OpenTouch Suite for SMB H2/2015
Built on OmniPCX Office RCE R10.2 will be available on November 16th. Below is a sneak preview of the expected content:
- Simplification and decrease of number of discount categories
- 8001 DeskPhone integrated in OXO RCE R10.2 (Open SIP license not required)
- OTCV iPhone: same look and feel as for MLE
- IP Desktop Softphone: availability on tablets and smartphone
- Windows 10 support
The brand new OmniSwitch 6350 was launched in August, and is available in the data catalog for ordering. It will be part of the updated SMB collaterals for H2/2015.
SMB Roadshow Dates TBC, one event will be at Alcatel Lucent Enterprise’s new office’s in Wooburn Green in High Wycombe Bucks.
Read the ESG report for advice about defending against SSL-based threats
A new study from ESG finds that 62% of information security professionals think their company is vulnerable to attacks hidden in encrypted SSL/TLS traffic.
How can you strengthen your defenses as the use of encryption rises? Get the facts and solid advice by reading the report.
Check Point Secure The Future!
When it comes to protecting your critical infrastructure, even small failures have huge consequences…
…PROTECT INDUSTRIAL CONTROL SYSTEMS!
Industrial control systems (ICS) and critical infrastructures are all around us and most days we don't even notice. When it comes to protecting our basics like water, electricity and other essential services, we don't want to leave anything to chance.
Check Point looked at critical infrastructure environments and the cyber threats they encounter, and compared five solutions to develop the Zero Tolerance Test and evaluate areas of vulnerability.
Did your security solution make the grade? Download the report to see all of the results.View Report
Gartner Recognizes Extreme Networks as a Visionary in the 2015 Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure
This recognition from Gartner demonstrates Extreme’s vision and ability to execute as a top vendor. According to Gartner, “a vendor in the Visionaries quadrant demonstrates an ability to increase features in its offering to provide a unique and differentiated approach to the market...”View Report
ForeScout CEO Comments on Ashley Madison Breach
Micheal DeCesare’s interview with Amanda Schupak of CBS News resulted in a feature article on lessons learned and cybersecurity best practices following the Ashley Madison breach.View More
Johnnie Konstantas, director of security solutions at Gigamon, makes the case for a single view of network traffic in the context of improved security
Cyber security is undergoing a transformation precipitated by extensive and evolving threat complexity. The scale and magnitude of data breaches points at diminishing security technology effectiveness and it is sending both security vendors and architects back to the drawing board, encouraging them to examine the deployment options and mitigation strategies.
Where previously security tools at the perimeter of a network, including firewalls, Intrusion Prevention Systems (IPS) and DDoS appliances were sufficient, today the attack vectors are much too complex for defences deployed only at network ingress. Advanced Persistent Threats (APTs) employ a variety of tactics to infiltrate networks, making any one of an organisation's internet connected devices a potential breach launch pad.View Report
HP & Aruba: A leader in the Garter Magic Quadrant
With HP and Aruba, your customers business can move towards the new digital workplace with speed, security, and simplicity. Combining HPN’s wired switches with Aruba’s access points and software suite provides your customers a robust end-to-end access-layer solution. Download the 2015 Wired and WLAN Access Infrastructure Magic Quadrant Report here.View Report
To understand why a simple, open and smart security solution is essential in the cloud era, download Juniper’s NEW eBook
This concise and informative document explains the new security challenges your organization faces and how to:
Protect virtual and physical environments
Protect assets and reduce vulnerability
Deliver scalable security that grows with you
To get always-on security that enhances business performance for your always-on workforce read our eBook now.
For more information about the above please contact email@example.com or call +44 (0) 1623 500 252Download eBook
Important RSA Product Announcement
As you may have seen in a recent press release and blog post that went out in late July, RSA is excited to announce their latest release of RSA Via Lifecycle and Governance, version 7.0! RSA Via Lifecycle and Governance is the re-packaged update of our Identity Management & Governance solution – part of RSA’s acquisition of Aveksa in 2013. RSA Via Lifecycle and Governance, or Via L&G for short, is part of the RSA Via family and was announced in April at RSA Conference in San Francisco, CA.
RSA Via L&G helps organizations efficiently meet their security, regulatory, and business access needs through a collaborative set of business processes. RSA Via L&G 7.0 is available for resell NOW!View Report
Survey Reveals General Dissatisfaction with Current Vulnerability Management Programs
A global Skybox survey reveals more than half of enterprises aren’t satisfied with their vulnerability management programs. Rapid response to new vulnerabilities and threats remains a challenge in containing attacks. Let Skybox Security help you launch fast, streamlined defense. Learn more in the 2015 Enterprise Vulnerability Management Trends Report.View Report