Neovera Launches Secure Performance Hub Solution in Collaboration with Equinix

Securely Accelerates Cloud, Network & Application Performance for the Enterprise

RESTON, Va.–(BUSINESS WIRE)–Neovera, Inc., a leading provider of cyber security services and enterprise cloud solutions, today announced the launch of its Secure Performance Hub solution in collaboration with Equinix, the leading data center and interconnection company. The solution provides secure high-speed, high-capacity direct connections to any public cloud provider. With Neovera Secure Performance Hub, enterprises can easily create hybrid environments between their internal data center(s) and public cloud environments to ensure optimal application and workload performance across global network environments.
“Enterprises looking for a secure, end-to-end fully managed Performance Hub solution can take advantage of the numerous benefits Neovera offers without deployment hurdles or incurring a CAPEX burden on their budget,” said Ryan Child, President at Neovera. “We’ve bundled co-location, power, cross connects and servers into one simple offering, and deliver it with 24×7 continuous support provided by Neovera’s Joint Security Operations Center (JSOC) located in the LEED & SSAE16 SOC-1 Type II Equinix Data Center in Ashburn, VA.”

Neovera’s Secure Performance Hub empowers enterprises to deploy business critical applications in multiple public cloud infrastructures, with industry-leading security, availability, and performance that today’s businesses demand. As a result, Secure Performance Hub provides globally consistent network security and quality of experience to users—all while potentially lowering Total Cost of Ownership.

“As more and more enterprise customers look to incorporate cloud deployments in their overall IT infrastructure, it’s crucial that they have a secure and high-performance solution with direct access to multiple cloud providers,” said Greg Adgate, vice president of global technology partners and alliances. “Equinix is pleased to be working with Neovera to provide solutions that enable enterprises to solve real-world challenges and advance their IT initiatives in a cost-effective manner.”

About Neovera

Neovera is a trusted provider of complex hosting solutions, leveraging over 15 years of unmatched technical expertise in enterprise cloud solutions, cyber security, and infrastructure management services. Headquartered in Reston, Virginia, Neovera’s clients range from start-up and non-profit organizations, to global media, healthcare, education, and financial institutions. Our goal? To help our clients achieve the highest return on their IT investment, ensuring convenience, superior support, and security of their mission critical systems and data. Learn more at www.neovera.com.

Read full press release here.

Neovera Joins F5 Networks UNITY Partner Program

Neovera’s Secure Performance Hub solution creates strong foundation for F5 partnership, empowering enterprises to deploy business critical applications in multiple public cloud infrastructures.

RESTON, Va. – Neovera, Inc., a leading provider of cyber security services and enterprise cloud solutions, today announced it has joined the F5 Networks UNITY™ Partner Program. In joining F5’s Partner Program, Neovera has gained access to the sales and marketing tools—as well as the training and services—necessary to provide the best possible service and support to its customers.

“Through the Neovera Secure Performance Hub solution, customers are able to meet the ever-increasing bandwidth and implementation demands expected in today’s enterprise market,” said Ryan Child, President at Neovera. “Our customers value our commitment to providing best-of-breed solutions, so we view the addition of the F5 product line as a wise investment of our time and resources.”

In partnership with F5, Neovera’s Secure Performance Hub empowers enterprises to deploy business critical applications in multiple public cloud infrastructures, with industry-leading security, availability, and performance that today’s businesses demand. As the only managed services and cyber security provider that can assemble, design, deliver and manage Equinix Performance Hub and F5 application delivery and security products as one simple, highly secure, and affordable solution, Neovera is able to lower costs for their users by pushing applications, data and processing closer to the edge of their enterprise network.

“F5 is pleased that Neovera has joined our UNITY Partner Program,” said Aldo Dossola, VP, North America Channels at F5 Networks. “Neovera’s innovative solutions create new experiences that enable customers to achieve maximum return on their investment. This new partnership is equally beneficial for both F5 and Neovera as it allows for mutual expansion of our markets.”

About Neovera

Neovera is a trusted provider of complex hosting solutions, leveraging over 15 years of unmatched technical expertise in enterprise cloud solutions, cyber security, and infrastructure management services. Headquartered in Reston, Virginia, Neovera’s clients range from start-up and non-profit organizations, to global media, healthcare, education, and financial institutions. Our goal? To help our clients achieve the highest return on their IT investment, ensuring convenience, superior support, and security of their mission critical systems. Learn more at www.neovera.com.

F5 and UNITY are trademarks or service marks of F5 Networks, Inc., in the U.S. and other countries. All other product and company names herein may be trademarks of their respective owners. The use of the words “partner,” “partnership,” or “joint” does not imply a legal partnership relationship between F5 Networks and any other company.

Read the full press release here.

Neovera Invited to Speak at Annual Homeland Security Week Conference

Neovera’s VP of Cyber Security Greg Shanton to speak on Cloud Implementation and Cyber Security at 11th Annual Homeland Security Week Conference in Washington, DC

RESTON, Va. Neovera, Inc., a leading provider of IT consulting, cyber security solutions, and infrastructure management services, announced that its Vice President of Cyber Security, Greg Shanton, has been invited by KnightPoint Systems to participate as a panelist for the Cloud Implementation and Cyber Security session at this year’s 11th Annual Homeland Security Week Conference in Washington, DC.

Hosted at the Washington Hilton November 1-3, the Annual Homeland Security Week conference allows industry leaders from both the public and private sectors to discuss the challenges faced currently in the realm of homeland security, and the best ways to answer those challenges and create a safer, more hopeful future for the country. It is an educational platform that, in its 11th year, continues to experience a great deal of popularity throughout the worlds of business, government and academia.

“I am honored to have been asked to participate as a panelist at this year’s conference,” said Greg Shanton, Vice President of Cyber Security at Neovera. “Lending a voice to such a significant discussion is truly a fantastic opportunity and I look forward to utilizing my extensive cyber security background during the session.”

About Neovera, Inc.

Neovera is a trusted provider of cyber security services and enterprise cloud solutions, leveraging over 15 years of experience in preventing, detecting, and remediating cyber threats for companies across multiple industries, including financial services, global media, healthcare, education, retail, technology, and non-profits. Our goal is to help clients understand the security threats associated with their environment, identify risks, and implement the necessary measures to prevent security breaches and data loss. Bottom line: we protect your business and critical information from cyber attacks. Learn more at www.neovera.com.

Read the full press release here.

DDoS Attacks Take Down the Internet

If you were unable to access Spotify, Twitter, or a number of other popular websites last Friday, it’s not a coincidence – according to various reports, a major DNS provider experienced one of the largest recorded DDoS attacks to date via IoT-connected devices. New details are constantly emerging about this attack, though while no one has come forward yet to take credit. Questions are being raised about how IoT-connected devices will impact our future security positioning, when another attack will happen, and how we can learn from this unfortunate series of incidents.

The Chief Strategy Officer at Dyn, Chris York, released a statement about the attack incidents this past Saturday – here are some key takeaways:

  • Two successful DDoS attacks occurred – 7AM and 12PM, respectively – with service being restored within 1 – 2 hours for both.
  • A third attack was attempted around 1PM but ultimately failed.
  • The first attack hit those on the East Coast, barring users from entering popular websites due to the influx experienced by Dyn’s NOC (Network Operations Center).
  • The second attack was global and not limited to just the East Coast POPs (Point of Presence); it was mitigated and Dyn restored service by 1PM EST.
  • There was never a system-wide outage – for example, West Coast users were not affected like their East Coast or European counterparts.

DDoS attacks are scary to consider, and while Dyn was absolutely taken aback by the largest DDoS attack to date, this is nothing new or surprising. Here’s why:

  • IoT-connected devices were used to deliver the Mirai botnets that ultimately staged the DDoS attacks at three different points throughout the day.
  • Mirai botnets are well-known in the cyber security community and have wreaked havoc in the past to the point that there should have been blockades in place.
  • DNS providers did not implement Network Ingress Filtering, Best Current Practice (BCP)-38, and Response Rate Limiting (RRL), all of which would have made the outcome of these events very different.

Tens of millions of IP addresses were associated with the Mirai botnet to pull off what is considered to be an historic DDoS attack. Does this bode well for the future of IoT devices? Yes and no. The IoT as we know it is ever expanding – refrigerators are connected, along with children’s toys, toothbrushes, the list goes on. However, in order to avoid these large-scale DDoS attacks, security protocols need to be implemented in future devices, and security updates need to be required for all current market models. These types of attacks will continue to happen, but only until the producer and consumer realize the grave necessity of complete cyber security protection.

October is National Cyber Security Awareness Month!

As the weather begins to cool and trees begin to turn gorgeous shades of orange and red, the month of October brings a number of changes beyond just the seasons. Most important – October is National Cyber Security Awareness Month! Neovera is a proud member of the cyber security community, leveraging over 15 years of unmatched expertise helping customers protect their critical information and businesses from cyber attacks.  To celebrate National Cyber Security Awareness Month, here are some informative tips to get you thinking about the best path to take for your cyber security needs.

  • 50%: the percentage of small businesses registered in the US alone that have been breached in the past 12 months
  • 60%: surveyed respondents admitting to not creating greater protections even after experiencing a breach
  • 27%: the percentage of small firms surveyed that have absolutely no cyber security protocols in place
  • $551,000: the average amount spent to restore network operations after a significant data loss event
  • 42%: enterprises that have mandatory cyber security information lessons
  • 36%: percentage of employees surveyed who have been exploited via their mobile device
  • 90%: organizations surveyed that have experienced some type of external threat
  • $942,000: average amount spent by enterprises on a breach in a virtual environment
  • 34%: the security incident percentage caused by someone clicking on an errant link or advertisement

Neovera provides 24×7 cyber security monitoring and management services to protect your vital data. By constantly monitoring all vulnerable spots within your network and infrastructure, our team of experienced IT and cyber security analysts will know at a moment’s notice when and if your organization is at risk of an attack, and what to do about it. You have enough to worry about at your company – goals to achieve, customers to acquire, expansion plans, and more. So let Neovera do the heavy lifting by ensuring the security of your infrastructure so you can focus on your business.

Cyber Warfare: The Biggest Challenge Facing the Next President

“Well, I think cyber security, cyber warfare will be one of the biggest challenges facing the next president…” With one of the largest audiences in the history of televised presidential debates, the candidates did not shy away from pressing topics, one being cyber warfare. A significant player in this year’s election cycle, it is a necessary conversation to have – regardless of political affiliation. Cyber crime is an issue that has plagued organizations, corporations, individuals and beyond. The private sector has yet to fully embrace the severity of possible cyber warfare, and that the public sector has yet to truly catch up with the latest technology, both need to work together and separately so everything within the IoT is fully and completely secure for a more reliable experience.

Let’s look at the staggering cyber warfare facts from this year alone:

  • 1 in 5: The ratio of small businesses that fall victim to hackers every year.
  • 60: The percentage of said small businesses that go out of business within six months of the attack.
  • $551,000: The average amount spent to restore network operations after a significant data loss event.
  • 34: The percentage of security incidents caused by someone clicking on an errant link or advertisement or visiting a compromised website.
  • 36: The percentage of employees exploited via their mobile device.
  • 40: The percentage of large enterprises who are confident in their suppliers’ information security system.
  • $1 Billion: The amount of money spent freeing networks and data from the aftermath of ransomware attacks.
  • 90: The percentage of organizations that have experienced some type of external threat.
  • $942,000: The average amount enterprises spend to handle a breach in a virtual environment.

Cyber warfare, on both a large and small scale, can impact any citizen, or group of citizens, at any time. Who could forget the attack by China on the Office of Personnel Management this year that resulted in countless unencrypted pieces of data getting into the wrong hands. Cyber security protection is beyond necessary, and of the utmost importance. Given the current cyber crime landscape today, the concern is no longer IF but WHEN an organization will be attacked. Safeguard the security of your critical data by implementing a solid cyber security plan that includes monitoring and management services by cyber professionals such as Neovera. You can rest assured that we will protect your vital information from cyber threats at home and abroad.

Neovera Selected to Provide Cyber Security Monitoring to CoventBridge Group

Neovera to provide high-performance Cyber Security Monitoring solution to full service investigation company CoventBridge Group

RESTON, Va. Neovera, Inc., a leading provider of IT consulting, cyber security solutions, and infrastructure management services, announced Friday it is now monitoring infrastructure for full service investigation company CoventBridge Group. With locations in both the UK and US, CoventBridge will receive continuous 24x7x365 monitoring with Neovera’s high-performance Cyber Security Monitoring (CSM) solution.

With CoventBridge’s unique standing as the only HIPAA and SOC-T2 compliant agency in the world, it became imperative to have a strong cyber security monitoring plan. Having a worldwide reach of over 1,000 employees and affiliates – who provide their clients with robust top-tier data privacy and security, as well as customized case management technology – both CoventBridge and their clients must be protected every step of the way.

“Cyber security is a non-negotiable priority for CoventBridge as part of our commitment to ensuring our clients have unrivalled protection and confidence in our management of their data and resources,” said Jason Zurn, Chief Information Officer at CoventBridge. “Neovera is providing us with 24×7 managed intrusion detection, global network scanning services, and centralized auditing and logging of our firewalls and security appliances at all our locations. Our clients can be assured in the security of their data as a result of this strategic partnership.”

“Having over 15-plus years of experience securing our customers’ data, and our comprehensive cyber security monitoring platform, we were the ideal fit for a sophisticated organization like Coventbridge,” said Greg Shanton, Vice President of Cyber Security at Neovera. “Layering our monitoring platform onto existing infrastructure across multiple Coventbridge locations was a highly complementary approach for their team and infrastructure model, helping to extend the security of their critical information by creating awareness, increasing compliance, and managing cyber-threats and vulnerabilities.”

 

About CoventBridge
CoventBridge Group is a full service investigation company providing: Surveillance, SIU and Compliance, Claims Investigation, Counter-Fraud Programs, Desktop Investigations, Social Media, Record Retrieval, Canvasses and vendor Management programs. With offices in the UK and US the company provides top tier data privacy and security practices, deploys robust case management technology customized to clients’ needs and delivers worldwide coverage via it 1000 and affiliates worldwide.

About Neovera, Inc.
Neovera is a trusted provider of complex hosting solutions, leveraging over a decade of unmatched technical expertise in IT consulting, cyber security, and infrastructure management services. Headquartered in Reston, Virginia, Neovera’s clients range from start-up and non-profit organizations, to global media, healthcare, education, and financial institutions. Our goal? To help our clients achieve the highest return on their IT investment, ensuring convenience, superior support, and security of their mission critical systems. Learn more at www.neovera.com.

National Security Agency Hacked

The National Security Agency is a little less secure these days – it was recently announced that they were victim to a significant hack attack from “Shadow Brokers”. However, they themselves are also connected to one of the most extensive hacks in recent history according to Kaspersky Lab. In a world where cyber attacks are far-reaching and constantly evolving, will our national security be able to stay one step ahead of these innovative government hackers?

When it was announced that the National Security Agency had experienced a significant hack and top-secret information was stolen, fingers started pointing at parties related to the Russian government. Eventually the group “Shadow Brokers” came out from the woodwork and began to boast of its treasure trove; specifically they mentioned what are known as cyberweapons used by the NSA to attack perceived enemies of the US government. This is where we have to go back a few years, because while the NSA is the overall body with the cyberweapons in its possession, it was a particular group that worked with them. Known as the “Equation Group”, they were the ones taking action by creating hundreds of backdoors to government networks in Russia, China, India, Britain, the list goes on.

Currently, the grandstanding continues online. The Shadow Brokers are taunting users online, saying that for one million bitcoins ($576 Million) they will release the rest of the information they have from the hack. Though they aren’t anywhere near reaching their goal it brings up a lot of questions that many of us have yet to even realize need answers. One would probably be, it’s the National Security Agency – how were they hacked to begin with? Unfortunately we probably won’t ever know, but most of the time these super sensitive data troves are stored within air-gapped systems and not connected to the Internet. So, with that, could it have been a disgruntled employee with a flash drive? Potentially, but again it’s all speculation.

As a whole, these findings speak to the uncomfortable truth of cyber espionage becoming a bigger part of the national and international narrative. A small silver lining is that cyber security is easily kept in our own smaller narratives. Whether your business has one location or ten, guaranteeing the continued protection of your network so that both you, your employees, and your clients are safe and secure is the top priority at Neovera, a managed and monitored security services provider. With 24x7x365 protection, detection, and remediation, Neovera can take cyber security worries off your hands and protect your sensitive network information.

Criminals Love Pokemon GO Users

Unless you’ve been living under a rock in the middle of the ocean for the past few weeks, chances are you’ve heard of Pokemon GO. Though I’m fairly certain even those living under said rocks in the middle of the ocean have heard of it. Moving on.

Pokemon GO’s fast-rising popularity is great for Niantic, the game’s creator, but simultaneously creates a potential hotbed of security issues on top of those already reported. The most recent breach involved the group OurMine implementing a DDoS attack this past Saturday that knocked out the entire network. Going beyond the “he said, she said” between Niantic and OurMine, the fact is that something as simple as a DDoS attack – which we’ve approached before – took down their network is inexcusable.

Beyond the lack of very basic cyber security protection comes the issue of access and how much is required. Pokemon GO needs to access your GPS, camera, the list goes on, all to play the game. And even though the company fixed this security flaw, at one point someone with limited hacking knowledge could access the game and gain information on any user’s location, current or past. What hasn’t been addressed is the amount of access allowed to third party vendors. In the middle of a 20 page privacy policy, Niantic allows third party vendors to access any and all user information without any notification. Who is to say that your sensitive personal information won’t fall into the wrong hands?

Everyone wants a piece of Pokemon GO – including criminals. Now many are blaming the quick rollout of the game – they expanded to 26 countries this past weekend alone – for the security and operating flaws. Shifting blame doesn’t solve the very real problem that every user is at risk when they log into the game, and the network itself is intensely vulnerable as well. As a cyber security management and monitoring company, Neovera’s top priority is understanding every aspect of the industry and implementing the latest features for each individual client. This means all the information you need is directly accessible through an actual person, and not stuck in some 20 page jumble.

Air-Gapped Systems: The Impenetrable Become Penetrable

Air-gapped systems are utilized by military and financial institutions around the world for their secure and practically impenetrable states – they utilize what is known as an air wall, meaning the network in question is not connected to the Internet or any other outside systems, so that the data is as secure as possible. Because these networks are not connected to the Internet, hackers have to be physically close to the systems in order to infiltrate and steal these guarded secrets. What is the latest attack used by hackers to garner this information, and are there any truly secure networks?

Over the past two years, a group of researchers in Israel have come close to perfecting attacks on air-gapped systems. It’s not just close proximity that is needed for hackers to infiltrate these networks – first the system in question needs to be infected with malware. Known as Fansmitter, this malware targets the speed of the fans in the computers – which are either the CPU, chassis, graphics card or power supply fans. By manipulating the speeds, hackers are able to communicate the binary ones and zeros that compose the data they want to steal by way of the sounds emitted from the controlled fans. Since it is a slower process, the amount of data stolen is in small increments but still vital to any company – anything from usernames, passwords, protected encryption keys, and more.

Obviously this is a time consuming process and requires an ability to be physically close to these networks; not impossible, but these institutions don’t make it easy. Hackers have answered with gusto and continued to come up with alternative attack methods – from utilizing radio or even electromagnetic waves, these attackers have gone above and beyond while organizations have faltered slightly behind when dealing with protecting these systems.

While the majority of private and public institutions won’t have to deal with an attack as sophisticated as the ones affecting air-gapped systems, they will have to deal with increasingly unique attacks. Ones that, unless you have an MSS/MSSP in your corner, will catch most businesses off-guard and unawares. Neovera makes it their mission to monitor for the latest threats on their client’s networks and keep themselves up-to-date on the latest news that affects any and all industries big and small. Neovera works 24x7x365 to keep themselves – and their clients – ahead of threats so that day-to-day business is uninterrupted.