Fujitsu | July 2015

Vendor News

Vendor News

Need Help with Directing Your Encrypted Traffic?

Cloud, web and mobile applications like Office 365 and are rapidly becoming the norm for our customers. These types of applications use SSL by default. So, how do your customers manage this encrypted traffic? More importantly, how do they identify, block and remediate the advanced threats that come in through these encrypted communications?

We’re working in partnership with Blue Coat Systems to help customers define their strategy for Encrypted Network Traffic Management so that they can:

    • Detect APTs that use SSL encryption to hide and bypass their current security tools
    • Differentiate their NGFW/IPS/IDS design using a dedicated SSL decryption device
    • Extend the life of their security tools that are straining under the increased volume of encrypted traffic

Blue Coat’s Encrypted Traffic Management solutions eliminate security blind spots and uncover hidden security threats while preserving privacy, policy and regulatory compliance.

To find out more about joint approach take a look at Blue Coat’s e-Guide (recommended browser: Chrome or FireFox ) click here

To find out why this is important take a look at the Gartner report: ‘Security Leaders Must Address Threats From Rising SSL Traffic’ click here

If you’d like any further information please contact:

Matt Howes Duncan Hart Blue Coat

Check out Check Point’s Threat Emulation

Check Point’sThreatCloud Emulation Software Blade prevents infections from zero-day attacks by inspecting suspicious files, emulating how they run to discover malicious behaviour and preventing malware from entering the network.

It reports new threats and automatically shares the newly identified threats for the benefit of customers.

Try it yourself by emailing suspicious files to or uploading them at

For further information please contact your Arrow Account Manager directly or email Check Point

Email Check Point


ForeScout enables organizations to continuously monitor and mitigate security exposures and cyber attacks. The company’s CounterACT™ appliance dynamically identifies and evaluates network users, endpoints and applications to provide visibility, intelligence and policy-based mitigation of security problems. ForeScout’s open ControlFabric™ architecture allows a broad range of IT security products and management systems to share information and automate remediation actions, we’ve teamed up with many leading network, security and IT management vendors to deliver unique and powerful integrations that allow companies to better leverage infrastructure investments, optimize IT resources, and help achieve continuous monitoring and mitigation capabilities.

Because ForeScout’s solutions are easy to deploy, unobtrusive, extensible and scalable, they have been chosen by more than 1,800 of the world’s most secure enterprises and government agencies in over 62 countries.

Learn More

Explore why ForeScout is seen as a leader in NAC…

and find out why Global 2000 enterprises choose ForeScout by downloading theGartner Magic Quadrant Report qualifying ForeScout as a NAC leader:

Learn More

Qualys Partnership announced!

ForeScout announced a partnership with Qualys on June 9th that will enable the integration of Qualys Vulnerability Management (VM) and ForeScout CounterACT™. Integration between the two solutions will give joint customers real-time assessment and mitigation capabilities against vulnerabilities, exposures and violations.

Learn More

Last chance challenge for Cisco ACE … Act Now!

Cisco ACE customers need to act now! It is official, Cisco ACE will reach end of Life on 30th September 2015. Don’t let your Cisco ACE customers delay. Work with them now to replace their ACE with BIG-IP.

F5 have launched a new partner incentive, the Last Chance Challenge Incentive for Cisco ACE where you can earn up to $6,000 per BIG-IP pair when your customers replace Cisco ACE.

Learn More

Intel Security (McAfee)

From the chip to the cloud, Intel® Security gives MSP partners the opportunity to deliver the industry’s broadest, most advanced security solutions as a managed service. With MSP-friendly buying options,

multi-tenant management capabilities, more efficient support and market-leading solutions, the Intel Security Managed Service Specialisation enables you to offer world-class profitable services.

McAfee have tailored the program for partners likeFujitsu who want to provide value-added services to their managed end users as part of partner-branded service. This provides a framework for new pricing models, simple reporting, access to hardware, on-premises software, cloud-based software, and optimised partner support to help you improve the value you offer to your customers and build more business.

Managed Services Specialisation Benefits

  • It’s easy to buy through the Monthly Buying Program.
  • Helps your customers shift from a Capital Expense to an Operational Expense without your business taking all the risk.
  • Eliminates the hassle of license renewals and co-terms.
  • It’s flexible because you can add or remove end users immediately.
  • You own the product license – not the end user.
  • It brings together solution management across endpoints, networks, data, and compliance.
  • You’ll have access to MSP-ready “high-growth” security solutions (SIEM, NGFW).

2015 Internet Security Threat Report Now Available

The Internet Security Threat Report provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec's analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.

Download Report

Websense Launches New TRITON APX 8.0 Platform

Websense have launched their new modular platform that provides advanced threat and data theft prevention. TRITON APX delivers protection across the Kill Chain, reveals actionable intelligence and reduces the need for remediation as it surfaces attacks and prevents advanced attacks.

Help your customers plan their future security strategy using the 2015 Threat Predictions Report, and contact Dan Poulsen for further information on how to propose a Websense solution to your customers.

Email Dan

What’s New in Skybox 7.5.200

The flowers are blooming, bees are buzzing, and Skybox’s developers are releasing a new version. The following features can be found in version 7.5.200, available now! Security Bulletins for Red Hat, New Firewall Rule Review Policy, Risk Assessment Enhancements in Change Process, Easy Integration of External Content for Firewall Changes and Added Device/Management System Support.

Read More