Vendor Overview This is is the go to value-added distributor that accelerates market entry and growth for innovative cybersecurity, networking and inf

Similar documents
AKAMAI CLOUD SECURITY SOLUTIONS

Social Engineering: We are the target Sponsor Guide

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

SECURITY SERVICES SECURITY

Cyber Resilience: Developing a Shared Culture. Sponsor Guide

Security

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

DIGITAL TRUST Making digital work by making digital secure

Services solutions for Managed Service Providers (MSPs)

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

Security. Made Smarter.

Securing Your Most Sensitive Data

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Security-as-a-Service: The Future of Security Management

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

SIEM Solutions from McAfee

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

FOR FINANCIAL SERVICES ORGANIZATIONS

The Top 6 WAF Essentials to Achieve Application Security Efficacy

Security by Default: Enabling Transformation Through Cyber Resilience

Securing Your Digital Transformation

Redefining IT distribution. The Portfolio. The Nuvias vendor portfolio

align security instill confidence

RSA NetWitness Suite Respond in Minutes, Not Months

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Cato Cloud. Solution Brief. Software-defined and Cloud-based Secure Enterprise Network NETWORK + SECURITY IS SIMPLE AGAIN

locuz.com SOC Services

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

THE ACCENTURE CYBER DEFENSE SOLUTION

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

The Oracle Trust Fabric Securing the Cloud Journey

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Cyber Security Technologies

MODERNIZE INFRASTRUCTURE

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Securing Digital Transformation

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Networks

Run the business. Not the risks.

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

SYMANTEC DATA CENTER SECURITY

Achieving Digital Transformation: FOUR MUST-HAVES FOR A MODERN VIRTUALIZATION PLATFORM WHITE PAPER

We re Different. Founded in 2007, Secure Source specializes in Network Security technology and compliance solutions.

Features. HDX WAN optimization. QoS

to Enhance Your Cyber Security Needs

CipherCloud CASB+ Connector for ServiceNow

RESELLER LOGO RADICALLY BETTER. DDoS PROTECTION. Radically more effective, radically more affordable solutions for small and medium enterprises

MITIGATE CYBER ATTACK RISK

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Cybersecurity Roadmap: Global Healthcare Security Architecture

Cisco Start. IT solutions designed to propel your business

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

with Advanced Protection

SOLUTION BRIEF ASSESSING DECEPTION TECHNOLOGY FOR A PROACTIVE DEFENSE

Accelerate Your Enterprise Private Cloud Initiative

Infoblox as Part of the Ecosystem

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

SIEMLESS THREAT MANAGEMENT

Imperva Incapsula Website Security

Leisure Business Center,Muntaza,Doha, Qatar Ph: Fax Your trusted security partner

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

Securing intelligent networks: a guide for CISO and CIOs

TRUE SECURITY-AS-A-SERVICE

Unlocking the Power of the Cloud

Go mobile. Stay in control.

Traditional Security Solutions Have Reached Their Limit

Managed Endpoint Defense

Best Practices in Securing a Multicloud World

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

KEDAYAM A KAAPAGAM MANAGED SECURITY SERVICES. Kaapagam Technologies Sdn. Bhd. ( T)

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

NEXT GENERATION SECURITY OPERATIONS CENTER

Kaspersky Cloud Security for Hybrid Cloud. Diego Magni Presales Manager Kaspersky Lab Italia

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

CloudSOC and Security.cloud for Microsoft Office 365

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Gujarat Forensic Sciences University

ATTIVO NETWORKS THREATDEFEND INTEGRATION WITH MCAFEE SOLUTIONS

Cyber Incident Response. Prepare for the inevitable. Respond to evolving threats. Recover rapidly. Cyber Incident Response

BUILDING A NEXT-GENERATION FIREWALL

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Cisco Cyber Range. Paul Qiu Senior Solutions Architect June 2016

THE IDENTITY DEFINED SECURITY ALLIANCE

Safeguard Application Uptime and Consistent Performance

BETTER Mobile Threat Defense (BMTD)

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Build application-centric data centers to meet modern business user needs

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

IT Enterprise Services. Capita Private Cloud. Cloud potential unleashed

Transcription:

Vendor Overview Disruptive Distribution Accelerating market entry and growth for innovative cybersecurity technologies

Vendor Overview This is is the go to value-added distributor that accelerates market entry and growth for innovative cybersecurity, networking and infrastructure technologies. Combining specialist value-adding technical and marketing support, with the volume and reach of a global distributor, reseller partners rely upon to boost business opportunities and help achieve new revenues from the changing enterprise technology landscape. continually challenges traditional VAD models, redefining value and creating differentiation. We call this Disruptive Distribution. Here is an overview of the solutions we distribute through our best in breed vendors. Key NG Firewall Platform Network Packet Caputre Endpoint Protection Strong Authentication Web Application Firewall PIM Endpoint Response Vulnerability Assessment and Patch Management SIEM Virtual Execution (sandbox) Email Protection Cloud Access Security Brokerage Distributed Denial of Service File Access and MDM Privilege Access Management Encryption Key Generation and Management User Entity Behaviour Analytics Network Response Mobile Security Network Plumbing Page 2 Tel:0845 0845521 5217217 7217 Tel:

Aerohive Aerohive is an innovative enterprise mobility company, providing Simple, Secure, Scalable wireless and switching solutions. Its flexible architecture, built-in firewall capabilities and in depth analytics makes Aerohive the ideal solution for organisations of all sizes and across all verticals. Aerohive is one of few remaining independent enterprise WLAN vendors and are soley focused on enabling mobility. BalaBit IT Security BalaBit is specialised in advanced monitoring technologies and development of privileged activity monitoring, trusted logging and proxy-based gateway technologies, to help protect customers against internal and external threats and meet security and compliance regulations. Shell Control Box is a user monitoring appliance that controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. Blackberry Blackberry easily manage users, apps, devices, content, policies and data costs. Users are able to access the content they need, where and when they need it, whilst IT departments stay in control for corporate-owned and bring your own devices. By using BES12 and Good s Secure EMM Suites you are guaranteed a trusted end to end approach to security. Carbon Black Carbon Black s endpoint security platform defends organizations of all sizes from modern-day attacks with its unique zero-gap protection. The solution, provides Endpoint Threat Prevention, Detection, and Response whilst offering continuous monitoring and recording for real-time visibility into every endpoint, multiple forms of signature-less threat prevention, instant and customisable detection, and the industry s only incident response solution that combines continuous recording with live response and remediation capabilities. Tel: 0845 521 7217 Page 3

Vendor Overview Certes Protecting Data in Motion, Certes is leading the Software-Defined Security revolution, via its next generation VPN and Layer 4 Encryption. Enabling you to dynamically control your data traffic security without dependence on firewalls or the network infrastructure. Thousands of Certes patented solutions are deployed to protect enterprise data traffic in 84 countries around the world. Exabeam Exabeam provides user behaviour analytics, leveraging existing log data to detect modern attacks, prioritize incidents efficiently, and help valuable SOC staff respond effectively. User behaviour analytics analyses actual behaviour to determine risk and to inform overburdened security analysts about potential attacks, as well as how to remediate them. Done correctly, UBA adds a powerful analytics layer over existing security technologies, detecting new attacks, prioritizing incidents, and guiding a more effective response. Fortinet Fortinet s mission is to deliver the most innovative, highest performing network security platform to secure and simplify your IT infrastructure. They are a leading global provider of network security appliances for carriers, datacentres, enterprises and distributed offices. Fortinet s security fabric can intelligently protect your entire network: from the endpoint to the cloud and everywhere in between, delivering industry-leading, end-to-end simplified security that won t slow you down. Providing network security via industry leading solutions such as NGFW, Email, Web, Endpoint and Sandbox, Fortinet provides advanced threat protection and detection from even the most robust network attacks. Page 4 Tel:0845 0845521 5217217 7217 Tel:

Gemalto Gemalto is a provider of data protection. Securing and protecting organisations most valuable data assets and intellectual property. Gemalto authenticate people, transactions and objects, encrypt data and manage that encryption securely. Enterprises and government agencies trust Gemalto to protect and control access to sensitive data, manage risk, ensure compliance, and secure virtual and cloud environments and the same products are equally as applicable for every company. Gigamon Gigamon empowers customers with the ability to capture all traffic traversing physical and virtual networks, maximizing cybersecurity forensic capabilities. Through patented technologies, the Gigamon GigaVUE portfolio of high availability and high density products intelligently delivers the appropriate network traffic to security, monitoring or management systems. Greenbone Greenbone delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management. The Greenbone Security Manager (GSM) is a vulnerability management solution that seamlessly and transparently integrates into your security and GRC strategy, providing vulnerability assessment, vulnerability intelligence and threat management capabilities in the form of a dedicated or virtual appliance. Identifying breaches of corporate security policy and regulations is covered as well. With a strong focus on 3rd Party integration and open standards, the Greenbone Security Manager is a best of breed security solution that enhances and supplements security posture and allows a proactive approach to automated vulnerability lifecycle management. Tel: 0845 521 7217 Page 5

Vendor Overview Imperva Imperva offers WAF and DDoS solutions. The cloud solution Incapsula, has powerful capabilities with an easy to swallow commercial proposition while SecureSphere focuses on high end enterprise with its on premise WAF product. Preventing data theft starting from the data centres through to web applications is what Imperva specialise in, with a range of capabilities including database activity monitoring, web application security, and DDoS protection providing comprehensive data security across entire networks can be ensured. Imperva are the only Leader in Gartners 2016 Magic Quadrant for Web Application Firewalls (WAF). Infoblox Infoblox delivers critical network services that protect Domain Name System (DNS) infrastructure, automate cloud deployments, and increase the reliability of enterprise and service provider networks around the world. As the industry leader in DNS, DHCP, and IP address management, the category known as DDI, Infoblox reduces the risk and complexity of networking. Ixia Ixia make applications stronger. Building on their three pillars of IXTest, IxVisability and IxSecurity Ixia provides reliability and security solutions for development, deployment, and operations teams. Whether you are seeking greater visibility into your network or better performance, Ixia solutions validate network functions, test the integrity of security infrastructure, and deliver an end-to-end view of your network. The result: stronger applications, better performance, increased security resilience, happier customers, and maximum ROI. Lieberman Software By delivering an adaptive threat response in real-time, Lieberman Software continuously secures your cross-platform enterprise, countering malicious attacks from the outside and within. ERPM (Enterprise Random Password Manager) allows you to automatically discover, secure, and audit the administrator, root, domain and service account passwords in your cross-platform enterprise detecting dependent accounts and synchronizing privileged password changes to safeguard your infrastructure. Page 6 Tel:0845 0845521 5217217 7217 Tel:

LogRhythm LogRhythm, a leader in security intelligence and analytics and empowers organisations around the globe to rapidly detect, respond to and neutralize damaging cyber threats. The company s award-winning platform unifies nextgeneration SIEM, log management, network and endpoint monitoring and forensics, and security analytics. LogRhythm s unique Security Intelligence Architecture ensures that when threats are identified, a global view of activity can be seen, enabling exceptional security intelligence and rapid response. Lookout Lookout s enterprise products and services help large organisations to enable their mobile workforce, ensure compliance, and defeat advanced mobile threats. Protecting individuals and enterprises alike, Lookout takes the fight to cybercriminals by predicting and stopping mobile attacks before they do harm. Predictive security is what differentiates Lookout by identifying hidden connections that would otherwise go unseen, protecting individuals and enterprises alike. Netskope Netskope is the leader in cloud app analytics and policy enforcement. Only Netskope eliminates the catch-22 between being agile and being secure and compliant by providing complete visibility, enforcing sophisticated policies and protecting data in cloud apps. The Netskope Active Platform performs deep analytics and lets decision-makers create policies in a few clicks that prevent the loss of sensitive data and optimize cloud app usage in real-time and at scale, whether IT manages the app or not. With Netskope, people get their favorite cloud apps and the business can continue to move rapidly, with confidence. Tel: 0845 521 7217 Page 7

Vendor Overview Palo Alto Palo Alto, Inc. has pioneered the next generation of network security with their innovative platform that allows you to secure your network and safely enable an increasingly complex and rapidly growing number of applications. At the core of this platform is their next-generation firewall, which delivers visibility and control over applications, users and content within the firewall using a highly optimised hardware and software architecture. They are the fastest growing security company in the market because of its deep expertise, commitment to innovation and game-changing security platform focused on bringing an end to the era of breaches by uniquely integrating its Next- Generation Firewall, Advanced Endpoint Protection, and Threat Intelligence Cloud. Proofpoint Proofpoint helps the most successful companies in the world protect and govern their most sensitive business data. Proofpoint are Leaders in Secure Email Gateways and Enterprise Information Archiving, delivering an integrated suite of on-demand data protection solutions spanning threat management, regulatory compliance, data governance and secure communications all of which are based on a common security-as-a-service platform. SentinelOne SentinelOne unifies prevention, detection, and response in a single platform driven by sophisticated machine learning and intelligent automation. It enables you to predict malicious behaviour across major threat vectors in real-time, rapidly eliminate threats with fully-automated, integrated response capabilities and adapt your defences against the most advanced cyber-attacks. Tanium Providing a fundamentally new approach, Tanium is being used by the world s largest organizations, across the largest and most complex global networks, to manage every endpoint with 15-second visibility capabilities and granular controls, giving better more informed decisions and implementing required actions far more quickly. Page 8 Tel:0845 0845521 5217217 7217 Tel:

Tufin Tufin enables organisations to implement network security changes in the same business day through automation and impact analysis orchestrating change processes end-to-end across physical environments and hybrid cloud platforms. The award-winning Tufin Orchestration Suite automatically designs, provisions, analyses and audits network changes from the application layer down to the network layer. It minimises errors and redoes for rapid service delivery, continuous compliance and business continuity. Passport Introducing Passport Services from ; Expert technical professional services, professional training and product support, created specifically to help you successfully deliver client projects with exceptional quality and minimal overhead. Passport Services are orchestrated from 24/7 Support Centre in Hampshire. The result? With Passport, you have the power to sell, implement and support client projects on the scale of a major 24/7 value added service and technology operation, but without the time and operating cost overhead. Tel: 0845 521 7217 Page 9

@EXN_UK /exclusive-networks-limited-uk