Technology seminar "Tasty morsels in the HPE menu"

The HPE offer includes several new products and opportunities that we decided to present to you at a technology meeting that we organize together with HPE Polska.

Below we present our subjective choice:

  • An alternative backup solution at a very good price: HPE VM Explorer + deduplication from HPE StoreOnce (alternative to veeam).
  • Inexpensive multisite stretched cluster (network RAID) using the HPE StoreVirtual 3200 array.
  • The successor of blade servers - HPE Synergy 12000 (especially interesting for owners of blade computers, a lot of news).
  • Cosmic possibilities with HPE Moonshot and HPE Apollo servers (highly scalable modular computers with high density).
  • News in the HPE 3PAR world - additional functionalities, favorable licensing changes.

Our free seminar will be held on Tuesday, September 19 at the Concordia Design conference center in Poznań at 3 Zwierzyniecka Street. Apart from interesting topics and gifts that we will distribute among the participants of the meeting, the proximity of the newly opened "Bałtyk" Business Center will be an additional attraction: o)

Information on the meeting agenda can be found here here. Please register using form on our websitej.

Summary of the "Workshop - security of information systems".

We finished in early July series of workshops introducing our clients to IT security issues. There were four meetings devoted to the following topics:

  • Penetration tests (reconnaissance, scanning, enumeration, metasploit, password cracking, wifi analysis),
  • Social engineering tests (backdoors, delivering malware, avoiding detection by antiviruses),
  • Web application tests (password cracking, SQL injecting, BurpSuite scanning),
  • Risk analysis and protection of personal data in the context of GDPR.

In total, about 40 people visited us during the workshops. More people were interested, but due to the capacity of our conference room, we could not register all of them

Our experience gained so far during security audits and system tests shows that the security solutions used in enterprises do not correspond to rapidly changing threats, and one of the most effective and, at the same time, the most neglected security measures for IT systems is training and a continuous process of improving employee competences. It should be noted that training should be periodic and be oriented towards updating knowledge in line with emerging threats.

I am pleased to inform you that our autumn safety workshop proposals for you are very interesting. You will of course be informed about the dates. The topics presented include new generation firewalls operating on the application layer, protection of workstations with the use of behavioral analysis, issues of backup as a service and outsourcing of services related to security.

Using the links below, you can read the materials from our workshops:

We would like to thank all participants for their time and feel free to contact us.

Workshop "EMC Avamar - backup solution for workstations and servers as an additional protection against ransomware attacks".

In recent days, some companies have experienced a ransomware attack WannaCry. More than 200,000 computers in over 100 countries have been infected. Antivirus protection and user training are not always effective with this type of software. For this reason, an efficient solution for managing data backups (backup) is an effective supplement to data protection methods.

We invite you to a workshop on EMC Avamar - the best workstation and server backup solution on the market, which will take place on June 8 this year at our company's headquarters in Poznań at 22 Ostrobramska Street.

The distinctive features of EMC Avamar are:
- backup of physical and virtual environments,
- backup of servers, workstations and databases (MS-SQL, Oracle, DB2),
- the best data deduplication ratio on the market (many times better than in the case of veeam Backup & Replication),
- efficient deduplication "on the source side",
- efficient work in a wide area network - effective use of the available band,
- data recovery also available to users,
- reconstruction of single and whole machines (also "bare metal"),
- intuitive user interface,
- very favorable licensing.

EMC Avamar is available as a complete hardware appliance containing the necessary disk resources and as a virtual appliance. EMC Avamar can be complemented by EMC DataDomain - an efficient, hardware data deduplicator.

During our workshops, we will discuss in detail the technical aspects of EMC Avamar's operation and show the solution in action. After the workshop is over, you will have the option of renting the device and testing your environment.

The workshop is free of charge.

To register your participation in the meeting, please use form on our website.

We cordially invite you and see you!

Workshops - security of information systems

Ladies and gentlemen,

IT system security issues are of interest not only to institutions such as banks, energy companies and government administration. The problem affects all companies, regardless of their size, on a daily basis, including many of our clients. According to the report entitled "Business protection in digital transformation or 4 steps to a safer company" recently published by PwC Polska, as many as 96% companies experienced over 50 security incidents in the last year. Due to the growing integration of production systems with IT systems, threats also apply to the continuity of production.

According to our experience, the most common (realized) manifestation of cybercriminals' activity among our clients are the effects of ransomware in order to obtain a ransom. We wrote about the spectacular amounts of ransom in an article on our blog. In this context, it is also worth considering attacks on production systems (OT) such as production lines, industrial automation, and warehouses. In this case, you can also expect interest from cybercriminals - they can count on a large ransom for withdrawing from the attack, since in some companies known to us the costs of stopping and restarting production are counted in millions of zlotys.

In order to meet the expectations of our clients and to make them aware of the scale of the threats, we decided to organize a series of 4 workshops during which we will show how and how easy it is to threaten our IT and OT systems. Below you will find the dates and agendas of individual meetings. The meetings will be held at our company's headquarters in Poznań at 22 Ostrobramska Street. The duration of each workshop is 4 hours, and participation is free of charge.

During meetings 1, 2 and 3, please have a computer with a virtual machine with the KALI Linux distribution with you, the installation version of which can be downloaded using of this link.

Workshop 1 - Introduction to Penetration Testing - April 25, 2017

Topics:
- information reconnaissance,
- scanning and enumeration,
- brute force and dictionary attacks on passwords,
- attacks on WLAN networks.

To register for the workshop on April 25, 2017, please use registration form.

Workshop 2 - Penetration Testing and Social Engineering - May 16, 2017

Topics:
- metasploit,
- social engineering toolkit,
- generating backdoors,
- C&C servers.

To register for the workshop on May 16, 2017 please use registration form.

Workshop 3 - Web Application Penetration Testing - May 30, 2017

Topics:
- structure of web applications (languages, frameworks, web servers),
- introduction to SQL,
- vulnerability scanning,
- sql-injection and CSS attacks.

To register for the workshop on May 30, 2017, please use registration form.

Workshop 4 - General Data Protection Regulation (May 4, 2016, Official Journal of the European Union) - moved to July 4, 2017

Topics:
- uniform rules throughout the European Union,
- new obligations of the Data Protection Officer,
- risk analysis - methodologies and examples,
- severe penalties.

To register for the workshop on June 20, 2017 please use registration form.

You're welcome!

UpGreat is a partner of the 6th Lodz IT Convention

VI Łódzki Konwent Informatyków

On April 6-7, 2017, at the Molo Hotel in Smardzewo on the Sulejowski Reservoir, the event will take place VI Convention of Informatics employed in public administration. The conference is aimed at representatives of public institutions responsible for computerization of their units. During the meeting, there will be a series of presentations devoted to, inter alia, e-services in public administration, medical records management and cloud services.

Our company is a partner of the convention alongside such companies as Microsoft, Samsung, Ever, Kyocera.

On the second day of the convention, Jakub Staśkiewicz, a security consultant in our company, will lead presentation entitled "Data leakage - how not to manage security incidents". During the demonstration, we will discuss in detail one of the cases of vulnerability to cyber threats detected by us in an organization providing services on the Internet.

During the entire convention, we also invite you to our stand, where you will be able to talk and consult related to the broadly understood information security. In addition to services like security audits, KRI audits, security policies and training, we also offer SOC (Security Operations Center) services, i.e. outsourcing of security management services.

Therefore, we invite all our customers and friends to the convention, to our presentation and to our stand. See you later!