BT | August 2016

Vendor News

Vendor News

Aruba Networks

NEW 2930F Series Switch

The Aruba 2930F Switch Series provide performance and ease of use for the enterprise campus, SMB and branch office and is is designed for customers creating digital workplaces that are optimised for mobile users with an integrated wired and wireless approach. These basic Layer 3 access switches are easy to deploy and manage with advanced security and network management tools like Aruba ClearPass Policy Manager and Aruba AirWave.

View Here

Blue Coat

New report: what’s hiding in your encrypted traffic and what to do about it.

Get the Fraunhofer report on Encrypted Traffic Management

The use of encryption holds many advantages for IT security. However, it also offers cybercriminals and malware authors a way to hide their exploits. Read the new report from respected standards organisation, the Fraunhofer Institute (FKIE) and learn how to combat the new risks with an effective Encrypted Traffic Management (ETM) solution.

View Here

Check Point

Check Point - To The POINT

Samsung Research America Chooses Check Point Mobile Threat Prevention

As the research arm of an industry-leading manufacturer of consumer electronics, Samsung Research America is committed to forward-looking innovation and bringing new products to market ahead of competitors. The last thing it needs is leaked confidential information, which could significantly compromise its market advantage and its bottom line.



The 4 Steps to Stronger Mobile Security

Every CISO worries about how to keep devices and data safe, but when it comes to doing so on iOS and Android, there’s still much to learn. Check out our infographic to learn where you can start to keep mobile devices and data secure.

View Here

It’s Time to ReThink Security Management: A Resource for the Security Professional

The traditional response to potential threats tends to be point products that worsen complexity. This is because a unified security program – based on integrated technology – is not being used. This paper invites you to rethink your current security posture and enable strong protections for your organisation.

Download Here


F5 Networks Secures IoT and 5G Networks with Availability of Standalone Carrier-Class Firewall

F5 Networks have announced the availability of its high performance and scalable carrier-class firewall solution focused on delivering end-to-end security across service provider networks. The standalone carrier-class firewall supports up to 1.2 billion concurrent connections and over 20 million connections per second. Today’s announcement is aligned with F5’s commitment to expand its portfolio of dedicated security offerings. F5’s carrier-class firewall is designed to address security concerns around the growth of the Internet of Things (IoT), migration to 5G and NFV networks, as well as increased security vulnerabilities affecting devices, networks, and applications.

View Here


Now More Customers Can Benefit From FireEye NX

Security-mature organisations have long realised the value of FireEye Network Security (NX) in protecting their network infrastructure, data and users from known and unknown advanced threats. Now FireEye has developed two new editions of NX, to help you extend that protection to a broader range of organisations. NX Power provides the traditional customer base a comprehensive network security platform incorporating more functionality, including mobile threat protection and contextual intelligence. NX Essentials provides less security-mature organisations with affordable enterprise-class protection against advanced attacks, without overwhelming security teams.

View Here


The Internet of Things is real, 5.5 Million new things will connect every day in 2016, 25 Billion devices will be connected by 2020*

* Gartner November 2015

Mid-Market customers may have smaller IT budgets, but they are still just as concerned about the security of their data and of their network.

New devices join their networks every hour. Unmanaged notebooks, smartphones and tablets. Internet of Things (IoT) devices of all shapes and sizes, rogue endpoints and servers. These devices significantly expand their attack surface yet are invisible to many security products. ForeScout can:

> See devices and details other systems can't
> Control enforcement, not chaos
> Orchestrate system-wide security

Although traditionally a player in the enterprise security space, ForeScout offers a solution for all. Arrow is currently offering two mid-market bundles:

> 500 devices from £10,500
> 1000 devices from £17,500

Read how ForeScout helped Sutton and East Surrey Water. They had 500 endpoints across 12 locations and needed to maximise internal security compliance, gain enhanced visibility and control of authorised and unauthorised devices and software on its network.

View Here


Fortinet Achieves 99.9% Security Effectiveness Score In NSS Labs Data Center IPS Test

Fortinet has recently announced the results of NSS Labs’ recent Data Center Intrusion Prevention System (DCIPS) report. NSS Lab’s DCIPS report is the industry’s most comprehensive test to date with their Security Value Map revealing that Fortinet’s FortiGate 3000D earned the highest ratings for Security Effectiveness, blocking 99.9 percent of exploits, and TCO (Total Cost of Ownership) per protected Mbps (Megabit per second). NSS Labs conducts regular testing of the top DCIPS vendors, subjecting competitive solutions to strenuous, real-world scenarios that test security effectiveness, network performance, and TCO. These results are used to generate their Security Value Map (SVM) and Comparative Reports. FortiGate 3000D DCIPS was put to the test against competing solutions, proving to be capable of thwarting 100 percent of all evasion techniques, as well as receiving a score of 100 percent for reliability and stability. The FortiGate 3000D demonstrated consistent leadership in security effectiveness, network performance, and value, earning NSS Labs’ coveted Recommended rating.

View Here


Forrester Study: The Total Economic Impact of Gigamon

The Forrester Total Economic Impact™ (TEI) study examines the return on investment (ROI) enterprises may realise by deploying Gigamon’s solutions. The findings were based on in-depth interviews with four of the company’s customers, and some of the key benefits of Gigamon’s solutions include:

  • Reduced cost of hardware and software
  • Reporting effort savings
  • Reduction in downtime
  • Fewer security personnel required
  • Greater customer satisfaction
  • Strengthened security profile

For more details and complete ROI figures, please download the complete report below.

View Here

Intel Security

This is security. Integrated.

Hear from Jim Reavis, CEO and Co-founder of the Cloud Security Alliance and Raj Samani, CTO of Intel Security around the current challenges enterprises face while moving to the cloud

In a recent survey, respondents reported that they expect 80% of their organisation’s IT budgets to be spent on cloud computing within the next 16 months. This challenges security executives and professionals to provide resilient security while incorporating industry best practices for moving to the cloud. Those very issues are the topics of discussion in a revealing new webinar, Cloud Security—What You Should Be Concerned About. Jim and Raj tackle subjects such as:

  • Whether or not we’ve come to the end of cloud utopia
  • The immense investments being earmarked for cloud technology
  • If we have a reliable roadmap for the cloud’s future
  • How the role of security professional is changing
  • New security models being driven by cloud adoption

The webinar also dives into the lack of trust in the cloud to provide data security, and whether that mistrust is supported by real-world statistics. In addition, they examine how organisations can become more confident in their security by adopting solutions that work across private, public, and on-premises clouds. Businesses Need to Act Fast The Cloud is rapidly evolving. To keep up with security needs, companies must deploy comprehensive solutions that provide integrated visibility and enable immediate response throughout their hybrid cloud environments.

Watch the webinar below

Watch Here

FOCUS 16: Register TODAY for Early Bird Pricing!

Register today to take advantage of the Early Bird Registration discount through to July 31st. Come learn about the latest security innovations at FOCUS 16 from Intel Security technical experts, our customers, partners, and other like-minded professionals from more than 80+ Technical Breakout Sessions and Deep Dives.

This year’s lineup of FOCUS keynotes includes some of Intel Security’s top executives and Ted Koppel – longest serving news anchor in U.S. broadcast history! Koppel’s most recent book, a New York Times best seller, Lights Out (October, 2015) examines a threat unique to our time and evaluates potential ways for America to prepare for a cyber-catastrophe.

Come join Intel Security at FOCUS 16 to bring groundbreaking initiatives to your business or enterprise for the next year and beyond.

Dont miss out on your chance to save big with the FOCUS 16 Early Bird discount, sign up by July 31 for $100 off your Registration. Register TODAY! Get all the details and countdown to FOCUS 16 by visiting our Website.

Register Here


New EX Series Switches Provide Secure, Simplified Management for Campus and Branch Networks

New E2300 and EX3400 access switches combine with Junos Fusion Enterprise to streamline management across enterprise networks. 

Juniper’s Junos Fusion Enterprise and Virtual Chassis technology is ready to provide flexibility and ease of management previously available only with higher end switches. Named  among CRN’s 10 New Innovative Networking Products to Check Out Right Now, Juniper’s new switches leverage Unite, the Juniper Networks reference architecture for secure enterprise infrastructure that unifies hardware, software, and security solutions—including third-party solutions through the Open Convergence Framework.

View Here


RSA Research: 75% of Organisations are at Significant Risk of Cyber Incidents

RSA, The Security Division of EMC (NYSE: EMC), released data demonstrating that organizations that invest in detection and response technologies, rather than perimeter-based solutions, are better poised to defend against cyber incidents. Highlights include:

  • For the second straight year, 75% of survey respondents have a significant cybersecurity risk exposure
  • Organisations that report more business-impacting security incidents are 65% more likely to have advanced cyber maturity capabilities
  • Half of those surveyed assess their incident response capabilities as either “ad hoc” or “nonexistent”
  • Less mature Organisations continue to mistakenly implement more perimeter technologies as a stop gap measure to prevent incidents from occurring
  • Government and Energy ranked lowest among industries in cyber preparedness
  • American entities continue to rank themselves behind both APJ and EMEA in overall cyber maturity


View Here

Palo Alto

Cybersecurity Education Efforts Yielding Results

Cybersecurity education efforts are yielding results, with 61 percent of respondents to a survey conducted by Palo Alto Networks saying they would speak with IT before introducing new devices onto a corporate network or adding business applications and tools onto unsecured devices. With more than 25% of identified attacks in enterprises expected to involve IoT by 2020, [1] – and many expected to enter the workplace – this survey finding represents a significant step in the right direction and demonstrates that employees’ knowledge and understanding of their role in cybersecurity is improving. However, the contrasting findings from this survey of business managers – who typically have the salary and tendency to be early adopters of new technology – are that 39 percent would fly under IT’s radar. This leaves a large margin for risk. Further still, of the group that doesn’t go to IT, one in every eight would “not tell anyone” about bringing a new device into an organisation or installing corporate tools, such as email, onto unsecured devices.

View Here