SC Magazine Awards Europe 2013 - winners announced

The winners of this year's SC Magazine awards Europe have been announced.

With a total of 25 awards were given out at the event held at London's Hilton Park Lane, this follows another record year for the organisers, with 320 entries received. The winners are as follows:

Best Anti-malware Solution - Symantec Endpoint Protection

Best Content Security - Wave Systems, Scrambls for Files

Best DLP Solution - Boole Server

Best Encryption Solution - Venafi Encryption Director

Best Enterprise Security Solution - Splunk Enterprise

Best Forensics Tool - Absolute Computrace

Best IAM Solution - Evidian Identity and Access Management suite

Best Integrated Security Solution - Fortinet, FortiGate-1000C

Best Mobile Solution - AirWatch Enterprise Mobile Management

Best Network Security - Fortinet, FortiGate-3240C

Best Remote Access - Signify: The Secure Authentication Service

Best Secure Transaction Solution - Winfrasoft PINgrid

Best Secure Virtualisation Solution - Trend Micro, Deep Security

Best Security Management - Skybox, Risk Control 6.5

Best Security Solution, Financial Services - Trusteer, Pinpoint

Best SME Security Solution - WatchGuard XTM 5

Innovation Award - Avecto, Privilege Guard

Information Security Vendor of the Year - Kaspersky Lab

Information Security Project of the Year - South West Fire and Rescue Services (FRS) Secure Information Interchange Programme (SIIP)

Information Security Product of the Year - CipherCloud Gateway

Information Security Team of the Year - Kaspersky Lab's Global Research and Analysis Team

The Rising Star Award - Ryan Dewhurst, security engineer, RandomStorm

Information Security Consultancy of the Year - Information Risk Management (IRM)

Information Security Person of the Year - Brian Honan, CEO, BH Consulting

Best Global Security Company - Sourcefire



Small Business Groups Offer Mixed Reaction to Obama Budget

Small business reaction to Obama budget

From a small business perspective, the proposed Fiscal Year 2014 budget unveiled last week by President Barack Obama gets mixed reviews.  Critics say the budget does not do enough to alleviate the tax burden on small businesses.

Three key areas of concern are: minimum wage, taxes, and entitlements / pensions.  Let’s look at the range of reactions to the President’s budget to these points.

Minimum Wage

The budget proposed by President Obama calls for the federal minimum wage to increase from $7.25 to $9 per hour.

Following the release of the Obama budget proposal, Dan Danner, President of the National Federation of Independent Business, said the proposed hike is “a major anti-jobs policy that will limit the volume of net new jobs at a time when the economically essential element of small business job creation is already struggling.

“Workers of all ages that are relatively unskilled are adversely impacted by this policy because they can’t break into the job market, and small-business owners can’t afford to create new positions for them,” Danner said.

The proposed $9 per hour minimum wage is lower than what some Democrats in Congress support, according to The Washington Post.

The minimum wage issue often breaks down along industry lines.  Hikes tend to be opposed by main-street small businesses in retail, restaurants, manufacturing and other industries highly dependent on manual or hourly labor.  Often such industries have razor-slim profit margins to begin with.  In some cases, they can ill afford expense increases lest they put the business’s survival at risk.

On the other hand, small businesses with mostly knowledge workers or professionals may support the increase.  Or they may take no position, because minimum wage does not directly impact their businesses.

Taxes

The President spoke about “closing tax loopholes” and raising taxes on people making more than $1 million.  During his budget announcement in the White House Rose Garden, President Obama said his proposal also calls for investments in infrastructure â€" creating new construction jobs â€" and for investments in manufacturing and hi-tech business hubs.

The NFIB in its statement had this to say:

“Because of existing deductions and loopholes, large publicly-held companies in the U.S. already enjoy much lower effective tax rates than our nation’s small-business owners. Which means that a family-owned hardware store on Main Street pays a higher tax rate than its big box counterpart. That isn’t right, and the president’s plan could make effective tax rates even more unfair.  Details from the White House have been few, but since the president has stressed that reform must be revenue-neutral, we must assume that corporate-only reform will fleece small businesses - who are organized as pass-through entities and pay taxes at individual rates - to pay for the new tax breaks that would be given to big business.”

The National Association for the Self-Employed (NASE), which says it represents 22 million self-employed and microbusinesses, called for more tax fairness to small businesses.  In a prepared statement NASE said:

“We cannot agree more with President Obama’s budget that aims to make the tax code more simple and fair. But the sad reality is our tax code is unfair for the millions of small businesses that want to grow and expand their small businesses, and even more deterring for those who want to open their own small businesses. While job creation and closing loopholes are important, just as essential is creating the environment for new and existing small businesses to thrive without a paper trail of unnecessary and complex requirements.”

As Economics Professor Scott Shane has pointed out here before on Small Business Trends, there are other ways to deal with small business taxes.

Entitlements and Pensions

The budget President Obama proposes also calls for cuts in funding to certain entitlement programs.  Some don’t think there are enough cuts, and that the burden to pay for everything will be too high.

Others,  like  John Arensmeyer, the CEO at Small Business Majority, said that cuts proposed to entitlement programs like Medicare and Social Security should not be the way to reduce the deficit.  Arensmeyer said, “Cuts could undermine small business owners’ economic well-being and our burgeoning recovery, and should be left out of any final budget deal.”

The President’s budget proposal also hits retirement plans. It adds a penalty for 401(k) plans holding more than $3 million. Brian Graff, CEO at The American Society of Pension Professionals & Actuaries, said this really isn’t an example of closing a loophole and is not much benefit to small businesses but more of a hindrance.

In a statement responding to the budget proposal and specifically a cap on retirement investment accounts, Graff said, “If a small business owner has saved $3 million in his or her 401(k) account, they won’t be allowed to save any more. Without any further incentive to keep the plan, many small business owners will now either shut down the plan or reduce contributions for workers. This means that small business employees will now lose out not only on the opportunity to save at work, but also on contributions the owner would have made on the employee’s behalf to pass nondiscrimination rules.”

Finally, keep in mind that there is no single “small business position” on any economic issue.  Just like voters are never of one mind on all issues, nor are small business owners.

That’s because small businesses vary widely in size, annual revenues, industries, goals and circumstances of the business owners.  Although there tend to be common concerns to many, we never all think exactly alike all of the time.




7 Tips To Generate Leads At A Trade Show Or Conference Without Attending!

Small business trade shows are a fantastic resource for generating leads, networking with fellow business people and learning about the latest in your particular trade or area of the world. It is one of the best ways to get your products in front of people, scope out the competition, increase brand awareness and much more. But the cost of registration, travel, hotels, booths, ads, and giveaways can keep many small to medium-sized businesses away.

So if you can’t make the trade show, you’re out of luck, right?

Not so! With a little bit of cleverness, it’s possible to leverage these big events from the comfort of your home or office. With social media, you can still network and gain prospects.

David Clark of SDL offered us seven tips for conference/trade show networking and marketing you can do from your computer. Check it out:

Research the Event. Before the event happens find relevant groups/hashtags to follow for troves of useful information, insight, and sales leads

Set up searches. Include the event’s name, hashtags, relevant topics and industry keywords

Market Yourself. For a fraction of the event’s price tag, SMBs can create advertisements, landing pages, product pages, or YouTube videos demonstrating the value their product/service

Look for Influencers. Look for the main voices in each media outlet, disseminate information through them or add them to your sales leads database

“Attend” the Event. Using Twitter during the event is a must, conversations and questions happen in real time and SMBs can use this as an opportunity market themselves

Offer a Promotion. See what competitors are offering, then throw your hat in the ring by advertising specials through Twitter (using event hashtags).

Follow Up. Contact prospects post-show with information about your brand, answer their questions and make the sale.

So, what do you think?  Can you forego the next trade show and still build your business?



7 Tips To Generate Leads At A Trade Show Or Conference Without Attending!

Small business trade shows are a fantastic resource for generating leads, networking with fellow business people and learning about the latest in your particular trade or area of the world. It is one of the best ways to get your products in front of people, scope out the competition, increase brand awareness and much more. But the cost of registration, travel, hotels, booths, ads, and giveaways can keep many small to medium-sized businesses away.

So if you can’t make the trade show, you’re out of luck, right?

Not so! With a little bit of cleverness, it’s possible to leverage these big events from the comfort of your home or office. With social media, you can still network and gain prospects.

David Clark of SDL offered us seven tips for conference/trade show networking and marketing you can do from your computer. Check it out:

Research the Event. Before the event happens find relevant groups/hashtags to follow for troves of useful information, insight, and sales leads

Set up searches. Include the event’s name, hashtags, relevant topics and industry keywords

Market Yourself. For a fraction of the event’s price tag, SMBs can create advertisements, landing pages, product pages, or YouTube videos demonstrating the value their product/service

Look for Influencers. Look for the main voices in each media outlet, disseminate information through them or add them to your sales leads database

“Attend” the Event. Using Twitter during the event is a must, conversations and questions happen in real time and SMBs can use this as an opportunity market themselves

Offer a Promotion. See what competitors are offering, then throw your hat in the ring by advertising specials through Twitter (using event hashtags).

Follow Up. Contact prospects post-show with information about your brand, answer their questions and make the sale.

So, what do you think?  Can you forego the next trade show and still build your business?



7 Tips To Generate Leads At A Trade Show Or Conference Without Attending!

Small business trade shows are a fantastic resource for generating leads, networking with fellow business people and learning about the latest in your particular trade or area of the world. It is one of the best ways to get your products in front of people, scope out the competition, increase brand awareness and much more. But the cost of registration, travel, hotels, booths, ads, and giveaways can keep many small to medium-sized businesses away.

So if you can’t make the trade show, you’re out of luck, right?

Not so! With a little bit of cleverness, it’s possible to leverage these big events from the comfort of your home or office. With social media, you can still network and gain prospects.

David Clark of SDL offered us seven tips for conference/trade show networking and marketing you can do from your computer. Check it out:

Research the Event. Before the event happens find relevant groups/hashtags to follow for troves of useful information, insight, and sales leads

Set up searches. Include the event’s name, hashtags, relevant topics and industry keywords

Market Yourself. For a fraction of the event’s price tag, SMBs can create advertisements, landing pages, product pages, or YouTube videos demonstrating the value their product/service

Look for Influencers. Look for the main voices in each media outlet, disseminate information through them or add them to your sales leads database

“Attend” the Event. Using Twitter during the event is a must, conversations and questions happen in real time and SMBs can use this as an opportunity market themselves

Offer a Promotion. See what competitors are offering, then throw your hat in the ring by advertising specials through Twitter (using event hashtags).

Follow Up. Contact prospects post-show with information about your brand, answer their questions and make the sale.

So, what do you think?  Can you forego the next trade show and still build your business?



Join Us for a Twitter Chat: SMB Internet Security

Twitter chat SMB security

Join us, along with Symantec SMB security experts, on Twitter on Thursday, April 25, at 9 am Pacific (12 noon Eastern) for a discussion about how cyber criminals are targeting small businesses.

You’ll get a chance to discuss the findings in Symantec’s recently-released report on Internet Security Threats.  The Report covers the major threat trends observed by Symantec in 2012.  It reveals that cybercriminals view SMBs as a prime target. In fact, the largest growth area for targeted attacks Read More

The post Join Us for a Twitter Chat: SMB Internet Security appeared first on Small Business Trends.



IRS Looking to Tax Free Lunches Offered at Tech Firms

tax free lunches

Federal tax officials may bring more reality to the old adage “There’s no such thing as a free lunch.”

According to reports from the California Bay Area and Silicon Valley, the Internal Revenue Service is considering whether to tax free lunches and other perks routinely offered to employees at tech companies.

Silicon Valley Mercury News reported recently that employees at companies like Facebook and Google may have to pay taxes on free meals.  It’s a fringe benefit that their employers Read More

The post IRS Looking to Tax Free Lunches Offered at Tech Firms appeared first on Small Business Trends.



6 Marketing Opportunities The New Facebook Hashtag Will Offer

Facebook is working on incorporating hashtags, says the Wall Street Journal. Although they gave no timetable for when the change will be implemented, the news is really exciting marketers. Why? Because this new feature will help get your business noticed by the demographic you’re after, if you pay attention to what they’re talking about.

If you’re on Twitter, you know what a hashtag is. If not, here’s what it is: It’s a tag, made by placing a number sign (AKA an octothorpe) in front of a word or phrase, like this: “#business” or “#SmallBizTechnology.”  On Twitter, placing the number sign in front of a word turns that word into a link, which, if clicked on, will bring you to all the other tweets that include that same hashtag. When you want to join a worldwide conversation about a sporting event or TV show or anything else, there’ll be a hashtag to facilitate that.

So now that’s coming to Facebook. We’ve looked at Twitter hashtags in the past, and they’re a mixed bag when it comes to marketing. Here’s some more information on what’s good and what’s bad about them.

CMIT Solutions was kind enough to send us a bit on a primer on what Facebook hashtags will be able to do for your business. Check it out:

  1. Your marketing team and social media managers should be cheering from the rooftops for the Facebook adoption of the hashtag, as the #opportunities are great.
  2. Hashtags can help get your business out there and discovered by the right people. Being savvy with your hashtag use can help you penetrate conversation threads of interest to your business’ targeted demographic(s); helping you to most effectively segment your message.
  3. This inclusion will offer you the opportunity to more effectively track your targeted audience and analyze the trends resonating in your customer’s mindset. This will reduce the effort required to follow your customers’ social activities and allow you an easy view of the latest trends and opinions relevant to your market.
  4. By giving your customers a hashtag in your posts, it encourages them to use it in their own statuses. This could lead to convenient observation of the complete product/service experience life-cycle. The translation of consumer interactions not only into Facebook statuses, but photos and videos as well will highlight your brand and potentially open the door for greater reach and the possibility of viral exposure.
  5. Though there is no replacement for conventional market research, hashtagging on Facebook will hugely impact the world of your researchers. The ability to track feedback from your customers without having to directly solicit it can be game changing. As it stands right now, a brand’s fans have to directly interact with the company page. Hashtags will empower your customers with the freedom to tell the world about their impression of your products/services.
  6. Offering your customers and clients this power will not only help you uncover areas that are in need of improvement, it will also help you to capture their words for testimonials which can then be used to entice prospective clients to take the plunge.


8 Reasons Companies Should Adopt a Content Marketing Culture

content marketing culture

If hustle was the key for traditional businesses to work, the hustle now has a new avatar. Earlier, it was pure hustle followed by the transaction. Today, it’s all about hustling with information. It’s more about informing, gaining trust, leveraging social media, amassing social proof, nurturing customers and then facilitating a sale.

For each of the steps in the modern buying cycle, content marketing plays a vital role. You probably know by now that content is at the heart of Internet marketing. Let’s see why companies should adopt a content marketing culture.

Culture Rules Behavior and Hence, Actions

What do Southwest Airlines, and Apple share in common? It’s culture. For each company, everything centers on culture. If Southwest Airlines is known for their legendary customer service and if Apple is known for designing some of the best lifestyle products in the world, it’s not so much about these companies making new products, innovating constantly and producing products and services that are world-class. There’s no mistake that these companies are the best in what they do; it’s just that they do it that way because they defined a culture to back up their businesses.

Culture, in a traditional sense, influences how people behave and hence act. It applies for businesses too. Content marketing needs a cultural backing because it envelops your business, involves everyone and it’s often the window of information exchange between the stake holders of your business and with your customers. Even small businesses such as WebpageFX, a Web design and development company, tries to breed culture as a part of growing up.

Culture Brings in Consistency

You’ll break rules, thwart the norm and almost always forget company policies. Culture, admittedly, is hard to break away from. You’ll occasionally slip and roll away but culture finds a way to bind production values, business ethics and core business philosophy. Further, culture brings in consistency.

People who belong to a particular culture almost always behave in a particular way. If you’ve applied that to business operations, product design and business processes, what do you get? The success of your content marketing depends on consistency and a content marketing culture helps you find that.

Culture Lends Voice

If a content marketing culture is a part of your business, everyone involved has a voice which finds its way into published content such as blogs, whitepapers, reports and books. This content will also make an impressionable mark on internal and external business communications.

Voice has character. Voice brings life. Voice is how your customers will come to recognize, value and relate with you. Businesses without a voice and hence, personality, character and values, aren’t businesses. They are more like short-term trading posts. Content marketing with a voice, which culture will find a way to define, gives your business some muscle. It lets you make a difference in style.

Have Culture; Will Differentiate

Your business creates products and services that are bound to solve a particular problem your potential customers have. Almost any business can do that. If so, how do you differentiate your business from competition? Customer service is one way. Your products and services are another way. The trouble with these differentiating points is that they are easy to replicate. Your competition can find a way to compete. They can’t, however, have the same culture as yours.

Just like every human is unique, every business with culture is special - one of a kind. Your competition can’t copy your culture; it can’t do things the way you do it. Culture now catapults your business to a unique stage of infallibility.

Culture is the Secret of Branding

Brands are created because promises are kept - consistently, repeatedly and unmistakably. Over periods of time, customers relate to brands; they come to trust these products. If you ever thought about how brands manage to achieve this level of consistency, the answer is culture again. Toyota cars don’t break down. McDonald’s Burgers almost always taste the same. Apple’s laptops don’t fail.

It’s possible to achieve this level of reputation only on the basis of working with a culture that clearly defines what each brand is supposed to achieve for businesses that depend on branding for profitability.

Provide a Unified Customer Experience

The better you serve your customers, the more they will buy from you. They will also spread the word about your business and they will come back more often to buy. To provide such customer experience is not easy though.

Culture gives your business a common ground to provide a unified customer experience. The logos, corporate branding kits and color schemes work to an extent. What customers finally take home is what they feel about your business. The ‘feeling’ comes from how you squeeze your business culture to provide a great experience for your customers.

Culture Demands Work

It takes a tremendous amount of work to run a business, to market your business, to provide customer service and to keep the wheels of business moving. How do so many moving parts come together? What’s that one thing that motivates employees, keeps business processes smooth and allows businesses to grow while keeping customers delighted? It’s hard work and it takes a lot more than task sheets and general management to make that happen. It takes years of ingrained culture.

Content marketing, like marketing itself, is not just the work of marketing department; it’s everyone’s work. Effective content marketing is everyone’s work. When all
stake holders wrap their heads around content marketing, it begins to show results. It creates an impact. Profits come from the reach of this impact.

Culture Gets You Firing on All Cylinders

Get together and work for a common cause and it’s easy to get excited about the possibilities of such collaboration. Business takes more than the need to make money, to provide employment and to trade. It requires a commitment to excel. You can have no half-hearted attempts in business. You can’t keep customers if they remain neutral about their feelings towards your products and services.

To get the equation right, you’ll need to fire up on all cylinders. You need gumption, zeal and a habit of excellence. Since your content marketing strategy also involves effort to get all this happening for you, culture gets you to the firing zone. It’s the spark that lights up the cylinders. It pushes the pistons.

How does your business culture influence the way you run your business? How deep does your content marketing culture and strategy go?

Content Photo via Shutterstock




2013 Verizon DBIR: Authentication attacks affect all organizations

Authentication-based attacks continue to plague organizations of all sizes, according to the 2013 Verizon Data Breach Investigations Report.

This is the same story we've been telling for years.

Tom Bowers,
regional security architect, ePlus

This year's report, released Monday evening, detailed 621 data breach events that were collected by Verizon and 17 partners over the course of 2012. Among the confirmed breaches, 52% utilized some form of hacking, with approximately 80% of those being authentication-based attacks.

The 2013 Verizon Data Breach Investigations Report (DBIR) emphasized that attackers don't need sophisticated hacks when much easier avenues are exploitable. Stolen credentials were used in 48% of the hacking-based data breaches recorded by Verizon, with brute-force attacks comprising a further 34%.

"Most attacks are not requiring a great deal of sophistication, and we believe that says less about what the attacker is able to do and more about what they need to do to get into the defender's network," said Kevin Maxwell, senior analyst for Verizon. "That is, if all it takes is something simple and easy to get into a network, then they're probably not going to burn a high-value zero-day vulnerability on getting into that organization if they can just get somebody to run their code in the first place."

Tom Bowers, regional security architect (mid-Atlantic) at ePlus, indicted users as the weak link in authentication.

"This is the same story we've been telling for years," he said. "The user is always going to be the weakness. There's no way around it.

"The biggest challenge I'd face over the years is asking users to create unique passwords," Bowers said. "And then what do they do? Write them down."

As for the ever-heated discussion of user security awareness training, opinions seem to be mixed. Bowers highlighted a successful training program that had been implemented to raise awareness around phishing when he was chief information security officer (CISO) of the Virginia Community College System, with phishing rates dropping noticeably at several of the schools in the system.

For Rich Mogull though, user training is ultimately never as effective as properly implemented security technologies.

"Training can only help to a point, but as the DBIR itself shows, eventually you can always fool a user," Mogull said. "Better monitoring, alerting and incident response will be more effective than trying to train users better or rotate passwords more frequently."

Users weren't the only human-related issues that came into play for authentication attacks though. Several of the experts we spoke with indicated that the inability to maintain a full staff and to find qualified infosec candidates plays a major part in organizations falling down on infosec basics. Bowers, for example, was never staffed at more than 50% during his time as CISO of the Virginia Community College System.

Rick Holland, senior analyst for Cambridge, Mass.-based Forrester Research Inc., commented that too much focus is spent on trying to solve problems with technology and not enough is spent on the people that enable those technologies.

"A lot of the failures are operational failures, not having the staff we need, shortages of staff," he said. "Even managed service providers have trouble getting the staff they need, so what does that say of the 'average Joe' company out there?"

Is multifactor authentication the answer?

The 2013 Verizon DBIR provided advice on mitigations for all types of attacks, and in the case of authentication-based attacks, the report argued that moving beyond single-factor passwords would go a long way towards solving issues with stolen credentials and brute forcing.

Bowers indicated that he uses two-factor authentication to keep his personal passwords secure, but that when it comes to defending against brute-force attacks, password complexity is the only real option.

Mogull agreed that multifactor authentication doesn't represent a panacea for every organization's password woes.

"No single-factor authentication scheme is materially more secure than any other. It is only the combination of factors that really starts to address the weaknesses," he said. "But multifactor authentication isn't always viable, leaving gaps even when it is in heavy use. Adding more complexity or changes is about the last thing that will help."

Ultimately, Mogull thinks organizations will just have to make do with the technology they already have for the foreseeable future.

"Passwords are with us for the rest of our lives," Mogull said. "There simply aren't viable alternatives at scale yet. While this is getting better, there will always be some degree of password use." If he's right, Verizon may well have a growing sample set of breaches for years to come.




Small Businesses Struggling To Keep Up With Web Evolution - Infographic

I have often wondered, for all the talk of importance of social media marketing today, of how affordable and accessible internet marketing has become, what really lies at the heart of marketing efforts of most small businesses? Are small business owners really convinced on the potential online marketing holds for them? And what are the likely key internet marketing trends in this sector. These are just some of the questions that have been answered by a survey by SiteApps, conducted across 245 U.S small businesses in January this year. Take a look at the infographic below and then let’s review some of the key findings of the survey that show why small businessesare struggling to keep up with the web evolution.

Growing businesses feel inundated with technology changes. More than 50% of businesses surveyed felt they are unable to keep pace with changes in marketing technology taking place around them. The obvious reasons for not being savvier in internet marketing tactics were:

  • time and money involved in implementing the change
  • the lack of technical expertise
  • lack of awareness of what marketing tools were out there.

‘Website’ is the preferred marketing tool, but is not being leveraged to the extent possible. Small businesses view their website as the best marketing investment. Yet, here too they fall short in being able to fully leverage the potential of their websites as 75% of the respondents do not use web analytical tools and 60% of those who do use these tools feel that they simply weren’t getting information that is actionable.

Social media ranks low as a marketing tool, but Facebook rules! Only a small percentage of businesses surveyed felt that social media, as well as review sites like Yelp, were effective. But, when it comes to small businesses, Facebook rules the roost with 41% stating they used the platform as part of their social media strategy, which is significant since 47% of the respondents were not using social media at all.

Small businesses keen on ramping - up online presence in 2013. Notwithstanding the fact that 51% the respondents didn’t view social media as a reliable online marketing tool, looking ahead, 47% of the respondents were convinced of its potential in driving sales. This optimism has been boosted by emergence of new online payment options, cloud sales software, e-commerce platforms and flash sale sites.  While 70% of the online marketing budget would still be diverted on developing website personality and performance, 18% of the online marketing outlay of small businesses is expected to be towards ramping up of social media capabilities.

As smaller businesses invest more of their time and efforts on marketing products online, they should not make the fatal mistake of failing to also improve their customer service.  After all while the web makes it easier to reach customers, it also exponentially increases the risk of bad publicity from a single poor customer experience.



Presentation Software: Which Of These Three Will Help Your Business Deliver A Stellar Message?

Presentation software is an excellent option for small businesses that are looking to share information in a more interesting way than traditional word documents and pamphlets. Having a visual aid offers a more stimulating presentation of ideas and can help you deliver your message with ease, even to large crowds. However, if you’re new to presentation software, it can be tough to know where to start.

While there is a huge list of presentation software available, three of the most popular options are PowerPoint, SlideRocket, and Prezi. In this article we will briefly discuss the benefits of each and feature a business that has successfully used that presentation software in the past. Knowing about the options and successes should help you discover what presentation software will work best for your small business.

PowerPoint

If you’re completely new to presentation software, PowerPoint is a great place to start out. One of the main benefits is that it is so wide spread. As part of Microsoft Office, it comes automatically with programs like Word and Excel, so there is a good chance it is already on your computer. Because it is widespread, many people already have some level of familiarity with it. Plus, it’s fairly user friendly, so you can be a self-taught PowerPoint user in a very short amount of time.

As a drawback, PowerPoint does not have the range of advanced options that other presentation software products have, like increased customization, visuals and animations. Further, since the presentation is stored on your computer, it can be harder to collaborate on a presentation with other users at remote locations, versus cloud-based presentation software. Finally, the file size is quite large, making it difficult to email files back and forth.

PowerPoint Success

Despite the drawbacks, Kristin Buckholz, a Marketing Coordinator at MultiAd, decided that PowerPoint was the best option for her business. MultiAd is marketing company that is thoroughly involved in all aspects of the marketing process, including creating, organizing and distributing marketing content. Kristin decided on PowerPoint because it is a stable program for the business that most people have some familiarity with. Having sensitive client information on a website/cloud tool was not a secure option, so PowerPoint was the perfect choice. In addition, Kristin points out that PowerPoint can be used as a graphic design tool and not just a presentation tool, giving it more flexibility.

During her time at MultiAd, Kristin has been able to use PowerPoint to gain many new clients, as well as retain clients as they went through the renewal process. The presentations have become a staple for their sales, as they make visits to client’s offices to present a pitch. PowerPoint slides are also used to distribute the company’s message at trade shows.

SlideRocket

SlideRocket is an online presentation tool, and as such, one of its benefits is the fact that the information is stored online. Because of online cloud-based storage, SlideRocket allows users to collaborate on a presentation even if they are working from different locations. It is user-friendly like PowerPoint, and even allows you to import existing PowerPoint presentations, or create your own from scratch.

The flexibility of online presentation software comes with some downsides. It’s not the best format for sensitive information, and working on or actually presenting your slides will require an internet connection. SlideRocket does give you the option of downloading your presentation and using it offline, but you have to pay for this feature, as well as other features that are not available in the basic, free edition.

SlideRocket Success

Alicia Phillips handled the marketing responsibilities at an eight-location car dealership group. Needing a presentation software to efficiently do her job, she researched various options and ultimately decided on SlideRocket. She chose SlideRocket because it was essential for her to reach numerous parties in various locations, and she didn’t want to clog up everyone’s emails with large PowerPoint attachments. The active hyperlink associated with her presentations allowed for quick viewing and sharing. Plus, when post-publishing changes to the document are made, the presentation is automatically updated for everyone, eliminating the need to re-send the material.

Alicia successfully used SlideRocket in many aspects of her job. The leader of a ten-person team, she used SlideRocket presentations for training purposes. Having the information online made it easy for everyone to access the presentation one day in advance, giving everyone a head-start to the material and allowing for a greater discussion time during the training session. In addition, SlideRocket allowed Alicia to quickly and easily conduct monthly Marketing Updates & Reviews. She found SlideRocket to be the best way to deliver uniform information to large numbers of people.

Prezi

Prezi is the newest software of those we’ve discussed and it has a very different take on how presentation software should work. Unlike other slide-based presentation tools, Prezi takes a non-linear approach by giving you a blank canvas on which you can add content anywhere. Other features allow you to incorporate movement and zooming in on the presentation for a more stimulating show. Prezi is web-based and completely free. In all, it allows you to give unique presentations that can quickly win over audiences.

With all the benefits of Prezi, there also are some downsides. There is a steeper learning curve when it comes to using Prezi, so it will take longer to learn and perfect it, which may be a hindrance if you need to complete your presentation quickly. Using options like movements is nice, but if you go too far and include too much you risk making your audience dizzy. Finally, because it is a web-based presentation tool, you will need to have internet access to create and deliver your presentation.

Prezi Success

Ryan Hamilton and his business partner Bret Faber created the toy wholesale company Geared for Imagination in 2009 (the same year Prezi came out). They create and discover a range of children’s toys and have introduced several different lines of products including Topozoo, wooden 3D animal puzzles for kids. It was when they were promoting Topozoo that they started to use Prezi. They chose this presentation software over the others because innovative features allowed them to tell the Topozoo story in the most compelling way.

Ryan and Geared for Imagination started using a Prezi presentation to introduce Topozoo toys at trade shows. The toys are hard to categorize and explain, but Prezi allowed them to clearly demonstrate how the toy worked, and deliver the message in an interesting way. They continued to use the Topozoo Prezi presentation as their company began to take off. Using it in sales pitches to Whole Foods and The Smithsonian, their attractive and persuasive Prezi pitch convinced buyers from both companies to begin selling Topozoo.

Clearly there are great aspects to all three of these presentation software options. The key is finding the one that best meets the needs of your business and has downsides that you can live with. We hope the information we’ve provided will help you choose the best presentation software for you. The success stories should give you new ideas about how presentation software can help your business, and motivate your own presentation-based success.



Infosec 2013: APTs are hard to defend against, but not impossible

Modern security technologies are not meant to stop advanced persistent threats (APTs), but organisations do not have to bury their heads in the sand.

Speaking at the Infosecurity Europe exhibition in London, Brian Laing, director of marketing and products at AhnLab, said that security tools are "not meant to block these types of attacks" and that while attackers can sell attacks for tens of thousands of pounds on the black market, organisations are not lost.

He said: “An attack could be with an attachment, with a drive-by download or with an infected website, or they could just infect your machine. You cannot do detection with signatures, so you have to dig down and look at the file and find out what it is doing.”

Speaking earlier in the day, Matthew Bennett, cyber incident response analyst at Cassidian CyberSecurity, said that attackers "are not trying to get a talk at Blackhat; they will use the minimum effort to achieve their goals".

He encouraged eradicating attackers by shutting down communication channels, enhancing a company's security posture and assuming that the attacker has access to the full environment. He said: “The attacker has an effective attack strategy, but they are not the only one. Yours can be the same, so do not bury your head in the sand when it comes to a reaction.

“Look at whitelisting, deprovision accounts, user awareness in protecting your account, as they are the first to be targeted. Have a surveillance strategy, have a response strategy and when intrusions take place, be the first to know.”



Infosec 2013: Cyber threats creating boom for security in age of austerity

Technology firms need to grab the opportunities offered by increasing cyber threats, which is creating a thriving security industry in spite of the poor economic climate.

This was the message pushed by Chloe Smith, minister for political and constitutional reform at the Cabinet Office, speaking at Infosecurity 2013's opening keynote. She said that the large turnout for the conference proved that the security industry was thriving with innovation and vitality, in spite of the difficulties of the current economic climate.

"Cyber threats are an increasing challenge to UK businesses, but they also present many exciting opportunities," she said, claiming that the current government was doing everything it can to increase it's ability to detect threats and defend UK interests. "We have to work with UK businesses to help this growing sector and capitalise on this growing demand."
 
Recently, the coalition government has made steps to raise the profile of cyber threats, to generate demnd for more and better cyber security products. Since 2010 when it came into power, cyber threats have been determined to be one of the top four threats to national security. 

In 2011 the government produced a cyber security strategy, with the aim of making the UK one of the most secure places to do business in the world, as well as making it more resilient to cyber attack. 

"£650 million of investment in cyber security has been put in place, in one of the most tightest fiscal environments we have ever seen," Smith said. "This underlines the importance we place in it." 

"Industry is by far the biggest victims of cyber threats. It costs the UK economy billions of pounds per year. As governments and businesses go online, the potential threat grows."

She revealed that today the government would launch new guidance for small businesses on how they could protect themselves from cyber threats.



Infosec 2013: Cyber threats creating boom for security in age of austerity

Technology firms need to grab the opportunities offered by increasing cyber threats, which is creating a thriving security industry in spite of the poor economic climate.

This was the message pushed by Chloe Smith, minister for political and constitutional reform at the Cabinet Office, speaking at Infosecurity 2013's opening keynote. She said that the large turnout for the conference proved that the security industry was thriving with innovation and vitality, in spite of the difficulties of the current economic climate.

"Cyber threats are an increasing challenge to UK businesses, but they also present many exciting opportunities," she said, claiming that the current government was doing everything it can to increase it's ability to detect threats and defend UK interests. "We have to work with UK businesses to help this growing sector and capitalise on this growing demand."
 
Recently, the coalition government has made steps to raise the profile of cyber threats, to generate demnd for more and better cyber security products. Since 2010 when it came into power, cyber threats have been determined to be one of the top four threats to national security. 

In 2011 the government produced a cyber security strategy, with the aim of making the UK one of the most secure places to do business in the world, as well as making it more resilient to cyber attack. 

"£650 million of investment in cyber security has been put in place, in one of the most tightest fiscal environments we have ever seen," Smith said. "This underlines the importance we place in it." 

"Industry is by far the biggest victims of cyber threats. It costs the UK economy billions of pounds per year. As governments and businesses go online, the potential threat grows."

She revealed that today the government would launch new guidance for small businesses on how they could protect themselves from cyber threats.



Infosec 2013: Cyber threats creating boom for security in age of austerity

Technology firms need to grab the opportunities offered by increasing cyber threats, which is creating a thriving security industry in spite of the poor economic climate.

This was the message pushed by Chloe Smith, minister for political and constitutional reform at the Cabinet Office, speaking at Infosecurity 2013's opening keynote. She said that the large turnout for the conference proved that the security industry was thriving with innovation and vitality, in spite of the difficulties of the current economic climate.

"Cyber threats are an increasing challenge to UK businesses, but they also present many exciting opportunities," she said, claiming that the current government was doing everything it can to increase it's ability to detect threats and defend UK interests. "We have to work with UK businesses to help this growing sector and capitalise on this growing demand."
 
Recently, the coalition government has made steps to raise the profile of cyber threats, to generate demnd for more and better cyber security products. Since 2010 when it came into power, cyber threats have been determined to be one of the top four threats to national security. 

In 2011 the government produced a cyber security strategy, with the aim of making the UK one of the most secure places to do business in the world, as well as making it more resilient to cyber attack. 

"£650 million of investment in cyber security has been put in place, in one of the most tightest fiscal environments we have ever seen," Smith said. "This underlines the importance we place in it." 

"Industry is by far the biggest victims of cyber threats. It costs the UK economy billions of pounds per year. As governments and businesses go online, the potential threat grows."

She revealed that today the government would launch new guidance for small businesses on how they could protect themselves from cyber threats.



Privacy groups write to ISPs over \'Snoopers Charter\'

Privacy groups the Open Rights Group, Privacy International and Big Brother Watch have written to internet service providers (ISPs), demanding that they stand up for their customers against the government' 'Snoopers' Charter'.

In an open letter, to Virgin Media, Sky, TalkTalk, BT, Royal Mail, o2 and Zen Internet, they are urged them to "withdraw their participation in a process" that they say "is deeply flawed, pursuing a pre-determined solution that puts competition, security and privacy at risk in an unprecedented way".

Signed by Jim Killock, executive director of the Open Rights Group, Big Brother Watch director Nick Pickles and Sam Smith, technologist at Privacy International, the letter calls on the ISPs to stop holding closed meetings with the government, saying that it "may end up with them becoming an arm of government law enforcement".

The letter reads: “It has become clear that a critical component of the Communications Data Bill is that UK communication service providers will be required by law to create data they currently do not have any business purpose for, and store it for a period of 12 months.

“Plainly, this crosses a line no democratic country has yet crossed - paying private companies to record what their customers are doing solely for the purposes of the state. These proposals are not fit for purpose, which possibly explains why the Home Office is so keen to ensure they are not aired publicly.”

Stating the privacy and security concerns of consumers, the letter says that the ISP's customers have not had the opportunity to comment on these proposals, and that this is a critical failure not only of the government, but is "a betrayal of your customers' interests".

“You appear to be engaged in a conspiracy of silence with the Home Office, the only concern being whether or not you will be able to recover your costs,” they said.

The Communications Data Bill is proposed to collect personal communications data, such as phone calls, emails and text messages. Home secretary Theresa May MP said that it will only be accessed by senior police and not held by the government, while critics have said that it is a "serious problem that requires action" and it has been called a "honeypot for hackers".

The bill was detailed in the last Queen's Speech at the state opening of Parliament in May 2012.



HP launches vulnerability inspection tool

HP has launched the new version of its WebInspect technology to help identify vulnerabilities in web applications.

Accordng to the company, the application security solution replicates real-world attacks through a guided testing process. It said that version 10.0 is an automated, configurable solution that allows security teams to efficiently manage test results and distribute security intelligence and remediation guidance early in the development process.

It includes an interactive testing process, named Guided Scan, which is based on an adaptive component recognition technique for analysing modern complex web applications and JavaScript. HP said that this feature leads novice users and professional security testers in adapting tests to specific scenarios in custom environments where test configuration is difficult to troubleshoot.

Mike Armistead, vice president and general manager of enterprise security products at Fortify HP, said: “To effectively build safe and secure web applications, organisations need to be thinking about and testing for critical threats from the onset of development.

“HP WebInspect 10.0 empowers clients to become proactive in their security efforts, rather than reacting to attacks after they happen, by simulating attacks to identify vulnerabilities early on and preventing breaches long before they occur.”



Review of Plantronics Voyager Legend UC Headset

“Can you hear me now?”

You may remember that line from a wireless-phone company commercial.  The reason that line is so successful is that we all say it. I’m willing to bet that many of you say that or some version of that question pretty often. We want to make sure we are heard.

This review of the Plantronics Voyager Legend headset is for the entrepreneur on the go, or the small business owner, manager or professional who needs a solid hands-free device with excellent reception and sound clarity.  And one also looking for time savings and convenience.

Last year, I was part of a Plantronics contest and received a Voyager Legend headset. At the time, I rarely used my mobile phone for important business calls because I could not depend on the other mobile headsets I had tried in the past. That meant I coordinated most of my meetings when I was absolutely certain I would be in a quiet place with the strongest wireless signal.

Since then, little by little, I started to use the headset. I’m pleased to report that I use a Voyager Legend headset nearly every day now.  I live on an island and when I go out for the day for business meetings, I have to take a ferry and am often gone for the day.  So I end up taking a lot of calls when mobile.  And I worry less about where I’m going to be when it’s time to take an important call.

The Voyager Legend (pictured below) comes in several flavors - regular and what is known as “UC” which stands for Unified Communications .

headset

UC is the platform on a user’s computer that allows them to integrate IM, phone calls, video conferencing and more. The Voyager Legend UC headset plugs into your computer with the included USB dongle, letting you take voice and video calls from your computer. The Voyager Legend UC also comes in two variants; one regular and one optimized for Microsoft. The UC version, either one, is $199. The regular Legend (non-UC version) is priced at $99 and this is the one I have.

Both versions of this headset are multi-point, allowing you to have two different mobile phones configured to connect to your headset.  That means you don’t have to switch headsets to use a different device.

For team members who use multiple devices during the workday, you begin to see the advantages.

What I really like:

  • The Mute button. On the headset, there is a simple button, but cooler is that the headset announces to you only that the “mute is on.” Of course, it tells you it is off, too, when you press it again. You can press the mute button on your actual phone, but I like the headset one.
  • The sensor technology (I don’t know exactly how it works, but it is cool): If I put it on my ear as the phone is ringing it will still answer the call. No fumbling about to make the switch.  If it’s already in my ear, I can use voice commands to answer it or ignore it.
  • On the UC front, not having to manually connect each device you want to switch to, is a time-saving option.

What I would like to see:

  • A universal charger - the headset has its own proprietary connection. This is the only downside, in my view. To be fair, it is probably pretty hard to fit a micro-USB connection into that tiny space. The good news is that the other end is a standard USB connection so most chargers will accept the USB end, or your laptop can charge it for you.

Although this review is focused on the Voyager Legend, I have to throw in a few good words about another option - the Calisto speakerphone, also by Plantronics. The Calisto is a portable speaker approximately four inches square by 1.5 inches tall. It can connect to your laptop with a small USB keyfob or via Bluetooth.  It is powered by a rechargeable lithium battery (connect it to a USB charger).

I am using the 620 model, optimized for Microsoft Lync and it is wonderful. Seriously. I have used it as a speaker in hotel rooms to play music on my Samsung S3. And I have used it as a speakerphone in my car when I’m not using a headset. It connects very quickly and for those who find that their cell phone speakers are just not enough, this little device is a lifesaver. It comes in its own little neoprene case for $149.95. It is also UC-capable.

Overall, if you find that you want a robust, sophisticated hands-free device, the Voyager Legend headset (UC or regular) is a serious contender.

If you just can’t put something in your ear, or need a speakerphone, look to the elegant little Calisto speakerphone.

Image credit: Plantronics




CrushPath Provides Sales Pitch Platform For SMBs

Matt Knapp has a unique product to sell. As vice president of key accounts for FACTS Management, he is tasked with regularly speaking to schools about the company’s tuition management programs. In addition, Knapp and his colleagues travel around to industry conferences, explaining to others in the education industry how FACTS Management can help K-12 private schools set up and easily manage  tuition payment plans

The company needed a solution that allowed them to summarize, in true elevator-pitch style, how their business model works. FACTS Management also wanted an interface that would allow them to easily communicate with customers.

Enter Crushpath. In just nine months, the company has grown to a customer base of more than 8,000, including FACTS Management. Through Crushpath, Knapp set up a short and concise, yet visually-appealing, site to reach out to potential customers. The page breaks down what FACTS Management offers, complete with easy ways to get in touch and quick facts about the company - like the fact that more than 1.5 million families and 6,000 schools use FACTS’ services.

Knapp also utilizes Crushpath to demonstrate the product in sales pitch meetings and at professional conferences. The simple summation of what a business does is ideal for demos to potential clients, Knapp has found. The site is the ideal combination of some of today’s best marketing tools.

“It’s like LinkedIn and Powerpoint had a baby,” Knapp enthuses on Crushpath’s website.

Businesses aren’t the only users of Crushpath. CEO Sam Lawrence has found that workers are also using the site as a great place to launch a product or service. Whether those individual entrepreneurs are self-employed or working for a company, Crushpath users are finding it’s a unique way to promote a product away from the typical business constraints.

According to Lawrence, professionals from big-name companies like State Farm, Cox Communications, and ADP are using Crushpath to reach out to customers. Traditional marketing methods are now seen as outdated, leading many businesses to find new ways to market that match today’s Internet-based world. Showcasing a business’s offerings on a tablet, utilizing a Crushpath pitch page, shows a business is far more modern than if that same business handed out a brochure.

Currently, Crushpath is offering a special to new members. For only $9 per month for the first year, businesses have access to unlimited pitch sites. If your business needs pitch pages for more than five team members, a company license is available. This gives businesses access to unlimited pitch sites, templates to help you create pitches, and analytics to allow you to view the results of all of your employees’ pitch pages in one place. With a 14-day free trial, you’ll be able to try the service out to see if it works for your company.

To learn more about Crushpath, visit http://www.crushpath.com/



CrushPath Provides Sales Pitch Platform For SMBs

Matt Knapp has a unique product to sell. As vice president of key accounts for FACTS Management, he is tasked with regularly speaking to schools about the company’s tuition management programs. In addition, Knapp and his colleagues travel around to industry conferences, explaining to others in the education industry how FACTS Management can help K-12 private schools set up and easily manage  tuition payment plans

The company needed a solution that allowed them to summarize, in true elevator-pitch style, how their business model works. FACTS Management also wanted an interface that would allow them to easily communicate with customers.

Enter Crushpath. In just nine months, the company has grown to a customer base of more than 8,000, including FACTS Management. Through Crushpath, Knapp set up a short and concise, yet visually-appealing, site to reach out to potential customers. The page breaks down what FACTS Management offers, complete with easy ways to get in touch and quick facts about the company - like the fact that more than 1.5 million families and 6,000 schools use FACTS’ services.

Knapp also utilizes Crushpath to demonstrate the product in sales pitch meetings and at professional conferences. The simple summation of what a business does is ideal for demos to potential clients, Knapp has found. The site is the ideal combination of some of today’s best marketing tools.

“It’s like LinkedIn and Powerpoint had a baby,” Knapp enthuses on Crushpath’s website.

Businesses aren’t the only users of Crushpath. CEO Sam Lawrence has found that workers are also using the site as a great place to launch a product or service. Whether those individual entrepreneurs are self-employed or working for a company, Crushpath users are finding it’s a unique way to promote a product away from the typical business constraints.

According to Lawrence, professionals from big-name companies like State Farm, Cox Communications, and ADP are using Crushpath to reach out to customers. Traditional marketing methods are now seen as outdated, leading many businesses to find new ways to market that match today’s Internet-based world. Showcasing a business’s offerings on a tablet, utilizing a Crushpath pitch page, shows a business is far more modern than if that same business handed out a brochure.

Currently, Crushpath is offering a special to new members. For only $9 per month for the first year, businesses have access to unlimited pitch sites. If your business needs pitch pages for more than five team members, a company license is available. This gives businesses access to unlimited pitch sites, templates to help you create pitches, and analytics to allow you to view the results of all of your employees’ pitch pages in one place. With a 14-day free trial, you’ll be able to try the service out to see if it works for your company.

To learn more about Crushpath, visit http://www.crushpath.com/



State-affiliated espionage statistics highlight threat of attacks and data breaches

The reality of state-affiliated espionage dominates this year's Data Breach Investigations Report from Verizon.

Drawing on data from 47,000 instances and from 621 confirmed data breaches, the report now considers state-sponsored hacking to be a serious matter, with state-affiliated espionage campaigns accounting for 20 per cent of all breaches in comparison with cyber crime, which accounts for 75 per cent of breaches.

The 60-page report also found that the amount of data stolen has decreased, while 92 per cent of data breaches were attributable to outsiders, and 14 per cent committed by insiders.

Chris Porter, managing principal at Verizon, told SC Magazine that this was not really a surprise, as year-on-year it was much the same. He said: “One of the things I believe is that insider statistics are higher than what we have here; if you look at a data breach a lot of the time an organisation doesn't know what happened if it wasn't for third parties letting them know.

“With an insider there is no easy way to find them and no fraud algorithm to identify this and if you catch the person, you don't call the police and don't have forensics to know what happened, and that is why this has showed up in the data set.

“If insiders are involved, it is usually for a lost laptop of mis-delivery of an email. This is more down to error.”

Porter said that in this year's report, there was not one standout statistic, as it had looked at large and small businesses and what was new was the espionage factor, and that was where the attacks showed up.

He said: “Espionage actors come from different locations and go after different assets, and we are seeing a clear difference between spyware and state-affiliated espionage. We wanted to shine a light on this and show the data on this.”

The report discovered that in terms of attack methods, hacking was the number one way for breaches to occur, with hacking a factor in 52 per cent of data breaches and 76 per cent of network intrusions exploiting weak or stolen credentials. Porter said: “With organised crime we call it a ‘smash and grab' where the attacker looks for open remote servers and brute force attacks on credentials.”

Also, the compromise-to-discovery timeline continues to be measured in months and even years, as opposed to hours and days. This year found that the number of breaches that remain undiscovered for months or more rose from 55 per cent in 2011 to 66 per cent in 2012, while discovery time was months for 62 per cent of respondents.

Porter said that people need to be able to identify that something has happened, and be able to react to it, and this requires having an incident response in place.”

Asked why there was such a strong focus on state-affiliated espionage campaigns, Porter said that there was no real decision to focus on this, it was just that the data was so strong, as the data set changes year-on-year.

Despite high-profile reports by companies such as Mandiant on APT1 and Kaspersky Lab on Flame and Red October, Porter said that state-affiliated espionage is "not a new problem", just that there was greater visibility on the issues.

“We got data at the time of the Mandiant report and did not take an alarmist tone, as we did not want to spread fear, uncertainty and doubt as this is not a new problem, it is just that we had data on it,” he said.

Wade Baker, principal author of the Data Breach Investigations Report series, said: “The bottom line is that unfortunately, no organisation is immune to a data breach in this day and age. We have the tools today to combat cyber crime, but it's really all about selecting the right ones and using them in the right way.

“In other words, understand your adversary - know their motives and methods, and prepare your defences accordingly and always keep your guard up.”



SafeNet offers cloud-based key management

SafeNet has launched what it calls the ‘first crypto hypervisor' that aims to solve key management issues.

According to the company, the Crypto Hypervisor delivers key vaulting and encryption services on demand in a cloud operational model that enables organisations to virtualise their crypto resources and ensure that all data can be safely encrypted, even as it moves in a virtualised environment. 

Speaking to SC Magazine, SafeNet CEO Dave Hansen said that this is a significant announcement in the hardware security module (HSM), as if offers multiple instances within a box. He said: “We needed to support the next generation of users in the cloud. This is based on the HSM platform to generate keys, store them and digitally sign.

“The operating system sits on a box and not an isolated server, it is a dedicated box with anti-tampering and the HSM is traditionally the Fort Knox of crypto.

“This will allow large enterprises to offer the ability to manage more keys in the cloud. Administrators will be able to plug in multiple customers on the same box and the customers can manage it. It can also be run in the cloud with multiple servers.”

Hansen said that this will permit less data centre reliance and more use of the cloud and the user's own environment and referred to it as ‘elastic key vaulting'.

“This is something worth getting into the cloud for, it is now even easier to leverage technologies,” Hansen said.

“The administrator runs it, so the end-user doesn't have to manage boxes and it makes management easier. Users want an ‘as-a-service' model, well this is a big thing for the largest customers.”

Christian Christiansen, program vice president of security products and services at IDC, said: “Storing the keys in special-purpose hardware, such as a hardware security module, is the recommended best practice. However, until now, hardware encryption solutions have not provided sufficient agility and flexibility needed in virtualised and cloud environments.”



Affiliate Managers: Balance Needs of Publishers, End Customers

Editor’s Note: Once again we bring you coverage from the Affiliate Management Days conference. This series of articles is on topics of interest to businesses that offer affiliate programs. 

* * * * *

Brian_MarcusBrian Marcus (pictured), Director of Global eBay Partner Network  is passionate about end customers as well as eBay’s affiliate channel.  In his Affiliate Management Days session, entitled “Customer-Centricity in a Publisher-Centric Channel,” he shared eBay’s changing program that is committed to a stronger relationship with affiliate Read More

The post Affiliate Managers: Balance Needs of Publishers, End Customers appeared first on Small Business Trends.



Affiliate Managers: Balance Needs of Publishers, End Customers

Editor’s Note: Once again we bring you coverage from the Affiliate Management Days conference. This series of articles is on topics of interest to businesses that offer affiliate programs. 

* * * * *

Brian_MarcusBrian Marcus (pictured), Director of Global eBay Partner Network  is passionate about end customers as well as eBay’s affiliate channel.  In his Affiliate Management Days session, entitled “Customer-Centricity in a Publisher-Centric Channel,” he shared eBay’s changing program that is committed to a stronger relationship with affiliate Read More

The post Affiliate Managers: Balance Needs of Publishers, End Customers appeared first on Small Business Trends.



Latino Small Business Owners Lack Financing

latino business

Latino small business owners are increasing in number. But the Latino business community still lacks access to that -oh-so-important resource: capital.

Latinos are one of the fastest-growing segments of small business owners in the United States.  Estimates suggest by the end of the decade there could be as many as 12 million small businesses owned by Latinos.

A recent report from Biz2Credit, a website connecting small businesses with lenders, suggests assistance is needed to give Latino and other small business Read More

The post Latino Small Business Owners Lack Financing appeared first on Small Business Trends.



Latino Small Business Owners Lack Financing

latino business

Latino small business owners are increasing in number. But the Latino business community still lacks access to that -oh-so-important resource: capital.

Latinos are one of the fastest-growing segments of small business owners in the United States.  Estimates suggest by the end of the decade there could be as many as 12 million small businesses owned by Latinos.

A recent report from Biz2Credit, a website connecting small businesses with lenders, suggests assistance is needed to give Latino and other small business Read More

The post Latino Small Business Owners Lack Financing appeared first on Small Business Trends.