BT | September 2015

Vendor News

Vendor News

Palo Alto

On the 7th. October, Nir Zuk, Founder & CTO of Palo Alto Networks will be taking to the UK stage, at IP Expo giving his ‘ Cyber Security Keynote’ perspective on:

  • How cyber security has evolved since he lead the team that invented stateful inspection,
  • Why cyber security is even more important today than it ever was,
  • What’s working today,
  • What’s not working today and
  • Where the security industry is heading in the future.

See Nir at the IP Expo at 1pm 7th October at The Cyber Security Keynote Theatre.


SandBlast Threat Emulation (Sandboxing)

As part of the Check Point SandBlast Zero-Day Protection solution, Threat Emulation prevents infections from new malware and targeted attacks. This innovative zero-day threat sandboxing capability within the SandBlast solution delivers the best possible catch rate for threats, and is virtually immune to attackers’ evasion techniques.

Request Demo

Mobile Threat Prevention

Using smartphones and tablets to access critical business information on the go has many benefits, but it can also expose your sensitive data to risk. Check Point’s iOS and Android security threat prevention protects your devices from advanced mobile threats, ensuring you can deploy and defend devices with confidence.

Request Demo

Introducing F5 Partner Central

The all-new F5 Unity Partner portal is here! Meet F5 Partner Central (previously Partner Resource Center or PRC), your source for valuable F5 selling, training, and marketing tools that you can access from any device, anywhere. There’s a lot to explore on F5 Partner Central. Get started today by registering for the site. We’ve transformed the partner portal experience to bring you personalised content, tools to boost your F5 expertise, easy access to F5’s Marketing Demand Center, and improved look and feel.

Read More

New F5 cloud service provider program

In August, we announced our new F5 Ready program that makes it easier for your customers to use F5 solutions in the cloud. With F5’s software-based solutions, customers can ensure the security, performance, and availability of applications in cloud environments. The F5 Ready program verifies BIG-IP compatibility with public cloud service providers, including AWS, Bluelock, BT, Cisco Intercloud, Datacom, Dimension Data, Microsoft Azure, Rackspace, SingleHop, Skytap, and VMware vCloud Air.

Read More

Focus on the Alerts that Matter

Download FireEye’s latest Whitepaper to understand:

  • Why SIEM tools are helpful — but don’t solve the underlying problem
  • Why some alerts are more important than others
  • How crucial alerts are lost or ignored
  • How to ensure alerts are actionable
  • Practical steps to making alerts work for you, not against you
Read More

Protect your Enterprise Network from the Inside-Out

As organisations embrace the latest IT technologies such as Mobility and Cloud, traditional network boundaries have become more complex to control and secure. With many different ways into an enterprise network today, Advanced Threats once inside take advantage of the flat and open network. The Solution is a new model of Firewall – Internal Segmentation Firewall that sits at strategic points of the internal network.

Read More

Making the case for a single view of network traffic in the context of improved security

Cyber security is undergoing a transformation precipitated by extensive and evolving threat complexity. The scale and magnitude of data breaches points at diminishing security technology effectiveness and it is sending both security vendors and architects back to the drawing board, encouraging them to examine the deployment options and mitigation strategies.

Read More

Introducing GigaSECURE®, the world’s first Security Delivery Platform

GigaSECURE, Gigamon’s Security Delivery Platform, delivers visibility into the lateral movement of malware, accelerates the detection of exfiltration activity, and can significantly reduce the complexity and costs associated with a diverse range of security deployments.

It’s a fundamentally new approach.

Read More

Instant Evolution with Juniper’s MetaFabric architecture for the Data Center

Instant evolution means any platform, any cloud, any time. Getting there requires a new approach to data center networks. Juniper’s MetaFabric architecture is built on a simple, open, and smart infrastructure. In this link Juniper’s CEO Rami Rahim discusses the importance of an evolved data center. How will you evolve?

Read More

Discover the benefits of Micro-Segmentation with VMware’s NSX proposition

NSX has been designed to simplify and consolidate the data centre, making short work of transitioning a software defined data centre. Watch our quick NSX overview video.

Watch Video

or download the top statistics of NSX with our focused infographic.

Download Infographic

New Palo Alto Networks PA-7080 next-generation security at unrivalled scale for service providers and large enterprises

Palo Alto Networks, the next-generation security company, announced availability of the PA-7080, the newest and most powerful addition to its family of next-generation firewalls.

Large enterprises and telecommunications service providers are constant targets of cyberattacks. Cybercriminals seek to steal customer information from their data centers, disrupt services and leverage service provider networks as vectors for attacks on businesses and consumers.  As data centers and networks grow in capacity, speed, and complexity, a security offering that delivers prevention against cyberattacks at scale is needed.

Read More

ForeScout CEO Comments on Ashley Madison Breach

Micheal DeCesare’s interview with Amanda Schupak of CBS News resulted in a feature article on lessons learned and cybersecurity best practices following the Ashley Madison breach.

Read More

Skybox

A global Skybox survey reveals more than half of enterprises aren’t satisfied with their vulnerability management programs. Rapid response to new vulnerabilities and threats remains a challenge in containing attacks. Let Skybox Security help you launch fast, streamlined defense.

Learn more in the 2015 Enterprise Vulnerability Management Trends Report.

Learn More

HP & Aruba: A leader in the Garter Magic Quadrant

With HP and Aruba, your customers business can move towards the new digital workplace with speed, security, and simplicity. Combining HPN’s wired switches with Aruba’s access points and software suite provides your customers a robust end-to-end access-layer solution. Download the 2015 Wired and WLAN Access Infrastructure Magic Quadrant Report here.

Download Report

Symantec finalise their business split

Symantec Corp. (NASDAQ: SYMC) today announced that its Board of Directors has unanimously approved a plan to separate the company into two, independent publicly traded companies: one business focused on security and one business focused on information management (“IM”). Symantec’s decision to pursue a separation follows an extensive business review of the company’s strategy and operational structure. Creating two standalone businesses will allow each entity to maximize its respective growth opportunities and drive greater shareholder value.

Read More