Uncategorized

WannaCry ransomware has links to North Korea, cybersecurity experts say

Two top security firms have found evidence linking the WannaCry ransomware to the prolific North Korean cybergang known as Lazarus Group.

Kaspersky and Symantec both said on Monday that technical details within an early version of the WannaCry code are similar to code used in a 2015 backdoor created by the government-linked North Korean hackers, who were implicated in the 2014 attack on Sony Pictures and an $81m heist on a Bangladeshi bank in 2016. Lazarus Group has also been known to use and target Bitcoin in its hacking operations. The similarities were first spotted by Google security researcher Neal Mehta and echoed by other researchers including Matthieu Suiche from UAE-based Comae Technologies.

Read more…

Uncategorized

DCM Data Systems: Leveraging the power of tools, analytics & cloud to optimise IT infrastructure performance

With multiple vectors pulling the market in different directions, the Infrastructure Management Services ambit is in a state of tremendous flux. Most Companies possess the physical infrastructure to host their computing resources, however they lack the human and process assets to support round-the-clock SLAs and meet their long-term IT centric business-alignment strategies. IT is a tool that can give them a competitive advantage if they can ensure that it runs smoothly. DCM helps ensure uptime and focuses on continuously improving performance while reducing costs.

DCM’s IT operations started with manufacturing hardware, system software and compilers for the indigenously conceived personal computers. Later with the changing times and advent of branded computers, the company was repositioned into a pure services company. The business was realigned in 2007 with strong focus on IT infrastructure services including monitoring, management, and backup solutions administered onsite or remotely from fully equipped Network Operations Centre (NOC) at Gurgaon and Hyderabad.

With its ITIL based processes,DCM provides services in UNIX/ Linux/VMware, Database, SAP / Oracle Apps, Enterprise Asset Management, Analytics, SIEM, IDAM, MDM and End Point Security/ Compliance management. In these technologies DCM executes projects as well provides complete sustenance services.
In the Cloud, DCM provides specialized services, namely the orchestration of the Cloud using specific tools and business continuity services.

“What makes us different is our flexibility, going the extra mile to accommodate the customer, and adapting our technology capabilities to solve the customer’s business challenges. As an example – our Enterprise Asset Management solution was developed because a client was fed-up trying to respond to audit requirements of software companies” says Animesh J Mathur (V.P- Marketing). Read more @ https://goo.gl/IUyc81

Uncategorized

What is Cyber Threat Analysis?

Related image

Today’s cyber threat actors are becoming more agile and aggressive, and finding new ways to bypass your traditional security measures. When this happens, they can do untold damage while navigating your company’s sensitive data and protected information.

However, the right cyber threat analysis solution can help you detect and neutralize unknown threats and breaches. Cyber threat analysis is a human-led process that enriches your existing security measures with contextual insights gained from external and internal data sources.

IBM i2 Enterprise Insight Analysis (EIA) is a cyber threat analysis solution that augments your current SIEM systems and equips your security operations center (SOC) team with the ability to analyze disparate sets of internal and external data, like HR, open source, social media and even dark web data. Conducting cyber threat analysis with i2 EIA not only helps you develop a more comprehensive understanding of your threats, but also helps you identify those unknown threats that could be occurring in your system as you read this.

To learn more about cyber threat analysis this What is Cyber Threat Analysis infographic and video. Turn the tables on your cyber threats today!

IBM Business Partner

Uncategorized

Chandra Kant: Application Performance Management – Solving the Performance Puzzle

According to Chandra Kant, SVP- Sales & Marketing, ZenQ, organizations rely on ERP and CRM solutions to support business critical functions and efficiently handle the business challenges. He said, “An effective ERP solution can give businesses a competitive advantage in this competitive era.”

He further added, “Even minor performance and scalability issues can cause a major impact on ROI and business productivity.” Read more on Application Performance Management.

Source: https://goo.gl/pQrSZc….
Uncategorized

DCM Data Systems “True Blue” partner of IBM

dcm-ibm

DCM Data Systems is a leading pure play service provider of IT Infrastructure services, globally with highly skilled and certified professionals serving different countries. DCM Data Systems with its focus on hardware, maintenance, trainings and value added services, went on to provide on-site and offsite services. The company enjoyed the status of a “True Blue” partner of IBM in India and a service only business partner in the US. It was also an authorized training partner of IBM in India. The company setup a hi-tech competency center in India, to continuously enhance and hone the skills of its engineers. The competency center also serves as a “Proof of Concept” center, to simulate customized solutions for the customers.

When customers choose DCM, they place a significant degree of trust in our ability to deliver. In fact, we are viewed as a trusted IT partner and an extension of their IT staff.We have long term relationship with companies like Eicher, HMCL, Vedanta, MVP consulting, LG, Mother Dairy, IGL to name a few.