Networking and Security | September 2015

Vendor News

Vendor News

Alcatel - Lucent

OpenTouch Suite for SMB H2/2015

Built on OmniPCX Office RCE R10.2 will be available on November 16th. Below is a sneak preview of the expected content:

- Simplification and decrease of number of discount categories

- 8001 DeskPhone integrated in OXO RCE R10.2 (Open SIP license not required)

- OTCV iPhone: same look and feel as for MLE

- IP Desktop Softphone: availability on tablets and smartphone

- Windows 10 support

The brand new OmniSwitch 6350 was launched in August, and is available in the data catalog for ordering. It will be part of the updated SMB collaterals for H2/2015.

SMB Roadshow Dates TBC, one event will be at Alcatel Lucent Enterprise’s new office’s in Wooburn Green in High Wycombe Bucks.

Blue Coat

Read the ESG report for advice about defending against SSL-based threats

A new study from ESG finds that 62% of information security professionals think their company is vulnerable to attacks hidden in encrypted SSL/TLS traffic.

How can you strengthen your defenses as the use of encryption rises? Get the facts and solid advice by reading the report.

Download Report

Check Point

Check Point Secure The Future!

When it comes to protecting your critical infrastructure, even small failures have huge consequences…


 Industrial control systems (ICS) and critical infrastructures are all around us and most days we don't even notice. When it comes to protecting our basics like water, electricity and other essential services, we don't want to leave anything to chance.

 Check Point looked at critical infrastructure environments and the cyber threats they encounter, and compared five solutions to develop the Zero Tolerance Test and evaluate areas of vulnerability.

Did your security solution make the grade? Download the report to see all of the results.

View Report

Extreme Networks

Gartner Recognizes Extreme Networks as a Visionary in the 2015 Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure

This recognition from Gartner demonstrates Extreme’s vision and ability to execute as a top vendor. According to Gartner, “a vendor in the Visionaries quadrant demonstrates an ability to increase features in its offering to provide a unique and differentiated approach to the market...” 

View Report


ForeScout CEO Comments on Ashley Madison Breach

Micheal DeCesare’s interview with Amanda Schupak of CBS News resulted in a feature article on lessons learned and cybersecurity best practices following the Ashley Madison breach.

View More


Johnnie Konstantas, director of security solutions at Gigamon, makes the case for a single view of network traffic in the context of improved security

Cyber security is undergoing a transformation precipitated by extensive and evolving threat complexity. The scale and magnitude of data breaches points at diminishing security technology effectiveness and it is sending both security vendors and architects back to the drawing board, encouraging them to examine the deployment options and mitigation strategies.

Where previously security tools at the perimeter of a network, including firewalls, Intrusion Prevention Systems (IPS) and DDoS appliances were sufficient, today the attack vectors are much too complex for defences deployed only at network ingress. Advanced Persistent Threats (APTs) employ a variety of tactics to infiltrate networks, making any one of an organisation's internet connected devices a potential breach launch pad.

View Report

HP & Aruba

HP & Aruba: A leader in the Garter Magic Quadrant

With HP and Aruba, your customers business can move towards the new digital workplace with speed, security, and simplicity. Combining HPN’s wired switches with Aruba’s access points and software suite provides your customers a robust end-to-end access-layer solution. Download the 2015 Wired and WLAN Access Infrastructure Magic Quadrant Report here.

View Report

Juniper Networks

To understand why a simple, open and smart security solution is essential in the cloud era, download Juniper’s NEW eBook

 This concise and informative document explains the new security challenges your organization faces and how to:

  • Protect virtual and physical environments

  • Protect assets and reduce vulnerability

  • Deliver scalable security that grows with you

 To get always-on security that enhances business performance for your always-on workforce read our eBook now.

 For more information about the above please contact  or call +44 (0) 1623 500 252 

Download eBook


Important RSA Product Announcement

As you may have seen in a recent press release and blog post that went out in late July, RSA is excited to announce their latest release of RSA Via Lifecycle and Governance, version 7.0! RSA Via Lifecycle and Governance is the re-packaged update of our Identity Management & Governance solution – part of RSA’s acquisition of Aveksa in 2013. RSA Via Lifecycle and Governance, or Via L&G for short, is part of the RSA Via family and was announced in April at RSA Conference in San Francisco, CA.

RSA Via L&G helps organizations efficiently meet their security, regulatory, and business access needs through a collaborative set of business processes. RSA Via L&G 7.0 is available for resell NOW!

View Report


Survey Reveals General Dissatisfaction with Current Vulnerability Management Programs

A global Skybox survey reveals more than half of enterprises aren’t satisfied with their vulnerability management programs. Rapid response to new vulnerabilities and threats remains a challenge in containing attacks. Let Skybox Security help you launch fast, streamlined defense. Learn more in the 2015 Enterprise Vulnerability Management Trends Report.

View Report