Value Journal | Issue 22 | May 2018

Page 1

Issue 22 // May 2018

DELL EMC TAKES OPEN NETWORKING TO THE EDGE FOR NEXT-GENERATION ACCESS New platform family and software bundles enhance SD-WAN to speed digital transformation and expand opportunities for service providers and enterprises. Dell EMC has introduced its Virtual Edge Platform (VEP) family, the first-to-market software-defined wide area network solution (SD-WAN) with the new Intel Xeon D-2100 processor, to help speed digital transformation by connecting the enterprise edge to the cloud via universal Customer Premise Equipment (uCPE). The new virtualized solutions will enhance or displace expensive fixed-function access hardware.

As a leading use case, the Dell EMC VEP provides next-generation access to the network via SD-WAN. By enhancing WAN operations and economics, service providers and enterprise customers can drive growth,

strengthen competitive differentiation and improve the end-user experience. Built with advanced intelligence for network virtualization and software-defined architecture, the Dell EMC VEP4600 provides an open Intel architecture-based platform to support multiple simultaneous virtual network functions (VNF). Numerous proprietary physical devices can be consolidated into this Continued on page 3

Microsoft announces new intelligent security innovations The new security features enable enterprises to secure their data and networks more easily.

Microsoft has announced several new intelligent security tools and technologies to help enterprises more easily secure their data and networks against today’s biggest threats as well as address

emerging threats aimed at IoT and edge devices. Microsoft is introducing Azure Sphere, the industry’s first holistic platform for creating highly secured, connected MCU devices on the intelligent edge. Featuring an entirely new class of MCUs with more than five times the power of legacy MCUs, an OS custom built for IoT security, and a turnkey cloud security service that guards every Azure Sphere device. With Azure Sphere, Microsoft extends the boundaries of the intelligent edge, to power and secure an

entirely new category of devices. The firm has introduced several new intelligent security features for its Microsoft 365 commercial cloud offering designed to help IT and security professionals simplify how they manage security across their enterprises. Microsoft has released Microsoft Secure Score and Attack Simulator. Secure Score makes it easier for organizations to determine which controls to enable to help protect users, data and devices by quickly assessing readiness and providing an

overall security benchmark score. It will also let organizations compare their results to those with similar profiles using built-in machine learning. Attack Simulator, a part of Office 365 Threat Intelligence, lets security teams run simulated attacks to event-test their employees’ responses and tune configurations accordingly. Also available with the upcoming Windows 10 update, are new automated investigation and remediation capabilities in Windows Continued on page 3

Redington Value is a value added distributor for the following brands in parts of Middle East & Africa:

For more information, please write to sales.value@redingtonmea.com


www.redingtonvalue.com

sales.value@redingtonmea.com

H Hotel, Business Towers, SZR, 7th Floor, Dubai, UAE


3 From page 1

Dell EMC takes... single uCPE while maintaining the high performance levels needed to host many. The modular design includes room to grow with front panel expandability so the platform can be easily upgraded or serviced in the field as needed. The VEP 4600 is powered by the new Intel Xeon D-2100 product family, Intel QuickAssist Technology (Intel QAT), and Data Plane Development Kit (DPDK). These features help optimise compute resources and provide efficiency for growing security workloads. The Intel Xeon Processor D-2100 product family’s performance, power and form factor have been tuned for higher performance-perwatt for SD-WAN and uCPE. It delivers more than 1.5x faster CPU performance, up to 2x improvement in packet processing, 2x memory bandwidth and up to 4x memory capacity. These processors enable complex packet processing and

COLUMN: REDefined

From page 1

other scale-out workloads with responsiveness and low latency. The cost- and powerefficient Dell EMC VEP4600 expands upon Dell EMC’s Open Networking initiative that offers customers choice and the ability to protect their investment. To help service providers speed time to market and enterprises simplify deployments, Dell EMC offers three validated solutions using the VEP4600. These solutions provide turnkey SD-WAN capabilities with pre-validated and pre-integrated configurations combining Dell EMC infrastructure and support services with industryleading SD-WAN software from Silver Peak Systems, VeloCloud Networks and Versa Networks. Architected and tested to Dell EMC standards, these offerings enable customers to quickly deploy cost effective SD-WAN solutions or managed services. The Dell EMC VEP4600 has begun shipping worldwide from April 24, 2018.

Microsoft announces Defender ATP, leveraging artificial intelligence and machine learning to quickly detect and respond to threats on endpoints, within seconds, at scale. Microsoft also announced a preview of a new security API for connecting Microsoft Intelligent Security Graph-enabled products as well as intelligence from solutions built by customers and technology partners to greatly enhance the fidelity of intelligence. Microsoft also is announcing a new Microsoft Intelligent Security Association for security technology partners so they can benefit from, and contribute to, the Intelligent Security Graph and Microsoft security products. Members of the association will be able to create more integrated solutions for customers that provide greater protection and detect attacks more quickly. Palo Alto Networks and Anomali join PwC and other existing partners as founding members of the new association.

Redington Value signs new vendor partnerships The regional distributor has partnered with IoT vendor PTC and cybersecurity leader Imperva. Redington Value has signed a Middle East and Africa distribution agreement with PTC, a renowned global Internet of Things (IoT) solutions provider. According to the terms of the agreement, Redington will enable its extensive partner network to deliver PTC solutions to enterprise customers in the region. “Redington’s ecosystem of partners can capitalise on PTC’s promise of physical digital convergence today and drive the future of innovation,” said Georges Millet, EMEA Channel Sales Vice President at PTC. “Combining the world-class components of ThingWorx with Redington’s knowledge and

Ramkumar Balakrishnan, Redington Value

network of partners will offer IoT innovation and adoption to customers within MEA.” The distributor has also signed a distribution agreement with Imperva, a cybersecurity leader that delivers solutions to protect data and applications in the cloud and on-premises.

The distributor will offer Imperva solutions including web application firewall and DDoS protection offering to its partners across the Middle East. “We are excited to work with Imperva as this crucial relationship helps us to expand and develop our security offerings. Through this relationship, our in-region partners have access to the winning combination of Imperva’s best-in-class security portfolio and our outstanding services, training and sales support capabilities,” said Ramkumar Balakrishnan, president, Redington Gulf, Value Distribution.

Powering partners’ transformation By Pradeep Kumar, Principal Consultant, Security, Redington Value

We are in an industry that is at high risk of disruption by new digital technologies. It is of prime importance that resellers employ a continuing skillset development program for their technical folks. Security is still a new skill set, one that is highly specialized and in high demand. As a VAD, we offer many avenues for our reseller partners to up and hone their security skill set. For example, we conduct product trainings, technical hands-on training, Shadow Pre-Sales and Post Sales, Webinars and ATC programs. Another important initiative we have taken is the Red Vault – which is a state-of-the-art customer experience and learning center. We will extend any support needed to our partners to help transform and make themselves relevant for the years to come. But for this to happen resellers must become agile in their business, focus on building expertise, have a strategy in place to scale and more importantly are willing to embrace latest technologies. We have also developed a few programs for our partners to help in their transformation. Here we employ our consultants to conduct workshops and help design strategies and time bound plans for our partners to transform their business and embrace the change. We will continue investing in equipping our channel partners to bring emerging tech to main stream, introduce vertical-based business outcome solutions and build ‘Strategy-to-Execution’ capability on cloud computing, IIOT and Data Analytics. .

For more information, please write to sales.value@redingtonmea.com


4

Fortinet delivers integrated NOC-SOC solution New management and analytics solution integrates Network Operations Center (NOC) and Security Operations Center (SOC) to bridge gap across silos

John Maddison, Fortinet

Fortinet has announced the industry’s first purposebuilt NOC-SOC solution that bridges workflows, analysis and automated response across operational and security processes. Building on the Fortinet Security Fabric architecture, Fortinet has combined the latest capabilities of FortiManager 6.0, FortiAnalyzer 6.0 and FortiSIEM 5.0 to offer a unique NOC-SOC management and analytics solution. NOC-SOC approach to management enables

enhanced security operations visibility with a new graphical Security Fabric topology view and extensions into both private and public cloud environments, with dynamic policy objects. New Security Rating feature combines analytics from FortiGate, FortiAnalyzer and FortiManager with threat intelligence services from FortiGuard to provide enterprises with a quantifiable security posture. Rating includes expanded audit rules, risk scoring and industry benchmarking with customized auditing based on network environments. New Incident Response (IR) tracking capabilities allow users to automate responses across silos based either on predefined triggers (system events, threat alerts, user and device status) or through direct ServiceNow

Fortinet is introducing a customized NOC-SOC solution that bridges the gap across IT disciplines to achieve broad and automated security response.” IT Service Management (ITSM) integration. Integration across security disciplines – not merely products – enables a greater level of visibility, control and operational management. Fortinet’s new NOC-SOC solution combines the latest capabilities of FortiManager, FortiAnalyzer and FortiSIEM, coalescing the operational context of the NOC, such as appliance status, network performance and application availability, with the security insights of the SOC, including breach identification, stopping data exfiltration, and

uncovering compromised hosts. John Maddison, senior vice president, Products and Solutions, Fortinet, says, “As the industry faces a cyber talent shortage and the pressure to maintain operational efficiency and security efficacy is critical for digital business, a new approach is needed that brings visibility and control into the NOC with workflow and response automation in the SOC. Fortinet is introducing a customized NOC-SOC solution that bridges the gap across IT disciplines to achieve broad and automated security response.”

HPE to acquire Cape Networks Acquisition expands Aruba’s AI-powered analytics and assurance capabilities. Hewlett Packard Enterprise has announced a definitive agreement to purchase privately-held Cape Networks based in Cape Town, South Africa, and San Francisco. Cape Networks will become a part of Aruba, a Hewlett Packard Enterprise company, and will expand Aruba’s Artificial Intelligence (AI) powered networking capabilities with a sensor-based service assurance solution that gives customers a simple, proactive, and networkagnostic tool for measuring and monitoring SaaS, application, and network services. The solution helps organizations deliver the

best possible end user experience by enabling IT to get ahead of service quality issues before they occur, accelerate time to resolution, and lower cost of operations. By applying a sensor-based and network agnostic approach to service assurance, Cape Networks proactively tests the availability and performance of services and applications, alerting IT professionals of issues before they impact the user or the business. Cape Networks delivers easy-touse insights with a simple and intuitive dashboard that helps eliminate the guesswork for IT.

For more information, please write to sales.value@redingtonmea.com

Cape Networks’ solution complements Aruba NetInsight, and together will deliver comprehensive AI-powered analytics and assurance so that customers can quickly adapt to changes in the user, device, application, and network environments. “Cape Networks strengthens and further differentiates the Aruba Mobile First Architecture with a simple and intuitive, yet powerful, approach to optimizing the end-user experience,” said Partha Narasimhan, CTO, Aruba, a Hewlett Packard Enterprise company. “With Cape Networks, IT can easily deploy

Partha Narasimhan, Aruba, a Hewlett Packard Enterprise company

and use a network of sensors to proactively optimize and remotely troubleshoot end user experiences for on-premises and cloud applications such as SAP, Salesforce.com, Microsoft Office and Wi-Fi captive portals.”


5

Malwarebytes introduces endpoint protection and response solution Malwarebytes Endpoint Protection and Response allows organizations to proactively hunt for malware across all of their endpoints without the need for a dedicated resource. Key features include: Cloud-based single management console and a unified agent. • Continuous monitoring and visibility of endpoints – Endpoint Protection and Response’s flight recorder provides continuous monitoring and visibility into Windows desktops to obtain powerful insight. • Multi-layered protection – Malwarebytes Endpoint Protection and Response’s multi-vector protection (MVP) uses a seven-layered approach, which includes both static and dynamic detection techniques. • Rapid identification and three modes of endpoint isolation – When an endpoint is compromised, Malwarebytes stops the bleeding by isolating •

Marcin Kleczynski, Malwarebytes

Malwarebytes has announced the release of Malwarebytes Endpoint Protection and Response. Marcin Kleczynski, CEO, Malwarebytes, said, “Malwarebytes Endpoint Protection and Response provides proven endpoint protection with integrated detection and response capabilities via a single agent, so organizations of all sizes can easily protect their endpoints from targeted attacks, thoroughly remediate systems and rollback ransomware.”

Malwarebytes Endpoint Protection and Response provides proven endpoint protection with integrated detection and response capabilities via a single agent.” the endpoint. Endpoint Protection and Response is the first product to offer three ways to isolate an endpoint. Network isolation restricts which processes can communicate. Process isolation controls which processes are allowed to keep

functioning. Desktop isolation alerts the end user and halts further interaction to limit damage. • Complete remediation and ransomware rollback – Malwarebytes proprietary Linking Engine provides complete and thorough remediation to rapidly return an endpoint to a healthy state and minimize impact to the end-user, post-compromise. Rollback technology winds back the clock up to 72 hours, negating the impact of ransomware with just-in-time backups prior to infection. Malwarebytes Endpoint Protection and Response allows organizations to proactively hunt for malware across all of their endpoints without the need for a dedicated resource.

Mimecast offers cyber resilience for email with new capabilities 53 percent predict their organization will suffer from an email-borne attack in 2018 Mimecast has announced enhancements to its Targeted Threat Protection services Impersonation Protect, URL Protect, and Internal Email Protect – engineered to combat and remediate the evolving threat landscape. New features include supply chain impersonation protection, similar domain detection, the integration of new automated intelligence feeds, as well as the introduction of automated threat remediation capabilities. New research from Mimecast and Vanson Bourne revealed that organizations are not only facing a variety of different threats, but the volume and frequency of these attacks continue their upward trajectory.

In fact, 53 percent expect a negative business impact from these emailborne threats in 2018. Impersonation attacks commonly use social engineering, and are designed to trick users such as finance managers, executive assistants, and HR representatives into making wire transfers or providing information which can be monetized by cybercriminals. Normally, these attacks target people from within the same company; however, attackers have started to impersonate senders from so called trusted third parties that the target company does business with regularly. New Mimecast and Vanson Bourne research found that 40

percent of the 800 IT-decision makers who responded said they saw an increase of these types of attacks over the past 12 months. Impersonation Protect, from Mimecast, will offer supply chain impersonation protection to guard companies against similar or lookalike third party email domains, helping to stop these attacks before they could cause any issue. Mimecast has incorporated new capabilities within Impersonation Protect and URL Protect that are designed to use new algorithms to protect internal users from similar or lookalike domains. New real-time data feeds have also been added to Impersonation Protect engineered to better identify newly observed and

Ed Jennings, Mimecast

registered domains to further enhance Mimecast’s ability to detect security threats. “Cybercriminals are constantly looking for new ways to be stealthy and trick users, which was the key driver for us to enhance Targeted Threat Protection with these new capabilities,” said Ed Jennings, Chief Operating Officer. Available in June 2018, these new features will be delivered through Mime|OS, a 100 percent single cloud platform that underpins the Mimecast services, and via a single administration console with a simple to use user interface.

For more information, please write to sales.value@redingtonmea.com


6

SonicWall announces Capture Cloud Platform SonicWall Capture Cloud Platform delivers integrated security, management, analytics and control across entire SonicWall portfolio.

Bill Conner, SonicWall

SonicWall, the trusted security partner protecting more than 1 million networks worldwide, introduces the SonicWall Capture Cloud Platform, which tightly integrates security, network, email, mobile and cloud security products. SonicWall also is introducing new and enhanced products in its portfolio of

hardware, virtual appliances and endpoint clients. The SonicWall Capture Cloud Platform identified more than 49,800 new attack variants in the first quarter, with SonicWall RealTime Deep Memory InspectionTM (RTDMI) identifying 3,500 neverbefore-seen variants.

Bill Conner, President and CEO, SonicWall, said, “The new SonicWall Capture Cloud Platform ensures organizations are always protected by the absolute latest information — updates, signatures and alerts — to automatically defend their networks from the most advanced cyberattacks.”

The new SonicWall Capture Cloud Platform ensures organizations are always protected by the absolute latest information to automatically defend their networks from the most advanced cyberattacks.”

To aid organizations in mitigating growing volumes and variants of cyberattacks, the SonicWall Capture Cloud Platform provides intelligence, management and analytics to supplement SonicWall’s complete portfolio of cybersecurity hardware, virtual appliances and endpoint clients for an efficient, easy-to-use and connected customer experience. The newly announced cloud platform includes capture security center, capture Advanced Threat Protection (ATP), capture client, hosted email security and capture Labs Threat Network. One of the cornerstones of the SonicWall Capture Cloud Platform is the SonicWall Capture Security Center, originally released as SonicWall Cloud GMS. Delivered as a cost-effective service offering, the SonicWall Capture Security Center offers the ultimate in visibility, agility and capacity to govern entire SonicWall security operations and services with greater clarity, precision and speed — all from a single pane of glass.

Veritas revamps channel program to drive partner growth The redesigned program enables partners to address and benefit from increased customer demand for data management solutions

Barbara Spicek, Veritas

Veritas Technologies has debuted an enriched partner program focused on helping the channel drive growth and profitability. The new Veritas Partner Force program is designed to create higher earnings potential for more than 10,000 global partners who want to capitalize on Veritas’ 360 data management

portfolio and multi-cloud data management solutions. The Veritas Partner Force program is dramatically simplified, making it much easier for partners to reap more benefits and rewards. Additionally, partners will have access to a plethora of educational offerings that will empower them to help customers solve some of their biggest data management challenges. The revamped program also offers expanded revenue opportunities to attract a new generation of worldwide resellers, service providers, system integrators and distributors. “The channel continues to evolve as many of our partners are developing more of their

For more information, please write to sales.value@redingtonmea.com

own intellectual property and are focused on selling business solutions versus point-products,” said Barbara Spicek, Vice President, Global Channels and Alliances, Veritas. “Recognizing the changing needs of the channel, Veritas is increasing technical assets, deepening skills and enhancing opportunities to make it easier for our broad ecosystem of partners to help customers harness the power of their data on-premises and in multi-cloud environments.” Key new components of the Veritas Partner Force program include increasing opportunities for existing partners with greater earnings potential, building new revenue streams for partners

selling to commercial and midmarket accounts, expanding the company’s Global Distribution Program to drive growth and innovation and boosting partner resources for a faster path to revenue and success. Partners can also choose from a variety of new accreditation courses and skills evaluations, based on their business practices. Online courses such as Veritas NetBackup Architecture, Challenges in Backup and Recovery, and Risk Mitigation and Compliance are offered as part of the redesign. New e-learning courses will be added regularly to address newly introduced Veritas offerings as well as customer challenges.


7

Accelerate your Digital Transformation with Red Hat and Barq Systems - Riyadh - 30 April

Barracuda Customer Executive Workshop Dubai - 1-5 April

Fortinet NSE 4 Technical Workshop Dubai - 23-24 April

Fortinet NSE 5 Technical Workshop Dubai - 25-26 April

Fortinet NSE 4 Technical Workshop Dubai - 29-30 April

Fortinet Partner Day with partner OCS Infotech - Oman - 30 April

Fortinet NSE 4 Technical Workshop Dubai - 23-24 April

Palo Alto cloud Workshop Dubai - 24 April

Dell EMC Partner Enablement Session Jeddah - 15 April

HPE Channel Seminar Oman - 25 April

Microsoft Azure Technical Training on Deployment and Migration - Dubai - 21-23 April

Palo Alto cloud Workshop Egypt - 30 April

Palo Alto TRAPS workshop with BARQ Systems - Riyadh - 25 April

For more information, please write to sales.value@redingtonmea.com


8

Palo Alto cloud Workshop - Dubai - 24 April

Red Hat Partner Awards powered by Redington Value - Dubai - 22 April

Red Hat Partner Awards powered by Redington Value - Dubai - 22 April-1

Redington Value empowering the Channel Community at the Fortinet Partner Sync - Dubai - 11 April

SonicWall Get Secured Seminar - Dubai - 3 April

Redington Value Proud Partner of Nutanix .Next Forum - Dubai - 10 April

Splunk Partner Conference 2018 - Emerging Markets - Dubai - 17 April

Splunk SE1 Bootcamp - Dubai - 2 April

Splunk Partner Immersion Training Session - Dubai - 3 April

For more information, please write to sales.value@redingtonmea.com

StorageCraft Data Management Workshop Dubai - 2 April


9

Cambium Networks - Partner Enablement Session Kenya - 12 & 13 April

Cisco - End User Event With CATS Tanzania Tanzania - 13 April

Microsoft - Partner Roundtable Kenya - 12 April

Microsoft - Partner Roundtable - Kenya - 26 April

Tripplite - Lunch & Learn Partner Session Kenya - 19 April

Cisco - End User Event With Carrel Technologies - South Sudan - 18 April

Cisco - Hyperflex Partner Workshop Nigeria - 25 April

Cisco - NPL Orientation & Acceleration Sessions - Nigeria - 5 April

Microsoft - Partner Roundtable - Nigeria - 12 April

Cisco - Partner Enablement Session Nigeria - 11 April

Microsoft - Partner Roundtable - Nigeria - 26 April

For more information, please write to sales.value@redingtonmea.com


10

Red Hat announces availability of Red Hat Storage One Red Hat Storage One is a platform of pre-engineered systems, created in close collaboration with Red Hat’s server hardware partners.

Ranga Rangachari, Red Hat Storage

Red Hat has announced the general availability of Red Hat Storage One, a new approach to web-scale enterprise storage aimed at providing customers the convenience of hardware-optimized systems while preserving the flexibility and scale of software-defined storage.

Red Hat Storage One is designed to provide more of a plug-and-play approach to the procurement, deployment, and performance tuning of softwaredefined storage, ushering in a new wave of enterprise storage to meet the varying demands of modern workloads. Red Hat Storage One is a platform of pre-engineered systems, created in close collaboration with Red Hat’s server hardware partners, that delivers tightly packaged workload-optimized storage solutions. The fulfillment and support is offered via Red Hat’s hardware partner ecosystem. Supermicro is the first Red Hat server partner offering a single part number for software,

hardware, and support of the solution. With rapidly increasing data volumes, many organizations are facing pressure to modernize traditional systems. As a result, many enterprises now want the benefits of software-defined storage without investing in the deep skill sets that may be required to configure and tune the systems. Unlike many proprietary, monolithic storage systems that are labeled software-defined storage only in name, Red Hat Storage One offers an open, flexible, and modular solution that can easily be extended to meet the evolving needs of the modern enterprise. Red Hat Storage One can help

customers get the flexibility of software-defined storage and the convenience of storage appliances, with features such as ease of installation, workload and hardware optimization, flexible scalability and cost effective. Ranga Rangachari, Vice President and general Manager, Red Hat Storage, said, “Many of our storage customers are looking to purchase and deploy a packaged solution that requires little customization. We are excited to bring together the flexible, software-defined power of Red Hat Storage with resilient hardware from our partner ecosystem to make software-defined storage more appealing.”

AWS announces Amazon S3 One Zone-Infrequent Access (Z-IA) Amazon S3’s new lowest cost storage class offers a single Availability Zone storage option for infrequently accessed data such as copies of data, backups, off-site compliance, and disaster recovery. Amazon Web Services (AWS), an Amazon.com company has announced Amazon Simple Storage Service (Amazon S3) One Zone-Infrequent Access (Z-IA), a new Amazon S3 storage class that stores objects in a single Availability Zone. Amazon S3 Z-IA is designed for customers who want a lower-cost option for infrequently accessed data, but do not require the multiple Availability Zone data resilience model of the S3 Standard and S3 Standard-Infrequent Access storage classes. S3 Z-IA is intended for use cases with infrequently accessed data that is also re-creatable, such as storing secondary backup copies of onpremises data, or for storage that

is already replicated in another AWS Region for compliance or disaster recovery purposes. S3 Z-IA is available today in all commercial AWS Regions. AWS Regions are comprised of Availability Zones, which refer to technology infrastructure in separate and distinct geographic locations with enough distance to significantly reduce the risk of a single event impacting availability, yet near enough for business continuity applications that require rapid failover. Amazon S3 object storage classes (S3 Standard and S3 Standard-IA) and Amazon Glacier store data across multiple geographically-separated Availability Zones to offer the

For more information, please write to sales.value@redingtonmea.com

Mai-Lan Tomsen Bukovec, AWS

highest level of resilience. With Amazon S3 Z-IA, customers can now store infrequently accessed data within a single Availability Zone at 20 percent lower cost than S3 StandardIA. In addition, S3 Z-IA offers customers higher availability and durability than self-managed physical data centers, with the

added benefit of having to pay only for what they use. Mai-Lan Tomsen Bukovec, Vice President, Amazon S3, AWS, said, “Amazon S3 Z-IA is ideal for customers who want storage for infrequently accessed objects, don’t need the durability of multiple Availability Zones, and want to save cost with our lowest priced storage tier in Amazon S3.” A single Amazon S3 bucket can store a mixture of S3 Z-IA, S3 Standard, and S3 StandardIA storage classes, letting storage administrators make decisions based on the nature of the data, data access patterns, and cost without having to change any applications.


Barracuda Email Protection

Comprehensive, elegantly simple protection against email-borne threats to your users, brand, and business.

Cloud Services

ESS Barracuda Essentials

PL

Barracuda PhishLine

SEN Barracuda Sentinel

Appliance-Based Products

ESG MA Barracuda Email security Gateway

Barracuda Message Archiver

For more details contact: MarketingMET_Team@barracuda.com



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.