Skip to content

Empire Airlines Soars to New Heights with Scale Computing

At Scale Computing, the success of our customers is our priority. Whether they are on land, air or sea, we have the ability to provide our customers with the technology they need to power their IT infrastructure across industries, regardless of size or location.

Founded in 1977, Empire Airlines in Hayden, Idaho flies 50 aircraft for FedEx, as well as passenger and cargo aircraft for Hawaiian airlines. In addition to its air carriers, Empire Airlines has a maintenance repair overhaul facility in Idaho, where the company takes airplanes apart and puts them back together.

According to Melanie Ellingson, director of IT at Empire Airlines, the company was looking to upgrade its legacy IT infrastructure with a virtualization solution. Ease of use was a priority for Ellingson, who said she wanted a simple solution that did not require additional training or specialized personnel to maintain the IT infrastructure. After researching competitors, Ellingson selected Scale Computing, remarking, “With Scale Computing, you plug it in, turn it on and you’re running. That’s all there is to it.”

How Empire Airlines Leveraged Hyperconverged Infrastructure

Hyperconverged infrastructure (HCI) solutions like the HC3 virtualization platform eliminate the need to combine traditional virtualization software, disaster recovery software, servers, and shared storage from separate vendors to create a virtualized environment. The HC3 all-in-one appliance architecture makes it easy to deploy fully integrated, highly available virtualization out of the box. With HCI, you can more easily deploy your virtualization architecture to consolidate servers in your environment and eliminate the need for storage appliances like SAN and NAS. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects problems in the infrastructure in real-time, enabling applications to achieve maximum uptime even when local IT resources and staff are scarce.

The platform combines self-healing with intelligent automation, empowering Scale Computing customers to spend less time on infrastructure maintenance and more time focusing on strategic projects to grow their business. Since implementing Scale Computing HC3, Ellingson said she and her team save time bringing up servers, adding, “If I need something, it’s there instantly. Before, I had to research hardware, get it delivered, put it in a rack. Now we have time to work on other projects.”

At Scale Computing, our HC3 architecture combines hyperconverged infrastructure for everything from centralized data centers to widely distributed edge computing use cases, and comes fully equipped with a number of built-in disaster recovery capabilities. Even in an emergency with the failure of hardware components or entire appliances, HC3 infrastructure lets you keep critical apps – and your entire organization – up and running.

After one drive failure, Ellingson said the combination of the HC3 platform and Scale Computing support team ensured Empire Airlines had minimal downtime. Ellingson noted, “HC3 alerted us, we called Scale Computing’s support team, they sent a new drive to us the next day, we put it in and we were done. I can’t stress how easy it is.”

Driving Performance with Edge Computing

With 16 locations across the U.S., Empire Airlines also benefits from an edge computing solution. Scale Computing HC3 brings simple, available, and affordable infrastructure to edge computing. The solution meets the company’s demands for operating a distributed enterprise with its highly available features that make it ideal for multiple industries. The HC3 platform also provides the flexibility, ease of use, and scalability that many customers require to create reliable and efficient working environments.

With HC3, organizations are able to improve the availability of critical workloads, rapidly scale their infrastructure, enhance disaster recovery capabilities, and do it all more simply and easily. HC3 is modern infrastructure for modern companies across industries. For more information on Scale Computing HC3, visit here.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scale Computing 
Scale Computing is a leader in edge computing, virtualization, and hyperconverged solutions. Scale Computing HC3 software eliminates the need for traditional virtualization software, disaster recovery software, servers, and shared storage, replacing these with a fully integrated, highly available system for running applications. Using patented HyperCore™ technology, the HC3 self-healing platform automatically identifies, mitigates, and corrects infrastructure problems in real-time, enabling applications to achieve maximum uptime. When ease-of-use, high availability, and TCO matter, Scale Computing HC3 is the ideal infrastructure platform. Read what our customers have to say on Gartner Peer Insights, Spiceworks, TechValidate and TrustRadius.

Cyberattack: another big company is a ransomware victim

Another cyberattack with devastating consequences for financial institutions. The target now was BancoEstado, one of the three largest Chilean banks, which was affected by ransomware on September 6. According to a statement to Chile’s Cybersecurity Incident Response Team (CSIRT), the cyberattack is believed to have involved the Sodinokibi ransomware, also known as Revil.

On the 6th, the bank informed through a statement that it had detected malicious software in its operating systems and that their platforms could have some kind of unavailability due to the incident. However, ATMs and Internet Banking were not affected, nor were the resources of its customers or the institution itself. It is believed that the attack, again, was orchestrated through Social Engineering, when one of the bank’s employees opened an Office document infected with the virus.

By compromising the employee’s machine, the attacker was able, through lateral movement, to infect more than 12,000 endpoints and affect the operations of all 416 branches of the Chilean bank.

After detecting the cyberattack on the 5th, Saturday, BancoEstado reported the incident to the Comisión para el Mercado Financiero (CMF), the equivalent of our Securities and Exchange Commission (CVM), which soon issued an alert to the Chilean banking system.

Long lines formed in the days following the cyberattack in front of BancoEstado branches. Account holders have complained on Twitter about various anomalies in their accounts, such as uncredited transfers to destination accounts, as well as lack of access to investment accounts, and inconsistent data in the amount totals. At the same time, there are reports that cybercriminals have started spam campaigns on behalf of the bank to capture customer credentials.

An attack of this magnitude indicates major flaws in the control of access to internal networks, including an efficient monitoring and response system. This involves the lack of computational and human resources for adequate response to incidents.

Another organization victim of the same ransomware that hit BancoEstado, in July this year, was Telecom Argentina, the country’s largest telephone operator. In this specific case, the required amount was US $ 7.5 million.

Learn more: How to protect your company from insiders threats?

But, what is the Sodinokibi ransomware and how does it work?

Sodinokibi is a family of ransomware that affects Windows systems and encrypts important files, requesting a cash amount to decrypt them. The ransomware creators are also associated with other malicious software, GandCrab, which was already linked to approximately 40% of global ransomware infections before being retired by its creators in June 2019. Thus, one can already have an idea of the potential for Sodinokibi infection.

The first difference noticed by users when having their device infected by ransomware is an infection warning, when the files are already encrypted. The ransom instructions are also visible on the user’s Desktop.

More than ever, cyberattacks through ransomware are among the biggest risks for organizations of all sizes and industries. According to the Mid-Year Threat Landscape Report 2020, there was a 750% increase in attack attempts through malicious software involving ransoms. And not only is the number of these attacks increasing but so is their sophistication.

In many cases, malicious attackers use threats against their victims to leak encrypted data, something that can compel them to pay the high amounts required as a ransom. One of the causes is the heavy sanctions that organizations are subject to in case of data leaks. If the leak involves personal data of European citizens and the organization is subject to GDPR, the fine could reach up to 50 million euros. If it takes place in Brazil and the LGPD is applied, this amount can reach up to 50 million reais.

One of the ways to mitigate the risks associated with a ransomware infection is to ensure that security updates are applied as soon as they are released by developers. By doing this, one can prevent malicious attackers from exploiting vulnerabilities to infect the environment. The implementation of features such as Multifactor Authentication is another strategy that prevents hackers from moving laterally through the environment and infecting even more endpoints.

Cybersecurity teams must also perform backups of their systems, as well as periodic testing as part of their disaster recovery and incident response plans. Thus, it is possible to guarantee that the systems are recovered without the need to pay a ransom.

Deploying a PAM solution such as senhasegura is also an excellent way to mitigate cybersecurity (and business) risks associated with ransomware infection.

Through our Privilege Elevation and Delegation Management solution, senhasegura.go, one can segregate access to sensitive information, isolating critical environments, and correlating events to identify any suspicious behavior. By controlling lists of authorized, notified, and blocked actions with different permissions for each user, senhasegura.go allows reducing the risks linked to the installation of malicious software and abuse of privilege, which can compromise the environment. Finally, through senhasegura, one can overcome the challenges of implementing controls for data protection legislation such as GDPR and LGPD, as well as PCI, ISO, SOX, and NIST regulations, with the automation of privileged access controls to achieve maturity in the audited processes.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Segura®
Segura® strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.

ESET CEO Richard Marko to help the Cybersecurity Tech Accord and UN offices bring innovative digital solutions as a judge on Apps 4 Digital Peace competition panel

Bratislava – Richard Marko, CEO of ESET, a global leader in cybersecurity, has been invited to judge the first-of-its-kind Apps 4 Digital Peace Competition organized by the Cybersecurity Tech Accord, the United Nations Office for Disarmament Affairs (UNODA), and the https://www.un.org/youthenvoy/.

The competition was created in response to the dramatic increase in the malicious use of information and technology by state and non-state actors. Given the possible threat to international peace and security, these organizations felt a need to encourage the brightest young minds to help develop technology solutions to limit the use of the internet as a domain of conflict, and to increase the security and stability of our online environment.

Through ESET’s involvement as a signatory of the Cybersecurity Tech Accord, Mr. Marko will join a panel of distinguished judges to help stimulate new and ethical thinking from young innovators across the world. The other members of the panel are Alex Stamos, director, Stanford Internet Observatory and former Facebook CISO; Damir “Gaus” Rajnovic, cybersecurity manager of Panasonic; Kim Zetter, award-winning journalist covering cybersecurity and national security issues; Liis Vihul, CEO, Cyber Law International; and Jayathma Wickramanayake, the UN Secretary General’s Envoy on Youth.

Five finalists are in the running to receive both cash prizes and networking opportunities that will help get their ideas off the ground. The winners will be invited to attend the Cybersecurity Tech Accord’s annual meeting to present their Apps 4 Digital Peace submission to some of the world’s leading technology companies committed to improving security online for users everywhere.

“It is a privilege to serve on the judging panel for the first-ever Apps 4 Digital Peace Competition,” said Mr. Marko. “At ESET we are passionate about making technology safer for everyone, and we are proud to empower the leaders of tomorrow in creating and developing innovative solutions that promote digital peace.”

“I’m excited to see what these bright, young minds create to tackle the many challenges that the cyber world brings,” said Tony Anscombe, Chief Security Evangelist at ESET. “Our youth innovators are the future of cybersecurity. Their contributions will help form cyber hygiene practices, protect infrastructure and promote responsible online behavior, creating a positive impact in our online world.”

The Apps 4 Digital Peace Competition Virtual Award Ceremony will take place on September 21 from 10:00 am to 12:00 pm EDT. Click here to register to watch the ceremony.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×