Daily Archives: January 11, 2018

U.S. Department of Defense Awards ForeScout Enterprise-wide IoT Security Agreement

ForeScout joins Pentagon’s ESI program to accelerate military’s use of commercial software, helping defense agencies centralize and expand ForeScout deployments

SAN JOSE, Calif., Jan. 11, 2018 (GLOBE NEWSWIRE) — ForeScout Technologies, Inc., a leading Internet of Things (IoT) security company, today announced that the U.S. Department of Defense (DoD) awarded the company and its federal partners an enterprise-wide blanket purchase (BPA) agreement through the U.S. military’s Enterprise Software Initiative (ESI) program. ForeScout’s partners facilitating ESI purchases are Alamo City Engineering Services, Inc., Carahsoft Technology Inc., DLT Solutions, immixTechnology, Inc. and Patriot Technologies, Inc. Eligible agencies can view full award details here: http://www.esi.mil/contentview.aspx?id=926.

This agreement provides the most current commercially available ForeScout products, maintenance and support for DoD, intelligence community and Coast Guard activities worldwide. The products offered through the BPA include ForeScout CounterAct® agentless security solutions, Enterprise Manager and Extended Modules for third-party orchestration, as well as ControlFabric® Architecture, ForeScout training and ActiveCare® support services.
                                                                                          
“The Department of Defense has been an IoT pioneer since the military’s earliest networked sensors, weapons and vehicle platforms and today runs some of the largest connected device portfolios in the world,” said Niels Jensen, senior vice president of U.S. Public Sector Sales at ForeScout. “ForeScout’s selection for the ESI program underscores the Pentagon’s strategic focus on IoT security and helps validate the proven advantages ForeScout professionals are delivering for DoD customers in demanding environments.”

ForeScout helps both defense and civilian federal agencies discover, classify and manage diverse devices and applications arriving on networks via the IoT’s explosive growth. This new enterprise-wide ESI award expands on ForeScout’s ongoing work to help defense organizations implement the DoD’s “Comply-to-Connect” (C2C) framework, which is responsible for protecting IoT devices and traditional IT systems from evolving security threats. Military agencies and their contractor partners already use CounterACT to maintain visibility and control over connected devices under C2C, keeping IT systems in compliance with DoD Chief Information Officer (CIO) security policies and U.S. Cyber Command operational orders.

ForeScout CounterACT offers a powerful, flexible platform that gives comprehensive protection to defense organizations’ connected assets – from laptops and ruggedized devices in the field, to IoT gear and networked Industrial Internet of Things (IIoT) and operational technology (OT) control systems across bases and shared facilities. CounterACT’s agentless technology discovers, classifies and assesses devices. After discovering a device, CounterACT uses a combination of passive and active methods to classify the device according to its type and ownership, then assesses the device’s security posture and allows an organization to set policies establishing authorized behaviors.

In DoD deployments, CounterACT seamlessly meets rigorous C2C requirements, including:

  • Network-based discovery and classification of devices
  • Redundant manageability and control of devices
  • Orchestration with other mandated security technologies, such as the DoD’s Host Based Security System (HBSS) and Assured Compliance Assessment Solution (ACAS) – confirming these third-party tools are configured and functioning properly
  • Continuous monitoring of connected devices

DoD ESI is an official DoD initiative sponsored by the DoD Chief Information Officer (CIO) to lead in the establishment and management of enterprise commercial, off-the-shelf (COTS) IT agreements, assets and policies. DoD ESI lowers the total cost of ownership across the DoD, Coast Guard and Intelligence Communities for commercial software, IT hardware and services.

Additional Resources:

About ForeScout
ForeScout Technologies, Inc. helps make the invisible visible. Our company provides Global 2000 enterprises and government agencies with agentless visibility and control of traditional and IoT devices the instant they connect to the network. Our technology integrates with disparate security tools to help organizations accelerate incident response, break down silos, automate workflows and optimize existing investments. Learn more at www.forescout.com.

Media Relations Contact:
Katie Beck                                                        
ForeScout Technologies, Inc.
650-314-8705
katie.beck@forescout.com

Investor Relations Contact:
Michelle Spolver
ForeScout Technologies, Inc.
408-721-5884
michelle.spolver@forescout.com

© 2018. ForeScout Technologies, Inc. is a Delaware corporation. ForeScout, the ForeScout logo, ActiveResponse, ControlFabric, CounterACT, CounterACT Edge and SecureConnector are trademarks or registered trademarks of ForeScout. Other names mentioned may be trademarks of their respective owners.

FSCT-O

Viper Networks Announces Coming Launch of Blockchain and Crypto Mining Technologies Group Division

Complements Existing Business Model in the LED, Energy & Smart Cities Sector

TROY, Mich., Jan. 11, 2018 (GLOBE NEWSWIRE) — Viper Networks, Inc. (OTC Pink:VPER), (Company), an international leader in the LED lighting products & integrated systems markets, with a focus on Smart Cities, reported today that the Company is expanding into a strategic industry sector by creating a new division for their emerging Blockchain and Crypto Mining Technologies Group.

By adopting fast-emerging powerful technologies that can strengthen the Company’s core technologies, products and services within the LED industry, Viper Networks is pursuing future success far beyond a single sector leadership position.

Farid Shouekani, the Company’s General Manager stated, “We are in the early stages of blockchain technology and our team has identified applications that can broadly complement our existing business and offer tremendous growth opportunities for Viper Networks.”

“We plan to keep our shareholders updated as coming events unfold.”

Info About Blockchain technology:

The blockchain is an incorruptible digital ledger of economic transactions that can be programmed to record not just financial transactions but virtually everything of value. Originally devised for the digital currency, Bitcoin, the tech community is now finding other potential uses for the technology.

By allowing digital information to be distributed but not copied, blockchain technology created the backbone of a new type of internet in that it has a built-in robustness. However, by storing blocks of information that are identical across its network, the blockchain cannot be controlled by any single entity and has no single point of failure.

Further, no centralized version of this information exists for a hacker to corrupt.

Bitcoin was invented in 2008. Since that time, the Bitcoin blockchain has operated without significant disruption.

Info about Crypto mining:

Crypto Mining is a sector that the Company has been actively exploring due to the large amount of energy required to fuel the mining technology, which dovetails perfectly with Viper Networks Energy division to deliver low cost energy solutions. Bitcoin’s surge in price has sent its electricity consumption soaring. Alex de Vries’ index shows that bitcoin miners worldwide could be using enough electricity at any given time to power about 2.3 million American homes.The use of renewable energy technology continues to grow in the United States and around the world.

For more information go to www.ViperNetworks.com.

Notice Regarding Forward-Looking Statements

This news release contains “forward-looking statements” as that term is defined in Section 27A of the U.S. Securities Act of 1933, as amended and Section 21E of the Securities Exchange Act of 1934, as amended. Statements in this release which are not historical are forward-looking and include any statements regarding beliefs, expectations or intentions regarding the future.

Investor Relations: Heritage First Capital // Scott Gibson, 407.444.5959

What’s the Spectre Your VoIP will Meltdown?

Telephony systems, SBCs and VoIP hardware that rely on Intel, AMD and ARM processors harbor some serious security vulnerabilities

GAITHERSBURG, Md., Jan. 10, 2018 (GLOBE NEWSWIRE) — Patton Electronics—US manufacturer of UC, cloud, and IoT enabling solutions for carrier, enterprise and industrial networks—declares Patton operating systems are NOT vulnerable to the Spectre and Meltdown security threats.*

Recent reports have alerted the world that devices built on the commonly-used Intel, Advanced Micro Devices (AMD) and Acorn RISC Machine or later Advanced RISC Machine (ARM) processors come with significant security vulnerabilities.

The Spectre and Meltdown threats allow hackers to gain access to (and wreak havoc with) all kinds of network elements, including telephony systems, session border controllers (SBCs) and other types of VoIP hardware, which largely rely on these processors.

But there is good news!

SmartNode eSBCs and VoIP customer-premise equipment (CPE) are not vulnerable to such malicious intruders. So, if you picked Patton’s SmartNode VoIP solutions, you have one less thing to worry about!

>>Read the official notice:
Patton Devices Not Vulnerable to Meltdown and Spectre Sidechannel Attacks

Patton’s forward-thinking engineering team has built a fence around the Patton operating system. That “fence” prevents malicious users or third-party software from gaining access to the kernel.

Spectre and Meltdown bugs are only the latest enemies Patton has foiled. Patton products have also shielded customers against such perils as the Heartbleed and Shellshock bugs.

A SmartNode device secures the border between enterprise and service-provider networks. In addition to being secured themselves against common vulnerabilities and exposures (CVE), Patton has implemented a rich set of security features for converged voice-and-data networks. These features include TLS/SRTP for encrypted voice and signaling with public key infrastructure (PKI), plus a built-in firewall with access control list (ACL) and stateful inspection.

*While Patton declares its products are not vulnerable to the Spectre and Meltdown security threats, Patton makes no claims regarding the security of third-party network elements. Patton recommends all customers follow the guidance of any other vendors about patching or upgrading their respective products and systems.

Media Contact: Glendon Flowers | +1 301 975 1000 | press@patton.com

Ministries, sectors urged to finalize FTAs

Deputy Prime Minister Vuong Dinh Hue has urged ministries and sectors to work closely with the Ministry of Industry and Trade to accelerate the signing of FTAs such as the Regional Comprehensive Economic Partnership, the Vietnam-EU Free Trade Agreement, and the Vietnam-Israel Free Trade Agreement.

At the first meeting of the Steering Committee for International Economic Integration on Thursday, Hue stressed the need to respond effectively to government resolutions on international economic integration as Vietnam is extensively participating in regional and international organizations and free trade agreements. The Deputy Prime Minister asked for stronger research on global integration issues to advise the Steering Committee and the government.

Source: VOV5

Mekong-Lancang Meeting releases Phnom Penh Declaration

The 2nd Mekong-Lancang Cooperation Leaders’ Meeting (MLC) reviewed the cooperation situation following the 1st meeting in March, 2016, and discussed orientations for the future.

The meeting, themed Our River of Peace and Sustainable Development, took place on Wednesday in Phnom Penh, Cambodia.

Leaders reaffirmed their goal of building a Mekong-Lancang region of peace, stability, sustainable development, and prosperity. They reached a consensus that the MLC should contribute more to promoting regional socio-economic development, narrowing the development gap between member states, and supporting the building of the ASEAN Community. They urged the MLC to coordinate with development programs and plans like the Master Plan on ASEAN Connectivity (MPAC), the UN’s 2030 Agenda for Sustainable Development (IAI), and regional connection initiatives.

The leaders adopted the Phnom Penh statement and the 5-year action plan with measures to realize cooperation in 3 areas: security and politics; economy and sustainable development; and society, culture, and people-to-people exchanges. Cambodian Prime Minister Hun Sen handed over the co-chairmanship of the meeting to the Lao Prime Minister. Mr. Hun Sen told a press conference afterwards: At the end of the meeting, we established a coordination secretariat for each country and other committees to support member countries, the Water Resources Cooperation Center, the Mekong-Lancang Environment Protection Center, and the Mekong-Lancang Research Center. We are very happy that the commitments made at the 1st Mekong-Lancang meeting have been implemented.

Chinese Prime Minister Li Keqiang reiterated his support for basic rules of the meeting: equality, mutual coordination and consultation, volunteering, contributing, sharing benefits, and respecting the UN’s charter and international laws. He said the Mekong-Lancang cooperation mechanism is effective and appropriate for the current trend of globalization and integration.

Source: VOV5

Iran threatens to resume uranium enrichment

Iran is ready to increase its uranium enrichment to a level several times what it was before the Joint Comprehensive Plan of Action (JCPOA), Iran’s Atomic Energy Organization spokesperson Behrooz Kamalvandi said Wednesday.

He warned that Iran will retaliate unless sanctions are removed.

52 US national security experts signed a letter urging President Donald Trump’s administration not to abandon the Joint Comprehensive Plan of Action.

Source: VOV5

Indonesia calls for end of sinking foreign ships

Indonesia’s senior officials on Wednesday called for an end to the policy of destroying foreign illegal fishing vessels in its waters, warning that it harms Indonesia’s external relations and fishing industry. tion not to abandon the Joint Comprehensive Plan of Action.

Indonesian Vice President Jusuf Kalla said there has been enough sinking of illegal fishing boats.

The Indonesian Chamber of Commerce said this unconstructive policy has damaged the fisheries industry and caused Indonesia’s seafood exports to decline.

Indonesia in 2014 took a tougher stance against illegal foreign fishing boats, which, in many cases, were destroyed.

Source: VOV5