Networking and Security | November 2015

Vendor News

Vendor News


OpenTouch Suite for SMB H2/2015 built on OmniPCX Office RCE R10.2 is available today!

Evolutions part of H2/2015 offer:

  • Simplification and decrease of number of discount categories

  • OTCV iPhone: same look and feel as for MLE

  • 8001 DeskPhone integrated in OXO RCE R10.2

  • 8232 DECT Handset: new software

  • IP Desktop Softphone: availability on tablets and smartphone

  • Windows 10 support

  • NEW: Hospitality native solution: limits extended from 120 to 200 guest rooms

  • NEW: SMB Sales Assistant now fully integrated with Actis 19.4. 

For more information, contact the team via

Contact Team

Blue Coat

Discover How Familiar Threats Are Becoming More Sophisticated

With mobile usage at an all time high, malware attacks are also on the rise. Don't wait — make sure you can identify the most common threats, where they come from and simple ways to protect your network. Knowledge is power. Download the report today and get the facts.

The report covers the latest issues affecting the mobile world, including:

• Potentially Unwanted Software (PUS)
• Ransomware
• Information Leakage

View Report

Check Point

Today's cyber thieves work long and hard at finding new ways to steal sensitive data from the devices we use and trust the most: our smartphones and tablets. But how do you step ahead of advanced mobile threats without stumbling over security or the end-user experience?

Please watch this joint webcast featuring Check Point and AirWatch to learn about:

  • The ever-changing threat landscape, and how it affects your business.
  • Recent attacks on iOS like XCodeGhost, including a demo of how devices can be exposed.
  • How Check Point and AirWatch work together to detect and stop threats before they start.

Visit our website to learn even more about Check Point Mobile Threat Prevention and how it keeps your organization’s mobile devices and data protected from advanced mobile threats.

For more information about the above or to answer any of your general Check Point queries please contact  or call +44 (0) 1638 569 600


Watch Webcast

Extreme Networks

Gartner Positions Extreme in the “Visionary” Quadrant for Wired and Wireless LAN Access Infrastructure Magic Quadrant

This trusted analyst report by Gartner evaluates a variety of LAN vendors providing converged access layer connectivity and positions vendors in their respective quadrant based on their ability to execute, and their completeness of vision.

With an increasingly competitive market and rapidly changing mobile needs, network decision makers use Magic Quadrant research to assess how vendors are adapting and differentiating their solutions.

Find out more below!

View Report


F5 and VMware delivering more control and better security for any device, anywhere

Partnership efforts between F5 and VMware support you—our customers—by integrating our technologies, products, and services to meet your business needs from the data center to the cloud. We have done so for close to 10 years—an eternity in the high-tech industry.

While it all started with F5’s BIG-IP load balancing the virtualised resources created and managed by VMware’s vSphere, over the years we have expanded our collaborative efforts. Today, we jointly deliver powerful and integrated solutions that support all elements of the Software-Defined Data Center.

View Report


Arrow named as PAN-European Distributor for FireEye!

Arrow are proud to announce that we have been named PAN European Distributor for FireEye. “Cyber security solutions from FireEye are a necessity for partners at the forefront of advising customers about their security or risk position,” said Nik Churchley, director of channel sales, EMEA, FireEye. “In recent years, we have seen a substantial increase in cyber threats across Europe against all types and sizes of businesses, and Arrow provides FireEye with broader reach into the channel to address this trend.”

For more information contact: Alison Nixon; – 01623 500224

View Report

Gemalto (SafeNet)

Gemalto partners with NetApp to deliver integrated cloud storage and data security solution for Amazon Web Services customers

Gemalto partners with NetApp to offer an integrated storage, encryption and key management solution for Amazon Web Services (AWS) customers. The solution brings together SafeNet Virtual KeySecure and NetApp Cloud ONTAP as a unified offer on AWS Marketplace and enables organisations to seamlessly store and encrypt their data and applications in virtual environments while maintaining business agility and complete ownership of their encryption keys.

Learn more

View Report


Fight back against cyber crime—new data from the Ponemon Institute:

To be forewarned is to be forearmed

The headlines tell us hackers are winning—and in some cases they are. But new research by the Ponemon Institute shows your peers are fighting back and using technology and best practices to reduce the financial impact of cyber crime.

View Report


NEW Juniper promotions

Junos Space:

  • Junos Space is a comprehensive Network Management Solution that simplifies and automates the management of Juniper’s Switching, Routing, and Security devices through a single pane of glass.

  • Junos Space Network Director provides a smart, comprehensive, and automated network management solution that enables network and cloud administrators to visualize, analyze, and control their entire Enterprise Switching Network - Data Center and Campus.

  • Junos Space Security Director provides extensive security scale, granular policy control, and policy breadth across the network. It helps administrators quickly manage all phases of the Security policy life cycle for Stateful Firewall, UTM, IPS, AppFW, VPN, and NAT through a centralized web-based interface. 

Juniper have new promotions  to enables you to qualify for discounts all of the above.

For further information about the details of the promotion please contact us at  or call +44 (0) 1623 500 201 

Contact Team


Did you know 90% of companies have experienced some form of external threat?* Not surprising really, as we all know it’s not easy staying on top of a dynamic threat landscape. Fortunately, you don’t have to – Kaspersky Lab’s security experts do it for you! Download our Practical Guide ‘Navigating the Threat Landscape’ and you’ll get:*


Insights into the current state of threats


Updates on common vulnerabilities and exploits


Advice on multi-layered security technologies


Tips to improve employee security awareness

View Report

Cheap and NastyDDoS

attacks capable of crippling network resources for days can be bought online for as little as $5 an hour. It's relatively easy for almost anyone to buy an attack capable of taking down a high-end e-commerce site.

While websites and online services attract the most attention, DDoS attacks can be launched against other infrastructure, such as routers and firewalls. Domain name servers (DNS) are particularly popular targets because without them, everything goes down. 

Kaspersky DDoS Protection (KDP) is a comprehensive solution that protects against DDoS attacks of all kinds and bandwidth. Geographically distributed “scrubbing” centres clean junk traffic, filtering legitimate communications to protected resources, while an Emergency Response Team of Kaspersky Lab engineers works on behalf of customers, as well as with the attack source, to end the attack.


Minimise losses through downtime of critical resources


Protect your business from reputational damage


Analysis and reports to help mitigate future attacks

Want to find out more around how Kaspersky Lab DDoS Protection can help your business stay secure against these threats?

View Report

Intel Security (McAfee)

McAfee Labs 2016 Threats Predictions report Learn what’s in store for cyberthreats in 2016 and beyond in our annual outlook

The cyberattack surface is growing faster than ever before, driven by trends and technologies like mobility, virtualization, and the Internet of Things (IoT). As the digital landscape evolves, so will threats. What can we expect a year from now—or five years from now? In the McAfee® Labs 2016 Threats Predictions report, 21 security experts share their predictions about how attackers, their behaviors, and their targets will change, and how the industry will respond over the next five years. In addition, researchers detail specific threat activity expected in 2016. Prepare yourself for the future by downloading the report now. Highlights:

  • Shared threat intelligence and collaboration across the public and private sector will enable better protection.
  • Vulnerabilities in everyday things—from wearables to automobiles —will be exposed.
  • Attacks on hardware, firmware and VMs will grow.
  • The underground market for stolen personal information will expand. 
  • Ransomware will become more sophisticated and will be offered as a service.

Find out about future trends by downloading the McAfee Labs 2016 Threats Predictions report.

View Report


RSA ECAT is an endpoint threat detection solution that exposes threats, highlights suspicious activity for investigation and instantly determines the scope of a compromise to help security teams stop advanced threats faster.  ECAT is the leader of the unknown being able to identify threats with the absence of a feed purely based on behavioural analysis (no signatures needed).

To learn more about the ECAT sales proposition, download our quick reference guide here

Contact Arrow to learn how you can make more money selling RSA’s ECAT.  Email  Call 01 638 569 600.

Contact Team