When you visit New Belgium Brewing Company, the aromas make it easy to anticipate the taste that awaits you in a sample glass of beer. And standing beside the massive vats and kettles, you get a true sense of the hard work required to provide that taste. However, you may not understand the important role IT plays in helping to deliver that world-class beer.New Belgium Brewing’s IT Director, Trevor Morrison and his incredibly talented IT team supports the 4th largest craft brewer in the US, while expanding operations on a global scale. According to Morrison, the company’s employees are a unique set of folks with a passion for brewing and a strong commitment to New Belgium’s business model of sustainability and social responsibility.In the highly competitive craft beer landscape, improving efficiency and achieving cost savings are key for success. New Belgium constantly looks for ways to make better use of materials, reduce energy consumption and minimize its impact on the environment. IT plays an essential role in every phase of beer making, from procuring the raw materials and maintaining exceptional quality control, to marketing and managing the business.As New Belgium’s business was expanding, they jumped on the bandwagon with a cloud service provider to help manage their growing IT requirements. As they expanded their operations and added a new brewing facility, New Belgium realized that a high-performance, on-premises solution would be much more efficient. Going through a third-party took more time for upgrades and management, and the New Belgium team found they could do the work themselves much faster without paying for services they didn’t need. As a result, the company moved their core business applications back on site while relying on the public cloud for less critical applications with Office 365.New Belgium chose Dell EMC PowerEdge servers as the underlying infrastructure to provide the foundation for the brewing process, handling everything from tweaking recipes, opening and closing valves, and managing temperatures. PowerEdge servers also support the increasing requirements for applications and data, allowing the team to achieve greater control over data integrity and security while improving application speed and reducing IT costs. The company runs sophisticated workloads, such as ERP and CRM systems, SQL databases, SharePoint, and Skype for Business for general operations and to support their growing need for data analytics.New Belgium’s on-premise servers and time-saving management tools—including Dell EMC OpenManage and iDRAC—have also cut costs substantially compared to an off-site public cloud facility.With the on-premise solution, New Belgium has:Lowered annual operational costs by 66%Reduced provisioning time by 90%Improved support ticket resolutions by 80%As the craft beer marketplace becomes increasingly competitive, New Belgium Brewing continues to evolve while leveraging technology to develop world-class craft beers and meet market demand in the most efficient and effective way. Read our new case study to see how we helped them to make it happen.Make plans to join us at Dell Technologies World 2019 and meet the New Belgium Team in person! We’ll be hosting an exclusive New Belgium Brewing Happy Hour every afternoon from the show floor in the PowerEdge booth. Follow @DellEMCservers to stay in the loop.
Month: February 2021
How prepared are you to protect your company’s most important asset – its data? Before you answer, consider the facts:Hackers stole nearly 447 million records containing sensitive personal information in 20181Every 60 seconds, $1.1 million is lost to cyberattacks2The average cost of cybercrime for an organization was $13 million in 20183These statistics are daunting, and the rate at which they continue is proof that organizations are missing something when it comes to security. But rest assured, you can have peace of mind.Because endpoint security is so complex and constantly evolving, there’s no silver bullet. But it’s important to start at the foundation. While the rest of the PC industry prioritizes security applications and defenses that sit above the PC operating system (OS), Dell Technologies fortifies the device deep within the endpoint, starting below the OS. This is where Dell Technologies sets itself apart, delivering the industry’s most secure PCs – hands down.How can we make such a bold claim? It’s all in our approach and way we architect a system of security measures, built from the inside out.Secure the Control Tower Many security vendors approach security as a layer that sits above the device as software; however, our approach starts at the deepest layer of the device – the BIOS, which acts as the air traffic-control tower, ensuring all the PC hardware works in concert. It’s essentially the king of the chessboard. Protecting the BIOS is critical for all devices because if an attacker gains access to this level of the PC, it’s checkmate my friend, and the infiltrator can do just about anything with the device on the network.To guard the PC BIOS from tampering and cyberattacks from the inside out, Dell Trusted Devices give customers the ability to choose their recovery options versus a mandatory refresh, a reckless practice that’s often used by others. Think of it this way – if a burglar broke into your house, wouldn’t you want to investigate how the break-in occurred to prevent it from happening again and make sure that criminal is put behind bars so no one else experiences the same crime? Dell helps you sleuth and strengthen your PC, from the foundation up. Prevent Credential StealingUser credentials are the skeleton key to the network kingdom, making them highly desirable to attackers. Some organizations store and secure user credentials via software, versus hardware, but this approach leaves important credentials vulnerable. When an attacker compromises a PC and gains access to user credentials, they have broad access to the network and can launch more attacks from within. Credential storage in software opens the door for serious side-channel attacks and other credential theft tactics.Only Dell provides secure credential storage in an isolated security chip for better credential protection. Dell’s security chip facilitates an authentication “handshake” directly in the hardware so that credentials are never exposed within software.Block Sophisticated Threats While security starts within the device from the inside out, cyber threats continue to grow and get more sophisticated. This doesn’t mean you’re forced to layer on piecemeal security solutions and cobble together an approach from multiple vendors. Only Dell Technologies unites hardware security with software and services to help you better protect your business. Here’s how we take our built-in security another step forward:We simplify threat management so organizations can prevent, detect and respond quickly and efficiently to threats, keeping devices free from malware and cyber attacks. Workers can stay productive and free from the disruption a security incident can cause.In the event of a serious security incident, organizations can tap into highly trained incident response specialists from Secureworks for expert support before, during and after a security incident.Encryption software protects data on the device and in the cloud, all without disrupting user productivity.Shield from Prying EyesCompanies trust their employees to keep confidential information safe. Every time a worker turns on their PC and accesses information, they create an opportunity for a nearby wandering eye to compromise sensitive data – especially for remote workers, who are growing in number every day.For a final layer of data privacy, Dell’s built-in privacy screen lets PC users control their screens’ viewing angles to protect sensitive data. With the push of a button, the display’s backlight adjusts for optimal privacy. No longer do you have to worry about wandering eyes in the airport or coffee shop sneaking a glimpse of next year’s product roadmap or your latest bank statement.Tomorrow brings an ever-evolving universe of threats, and the most effective endpoint security will adapt quickly to defend against the unknown. Dell Technologies’ continued investment in security innovation helps us stay ahead of others – but most importantly – makes our customers the most secure.1 2018 End-of-Year Data Breach Report from the Identity Theft Resource Center2 RiskIQ 2018 Evil Internet Minute Report3Cost of Cybercrime Study 2019 Security_ProductSecurity_ProductVideo Player is loading.Play VideoPauseMuteCurrent Time 0:00/Duration 0:52Loaded: 18.97%0:00Stream Type LIVESeek to live, currently playing liveLIVERemaining Time -0:52 Playback Rate1xChaptersChaptersDescriptionsdescriptions off, selectedCaptionscaptions settings, opens captions settings dialogcaptions off, selectedAudio Tracken (Main), selectedFullscreenThis is a modal window.Beginning of dialog window. Escape will cancel and close the window.TextColorWhiteBlackRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentBackgroundColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyOpaqueSemi-TransparentTransparentWindowColorBlackWhiteRedGreenBlueYellowMagentaCyanTransparencyTransparentSemi-TransparentOpaqueFont Size50%75%100%125%150%175%200%300%400%Text Edge StyleNoneRaisedDepressedUniformDropshadowFont FamilyProportional Sans-SerifMonospace Sans-SerifProportional SerifMonospace SerifCasualScriptSmall CapsReset restore all settings to the default valuesDoneClose Modal DialogEnd of dialog window.Close Modal DialogThis is a modal window. This modal can be closed by pressing the Escape key or activating the close button.This is a modal window.RestartShare
Companies list cyberattacks, IT downtime, and leaked data as the greatest threats to their business operations according to the “2020 Allianz Risk Barometer.” What’s more, hardly anyone could have anticipated a global pandemic that would temporarily paralyze parts of the economy. As a result, many companies will reassess their risks, with the likelihood of even more emphasis on cybersecurity, because working from home in particular has increased companies’ dependence on digital infrastructures while simultaneously increasing their vulnerability. Cybercriminals recognized this fact during the early stages of the pandemic, and attacks have been on the rise ever since.Not only has the number of attacks increased, but also the quality of these attacks. Cybercriminals can use the dark web to access a broad range of cyberattack tools that were previously only available to major hacker groups and nation-states. SMEs are also being subjected to very complex cyberattacks. However, they are often negligent about IT security and reliability because they lack know-how, personnel, or financial resources.In doing so, they underestimate or overlook how expensive security incidents and interruptions to IT operations are. According to the “Global Data Protection Index: New 2020 Snapshot” from Dell Technologies, the estimated cost of data loss is more than $1 million and the cost of IT downtime more than $800,000. Which means that it is a good investment to spend the money on data and infrastructure protection.The question remains, where should it be invested? Traditional concepts and solutions work to a limited degree due to increasingly distributed infrastructures with a remote workforce and the use of cloud services. Of course, there’s no getting around the basic necessity of quick and reliable installation of security updates, because most cyberattacks exploit software vulnerabilities. The mail infrastructure must be protected because e-mail is the main port of entry for malware and phishing attempts. Still, having an up-to-date backup is your company’s best insurance against ransomware and hardware downtimes.Nevertheless, the modern world of work also requires new concepts and technologies. The protection of digital identities, the granting of rights, and monitoring access are among the priorities because the boundaries of the corporate network are becoming. Zero-trust concepts and multi-factor authentication, for example, can help here. In addition, the focus can no longer be on providing defense against threats alone; it needs to be expanded to include detection and response to cyberattacks. In this context, AI and automation are invaluable. They relieve the burden on the employees in IT security departments and help if it becomes necessary to quickly initiate countermeasures to minimize damage and downtimes. It’s the only way of achieving real cyber resilience.Furthermore, as we have seen in the current global pandemic, companies need emergency plans with thought-out and proven procedures they can fall back on in crises so they do not have to improvise at the last minute. Sending employees home to work remotely is an example of one such improvisation. The option of working from home should be integrated into a company’s overall security concept as quickly as possible. Additionally, employees need clear guidelines and training to enable them to securely handle data and company applications in a responsible manner when working from home.In the future, IT security must be an integral part of all IT projects, regardless of whether they involve employees working from home, the modernization of the infrastructure, or the introduction of a new cloud service. After all, cybercrime is a business that generates billions in revenue and is constantly evolving, which is why companies need to also consider IT security from the outset and view it as a process that is constantly reviewed and continuously improved.
BEIJING (AP) — China says it will no longer recognize the British National Overseas passport as a valid travel document or form of identification amid a bitter feud with London over a plan to allow millions of Hong Kong residents a route to residency and eventual citizenship. The announcement Friday by the Foreign Ministry spokesperson throws up new uncertainty around the plan just hours after the U.K. said it would begin taking applications for what are called BNO visas starting from late Sunday. Under the plan, as many as 5.4 million Hong Kong residents could be eligible to live and work in the U.K. for five years then apply for citizenship. Demand soared after Beijing last year imposed a sweeping new national security law on the former British colony.
NEW DELHI (AP) — India estimates its economy contracted by 7.7% in the 2020-21 financial year, battered by the coronavirus pandemic. But a government economic survey says it will likely bounce back, growing 11% in the fiscal year that begins in April. India’s economy contracted 7.5% in the July-September quarter following a record slump of nearly 24% in the previous three months that pulled the country into a recession. India last suffered a recession in 1979-80 after an oil shock. The current downturn followed a strict two-month lockdown imposed across the country beginning in March to combat the pandemic. It triggered massive unemployment in small and medium-sized businesses and left farmers in distress.
COLUMBUS, Ohio (AP) — Community activists critical of policing in Ohio’s largest city say its next chief must come from outside the agency. Democratic Mayor Andrew Ginther says Columbus residents have lost faith in Chief Thomas Quinlan and has demoted him. Chenelle Jones is a college dean who served on Ginther’s police reform commission. She said Friday that the new chief must come from outside of the state to stay clear of the agency’s culture of policing. Ginther says he plans a national search to replace Ginther. Other activists say a national search should not end in another internal hire like Quinlan’s.
MEXICO CITY (AP) — Mexico has lodged a protest with the French government over a planned auction in Paris of about 30 pre-Hispanic sculptures and other artifacts. Mexico’s National Institute of Anthropology and History said Tuesday that it also filed a criminal complaint, arguing it is illegal to export or sell such pieces. Christies of Paris says it will auction 39 artifacts Feb. 9, including “an impressive” 1,500-year-old stone mask from Teotihuacan and a “majestic,” equally ancient statue of the fertility goddess Cihuateotl, apparently from the Totonaco culture. The Mexican institute says about 30 of the pieces appear to be genuine, but accuses the auction house of putting some fakes up for bid as well.