European Reseller

Helping bring new products to market

Monday, Sep 24th

Last updateFri, 21 Sep 2018 10am

You are here: Home Security
Hand Held

WICK HILL NOW SHIPPING WATCHGUARD’S NEW APT

Wick Hill is now shipping WatchGuard’s new Advanced Persistent Threat (APT) solution, WatchGuard APT Blocker. Delivering real-time threat visibility and protection in minutes, not hours, APT Blocker identifies and submits suspicious files to a cloud-based, next-generation sandbox, using the industry's most sophisticated full-system-emulation environment for detecting APTs and zero day malware.homepage wickhill logo

Read more: WICK HILL NOW SHIPPING WATCHGUARD’S NEW APT

Synerzip has Developed Unified Threat Management Platform

WatchGuard’s visibility solution eliminates need for SIEM

Synerzip, a software-development company, has deployed WatchGuard Technologies’ Unified Threat Management (UTM) platform, featuring the company’s new real-time, security intelligence visualisation solution, WatchGuard Dimension. Synerzip, headquartered in Dallas, Texas, with a development centre in India and customers around the world, needed to secure its extensive network and quickly identify usage trends and security threats.

Read more: Synerzip has Developed Unified Threat Management Platform

Security Threat and Multi-Factor Authentication

Zero-Day Security Threats Give Rise to Next-Generation Multi-Factor Authentication

   threat development web

Here Claus Rosendal of SMS PASSCODE explains more

Read more: Security Threat and Multi-Factor Authentication

Edward Snowdon and the RSA receiving $10 million for a back door with NSA

Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a "back door" in encryption products


Back door .reutersmedia.net
A National Security Agency (NSA) data gathering facility is seen in Bluffdale, about 25 miles (40 km) south of Salt Lake City, Utah, December 16, 2013. Jim Urquhart/

Credit: Reuters

Read more: Edward Snowdon and the RSA receiving $10 million for a back door with NSA

Delivering M2M Security Within Encrypted Networks

Delivering M2M Security Within Encrypted Networks

 As cloud services explode in popularity, enterprises are increasingly turning to their channel partners for governance and visibility options that enable them to provision and control access to their applications, cloud infrastructure, servers and both structured and unstructured data. For the most part, those solutions today mainly take the form of enterprise identity and access management (IAM) strategies, which are generally effective in managing the identities assigned to interactive, human users.

J.Lewis WEB 

Jonathan Lewis, director of product marketing, SSH Communications Security

Read more: Delivering M2M Security Within Encrypted Networks

Best Practices for Secure Shell Key Management

Tatu Ylonen WEB CEO  founder SSH Comunications 

By Tatu Ylönen, CEO and founder, SSH Communications Security

Over the years, large enterprises have seen an increase in the number of security threats they have encountered.

Read more: Best Practices for Secure Shell Key Management

A Great time was had at the InfoSecurity Russia

Now InfoSecurity Russia Show 2013 is over it was held  25-27th September, Moscow, Crocus Expo, Pavilion 2. Don’t miss opportunity to register free of charge to 2014 Exhibition and conference

Infosecurity Russia groteck

Read more: A Great time was had at the InfoSecurity Russia

Infoseurity Russia 2014 A review as we look forward to 2014

Attempts to transfer infrastructure particularly or completely to the side of outsourcing service provider or in Cloud lead to the fact:

The management of a company’s IT-infrastructure is becoming a weak spot, which makes it difficult not only supporting existing systems and architectures, but also it doesn’t allow introduction of new solutions

.Ekaterina Kvitkovskaya Marketing Manager kvit

Ekaterina_Kvitkovskaya Marketing Manager

Read more: Infoseurity Russia 2014 A review as we look forward to 2014

Mayflex to Distribute Siemens Access Control - Aliro Range

Cabling infrastructure company Mayflex  a network and security solutions distributor, has signed an agreement to distribute the Aliro range from Siemens.

Aliro is a simple flat system architecture with easy-to-use web based software and  mobile applications.  Offering a flexible  approach to Access Control it enables system management from almost any device with Internet access.

Siemens Aliro

Read more: Mayflex to Distribute Siemens Access Control - Aliro Range