Skip to content

Perforce Announces Same-Day Support for iOS 18

Perfecto by Perforce provides same-day support for iOS 18 mobile application testing –helping customers prepare their applications for the major release.

 

MINNEAPOLIS, Monday, September 16, 2024 – Perforce Software, a global leader in DevOps solutions, announces that its mobile application testing platform, Perfecto, will support Apple’s latest iOS version, iOS 18, on Monday, September 16, 2024. 

By enabling same-day mobile application testing support for iOS 18 and the new iPhone 16 series—scheduled for release on September 20, 2024—Perfecto encourages app developers and testing teams to prepare their applications to handle the latest iOS version and iPhone devices as soon as they become available. Since most iPhone users upgrade their devices immediately upon release, apps must be ready to handle the change. 

Research from Cambridge Judge Business School has shown that software failures cost enterprise organizations $61 billion annually.

“It is critical that testing and development teams prepare their applications for the latest release on day one,” says Clinton Sprauve, Director of Product Marketing at Perforce. “We are proud to offer day-one support for both the iOS 18 release and the iPhone 16 series in our device cloud.” 

With both beta testing and day-one testing support for the latest operating systems and devices, Perfecto has always enabled customers to prepare their applications ahead of time, keeping them free from bugs or glitches and saving resources and reputation. 

Developers and testing teams will need to test their applications against a host of new features arriving with the release of iOS 18 and the iPhone 16 series, including new customizable home screens, a redesigned photos app, email and note transcription services, message scheduling, and AI-powered features like Image Playground, Genmojis, and the upcoming Apple Intelligence, a beta version of which will be released with the iOS 18.1 update in October. 

Perfecto has consistently been ahead of the curve when it comes to same-day support for new releases—going back to 2007 with the first iPhone release—and continues that trajectory of innovation with the release of iOS 18. The iOS 18 release marks the seventeenth year that Perfecto is supporting a release on day one.

Perfecto’s cloud-based testing lab supports thousands of devices (real and virtual), operating systems, and browsers across the globe. To see the comprehensive list of supported platforms, visit http://www.perfecto.io/supported-devices

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Perforce
The best run DevOps teams in the world choose Perforce. Perforce products are purpose-built to develop, build and maintain high-stakes applications. Companies can finally manage complexity, achieve speed without compromise, improve security and compliance, and run their DevOps toolchains with full integrity. With a global footprint spanning more than 80 countries and including over 75% of the Fortune 100, Perforce is trusted by the world’s leading brands to deliver solutions to even the toughest challenges. Accelerate technology delivery, with no shortcuts.

UEM’s Role in Ensuring Security and Compliance in the Aviation Industry

Ensuring compliance with regulations and maintaining high-security standards has become crucial in the aviation industry. According to a report, the aviation industry scores a “B” on average. While this isn’t a failing grade, organizations with a B rating are 2.9x more likely to be victims of data breaches than those with an A rating[1]. Further, with the increasing integration of digital technologies in airports and airlines, managing the vast array of devices and protecting sensitive data has become more complex.

UEM for aviation security
Ensuring Aviation Compliance and Security with UEM

Unified endpoint management (UEM) solutions are designed to address such compliance and security-related challenges by providing a centralized approach to managing and securing a wide range of devices and data.  

This blog highlights the compliance and security challenges in the aviation industry and the key features offered by Scalefusion to help airlines maintain security and compliance.

Compliance and Security Challenges in Aviation

1. Regulatory Compliance 

The aviation industry operates under a stringent regulatory framework to ensure safety, security, and efficiency. For instance, the International Civil Aviation Organization (ICAO) has set various international standards and regulations for security compliance in the aviation industry. 

For aviation data security, it mandates periodic offline secure backup and encryption of sensitive data to maintain information availability and integrity. Similarly, the physical security controls include, defining access management and control policies, background checks of personnel with administrative rights on databases, or with access to sensitive data. 

Similarly, for information, communication, and technology ICAO mandates access control policies and application of least privilege principles, software/hardware firewalls and network security, cryptography, organizational password policies, end-point protection, network monitoring and detection of anomalies, network separation, and device management. 

Moreover, due to the global nature of the aviation industry, compliance with GDPR is essential for airlines operating within or serving the European Union. GDPR imposes strict data privacy and protection rules, requiring airlines to implement robust data security practices. The challenge here is ensuring passenger data is collected, securely stored, and shared within a controlled environment and only with authorized airline personnel. Non-compliance can result in significant fines, up to 4% of the airline’s annual global turnover or €20 million, whichever is higher.[2]

2. Monitoring Airport Physical Infrastructure

Airports rely on a complex network of sensors and servers to ensure the smooth operation of various systems, from baggage handling and advertisement screens at airports to inflight cockpit devices and seatback entertainment screens. The challenge lies in continuously monitoring and maintaining this infrastructure to prevent disruptions and malicious attacks. Aviation organizations can leverage a robust endpoint management solution to manage and protect all endpoints from vulnerability threats. 

3. Authorized Access 

Ensuring that only authorized personnel access sensitive data is critical for maintaining data security and integrity. This involves implementing robust identity and access management (IAM) solutions to control who can access what information and when. The aviation industry has a diverse workforce, which includes pilots, ground staff, maintenance crews, and administrative personnel, managing each of their access rights is a tedious task for IT admins. A data breach in an airline company or an airport can have catastrophic consequences, leading to unauthorized access to flight control systems or passenger data. 

4. Securing Large Volumes of Customer-sensitive Data

The aviation industry manages vast amounts of sensitive customer data, including personal identification details, travel itineraries, and payment information. Protecting this data from breaches is crucial. Recent incidents highlight the urgency, a Hong Kong-based airline experienced a breach affecting 9.4 million passenger records, while a UK-based airline lost 9 million customer records to hackers[3]

Similarly, an Indian airline suffered a breach that exposed sensitive data, including credit card information and frequent flyer details, of approximately 4.5 million customers[4]. It is a crucial challenge to safeguard data during transmission and storage and ensure compliance with various data protection laws. 

Key Features of UEM for Adhering to Compliance and Upkeeping Security in the Aviation Industry

Unified endpoint management (UEM) solution transforms the above complexities into streamlined and secure operations. It serves as a centralized and intuitive solution to address the compliance and security challenges faced by airports. 

1. Centralized Management 

UEM solution extends centralized control through a unified dashboard or console. Devices in an airport environment operate 24/7, requiring constant monitoring from IT. A unified management console provides this visibility, helping minimize any oversight. By enabling IT admins to respond promptly to routine operations and any issues that arise UEM offers real-time visibility into the entire device ecosystem, providing instant insights into each device’s status, health, and performance.

2. Data Encryption

Robust data encryption is essential for protecting the confidentiality and integrity of passenger data, a critical requirement under GDPR. UEM solutions enforce strong passcode policies and ensure sensitive data stored on devices is encrypted, safeguarding it from unauthorized access. This feature addresses security concerns by preventing data breaches and ensuring compliance with ICAO data protection regulations.

3. Geofencing & Location Tracking

Geofencing and location tracking capabilities enhance the management and control of device whereabouts, ensuring streamlined operations and staff safety. For example, geofencing can restrict the ground staff’s access to no-entry areas such as runways. 

IT admins can monitor if airport personnel aren’t at their designated place and can quickly locate them with location tracking. while location tracking can quickly locate personnel. These features are important for streamlined operations and aviation staff safety.

4. OS Updates and Software Deployments

UEM allows admins to execute updates, patches, and software deployments seamlessly across all devices from a centralized dashboard. Regular updates ensure that devices are equipped with the latest features and security protocols, reducing the risk of vulnerabilities that could lead to non-compliance. This feature helps maintain the integrity and security of the device ecosystem, ensuring continuous compliance with regulatory standards.

5. Access Controls

Setting and managing access controls ensures that only authorized personnel can access specific device features or functionalities. UEM solutions for aviation offer a range of access control features, such as role-based access control, which provides user access based on their role in the organization. For instance, enforcing access controls will restrict the access of ground staff to sensitive files with customer information. These controls are essential for maintaining compliance with regulatory requirements and protecting sensitive data from unauthorized access.

6. Policy Enforcement

Consistent policy enforcement across all devices is critical for airport device management. A UEM solution allows administrators to set and enforce policies related to security, usage, and configurations, fostering a standardized and secure operational environment. 

Policies can vary based on staff roles, and UEM enables admins to create device and user groups to apply these policies seamlessly. Each airport is unique, and UEM offers customizable policies that administrators can tailor to the specific needs and nuances of their operational environment, ensuring UEM aligns seamlessly with the airport’s workflow.

7. Remote Lock and Wipe 

If a device gets lost or stolen, with remote wipe and lock feature, IT admins can erase all the sensitive data from the device. This feature prevents unauthorized access to confidential information, mitigating the risk of data breaches. UEM solutions help airports comply with data protection regulations and maintain a strong security posture by ensuring consistent data security.  

8. Kiosk Mode

Kiosk mode restricts devices to specific applications and functionalities, ensuring that they are used only for their intended purposes. This feature is particularly useful in securing devices used by passengers, such as self-service kiosks and seatback entertainment systems. It helps prevent unauthorized access and usage, thereby maintaining a secure and controlled environment. 

9. Broadcast Messages

Broadcast messages enable instant communication with all devices, which is essential during emergencies or critical updates. For instance, in the event of a security threat, IT teams at airports can quickly send out alerts and instructions to all managed devices, ensuring a coordinated and swift response. 

Ensure Compliance and Security in Aviation with UEM 

Aviation is a rapidly evolving and highly competitive industry, where operational excellence is necessary for maintaining compliance and security. Unified endpoint management (UEM) solutions like Scalefusion UEM offer various data and device security features, enabling airline IT professionals to manage diverse device ecosystems and safeguard sensitive information. 

As airports and airlines adopt digital transformation initiatives, the role of UEM becomes critical. Moreover, Scalefusion offers comprehensive capabilities that address aviation challenges – on the ground and in flight. Scalefusion enhances operational efficiency among the airline staff and delivers a safer, more connected travel experience for passengers while ensuring aviation safety and compliance and maintaining security. 

Contact our experts to schedule a demo and experience how Scalefusion UEM maintains compliance and security. Get started by signing up for a 14-day free trial today!

References 

1. Air Traffic Management

2. Iubenda

3. & 4.  SISA

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Scalefusion
Scalefusion’s company DNA is built on the foundation of providing world-class customer service and making endpoint management simple and effortless for businesses globally. We prioritize the needs and feedback of our customers, making sure that they are at the forefront of all decision-making processes. We are dedicated to providing comprehensive customer support services, and place emphasis on customer-centric thinking throughout the organization.

Ransomware: A Universal Threat to All Industries

The manufacturing industry, a cornerstone of the global economy, faces a growing threat from ransomware attacks. These cyberattacks can cause severe damage, leading to costly downtime, production delays, and a multitude of other critical issues.

The Impact of Ransomware on Manufacturing

Ransomware attacks can have devastating effects on manufacturing operations, finances, and reputation. Here’s how:

  1. Operational Disruption:
    • Halted Production Lines: Ransomware can bring production lines to a standstill, disrupting supply chains and causing quality control issues. This can lead to significant downtime and the production of defective products.
    • Data Loss: Critical information can be permanently lost, or take considerable time to recover and rebuild.
  2. Financial Consequences:
    • Ransom Payments: Companies may face ransom payments that can amount to millions.
    • Revenue Loss: Missed production deadlines due to downtime can lead to substantial revenue losses.
    • Increased Insurance Premiums: Companies often see a hike in insurance premiums post-attack.
  3. Reputational Damage:
    • Customer Trust: Loss of customer trust and long-term harm to the company’s brand are common after such incidents.
    • Regulatory and Legal Consequences: Non-compliance with regulations and potential litigation can arise, further damaging the company’s reputation and finances.

The Cost Of Downtime

The financial impact of downtime due to ransomware attacks in manufacturing is staggering. In 2021, the cost was estimated to be $22,000 per minute, with the average ransom payment in the manufacturing sector being $1.5 million, higher than the global average across all industries.

The Growing Risk

The risk of ransomware attacks on manufacturing is increasing:

  • In 2022: 61% of manufacturing and production organizations experienced ransomware attacks.
  • Between 2019 and 2020: There was a 156% increase in ransomware attacks on the manufacturing sector.
  • Impact on Operations: 70% of manufacturing firms that experienced a ransomware attack reported significant operational impacts.

Protecting Your Manufacturing Business

Given the significant impact that ransomware attacks can have on government organizations, it is crucial to take steps to prevent these attacks. Here are a few steps that organizations can take to protect themselves:

Implement robust cybersecurity measures: Government organizations should implement robust cybersecurity measures, such as firewalls, intrusion detection systems, and anti-malware software. Regularly updating software and operating systems can also help reduce the risk of attacks.

Conduct regular employee training: Regular training for employees can help reduce the risk of successful phishing attacks, which are a common method of ransomware delivery.

Regularly backup data: Regularly backing up critical data and storing backups in a secure location can help ensure that data is recoverable in the event of a ransomware attack.

Implement multi-factor authentication: Multi-factor authentication can help reduce the risk of unauthorized access to systems and data, even if credentials are stolen.

Develop an incident response plan: Developing an incident response plan can help organizations respond to a ransomware attack quickly and effectively, minimizing the impact on the organization. A ransomware containment solution is a critical component of such a plan.

Is Your Organization Protected?

Given the increasing threat of ransomware, it’s crucial for organizations to assess their current cybersecurity posture and ensure they are prepared to defend against and respond to these attacks.

Think your organization is protected from the growing ransomware threat? Find out for sure by conducting a thorough review of your cybersecurity measures and updating your strategies to stay ahead of evolving threats.

About Bullwall
BullWall is a fast-growing international cybersecurity solution provider with a dedicated focus on protecting critical data during active ransomware attacks. We are the only security solution able to contain both known and unknown ransomware variants in seconds, preventing encryption and exfiltration across all data storage types.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

The Role of Data Backup in ESG and Sustainability

Data has become more essential than ever in businesses, especially as companies shift toward eco-friendly models. However, this greater dependence on data also brings various risks, such as data loss and theft. To meet environmental, social, and governance (ESG) goals and sustainability targets, it’s crucial to have strong data backup strategies in place. Thus, organizations should not overlook the need of data backup even as they give increasing focus on these investment ideas.

Effective data backup solutions stop data loss and promote the ESG performance and sustainability of a company in the data-driven environment of today. This article discusses the role of data backup on ESG and sustainability to assist you in harnessing its benefits in achieving your ESG goals.

What is the Role of Data Backup in ESG (Environmental, Social, Corporate Governance)?

ESG (Environmental, Social, and Corporate Governance) is a framework for evaluating a company’s sustainability and ethical impact. It is a model that allows firms to recognize and evaluate the non-financial hazards and opportunities resulting from daily corporate activities. However, attaining ESG and sustainability depends critically on data backup. In the following sections, we will explore its role in each vital area.

Protecting the Environment through Efficient Data Storage

Data centers and IT systems consume much energy, contributing to an organization’s carbon footprint. However, you can reduce this environmental impact using backup solutions that help to optimize energy use in several ways:

  • Energy Efficiency

Efficient backup strategies can minimize the data used, leading to a smaller environmental footprint. Moreover, modern data backup solutions centers employ energy-efficient data tools, such as cloud storage, that use renewable energy. Thus, using these advanced tools also helps to reduce your overall carbon footprint instead of using inefficient methods. Offline storage media, such as magnetic tape and external hard drives, reduce energy use by storing data inactively.

  • Efficient Resource Management

Regular data backup can help an organization optimize its data storage practices, allowing it to use resources more efficiently. This includes avoiding redundancy by only storing necessary data and discarding outdated storage practices that consume excessive energy and materials.

  • Reduction in Physical Storage Need

Traditional storage methods, such as paper records, take up physical space and materials, leading to deforestation, increased waste, and inefficiency. However, with modern data backup solutions, organizations can reduce the need for physical storage, reduce waste, and conserve natural resources.

  • Disaster Recovery

Backing up your data will ensure quick recovery without needing extensive physical resources in the event of a natural disaster or other environmental impact that could lead to data loss. When such events happen, an organization can minimize downtime and the environmental costs of starting from scratch due to data loss.

Enhancing Social Responsibility through Data Backup

Data backup plays a major role in fulfilling an organization’s social responsibility:

  • Protection of Sensitive Information

Sensitive information must be protected and safeguarded. Thus, when organizations collect and store sensitive information, including customers’ and employees’ data, they must ensure privacy and security. Using efficient data backups that employ high-standard security solutions ensures maximum protection for such sensitive information, fostering customer trust.

  • Regulatory Compliance

When your organization performs regular data backups, it complies with legal and regulatory requirements. Thus, data backup solutions help organizations adhere to data regulations and standards, enabling them to perform their social responsibilities and ensure data integrity.

  • Stakeholder Trust

Generally speaking, stakeholders such as partners, customers, workers, and investors want to collaborate with and support an organization prioritizing data security. Therefore, you gain the trust of stakeholders when you use backups to guarantee the availability and integrity of data. Also, a robust backup solution will ensure immediate business continuity after a data disaster, fostering and maintaining trust with stakeholders, especially customers.

  • Positive Social Impact

Companies can make positive social impacts when they back up data to protect their digital assets. Many modern businesses operate with these digital assets, including information. Thus, data backup indirectly supports employment and economic stability, which leads to a positive social impact.

Strengthening Corporate Governance through Data Backup

Data backup also plays a crucial role in strengthening an organization’s corporate governance. By implementing robust data backup strategies, organizations can:

  • Regulatory Compliance

Many industries are subject to strict data protection that mandates regular backups. Compliance with these regulations shows good governance practices, helping to avoid legal penalties.

  • Risk Management

By safeguarding an organization’s data from possible loss brought on by hardware failures, human mistakes, cyberattacks, or natural disasters, data backup solutions assist to control data risk. This is absolutely important since these events can seriously damage the company’s reputation and cause operational slowdown in the lack of a trustworthy backup plan. However, with a robust backup system, you can ensure quick data recovery, preventing loss of customer trust.

  • Accountability and Transparency

Consistent data backup practices enhance transparency and accountability. They ensure that accurate records are available for audits, reporting, and stakeholder communications, which is vital for maintaining trust.

  • Ethical Data Management

Data backup supports the ethical handling of data, which aligns with the governance principle of integrity and ethical conduct. As a result, an organization can showcase its commitment to protecting stakeholders’ information and ensuring proper data security.

  • Decision-Making

An organization can access accurate and complete data with a reliable backup system when needed. Thus, you can make strategic decisions backed by correct information.

How Does Data Backup Foster Sustainability?

Data plays a crucial role in any organization, so data backup enables its sustainability by ensuring continuity, security, and efficiency. The following are some significant ways that data backup supports organizational sustainability:

  • Quick Disaster Recovery

Backing up the data of a firm helps to stop human error, cyberattacks, or data loss during natural disasters. Having a good backup plan and disaster recovery strategy guarantees swift recovery in case of data loss, so reducing downtime and ensuring business operations carry on fast.

  • Data Security

Preserving data in its original form is crucial, and regular data ensures that you can always restore data to the state it was before a cyber attack or disaster. Thus, an organization can always preserve data integrity and prevent unauthorized alterations.

  • Cost Efficiency

Data loss can incur a significant loss for an organization, including lost revenue, legal fees, and damage to reputation. However, backup solutions prevent such loss by enabling quick recovery and optimizing data use and management, leading to long-term cost savings.

  • Reputation Management

Improper data management can ruin an organization’s reputation during situations like a data breach or significant downtime after a data disaster. However, with robust data solutions, you can manage your reputation by fostering trust among customers and stakeholders. Quick data recovery also shows that an organization is reliable and trustworthy, ensuring sustainability.

  • Operational Efficiency

Regular backups guarantee that data is constantly accessible for the operational requirements of an organization—that is, for analytics, reporting, and decision-making. It also lessens the effects of data loss on a company’s operations so that staff members may continue to be productive long after a data disaster.

Conclusion

Data backup plays a crucial role in ESG. Therefore, it has to be given great attention to guarantee responsible social and environmental effect, the improvement of corporate governance, and a sustainable company environment. Giving data backup top priority in your environmental, social, and governance (ESG) and sustainability plans can assist in safeguarding data assets and support the development of a more ecologically friendly digital future.

Storware places great importance on sustainability. That’s why we’re happy that the technology solutions we create support these values. Learn more from our other articles:

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Storware
Storware is a backup software producer with over 10 years of experience in the backup world. Storware Backup and Recovery is an enterprise-grade, agent-less solution that caters to various data environments. It supports virtual machines, containers, storage providers, Microsoft 365, and applications running on-premises or in the cloud. Thanks to its small footprint, seamless integration into your existing IT infrastructure, storage, or enterprise backup providers is effortless.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×