Networking and Security | August 2016

Vendor News

Vendor News

Blue Coat

2016 Cyberthreat Defense Report Executive Summary  
The 2016 Cyberthreat Defense Report yielded dozens of insights into the challenges faced by IT security professionals today.
Notable findings include:

  • Security analytics a top investment choice
  • SSL a big blind spot
  • CASBs for cloud DLP
Download Here


Are you a service provider?

Optimize, monetize, and secure network services. 

Continued growth in broadband subscribers and application usage — along with the enormous numbers of “things” being connected to networks — all combine to create continued challenges for service providers. To stay competitive, you need solutions that will most effectively scale and evolve your network while enabling rapid new service delivery and a secure, end-to-end environment.

Read the perspective of 73 global operators and discover what's trending for 2016 in a report from Heavy Reading, The Future of Mobile Service Delivery - 2016  

View Here

Protect your network infrastructure at every layer

Increasing and evolving threats require a multi-faceted approach that ensures security is inherent across every domain in service provider networks, as well as between users and the applications they are accessing across your network. F5 solutions provide multi-layer and multi-domain protection.

View Here

Network Functions Virtualization

Maximize the benefits of NFV. Moving to NFV is key to improving agility and elasticity, but it requires appropriate management and orchestration. F5 provides a unified platform that delivers the core functions service providers need to transition from existing infrastructures to fully integrated and orchestrated NFV architectures.

View Here

Data Traffic Management

Create a simpler and more profitable network. Increasing complexity in networks and traffic patterns presents service providers with constant scalability and performance challenges in the data plane. F5 solutions enable a simplified, high-performance network that delivers a high quality of experience for subscribers and maximizes profitability.

View Here

Diameter and DNS Signaling

Take control of signaling growth. With the rollout of LTE comes massive growth in Diameter and DNS signaling. F5 provides a strategic point of control in the signaling plane to help service providers simplify the network architecture, efficiently manage resources, respond to changes in real time, and quickly roll out new services to optimize the customer experience.

View Here


Certification with a Bonus

Pass any free online pre-sales training on Forcepoint University and get a US$200 voucher toward the Administrator* training course. (*Pre-sales and Admin Course are required to meet partner program training competency). This offer is running until 31st December 2016 and is exclusive to Global Platinum, Gold and Silver Stonesoft and Sidewinder Partners who have signed up to the Forcepoint Global Partner Program after January 14, 2016.

View Here

Forcepoint™ and Ponemon Institute Survey Finds Organisations Challenged when Monitoring Privileged Users, Preventing Insider Threats

Forcepoint™, in partnership with the Ponemon Institute, have released the results of its “Insecurity of Privileged Users” study, comparing data sets from 2011 and 2014 with present day. Although insider leaks and attacks continue to multiply, this study found that 58 percent of IT operations and security managers believe their organisations are unnecessarily granting access to individuals beyond their roles or responsibilities with 91 percent predicting the risk of insider threats will continue to grow or stay the same. With more than 40 percent of respondents agreeing that malicious insiders would use social engineering to obtain privileged user access rights – up 20 percent from 2011 data – it’s no surprise then that the majority of those surveyed expect insider threats to remain an issue. More than 600 commercial and 142 federal IT operations and security managers participated in the study.

View Here

Intel Security

Unpack, Unwind, Unplug: Is Your Data Going on Vacation with Your Staff?

Summertime, and the living is easy – Vacation days spent by the pool or the campfire, sipping something cool, and checking your work email! 

Sadly, that’s the reality for many of us…

We asked almost 14,000 people from around the globe about their electronic habits while on vacation. Not surprisingly, most of them could not unplug, even if they wanted to. In the U.S., almost 70 percent of people continue to check their email at least once a day while on vacation. Even those who want to disconnect have trouble staying away; more than half who expressed the intent to remain unplugged during their vacation couldn’t achieve their goal.

I’m not here to debate whether vacationing employees with a digital addiction are good or bad, but it does come with a measure of cybersecurity risk for their employer. Outside of the normal work and home routine, people often lower their guard. With just a quick check of email and the opening of an urgent attachment, it’s possible to get stung by a phishing scam.

Even public Wi-Fi networks can be dangerous. Just need to download a couple of work files? Hey, here’s a Wi-Fi signal, only this network may be run by local criminals for the purpose of luring tourists and catching something valuable.

When your employees take vacations, here are some best practices to share with them,  which will help them, and your corporate data, stay protected:

  • Make sure security software is installed, up-to-date, and active on any devices that are going on the trip.
  • Keep your devices locked and secured when not in use, and require PINs, passwords, or bio-metric security to unlock. Use the hotel safe when available as an extra security measure.
  • Install a privacy or black out screen on your phone and PC to prevent prying eyes on the plane, or beach.
  • Avoid public networks, use only encrypted and password-protected Wi-Fi, and turn off automatic connections on your devices.
  • If you must connect to the office, use encryption and VPN software.
  • Turn off Bluetooth and only enable it when and if you need it, to avoid unwanted connections from other devices.

Many people take their devices on vacation for social and leisure reasons. They want to get travel tips, post on social media, use navigation apps, listen to music, and stay in touch with family and friends. Nothing wrong with any of those things, as long as the corporate data and apps on their devices are properly safeguarded. If you feel your vacation location is too risky, you could even consider backing up and deleting the corporate apps and data before you go, and re-installing them upon return. With cloud backups, this is a quick and simple task.

Vacation is an important refresher for employees, and as a society we often don’t use it enough. We are lucky we live in a time when technology allows us to go on vacation and still take care of a few critical work items even when we are not physically in the office. Some gentle reminders and proactive steps on digital hygiene will ensure that corporate data is secure—even if employees are accessing it from a hammock on the beach.

Want to learn more about our findings? Check out the survey infographic below

By Candace Worley

View Here


Stop Ransom! Know The Facts

Ransomware attacks grew by almost 700% on average globally in 2014-2015*. Companies of all sizes are being targeted by cybercriminals, who encrypt and hold their data ‘hostage’ until a ransom is paid.

Stay one step ahead of the cybercriminals!


• 40% of businesses don’t believe ransomware is that big a problem

 Kaspersky Lab detected four times
more ransomware attacks in 2015
than in 2014

• In 2015, an estimated $325m was
extorted from ransomware victims

• The financial sector is the biggest
target for attacks

 In Q1 2016, Kaspersky Lab’s experts
detected 2,900 new modifications of

• In Q1 2016, Kaspersky Lab security
solutions protected 372,602 users
from ransomware attacks 

• 17% of ransomware attacks
specifically target businesses 

• One of the most famous and
widespread ransomware attacks of
2016 is Locky – Kaspersky Lab
has reported attacks from this Trojan in 114 countries.

• The Petya cryptomalware attack not
only encrypts data but also over-
writes the hard drive’s master boot
record (MBR) so victims can’t boot
into their operating system.

• In 2015, Kaspersky Lab solutions
protected 443,920 users worldwide
from cryptomalware, depriving
criminals of almost $53m in illegal

Download the free Kaspersky Anti-Ransomware tool for business below

Download Here


Today’s threat landscape was unimaginable a decade ago. Cybercriminals have adapted their techniques to sidestep traditional defences and lurk undetected on systems for months or even years. It’s time for enterprise security to adapt with an intelligence-driven, multi-layered approach to IT security.

View Here

The Threat Environment Gets Even More Complicated

The new generation of cyber threats is much more sophisticated than what came before. Lack of awareness about current advanced threats without effective solutions to mitigate them exposes businesses to cyberattacks - cyberattacks that affect not only financial resources, but continuity of critical business processes and confidential data as well. Enterprises know that these zero-day attacks, often based on exploits, are extremely harmful to their business, no matter what industry they operate in.

The Key: a Next-generation Endpoint Security Platform

The most important factor in a corporate security strategy is a next-generation endpoint security platform, powered by a global intelligence network (Kaspersky Security Network), which provides a higher level of business processes and data protection together with a wide range of security capabilities to fight advanced threats (detecting suspicious activities and protecting against zero-day attacks). No matter what endpoints you have – desktops, servers, mobile devices, virtual machines, even heterogeneous IT environments – you need a solution that gives you centralised control to protect all your endpoints.

View Here


Dealing With DDoS Application Threats In Mobile Networks

Leveraging Heavy Reading survey data, and pointing to real examples which have not attracted the same level of publicity, this webinar will demonstrate just how vulnerable the network stability and confidential information of mobile operators becomes to DDoS attacks, especially as LTE scales.

View Here

Next-Generation DDoS Mitigation: Leveraging Hybrid On-Premise and Cloud Solutions

As DDoS attacks become increasingly large and complex, most buyers looking to deploy DDoS mitigation begin their investigation by answering one simple question: Do I want to deploy DDoS mitigation products in my infrastructure or instead buy a hosted service?

View Here

The Next Cyber War - Geo-Political Events and Cyber Attacks

What do the latest news events have in common? Each conflict has included cyber-attack weapons and attacks. Join this webinar and learn about the evolving threats and cyber techniques, as well as strategies for survival.

View Here

Skybox Security

Skybox Security Launches Interoperability with VMware NSX

Skybox® Security has announced a new interoperability with the VMware NSX® network virtualisation platform, supporting network mapping, access analysis and vulnerability detection in NSX environments. With this introduction, Skybox continues to expand its security management capabilities to virtual and cloud networks, bringing greater visibility to hybrid IT environments.

Skybox previously announced integration with Amazon Web Services and the company will rollout support for additional virtualisation and cloud platforms in the next year. With new functionality in Skybox® Network Assurance, enterprises gain end-to-end visibility, from their physical networks to virtualised and cloud networks. Comprehensive network mapping and modeling gives network security administrators insight to how policy is actually deployed on virtual machines and enables end-to-end access analysis, combining both north-south and east-west policies. Using Skybox security analytics and the network model, vulnerability management teams are also now able to discover vulnerabilities in virtual and cloud environments that were previously uncharted or inaccessible.

View Here