Networking and Security | July 2016

Vendor News

Vendor News

Alcatel-Lucent

0% LEASE ON DEALS UP TO £50,000 AND PAY NOTHING FOR A QUARTER*

For a limited time only, your customers can benefit from three years 0% lease finance deal on all Alcatel Lucent equipment, up to £50,000 and pay nothing for a full quarter following installation.

Available to non-regulated business customers only.

Key Benefits

•Quick return on investment
•Increase the purchasing power of your annual budget
•Protect against obsolescence
•Allocate cash to strategic business goals
•Drive business efficiencies with the latest Alcatel Lucent technology

To take advantage of this offer, please contact BNP Paribas Leasing Solutions on 01179 100 801 or ict.leasingsolutions@bnpparibas.com

Terms and Conditions
*Finance is restricted to non-regulated business customers only, subject to acceptance and affordability checks. For Finance Lease, VAT is due with each rental payment and you will not own the machine at the end of the agreement. Return conditions apply. Documentation and administration fees apply, see full terms and conditions. First payment will be collected 90 days after BNP Paribas Leasing Solutions sign the finance agreement. This promotion is available until 31st December 2016 and valid for deals between £3,000 to £50,000 (exc VAT). Maximum finance term is 3 years. The figures are correct at the time of printing but subject to change prior to signing. Images are for illustrative purposes only. Other finance products and services are available, terms and conditions apply. Finance provided by BNP Paribas Leasing Solutions Limited, Northern Cross, Basing View, Basingstoke, RG21 4HL. Registered in England No 901225. Authorised and regulated by the Financial Conduct Authority.

View Here

Why Upgrade to OpenTouch for SMB R10.3

View below to find why you should upgrade to OpenTouch for SMB R10.3 

View Here

Blue Coat

2016 Cyberthreat Defense Report Infographic  

Download the Infographic now!

The 2016 Cyberthreat Defense Report gives insights into the many challenges faced by IT security professionals today. Among the key findings:

  • 76% of respondents’ networks were breached in 2015
  • 62% believe a successful attack is likely in 2016
  • 65% witnessed an increase in mobile threats over the prior year
  • Malware and spear-phishing are causing the most headaches

Download Our Infographic Now to Learn More

View Here

FireEye

Update from the New FireEye iSIGHT Intelligence Team

In a message to their customers, Senior VP of FireEye iSIGHT Intelligence Sean Charnock – who heads up the combined FireEye iSIGHT Intelligence Team – provides a look inside this new organization.

You’ll learn how our industry-leading threat intelligence capability will help you better manage risk and improve your response to today's increasingly sophisticated cyber attacks.

View Here

Gemalto

New Market Research

The 2016 Gartner Market Guide for User Authentication is now available, courtesy of Gemalto. 

View Here

Intel Security

Announcing 2nd Guest Keynote for FOCUS 16!

FOCUS 16 Security Conference - November 1-3, 2016
ARIA Resort & Casino at CityCenter - Las Vegas

FOCUS 16, Intel Security’s 9th annual conference, connects leading security specialists from around the globe to exchange innovative ideas, one-of-a-kind visions, and invaluable insights about cybersecurity in a digital world.  

FOCUS 16 will feature compelling guest keynotes including:

Ashton Kutcher - As one of Silicon Valley’s most successful investors, Kutcher has funded many startups that are now household names and provides invaluable perspective on how a company’s cybersecurity posture affects growth and innovation. Holding the notable distinction as the first individual to earn one million Twitter followers, and to subsequently have his Twitter account hacked, Kutcher humanises the impact of cybercrime. As a thought leader in his own right, Kutcher offers a unique point of view on balancing the scales between security and freedom among other complex issues. 

Ted Koppel - The longest serving news anchor in U.S. broadcast history! During more than 50 years that he has worked as a professional journalist, Ted Koppel has embodied the term “eye-witness” by covering some of the most memorable events in history.  Koppel’s most recent book, a New York Times best seller, Lights Out (October, 2015) examines a threat unique to our time and evaluates potential ways to prepare for a cyber-catastrophe.

Sign up before July 31 and save $120 off your registration with the Early Bird discount. Don’t miss your chance to learn about the latest security innovations from Intel Security technical experts, our customers, partners, and other like-minded professionals across more than 90+ Technical Breakout Sessions and Deep Dives. Register today before the Early Bird discount expires!

Join Intel Security at FOCUS 16 to bring groundbreaking initiatives to your business or enterprise in the next year and beyond. Get all the details at http://focus.intelsecurity.com/focus2016

Register Here

Gain Visibility and Control across your Cloud Environment

Have you considered the security setup and responsibilities for your cloud yet?

Then you will know you need a solution that can address key challenges like:

  • Visibility across multiple cloud architectures
  • Efficient deployment of security controls
  • Uniform management of security posture

Read our solution brief to find out how Intel Security can help you address these challenges so you can manage and run discovery on your entire environment.

View Here

Pulse Secure

Pulse Secure Appliances
Purpose Built for Next Gen Secure Access

The Pulse Secure Appliances deliver SSL VPN connectivity or network access control (NAC) via a single high-performance platform.

Click below for a list of all the entry level promotions for Pulse Secure.

View Here

Ruckus

New Partner Marketing Center

Sales Tools

The new Partner Marketing Center (PMC) on the Ruckus Partner Portal provides easy access to content and resources that will help you create awareness of Ruckus solutions, build pipeline and accelerate sales.

Visit the PMC today to see what's available.

View Here

Skybox Security

Skybox Security Products Honoured With Three Cybersecurity Awards in June

Skybox® Security, a global leader in security analytics, is proud to announce the company was honoured with three separate cybersecurity awards in June:

  • SC Magazine gave the Skybox® Security Suite its highest rating of five stars in its Group Test for Vulnerability Management. The test was conducted by the magazine’s U.S. testing team, which includes SC Lab staff and a network of external experts who are respected industrywide. According to the review, five stars means, “Outstanding. An ‘A’ on the product’s report card.”
  • The Cyber Security Awards honored Skybox® Horizon as “Innovative Product of the Year” for 2016.
  • SC Magazine UK honoured the Skybox Security Suite with high commendation in two categories — Best Vulnerability Management Solution and Best Risk/Policy Management and Regulatory Compliance Solutions - at the 2016 SC Magazine Awards Europe. The awards were announced during Infosecurity Europe 2016. Each year, a handpicked panel of information technology security experts from the private and public sectors review hundreds of entries and narrow the field down to a select group of finalists.
View Here

Harnessing Integrated Security Analytics - Blog

Necessity is the mother of invention. To match the demands of a threat landscape that has grown exponentially in the last decade, cybersecurity innovation has moved at a break-neck pace. Like all innovation, it solves an immediate need — but it’s difficult to see the new issues it will cause. Cybersecurity point products that focus on one problem – or even one class of problems – have created major obstacles in security management and operations, in sourcing talent to wield these products and, most importantly, in comprehensive visibility of the attack surface. Lack of communication and integration between various vendors and solution sets have created disconnected environments, making it difficult to pull together the intelligence needed to gauge security status, preemptively strengthen defenses or respond quickly to an emerging threat or ongoing attack. In essence, the use of point solutions is like defending a castle one stone at a time.

View Here