Category: Technology

  • Hackers target YouTube creators, send fake brand collaboration offers with malware

    Cyber Crime

    Hackers target YouTube creators, send fake brand collaboration offers with malwarePixabay

    In an alarming trend, cybercriminals are now increasingly targeting popular YouTube creators by exploiting fake brand collaboration offers to distribute malware, a report showed on Monday.

    The malware, disguised as legitimate documents like contracts or promotional materials, is often delivered through password-protected files hosted on platforms such as OneDrive to evade detection, claimed CloudSEK, a cybersecurity firm.

    “Once downloaded, the malware can steal sensitive information, including login credentials and financial data, while also granting attackers remote access to the victim’s systems,” said security research Mayank Sahariya.

    At the end of the email, the threat actor includes instructions and a OneDrive link to access a zip file containing the agreement and promotional materials, secured with the password. When the YouTube victim clicked the URL in the email, they were directed to a Drive page.

    The adversary leverages malware and sophisticated techniques for targeted attacks. Their actions suggest a well-organised group with access to diverse tools and resources.

    Key characteristics of the campaign include email payload where the malware is hidden within attachments such as Word documents, PDFs, or Excel files, often masquerading as promotional materials, contracts or business proposals.

    Cyber Crime

    Fhishing emails are sent from spoofed or compromised email addresses, making them seem credibleIANS

    The phishing emails are sent from spoofed or compromised email addresses, making them seem credible. Recipients are lured into downloading the attached files, believing they are legitimate business offers.

    Once the attachment is opened, the malware installs itself on the victim’s system. This malware is typically designed to steal sensitive data, including login credentials, financial information, and intellectual property, or to provide remote access to the attacker.

    Businesses and individuals in marketing, sales, and executive positions are the primary targets, given their propensity to engage in brand promotions and partnerships.

    “With content creators and marketers as primary targets, this global campaign underscores the importance of verifying collaboration requests and adopting robust cybersecurity measures to protect against such threats,” Sahariya added.

    (With inputs from IANS)

  • Delta IT Network Commissions Computer Lab at SS Jain Subodh Girls PG College, Jaipur – CRN

    Delta IT Network Commissions Computer Lab at SS Jain Subodh Girls PG College, Jaipur – CRN

    Delta IT Network (Delta ITN), has inaugurated a cutting-edge computer lab at SS Jain Subodh Girls PG College, Jaipur.

    As part of its CSR initiative, the company has installed 120 Dell desktops, to empower women’s education and foster digital literacy. “We have supplied 120 desktops for the college’s computer lab for girls’ education—a social sector cause close to our heart,” said Mr. Sunil Yadav, AVP Sales, Delta IT Network, during the announcement. “As a goodwill gesture, we provided the desktops at special discounted prices to this trust-run institution that specialises in education for women and children.”

    SS Jain Subodh Girls PG College, Ram Bagh Circle, Jaipur, is part of Subodh Shiksha Samiti’s extensive network of educational institutions. Founded in 2004 with the motto “If you can dream it, you can do it,” the college has grown from 126 students to approximately 3,000 students today.

    It offers premier graduate and post-graduate programs in Science, Commerce, Arts, and professional courses in Computer Applications and Business Administration, with a strong focus on AI.

    Delta’s proven expertise in the education sector was instrumental in the institution’s decision to choose them. Delta looks forward to building a strong and lasting relationship in the future.

    Discussing Delta ITN’s future plans, Yadav added, “We have started a meaningful relationship with the college and envision larger collaborations in the next fiscal year.
    While the institution is supported by the Jain community, our focus remains on leveraging technology to enhance their educational offerings.”

    The initiative was enabled through leading technology provider Dell. Mr. Anith Kumar, Strategic Account Manager, Dell Technologies, remarked, “We provided our compute products at special prices to support an institution dedicated to women empowerment.”

    Mr. Sanjiv Krishen, CMD, Iris Global Services, stated, “We are proud to assist Delta IT Network with logistics and financial support for this meaningful project. Projects like the AI Lab for Galgotias and EMS production line expansion for Syrma SGS demonstrate our commitment to fostering impactful solutions. Supporting Subodh College is another step in this direction.”

    Delta ITN’s efforts in the education sector reflect its dedication to empowering the next generation through advanced technology. The company recently delivered AI-driven assets worth ₹12 crore to institutions like Galgotias University and secured an additional ₹5 crore order for new machines, with plans for further upgrades.

    Mr. Deepanshu Chauhan, CEO, Delta IT Network, highlighted, “Our partnerships with industry leaders like Dell and HP are driving significant progress in education technology. We are now focused on achieving a ₹60 crore footprint in the EduTech vertical by FY 2024-25.”

    With over four decades of experience, Delta IT Network is a trusted provider of solutions across sectors like Pharma, Automobile, and Education. Recognised under the Make in India initiative, the company’s “DeltaView” EduTech innovation exemplifies its commitment to advancing technology for societal benefit.

  • Blazeclan Technologies recognised as a major player in the IDC MarketScape – CRN

    Blazeclan Technologies recognised as a major player in the IDC MarketScape – CRN

    According to IDC analysis and buyer perception, Blazeclan is positioned in the Major Players Category in the 2024–2025 IDC MarketScape: Asia/Pacific Managed Cloud Services 2024-2025 Vendor Assessment (doc # AP51571124, November 2024). 

    This study presents a vendor analysis and assessment of the 2024–2025 Asia/Pacific managed cloud services (MCS) market through the IDC MarketScape model. MCS is a qualified subset of IT managed services that fall under the existing foundation markets outlined in IDC’s Worldwide Managed Cloud Services Taxonomy, 2024 (IDC #US50637124). The market includes application management (AM), hosted application management (HAM), hosting infrastructure services (HIS), IT outsourcing (ITO), and network and endpoint outsourcing services (NEOS), executed as part of managing an enterprise’s IT operations within the context of its public, private, or hybrid cloud usage. 

    “We are honoured to be recognised as a Major Player in the IDC MarketScape: Asia/Pacific Managed Cloud Services 2024–2025 Vendor Assessment. We believe this acknowledgment reflects our unwavering commitment to delivering innovative, customer-centric cloud solutions and empowering businesses across the region to accelerate their digital transformation journeys. At Blazeclan Technologies, we remain dedicated to pushing the boundaries of what’s possible in managed cloud services, ensuring our clients achieve resilience, scalability, and success in the ever-evolving digital landscape.” said Varoon Rajani, CEO, Blazeclan Technologies, an ITC Infotech Brand.

    Since its inception in 2011, Blazeclan’s cloud service partnerships have expanded across major hyperscalers to include AWS, Microsoft, and Google, with Oracle Cloud recently added to its service offerings. Blazeclan has expertise across all aspects of cloud services – from consulting to migration, modernisation, and management of multicloud environments.

    Blazeclan’s service offerings include consulting, engineering, modernisation, and managed and security services across cloud infrastructure, applications, data, and security. It excels in multicloud orchestration, primarily between AWS and Azure, providing 24 x 7 operational support through proprietary tools & frameworks such as Cloudlytics, Blaze Pulse, SpendEffix, cAssure, and cSecure.

    In April 2024, ITC Infotech announced its acquisition of Blazeclan, which was finalized in October 2024. This strategic move enhanced its cloud capabilities and broadened its market presence.

  • Reasons you should update your iPhone to iOS 18.2, stat [Review]

    iOS 18.2

    iOS 18.2Apple

    Apple has finally rolled out its second major update, iOS 18.2, to all eligible iPhones, giving an edge to owners of the iPhone 16 series and iPhone 15 Pro and 15 Pro Max. Apple Intelligence is the headline feature of iOS 18.2, but there’s more to it than meets the eye.

    For those who’ve already updated to iOS 18.1, iOS 18.2 will be around 2.2 GB. But this is an important update, and those on iOS 17 have no choice but to update if they’re eligible for the latest update. This is to ensure they have the necessary fixes to the iPhone kernel and WebKit. Apple’s AI features aside, eligible iPhone users must update to iOS 18.2 right now. This is for all iPhones from the iPhone XS onwards, including the second and third-generation iPhone SE models.

    Important reasons to update

    Before we get to the cool stuff, let us shed some light on the crucial aspects of iOS 18.2, which may otherwise go unnoticed. There are a lot of security patches in this update, which, for instance, prevent a remote attacker’s attempt to cause app termination or execute code. It also fixes an issue that would allow apps to gain elevated privileges and WebKit issues that allow memory corruption in cases of interaction with malicious web content.

    Forbes recently pointed out that the Passwords app had been using the HTTP protocol to download icons for password entries since the iOS 18 update. But iOS 18.2 fixes that serious security flaw. These are good enough reasons for you to update to iOS 18.2, but that doesn’t have to be all. There are many cool features in iOS 18.2, which will impress you.

    The cool stuff

    With iOS 18.2, ChatGPT has been integrated with Siri for the first time, elevating Apple Intelligence hype. It’s worth noting that Apple Intelligence only works on six iPhones: iPhone 15 Pro, iPhone 15 Pro Max, iPhone 16, iPhone 16 Plus, iPhone 16 Pro, and iPhone 16 Pro Max.

    iPhone 16 Pro review

    iPhone 16 ProIBT/Sami Khan

    With this update, users will see a new app icon called Image Playground. This is where the fun happens, and hop on to this trend early on. Social media apps will soon be buzzing with those images. The app lets you create fun, playful images in various styles using different concepts, descriptions, and people from the photo library. You can just swipe to see previews before adding concepts to your playground. You can also choose from animation and illustration styles and create images in Messages and Freeform, as well as third-party apps.

    Genmoji is another cool addition, which lets you create custom emoji simply by describing it in your own words.

    As mentioned above, ChatGPT integration means it can be used anywhere from Siri to Writing Tools. Users don’t even need to have a ChatGPT account and your requests will be anonymous and won’t be used to train OpenAI’s models. That’s a relief, right?

    Then there’s Image Wand, which turns sketches and handwritten or typed notes into images in Notes.

    Camera Control, though limited to the iPhone 16, iPhone 16 Plus, iPhone 16 Pro, and iPhone 16 Pro Max, can invoke Visual Intelligence to instantly learn about places or interact with information simply by pointing your iPhone at an object. Yes, ChatGPT is there too, so you can get better assistance or simply go with the good old Google Search. To use this, simply press and hold the Camera Control button, and a different UI than the regular camera will appear.

    The Photos app redesign was criticised in the iOS 18, which has now been resolved. Now, video viewing has been set to full screen, and there’s a setting to turn off auto-looping video playback

    Along with the ability to scrub frame-by-frame. Users can also clear their Recently Viewed and Recently Shared album history.

    iOS 18.2 also makes it easier to recover lost items. Users can generate a link, which can be shared with third parties such as airlines or authorities, to find your lost item. You can simply select “Share Item Location” in the “Find My” app to take advantage of this new feature. But the best part is that you can share this link with anyone, regardless of whether the recipient has an iPhone or not. It works on all devices. Cool right?

    Oh, having used Siri, Apple Intelligence features in Notes, Visual Intelligence, Call Recording, and all that, I must say, there’s been noticeable improvement. Third time’s the charm! and these AI features now work great than they did in iOS 18.

    That’s it for now. Now, go to your Settings > General > Software Update and upgrade to iOS 18.2, stat!

  • India ranks second globally in encrypted cyberattacks: Zscaler report – CRN

    India ranks second globally in encrypted cyberattacks: Zscaler report – CRN

    Zscaler, Inc. published its Zscaler ThreatLabz 2024 Encrypted Attacks Report, which explores the latest threats blocked by the Zscaler security cloud and provides critical insights into how encryption has become a conduit for more sophisticated threats, further compounded by the rise of artificial intelligence (AI). The findings suggest that India registered 5.2 billion, the second-highest number of encrypted attacks globally, preceded by the U.S. (11 billion) – surpassing countries like France (854 million), the UK (741 million), and Australia (672 million). 

    ThreatLabz found that over 87% of all threats were delivered over encrypted channels between October 2023 and September 2024—a 10% increase year-over-year. The report offers strategies and best practices to help organisations tackle these covert threats.

    “The rise in encrypted attacks is a real concern as a significant share of threats are now delivered over HTTPS,” said Deepen Desai, Chief Security Officer, Zscaler. “With threat actors focused on exploiting encrypted channels to deliver advanced threats and exfiltrate data, organisations must implement a zero-trust architecture with TLS/SSL inspection at scale. This approach helps to ensure that threats are detected and blocked effectively, while safeguarding data without compromising performance.”

    Encrypted malware continues to dominate

    Malware accounted for 86% of encrypted attacks, totaling 27.8 billion hits—a 19% year-over-year increase. Encrypted malware includes malicious web content, malware payloads, macro-based malware, etc. This growing prevalence of malware reflects a strategic shift by attackers adapting tactics to thrive within encrypted traffic, using encryption to conceal malicious payloads and content. 

    According to ThreatLabz researchers, the most active malware families globally were – AsyncRAT, Choziosi Loader/ChromeLoader, AMOS/Atomic Stealer, Ducktail, Agent Tesla and Koi Loader.

    The report highlights significant year-over-year increases in web-based attacks, including a 79.39% surge in cross-site scripting and a 172.81% increase in browser exploit attacks. Malware, phishing and ad spyware sites topped the list for India, with malwares accounting for nearly 97% of all encrypted threats observed. Interestingly, cryptomining/cryptojacking saw a slight decline of 8.67%, while phishing attacks decreased by 3.80%. These trends may reflect the evolving tactics of threat actors, potentially fueled by the growing use of generative AI technologies by threat actors.

    Most targeted industry verticals

    In India, manufacturing was the most-targeted industry, experiencing a dramatic 170.88% year-on-year increase in encrypted attacks. This surge is likely fueled by rapid advancements in Industry 4.0 and the integration of interconnected systems, which have expanded the attack surface. The technology & communication sector was the second-most targeted, accounting for 32.6% of the encrypted attacks. Other heavily impacted industries included finance & insurance and retail & wholesale, showcasing the diverse range of sectors under threat in India.

    “As India’s digital landscape expands, so does the threat landscape. The report highlighting 5.4 billion encrypted attacks serves as a stark reminder that cybercriminals are relentless”, said Suvabrata Sinha, CISO-in-Residence, India at Zscaler. “As we enter 2025, to protect our digital assets, we must adopt a Zero Trust approach, inspecting 100% of traffic to protect users and organisations from threats concealed within encrypted channels. We can build a more secure digital India by investing in robust security measures and empowering our workforce with cybersecurity awareness.”

    Stopping encrypted attacks with zero trust

    Understanding how zero trust disrupts encrypted threats requires looking at a typical attack sequence. Advanced attacks often unfold in four stages:

    1. First, attackers conduct reconnaissance to find a way into the targeted network.
    2. Next, they breach the network, often via exploits, brute-force attacks or stolen credentials.
    3. Once inside, they move laterally, escalate privileges and establish persistence.
    4. Finally, they carry out their objectives, typically conducting data exfiltration to extract valuable information that can be leveraged for further extortion or attacks.

    The Zscaler Zero Trust Exchange platform provides security controls at each stage to mitigate risk and stop encrypted threats.

    Organizations can bolster their ability to protect their devices, apps and data from encrypted attacks by following these recommendations:

    • Understand that any internet-facing service can be found and attacked or abused
    •  Inspect incoming encrypted traffic to detect and block threats
    • Use a zero-trust architecture to secure all connectivity holistically between users and applications, between devices like IoT and OT systems, between all locations and branch offices, between cloud workloads and more.
    • Implement microsegmentation to reduce access, even for authenticated users.
    • Leverage an AI-driven cloud sandbox to isolate and quarantine unknown attacks and stop patient-zero malware before it touches users.
    • Reduce the number of entry points into an environment.
    • Inspect outgoing northbound traffic along with incoming southbound traffic to disrupt C2 communications and protect sensitive data.
  • How self-service technology is reinventing customer service

    Today, self-service is woven into the fabric of daily life for consumers, be it at the supermarket, quick-service restaurant (QSR), bank, museum or sports arena. The reasons are many, but all start with enhancing the customer experience. Self-service kiosks allow consumers to avoid long checkout lines and speed up purchases. The technology also improves order accuracy and enables personalized services.

    For businesses, the benefits of self-service kiosks include flexibility of use, larger basket sizes, cost savings and improved efficiency. That makes self-service technology an increasingly important part of digital transformation and a way to meet the growing customer demand for convenience and personalization.

    As a result, self-service solutions like Samsung Kiosk can play a key role in driving business profitability to consumer satisfaction. Here’s how.

    Consumers prefer self-service experiences

    Consumers are used to self-service experiences now — and many prefer it. In fact, 84% of Americans like using self-service kiosks, and 66% would choose kiosks over a human-run checkout, according to a 2024 survey by PlayUSA. The reasons are revealing, too. Of the 1,001 people surveyed, 71% said self-service kiosks and mobile apps offer faster checkouts than human-run checkouts, and 60% use self-service kiosks and mobile apps, so they don’t have to talk to people.

    Self-service technology improves personalization, too, further aligning with consumer trends. For example, diners at QSRs can browse and order from a self-service kiosk at their own pace without the pressure of an employee waiting for their order. Self-service kiosks at restaurants and retail stores also allow customers to access their loyalty program, so they can view and redeem rewards and earn points directly through the kiosk interface. At hotels, a self-service kiosk can greet guests in their native language, check them in, and suggest hotel amenities, such as room service, fitness centers, and poolside cabanas.

    The treasure trove of data these self-service solutions harvest can strengthen this personalization even more by targeting promotions and adjusting operations according to individual consumer preferences — increasing the success of an upsell and return on investment.

    Who can benefit from a self-service kiosk?

    One of the chief features of Samsung Kiosk is its flexibility, which allows it to be used in various industries.

    Restaurant kiosk systems

    Kiosks can solve a variety of challenges for restaurants. Not only do they address the problem of waiting in line, but they can also increase profits. Kiosks never forget to upsell or promote new menu items and limited-time offers, which can boost basket sizes. They can also tie into the menu board, making it easy to daypart and update content on the fly.

    In arenas and sports complexes, guests can order and pay from a kiosk in the food court and then walk to the restaurant stall to pick up their food. And in a company cafeteria or break room, diners can scan their food items and be on their way.

    Hospitality self-check-in

    If you’ve ever tried to check in to a busy hotel or resort, you know it can take a while — even if you’re part of the loyalty program. Kiosks allow guests to check in with ease after a long flight or drive, often when it’s most appreciated.

    Just like in restaurants, there is a huge opportunity for upsells here. If given the opportunity to check in at their leisure, guests might add spa services, breakfast, activities or room upgrades. Kiosks can also assist guests with concierge-related queries such as nearby restaurants, activities and landmarks, boosting partnerships between hotels and local businesses.

    Retail kiosks

    Self-service technology can be a lifesaver for busy retail outlets. Not only does it allow shoppers to skip long lines in favor of quickly checking themselves out, but a kiosk ups the ante on omnichannel shopping and digital-out-of-home advertising. With kiosks, customers can locate products within the store, find product pricing, compare similar models and even order products to be delivered to their homes. If a size or model requested is unavailable, kiosks can help locate a nearby store that has the item in stock.

    How digitizing retail experiences boosts ROI

    Explore customer behavior with and the operational benefits of a complete digital retail ecosystem.
    Download Now

    Kiosks can be especially useful at micro markets — unmanned retail spaces that offer grab-and-go food and convenience items. At these establishments, customers simply take what they need and pay at the kiosk. In more traditional retail settings, kiosks allow humans to do what they do best: interact with other people. Rather than replacing human workers, kiosks free up time for employees to greet shoppers, stock shelves or personally assist customers.

    EV charging stations

    As electric vehicles (EVs) become more common, EV charging stations are popping up at restaurants, retail centers, rest stops, hotels and supermarkets. Not only are they helpful for travelers, but they can also be a profit center for brands. Kiosks allow customers to fuel up quickly and easily, and the ad revenue pays for the hardware over time.

    An all-in-one self-service solution

    Samsung Kiosk is a sleek, intuitive and easy-to-install self-service solution that allows brands to get in on the self-service game immediately. The latest version by Samsung launched with Windows OS for ultimate flexibility, and it can work out of the box with many of the major point-of-sale providers. Its 24-inch touchscreen boasts a shatter-resistant film and an antimicrobial coating that helps inhibit bacterial growth, both of which keep customers — and the units — safe.

    Samsung Kiosks can be configured in standing, wall-mounted, and countertop layouts, making them well-suited to the majority of store configurations and layouts. They include a speaker, terminal, and printer and come programmed with credit card processing capabilities right out of the box, which saves on installation fees. Samsung Kiosks can also be managed remotely, allowing operators to troubleshoot and resolve issues from anywhere in the world.

    The modern customer experience

    Whether shopping in-store or online, today’s consumers want convenience, ease of use and personalization. Samsung Kiosk meets all these needs, while also addressing operational challenges and providing a modern consumer experience.

    Learn more about why self-service kiosks are a necessity for restaurants. Also, see how Samsung Kiosk raised the game for one Chicago restaurant.

  • Half of US teenagers are online almost constantly: Study

    Australian govt to ban social media access for children younger than 16

    Half of US teenagers are online almost constantly

    Half of teenagers in the US are almost constantly online on social media platforms like YouTube, TikTok, Instagram, and Snapchat, finds a study, raising concerns about technology’s impact on youth.

    The study by Pew Research Centre, based on a survey of US teenagers ages 13 to 17, showed that nine-in-10 teenagers reported to be mostly on YouTube.

    Overall, 73 per cent of teenagers said they watch YouTube daily, making it the most widely used and visited platform. This share includes 15 per cent who describe their use as “almost constant.”

    “Nearly half of teenagers say they are online almost constantly, up from 24 per cent a decade ago. This share has stayed consistent over the past few years. Overall, nearly all teenagers – 96 per cent – report using the internet daily,” the report said.

    The alarming report comes even as the Australian government, last month, passed a social media ban for children under 16. The ban will apply to Instagram, X, Snapchat, and others from late 2025.

    Meanwhile, Pew research showed that about 6-in-10 teenagers in the US reported using TikTok and Instagram, and 55 per cent said they use Snapchat.

    About six-in-10 also reported visiting TikTok daily. This includes 16 per cent who report being on it almost constantly.

    Roughly half of teenagers said they go on Instagram or Snapchat daily. This includes about one-in-10 who say they’re on each of these platforms almost constantly.

    The share of teenagers who say they use Instagram almost constantly has increased slightly, from 8 per cent in 2023 to 12 per cent today.

    The use of Facebook (32 per cent) and X (17 per cent) has steeply declined over the past decade among teenagers.

    Australian govt to ban social media access for children younger than 16

    Across all five platforms, one-third of teens use at least one of these sites almost constantlyIANS

    Further, about a quarter of teenagers (23 per cent) said they use WhatsApp, while 14 per cent reported using Reddit.

    Across all five platforms, one-third of teens use at least one of these sites almost constantly.

    Notably, “no gender differences” were observed in the shares of teenagers who reported using Instagram and Facebook almost constantly.

    Yet, teenage girls use Instagram (66 per cent vs. 56 per cent) and TikTok more widely than teenage boys (66 per cent vs 59 per cent). On the other hand, boys are more likely than girls to use YouTube (93 per cent vs. 87 per cent).

    (With inputs from IANS)

  • eScan Introduces Vision Core XDR: Advanced Security Solution Empowering Enterprises with Threat Detection and Human-Centric Cyber Resilience – CRN

    eScan Introduces Vision Core XDR: Advanced Security Solution Empowering Enterprises with Threat Detection and Human-Centric Cyber Resilience – CRN

    eScan Cyber Security Software Solutions, announces the launch of its cutting-edge Extended Detection and Response (XDR) solution, eScan Vision Core XDR. Designed to address the growing complexity of cybersecurity threats, this comprehensive solution not only strengthens threat detection but also integrates human-centric security measures, transforming employees from potential vulnerabilities into active defenders.

    As enterprises face increasing challenges due to sophisticated cyberattacks and distributed workforces, eScan Vision Core XDR offers a unique blend of advanced technological capabilities and adaptive security awareness. Research reveals that approximately 95% of cyber breaches involve compromised credentials, underscoring the need for a robust, multi-faceted approach to enterprise security.

    “Today’s cybersecurity challenges require more than just technological solutions,” said Govind Rammurthy, Managing Director & CEO, MicroWorld Technologies, the developer of eScan. “Vision Core XDR represents a paradigm shift in enterprise security by integrating advanced threat detection with human-centric security measures that empower employees to become an active part of the security ecosystem.”

    The solution introduces IP-Radar, a smart navigation system that enhances situational awareness by providing real-time surveillance of all network connections and issuing immediate alerts for suspicious activities originating from high-risk regions. With the integration of the MITRE ATT&CK Framework, eScan Vision Core XDR leverages advanced threat anticipation capabilities, identifying and countering potential threats through known attack patterns and enabling proactive defense mechanisms. Further strengthening its unique offering is an Adaptive Security Awareness System, which dynamically evolves with emerging threats. By simulating real-world attack scenarios and conducting personalised security readiness assessments, the system enhances employee security competence and resilience against social engineering attacks.

    Acting as an advanced co-pilot for enterprise security, eScan Vision Core XDR combines traditional security features with intelligent monitoring and behavioral reinforcement. This integrated approach ensures comprehensive protection, addressing not only technical threats but also the human factor, a critical aspect often overlooked in cybersecurity strategies.

    Tailored for large enterprises, the platform is especially valuable for those seeking to consolidate their security infrastructure while managing the challenges posed by complex IT environments, limited cybersecurity expertise, and an ever-evolving threat landscape.

  • Schneider Electric Introduces EcoConsult in India, to provide Electrical and Automation System Consulting Services – CRN

    Schneider Electric Introduces EcoConsult in India, to provide Electrical and Automation System Consulting Services – CRN

    Schneider Electric, announced the launch of EcoConsult in India. Through this, the company aims to provide consulting services for electrical and automation systems, enabling them to prevent downtime, maximise safety and resilience, and contribute towards their sustainability goals. Whether a new installation or existing equipment, EcoConsult solutions will enable businesses to discover untapped efficiencies by providing them actionable insights to improve connected asset health and efficiency while helping to reduce overall carbon footprint.

    EcoConsult provides actionable insights and deliver on critical business outcomes, including up to 30% reduction in Operational Expenditure (OpEx) for asset management, up to 35% reduction in electrical energy losses, up to 15% savings on electrical utility bills through power factor improvement, and up to a 20% enhancement in electrical system reliability through implementation of recommendations.

    Underlining the importance of electrical consulting services to ensure efficient and sustainable electrical and automation assets, Ramesh Kumar Jha, Vice President – Services Business, Schneider Electric India said, “With Schneider Electric’s EcoConsult, we empower businesses to optimise efficiency, enhance safety, and achieve sustainability goals. Our suite of services, including audits and digital twins, helps mitigate risks and improve performance. By choosing EcoConsult, customers can unlock the full potential of their connectable and systems with the end-to-end digital platform, AI, and innovative analytics, optimising their business process and system design.”

    Speaking on the launch, Mr. Rajat Abbi, Vice President- Global Marketing, Chief Marketing Officer, Schneider Electric India said, “At Schneider Electric, we recognise that our customers are navigating an era of rapid change, where efficiency, reliability, and sustainability are more critical than ever. With EcoConsult, we offer a tailored solution designed to help businesses unlock their true potential by addressing these evolving needs. Through personalised customer experiences, compelling success stories, and cutting-edge digital engagement, we aim to inspire confidence and demonstrate how EcoConsult can tackle their unique challenges. This initiative reflects our unwavering commitment to empowering our customers to achieve their goals while thriving in a rapidly changing and dynamic environment.”

    Through this offering, Schneider Electric aims to identify potential safety and performance issues to reduce risk and improve reliability, right from planning a new installation to assessing the existing equipment:

    · EcoConsult Audit – Providing first assessment Audit Service to ensure that the installation is continually operating in a safe and secure way.
    · EcoConsult Electrical Digital Twin- Electrical Digital Twin Service digitises the paper-based electrical single-line diagrams by leveraging digital twins to manage electrical network including a multi-year services agreement to maintain your documentation up-to-date.
    · EcoConsult System Studies- Providing actionable insights to address the safety, resiliency and sustainability of electrical network.
    · EcoConsult Design- Helping businesses plan a new installation and ensure they are well-designed to avoid any potential safety and cybersecurity issues.
    · EcoConsult For Data Centers: EcoConsult for Data Centers ensures that Data Centers are fully prepared for the future. It helps boost its reliability, cut costs, and extend the useful life of your assets.

  • Vertiv Introduces Compact, High-Power Density UPS for Large Data Centers and Other Critical Applications – CRN

    Vertiv Introduces Compact, High-Power Density UPS for Large Data Centers and Other Critical Applications – CRN

    Vertiv introduced the Vertiv™ PowerUPS 9000, an energy-efficient, high-power density uninterruptible power supply (UPS) system with a compact footprint. The system is engineered to support IT applications from traditional computing to high density applications. It is available globally in UL and CE models, from 250 to 1250kW per unit.

    The Vertiv PowerUPS 9000 is designed for high-power density, as well as a high double-conversion efficiency of up to 97.5%. The system enables fast and easy installation, with top or bottom cable entry, as well as backfeed protection and ground fault kit options that are embedded in the system without need for extra space or on-site installation. The units are deployable anywhere in the world, reducing potential procurement and service inconsistencies, delivery delays and downtime.

    “The Vertiv PowerUPS 9000 UPS is engineered to maximise reliability and efficiency and to minimise footprint and complexity,” said Giovanni Zanei, Vice President, Large Power, Vertiv. “With its modular structure and high-power density, it will deliver energy-efficient, reliable power protection that data center customers are looking for to protect both traditional and mixed AI applications.”

    Commenting on the launch, Vikas Srivastava, Director – Medium/Large AC Power Offering, Vertiv India said, “We at Vertiv are always committed to providing innovative solutions for our clients to help effectively power the next generation of data centers. Vertiv PowerUPS 9000’s universal compatibility and easy deployment reinforces our intent to simplify operations while optimising performance, delivering high value for customers in a compact and highly efficient module.”

    The Vertiv PowerUPS 9000 is Vertiv’s most efficient UPS in its product class, with a physical footprint 32% smaller than previous generations. It is compatible with Vertiv™ EnergyCore lithium battery cabinet, and other battery technologies, including Valve-Regulated Lead-Acid (VRLA) and Nickel-Zinc.

    Dedicated, segregated controls and dual, hot-swappable communication and control boards allow each power module to operate independently. In the event of a fault, the affected module can isolate itself, thereby protecting the other modules and enabling continued operation. The continuous-duty solid state static bypass switch optimises the bypass line, and the system is fully hot-service and hot-swappable, meaning maintenance and upgrades can occur without downtime.

    The Vertiv™ PowerUPS 9000 can be enabled with Vertiv™ Next Predict, a preventative maintenance strategy with advanced monitoring, data-driven health analytics and insights that optimises site operations. By leveraging AI and machine learning algorithms to monitor actual equipment conditions and measure equipment health, Vertiv offers a comprehensive solution for optimal equipment performance and longevity.

    In Vertiv’s test labs, Vertiv engineers subjected Vertiv PowerUPS 9000 to extensive Engineering Validation Tests (EVT) and Design Validation Tests (DVT) against a wide spectrum of operational conditions to confirm its performance and reliability in real-world scenarios. It also passed additional environmental, performance and corner case tests – including debris protection, structural tests of seismic integrity and durability, and voltage surge and sag tests – that simulated extreme conditions the system may encounter.