all NAS. Please contact your local distributor for further details.


  1. The NAS devices shipped might not be updated with newest ADM software. Users will be automatically directed pop-up notification if there is any firmware update via ADM or they can manually download latest software from official ASUSTOR website.
  2. Surveillance Center 2.8 and NAKIVO Backup & Replication Apps can be downloaded from App Central

# # #


Founded in 2011, ASUSTOR Inc. was established via direct investment from ASUSTeK Computer Inc. The ASUSTOR brand name was created as a portmanteau of “ASUS” and “Storage”. ASUSTOR is a leading innovator and provider of private cloud storage (network attached storage) and video surveillance (network video recorder) solutions, also specializing in the development and integration of related firmware, hardware and applications. We are devoted to providing the world with an unparalleled user experience and the most complete set of network storage solutions possible.

Media Contact Information:

Extortion spam emails have raked in INR 1.5 Crore since August 2018: eScan

October 11, 2018

Although Bitcoin has been the most volatile in the past few years, yet this has not deterred the criminals from collecting bits from the Bitcoins. When we talk about extortion, we have seen the emergence and effectiveness of Ransomware using Bitcoins and other forms of crypto-currencies. We have also seen Crypto-Currency Miner (sic.Monero) being deployed on hacked servers/systems, so as to take advantage of the computational resources and generate crypto-currencies. However, lately, we have seen a rising trend in extortion emails, asking for Bitcoins.

These emails are in plain text format and warn the recipient of a malware being deployed on an Adult Porn Site, furthermore, in the mails, it is also explained in brief how the recipient’s, the webcam was hacked, keylogger was deployed and the login credentials were stolen. The email also explains that a video was captured while they were busy visiting the Adult Porn site and the recipient is threatened with dire consequences viz. sharing of the video with those present in the stolen address book.

Similar to Ransomware and Miner Attacks, this scam also relies on the anonymity provided by crypto-currencies. It’s a simple plain text threat, based on the premise that the recipient has visited some Porn site. The criminals have in most of the cases, successfully invoked the aspect of fear and social stigma into the psych/mind of the email recipients.

eScan’s research team has been analyzing and tracking these emails and most importantly, the Bitcoin addresses found in these mails. The Modus-Operandi of the criminals is to

  1. Create Bitcoin-Address for every Spam campaign.
  2. In case the recipient’s do pay up the extortion BTCs, the BTC is broken down and transferred to multiple Bitcoin Wallets so as to ensure that researchers find it difficult to track the transactions.
  3. The breakdown and subsequent transfer of the BTC is done a couple of times, hence at the end of third iteration we have close to 100 BTC wallets.
  4. Finally, all these wallets are consolidated and the BTCs transferred to one single wallet.

During the course of research, we came across numerous wallets with one of them (3FJDeT2E1fWb4oZBeub4MH9ennUp5e4QG6) having received around 31 BTC and were then sent to other wallets. The criminals have sometimes transferred the BTCs to Escrow Accounts / Exchanges to further anonymize/convert the BTCs into cash. At the existing exchange rate of BTC, the wallet was worth 1,49,09,139 INR and thus the Spam Campaign can be considered highly profitable and successful.

Some of the BTC addresses of the campaign:

  1. 19YayKasVoiRcjcihqmUpjVwvWB9aGyKCC
  2. 1DtBY4zD7cK35fpbNecpxSaEuEmfu9uyVG
  3. 1BmXuzjeWdoBKhsX8kJMNBFz5uJzrc2Gvc
  4. 1HRpxFdKGc7Anb7xfpQf3tmAcH6pph2ssX
  5. 1FCaw9jXhHveRyLxB54ypCpJ2CtanVoLC1
  6. 1MJcj7MdWeKR7eT7PukLG78jcRGf4opcsD

Due to the anonymity provided it is impossible to track the identity of the Wallet Owner. Since the month of August 2018, there has been steady increase in these extortion spam mails.

According to eScan researchers these mails are a part of a spam campaign and advices that recipients shouldn’t reply to these emails. However, since this campaign is in its nascent stages, there is a possibility that in near future the emails might be weaponized with the usual variants.

Prevention Measures:

  1. Ensure to not reply to these emails at all.
  2. Install and Configure eScan with all security modules active.
  3. eScan Real Time Monitoring
  4. eScan Proactive protection
  5. eScan Firewall IDS/IPS Intrusion prevention
  6. Users shouldn’t enable macros in documents.
  7. Organizations should deploy and maintain a backup solution.
  8. Most important, Organizations should implement MailScan at the Gateway Level for mail servers, to contain the spread of suspicious attachments.

SUSE Operates Across Communities to Deliver Kubernetes and Cloud Foundry Innovation to the Enterprise

October 10, 2018

SUSE Operates Across Communities to Deliver Kubernetes and Cloud Foundry Innovation to the Enterprise

BASEL, Switzerland / BENGALURU, India – October 10, 2018 – SUSE® today announced that a new Kubernetes-native implementation of the popular Cloud Foundry development model is coming to SUSE Cloud Application Platform, advancing the company’s drive to help enterprises accelerate application delivery, speed innovation and increase business agility. This is SUSE’s latest move to provide Kubernetes users with the top cloud native DevOps experience by combining Kubernetes and Cloud Foundry technologies. SUSE Cloud Application Platform boosts developer productivity with automation that eliminates the need to build and manage container images.

SUSE is including technology from open source Project Eirini that allows Kubernetes to be used as the container orchestration engine for deploying and managing applications through Cloud Foundry. Eirini allows operators to choose Kubernetes functionality to orchestrate application container instances in SUSE Cloud Application Platform while retaining the Cloud Foundry user experience familiar to many application developers.

SUSE provides high productivity solutions for cloud native application delivery,” said Gerald Pfeifer, SUSE Vice President of Products and Technology Programs. “Our approach is to identify leading open source technologies and bring them together in a way that makes sense for our customers. Today, that means bringing the unsurpassed productivity of the Cloud Foundry model together with modern Kubernetes infrastructure in SUSE Cloud Application Platform. This unique combination enables our customers to reduce complexity and become more agile to meet the changing demands of the digital economy.”

SUSE began to integrate Kubernetes and Cloud Foundry in 2017 by containerizing Cloud Foundry and running it in Kubernetes. That reduced the Cloud Foundry footprint and made it easier for Kubernetes users to manage. Replacing Cloud Foundry’s internal scheduler with Kubernetes is the next step, providing a top-to-bottom Kubernetes-native implementation of Cloud Foundry and further simplifying SUSE Cloud Application Platform for Kubernetes users.

One of the greatest strengths of open source is its community-driven approach to software advancement, encouraging the free flow of ideas to spur innovation,” said Dan Kohn, Executive Director of the Cloud Native Computing Foundation. “SUSE’s collaborations across the CNCF and Cloud Foundry communities reflect our common goal of improving the Kubernetes developer and user experiences.”

Chip Childers, CTO of the Cloud Foundry Foundation, said, “The Cloud Foundry Foundation is excited to see SUSE’s contributions to the Cloud Foundry community’s efforts around the Kubernetes platform. It’s an example of an enterprise solution emerging as a result of the open source ecosystem actively building bridges between projects, communities and technologies.”

SUSE Cloud Application Platform is a modern, Kubernetes-based application delivery platform used by software development and operations teams to streamline lifecycle management of traditional and new cloud native applications. Bringing together industry-leading Kubernetes and Cloud Foundry technologies, the platform facilitates DevOps process integration to accelerate innovation, improve IT responsiveness and maximize return on investment.

Nicolas Christener, CEO/CTO at Adfinis SyGroup AG, said, “Because SUSE Cloud Application Platform runs in Kubernetes, it’s relatively simple for us to use in our multi-cloud environment. We run the platform on public cloud Kubernetes services for testing purposes and then deploy to private cloud Kubernetes infrastructure for production. It works like a charm.”

SUSE plans to include the Kubernetes-native implementation of Cloud Foundry featuring the Project Eirini Kubernetes scheduler in the next major release of SUSE Cloud Application Platform next year. SUSE is showing an early version of the new capabilities at the Cloud Foundry Summit this week in Basel, Switzerland, in booth #14. For more information about SUSE Cloud Application Platform, visit

# # #

About SUSE

SUSE, a pioneer in open source software, provides reliable, software-defined infrastructure and application delivery solutions that give enterprises greater control and flexibility. More than 25 years of engineering excellence, exceptional service and an unrivaled partner ecosystem power the products and support that help our customers manage complexity, reduce cost, and confidently deliver mission-critical services. The lasting relationships we build allow us to adapt and deliver the smarter innovation they need to succeed – today and tomorrow. For more information, visit

Copyright 2018 SUSE LLC. All rights reserved. SUSE and the SUSE logo are registered trademarks of SUSE LLC in the United States and other countries. All third-party trademarks are the property of their respective owners.

R&M Receives Encouraging Response from Customers at 2nd FTTH India Summit

October 10, 2018

  • R&M showcased its industry trending FTTH products for National ICT Connectivity
  • Technical Director has given a presentation on R&M’s plans for ‘5G Networking Connectivity

BENGALURU, India – October 10, 2018 – R&M, a Swiss cabling systems developer and provider of high-quality fiber & copper solutions for network infrastructures around the world, took part in 2nd FTTH India Summit held at Mumbai and exhibited its revolutionary FTTH strategy products and solutions.

The event witnessed 400 plus industry leaders, policy-makers, innovators, regulators, technology providers, manufacturers and partners across the Indian Telecom sector. The event gave a platform to interact with industry experts, analysts and suppliers from the industry.Addressing the crowd, Shailendra Trivedi, Senior Director Sales – Public Network at R&M India said,”FTTH India Summit has been a vital forum for all connectivity vendors to exhibit their technology driven products and solutions. We at R&M feel privileged to be associated with the forum and display our FTTx strategy products, to boost ICT digital services.

He further continued, As a part of preparations for 5G era, we have introduced range of FTTH strategy products and solutions. Network operators who rely fully on their hubs can be pro-active and confident while conducting business on the market. With these products, they will be able to serve their end-users effortlessly and operate them with ease.

R&M displayed the following products at the event:

  • Fiber Optics Indoor : Patch cords (SM, MM, MPO), Fibre Management Systems. (wall mount & rack mount)
  • Fiber Optics Outdoor : IP FMS wall mount, Joint Closures, FTTA (CPRI) Patch Cords and assemblies, Armoured Patch Cords
  • FTTH Products : FAT, OTB, FDC, HTB, Splitter Boxes, Polaris Box
  • TSEC & CACT Approved : FDMS Indoor, FDMS Outdoor, Splitter, Wall Mount FDMS, Patch cords
  • Unique product : E-2000

In the summit, R&M techinal team has given a presentation on “Preparing OFC Network Densification for 5G” and enriched the attendees with the knowledge of Integration of optical connectivity with Smart cities and stated the advantages of adding capacity to the networks.

While presenting on R&M’s plans for 5G connectivity, Shajan George, Technical Director at R&M India said “The demand for bandwidth on the internet doubles every 20 months. Users wish to enjoy new services with increasing frequency for the sheer convenience. With the intrusion of 5G speeds, fast network connectivity solutions are among the basic needs of the population in our country. Understanding the current market scenario, R&M invested in Research & Development of OFC , to effectively implement the Network Densification for 5G era at lesser operational and maintenance costs.

# # #

About R&M

R&M (Reichle & De-Massari AG) is a leading global producer of future-proof products and systems for communication and data networks. The company’s close collaboration with certified partners results in pioneering connectivity solutions in the sectors LAN, Public and Telecom Networks as well as Data Centers. The Swiss family company stands for innovation, quality, and proximity to customers. More information is available at

%d bloggers like this: