23.10.15

Apple: It is impossible to access encrypted data on iPhones

Your message has been sent
Bovenkant formulier
Onderkant formulier

It is “impossible” to access encrypted data on the vast majority of iPhones, Apple has told a US federal judge in a New York court.
In a brief that was filed on Monday night at the request of magistrate judge James Orenstein, the tech giant explained that it lacks the “technical ability” to hack into smartphones that are operating iOS 8 or higher.
Apple said that the request from the US Department of Justice to “perform forensic services” on a device in the custody of the government is not only unfeasible, but also “substantially burdensome”.
“Apple cannot take possession of a password protected device … and extract encrypted user data from that device for the government.”
It stated: “[Apple cannot] take possession of a password protected device … and extract encrypted user data from that device for the government.
“Among the security features in iOS 8 is a feature that prevents anyone without the device’s passcode from accessing the encrypted data. This includes Apple.”
It added that as of October 5th, approximately 90 percent of Apple devices are running iOS 8 or higher – all of these, in effect, cannot be accessed by the company.
This is the latest development in what is an ongoing case between Apple and other tech companies and the government over data encryption.
Interestingly, in this instance, the iPhone in questions is running on a version of iOS 7, which Apple can actually hack.
However, even this isn’t absolute. In the brief it said that its ability to access encrypted data depends on multiple factors, including whether or not the smartphone is in good working order.
The ethics of hacking into a protected device
However, beyond the technical challenges, as well as the associated physical and monetary costs, the request to perform such an action leaves Apple in an uncomfortable position.
It noted that presently there is an “unprecedented level” of public sensitivity over issues that relate to digital security and privacy.
“This is true not only with respect to illegal hacking by criminals but also in the area of government access – both disclosed and covert,” Apple expanded in the document to the US judge.
“Apple has taken a leadership role in the protection of its customer’s personal data against any form of improper access.
“Forcing Apple to extract data in this case, absent clear legal authority to do so, could threaten the trust between Apple and its customers and substantially tarnish the Apple brand.”
This goes beyond the rule of law, says the government
This case has highlighted the clear divide between what tech companies believe is acceptable and what the US government and its international counterparts consider morally and legally justified.
Speaking last year, James Comey, the seventh director of the FBI, told members of the press that efforts by the likes of Apple and Google to boost privacy features on their devices had left the agency “very concerned”.
He said that that while “no one in this country is beyond the law”, these developments to bolster encryption will allow individuals to bypass the legal system for all sorts of malicious reasons.
“There will come a day … when it will matter a great, great deal to the lives of people of all kinds that we be able to, with judicial authorization, gain access to a kidnapper’s or a terrorist or a criminal’s device,” Mr. Comey said at the time.
“I just want to make sure we have a good conversation in this country before that day comes. I’d hate to have people look at me and say, ‘Well, how come you can’t save this kid,’ ‘how come you can’t do this thing?'”


22.10.15

Is the cloud more secure for you? Only you hold the answer


Thinking of using cloud, but have your doubts whether it’s secure enough? You are not the only one. Even large enterprises or medium and small businesses hesitate to full-heartedly embrace it, fearing that their sensitive data might get compromised when stored online. But is the risk really high or can it be managed?

As the statistics show, more than half of all European enterprises and third of small and medium-sized firms have security concerns when thinking of transferring their operations to cloud. It tops the list outpacing even the uncertainty about the location of their vital data or even practical problems, such as possible difficulties when accessing the information on-demand. As October is a European Cyber Security Month, we will try to take a closer look whether these fears are justified.

Firstly, we have to admit that no system is perfectly secure and this applies to cloud too. But for some companies with lower budgets and manpower a cloud solution might actually lead to improvement in security, as the provider might have more resources dedicated to protecting the system and managing possible security breaches quickly and effectively. However, this isn’t a rule and while the information could be safer online the manipulation while using it locally should be carefully managed too.

Also, cybercriminals are reaching for the same strategies when trying to penetrate cloud and on-site hardware. So even if the cloud servers of the provider present a more tempting target containing the data of dozens or even hundreds of firms, this doesn’t change the types of threats it is up against. So to answer our question − yes, choosing cloud brings with it some risks, but those can be mitigated if resources are managed properly.

Specifying the safety measures in the contract (so-called Service Level Agreements or SLA) with the provider is one of the areas to look out for. If your company adopted a high security standard, uses a reliable software solution and applies other effective protection strategies like two-factor verification or data encryption − all this can be retained when opting for the cloud.

You also have other options like running a security audit to make sure that all of the security conditions you requested from your cloud provider are adhered to. If not, sanctions can be imposed. But most of the above-mentioned measures are only reactionary to the breaches, which might have happened already.

When moving your company business to cloud, you should ask yourself a few questions:

Is your company or its core sector subject to regulation? Many industries like healthcare or finance have strict rules, applying to data storage, sometimes even restricting their storage in another country. If so, it might render your business unable to comply.

Do you know the value of all your assets? At the minimum, identify and classify at least the critical pieces of information you intend to store in the cloud – for example accounting or customers’ private information. Now imagine you will lose access to them for several hours or days. Is your company able to manage such a situation or is there a higher level of security needed and therefore the data has to stay in-house?

How is the data protected when on the move between the cloud and company devices? Encrypting the data on the cloud and on its way to it – no matter if from desktops, laptops, mobile phones or tablets – is important for keeping it secure.

Can you control who is accessing your data? If you want to avoid unauthorized users going through your files and sensitive information. Also when multiple employees are editing a file, you need to be able to identify who has made the changes.


What if the cloud security systems are breached? Is your firm able to absorb the damages done to the brand? Don’t get this wrong, it’s not about financial liabilities, which are most probably part of the SLA. But if the data is lost or stolen, your customers are not going to turn to your cloud provider for a remedy.


21.10.15

Omzetverwachting van Software AG voor FY 2015 naar boven bijgesteld


  • Totale omzet Q4 2015 is 215,9 miljoen dollar
  • Totale omzet met 5 procent gestegen
  • Omzet uit maintenance met 8 procent gestegen
  • Omzet uit licenties met 7 procent gestegen
  • Omzetvoorspelling voor FY 2015 naar boven bijgesteld 
(NB: Alle opgegeven cijfers zijn voorlopig en afgerond)

Brussel, 21 oktober 2015 –Software AG (Frankfurt TecDAX: SOW) heeft zijn voorlopige financiële resultaten voor Q3 2015 bekend gemaakt. De totale omzet steeg met 5 procent tot 215,9 miljoen dollar. De omzet uit maintenance kende een stijging met 8 procent jaar-op-jaar en de verkoop van licenties steeg met 7 procent. Deze groei is mede te danken aan de productlijnen Adabas & Natural, die een groei van 9 kenden, en het Digital Business Platform, dat  en groei van 7 procentbehaalde. Onder het Digital Business Platform vallen alle producten voor digitale transformatie en process excellence, namelijk ARIS, Alfabet, Apama, Terracotta en webMethods. Winst voor rente en belastingen (EBIT) kende in Q3 een aanzienlijk stijging van 34 naar 36 procent, gelijk staat als een stijging van 66 miljoen dollar naar 67 miljoen dollar.

Op basis van de evolutie tijdens de eerste negen maanden van dit jaar en de projectpijplijn voor Q4, stelt Software AG zijn omzetvoorspelling voor het fiscale jaar 2015 bij naar boven.

Het volledige Engelstalige persbericht met een verklaring van de cijfers is te vinden op
: www.softwareag.com/press


Over Software AG
Software AG helpt klanten innoveren, differentiëren en scoren in de digitale wereld. De producten van Software AG helpen bedrijven om systemen die on premise en in de cloud draaien te combineren op één platform, waardoor ze hun business kunnen optimaliseren en digitaliseren. De combinatie op één middlewareplatform van procesbeheer, data-integratie en analytics in real time laat klanten toe hun operationele efficiëntie te verbeteren, hun systemen te moderniseren en hun processen te optimaliseren om slimmere beslissingen te nemen. Software AG bouwt verder op meer dan 45 jaar klantgerichte innovatie. Het bedrijf staat bekend als leider in heel wat innovatieve IT-domeinen. Software AG telt meer dan 4.400 medewerkers in 70 landen en realiseerde in 2014 een omzet van 858 miljoen euro.

Voor meer informatie:
Software AG Belux

+32 (0)2 674 22 00

Key Communications
Catherine d’Adesky / Louise Biron
+32 (0)475 48 62 68
+32 (0)2 230 40 72
catherine@keycommunications.be
www.keycommunications.be



19.10.15

InterSystems positionné comme leader dans le Quadrant magique 2015 “Operational Database Management Systems” de Gartner





Pour la deuxième année consécutive, InterSystems se retrouve positionné dans le quadrant des “leaders” en raison du caractère exhaustif de la vision qui sous-tend ses solutions et de son aptitude à la mettre en œuvre

InterSystems, fournisseur international de technologies logicielles évoluées, parmi lesquelles figure notamment la plate-forme de données multi-modèles InterSystems Cachée ®, vient à nouveau d’être positionné comme “Leader” dans le “Magic Quadrant for Operational Database Management Systems” de Gartner. Le rapport de ce bureau d’études, rédigé par les analystes Donald Feinberg, Merv Adrian, Nick Heudecker, Adam M. Ronthal et Terilyn Palanca, a été publié le 12 octobre.

L’analyse “Quadrant Magique” de Gartner fait autorité sur le marché. Elle indique le positionnement des fournisseurs de solutions technologiques en termes d’exhaustivité de leur vision et de capacité à la concrétiser.

La définition que Gartner donne d’un “leader” est la suivante: “D’une manière générale, les leaders apportent la preuve qu’ils procurent le support le plus abouti pour une large gamme d’applications opérationnelles, se basant sur le support d’une grande variété de types de données et de possibilités d’utilisation. Ces fournisseurs font preuve de constance dans l’offre d’un bon support client, ce qui se traduit par un degré de satisfaction client élevé. Nombre de ces fournisseurs sont présents depuis de nombreuses années sur ce marché. Ils ont constitué un vaste écosystème de partenaires au service de leurs produits. Il en ressort que leur gamme de produits représente le niveau de risque le moins élevé pour les clients en termes de performances, d’extensibilité, de fiabilité et de support technique. Les “leaders” font preuve d’une vision robuste, s’adaptant aux évolutions imposées par le marché et ce, non seulement par rapport aux besoins actuels du marché mais aussi en se concentrant sur les tendances émergentes. Enfin, la stratégie de communications à destination du marché, et les activités de recherche et développement et de délivrance des produits que déploient les leaders sont en phase avec le marché actuel et avec les nouvelles tendances et demandes, tant en matière de logiciels SGBD (systèmes de gestion de bases de données) que de technologie matérielle.”

“Nous estimons que le rapport Quadrant Magique de Gartner témoigne du fait que nos clients apprécient de travailler avec nous. Cela explique qu’ils soient clients chez nous depuis déjà des dizaines d’années”, déclare Robbert Nagle, vice-président Database Platforms chez InterSystems. Il poursuit: “notre plate-forme de données multi-modèles Caché est en mesure de gérer les importants volumes et les multiples formats de données auxquels nos clients sont actuellement confrontés. La plate-forme supporte tous les types de données - structurées et non structurées, SQL et NoSQL, qu’elles soient gérées de manière centrale ou qu’elles soient distribuées. Le potentiel d’extensibilité est énorme, tant en horizontal qu’en vertical. Et, chose la plus importante, Caché autorise des analyses au moment-même de l’action, de quoi procurer une vision “just in time” sur les données”.

Dans son rapport, Gartner définit les SGBD opérationnels comme des systèmes qui sont également capables de supporter de multiples structures et types de données, tels que XML, textes, JavaScript Object Notation (JSON), contenus audio, images et video. Ces systèmes doivent en outre être en mesure de les organiser de manière performante, contrôlée et sécurisée.


Le texte intégral du rapport “Gartner Magic Quadrant for Operational Database Management Systems”, rédigé par les analystes Donald Feinberg, Merv Adrian, Nick Heudecker, Adam M. Ronthal, et Terilyn Palanca (G00271405, 12 octobre  2015), est disponible via InterSystems.com/ODBMS