Page 2
Contents
4
WhiteGold - The Gold Standard in Partner Enablement
5
WhiteGold - Profile
6-7 Fortinet 8-9 D-Link 10-11 WatchGuard 12-13 Barracuda 14-15 Kaspersky 16-17
Solera Networks
18 FireEye 19
Allied Telesis
20-21
WG - Solutions Chart
22-23
Meraki
24
Exinda
25
Imation
26-27
Aastra
28-29
nCircle
30
zScaler
31
CTERA Networks
32
BlueCat Networks
33
Gemalto
34
Arbor Networks
35 Vasco 36
Ultra Electronics - AEP Networks
37
Swivel
38
WG - Boomerang
Page 3
The Gold Standard in Partner Enablement needs in an ever-changing channel and technology landscape. We know that we need to enable you in an by change. That’s why in 2012 and beyond, we will introduce fresh, new online business enablement tools to help you succeed like never before - whatever your business size or focus. We will set the Gold Standard in Partner Enablement
CloudWise
www.whitegold.com.au Building Networks for People
Page 4
WhiteGold is a leading value-add distributor specialising in unified technology solutions for businesses across Australia and New Zealand. Our portfolio includes a comprehensive range of security, networking, storage and VoIP solutions, as well as associated services, wholesale managed services and certified training courses – all delivered through the very best Reseller and Service Integrator Partners available in Oceania. our industry is constantly talking about ‘convergence’ – but what does it really mean? It implies that technology users today require increasingly complex solutions that are slowly bringing together what were once disparate products and technologies, into a singular infrastructure that can cater for all their needs and interoperate for maximum efficiency and benefit. In other words – they want everything to work together and empower them – and they want it cheap, fast, secure and available all the time. After a number of years operating in the ANZ IT channel, this prompted WhiteGold to assess our traditionally security-focused business model and evolve into something new – that caters for the demands and requirements of today’s technology users. The end result is something very fresh – and very different. our strength in IT Security will remain, but our business has transformed into a broader-based technology provider that still retains our niche Customer Experience. Highlighting the unified technology solutions that we now distribute – we call this Unified Value Distribution. WhiteGold Distribution is Australia’s first Unified Value Distributor (UVD) in the Australian IT channel. As a hybrid distribution model that sits squarely between Broad-based and Niche distribution – the primary driver is to retain all the advantages of both of these traditional models, whilst eliminating all the disadvantages. The UVD model facilitates a wider set of technologies through one distribution vehicle rather than many (offering resellers a “one-stop-shop”, similar to a Broad-based distributor), whilst at the same time providing all the value-add of experienced-based pre-and-post-sales and technical support, training and professional services – normally only offered through Niche distributors. The term Unified Value Distribution perfectly encompasses just such a hybrid model, one that the ANZ region has been crying out for – and it works. This strategy gives resellers better margins, services, support and (ultimately) better value in all solutions involving the WhiteGold Product Portfolio.
To supplement the overall model, we also feel driven to actively develop Partner Enablement services, technologies and products – to turbo-boost the value on offer to WhiteGold reseller partners and increasingly differentiate ourselves in the marketplace. From creating new, specialised business units to cater for emerging technologies and delivery platforms, to assisting our partners by providing tools and services that help them develop their own businesses, as well as continually developing our back-office systems and procedures to outpace any other distributor – we aim to set the pace for the local distribution market. Wherever you see the WhiteGold Seal – you can bet your bottom dollar that there are world-class products, services and Partner Enablement elements within easy reach.
WhiteGold was incorporated in Australia in 2002 by seasoned IT Security identities with experience across sales and marketing, technical capabilities and channel knowledge in this space. The company provides products to resellers encompassing the SME, Education, Government, Corporate and Enterprise sectors – with key niche verticals within each. With nationwide coverage, a stable of world-class vendors, outstanding systems, people and services – we invite you to engage with us and experience the difference for yourself. WhiteGold – infinite value in distribution – the way it’s supposed to be.
Page 5
Fortinet • Ranked "Top Player" in Email Security Appliance Quadrant • ISO 9001:2000 Certified for Quality Management Systems standard • Voted one of Best Places to Work in Silicon Valley
Fortinet Fortinet (NASDAQ: FTNT) is a worldwide provider of network security appliances and a market leader in unified threat management (UTM). Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2009 Fortune Global 100. Fortinet's flagship FortiGate product delivers ASIC-accelerated performance and integrates multiple layers of security designed to help protect against application and network threats. Fortinet's broad product line goes beyond UTM to help secure the extended enterprise - from endpoints, to the perimeter and the core, including databases and applications. Fortinet is headquartered in Sunnyvale, Calif., with offices around the world. Fortinet's flagship FortiGate® security platforms offer a powerful blend of ASIC-accelerated performance, integrated multi-threat response, and constantly-updated, in-depth threat intelligence. Employing innovative technologies for networking, security and content analysis, Fortinet systems integrate the industry's broadest suite of security technologies, including firewall, VPN, antivirus, intrusion prevention (IPS), Web filtering, antispam, and traffic shaping, all of which can be deployed individually to complement legacy solutions or combined for a comprehensive threat management solution. The company complements these solutions with an array of management, analysis, e-mail, database and end-point security products.
Fortinet is headquartered in Sunnyvale, California, with customer support, development and sales facilities throughout the world. Fortinet sells its system and subscription service products through a network of channel partners worldwide.
Products Fortinet's comprehensive portfolio of security gateways and complementary products offers a powerful blend of ASICaccelerated performance, integrated multi-threat protection, and constantly-updated, in-depth threat intelligence. This unique combination delivers the highest level of network, content, and application security for enterprises of all sizes, managed service providers, and telecommunications carriers, while reducing total cost of ownership and providing a flexible, scalable path for expansion.
FortiGate: Unified Threat Management Delivers comprehensive protection agains sophisticated network, content, and application-level threats without degrading performance or availability. • Large Enterprise/Service Provider: Up to 182 Gbps firewall throughput • Enterprise: Up to 44 Gbps firewall throughput • SOHO/SMB: Up to 500 Mbps firewall throughput
To date, Fortinet has shipped more than 700,000 appliances to more than 100,000 customers worldwide, including: • 55 of the Global 100 • 7 of the top 10 Fortune companies in Americas • 8 of the top 10 Fortune companies in EMEA • 8 of the top 10 Fortune companies in APAC • 9 of the top 10 Fortune telecommunications companies • 9 of the top 10 Fortune banking companies • 7 of the top 10 Fortune defense/aerospace companies A key differentiator, Fortinet's custom-built FortiASIC content and network processors enable FortiGate systems to detect and eliminate even complex, blended threats in real time without degrading network performance, while an extensive set of complementary management, analysis, database and endpoint protection solutions increases deployment flexibility, assists in compliance with industry and government regulations, and reduces the operational costs of security management. Fortinet was founded in 2000 by Ken Xie, the visionary founder and former president and CEO of NetScreen and is led by a strong and seasoned management team with deep experience in networking and security. Fortinet's market position has been validated by widespread recognition by industry analysts, business organizations, and media. Company recognitions include: • Worldwide Leader in UTM (IDC; Frost & Sullivan) • "One of Top 5 Network Security Appliance Vendors WW (IDC)" • Ranked Tier 1 Enterprise Security Vendor (Current Analysis) • Leader in Gartner UTM Magic Quadrant
Page 6
FortiWifi 60CX ADSL-A
FortiGate 5140
FortiGate 40C
FortiGate 20C FortiGate 3950B
FortiGate 100D
FortiManager: Centralized Management Effectively manage any size Fortinet security infrastructure, from a few devices to thousands of appliances and end-point security agents. • Manages up to 4,000 Fortinet network devices
FortiAnalyzer: Centralized Analysis and Reporting
FortiScan: Vulnerability Management
Centralized logging, analyzing, and reporting from multiple Fortinet devices, as well as vulnerability assessments and event correlation.
Provides end-point vulnerability management, asset compliance evaluation, patch management remediation, auditing and reporting.
• Analyzes up to 5,000 logs/second
• Scans up to 2,000 agents up to 60 database instances
FortiAnalyzer 2000B
FortiSwitch: Gigabit Switching
FortiMail: Secure Messaging
Delivers wire speed, resilient, scalable, ultra-low latency fabrics with Gigabit Ethernet (GbE) and 10 GbE switching platforms.
Advanced antispam and antivirus filtering capabilities, with extensive quaratine and archiving capabilities.
• Delivers up to 2.9 Tbps switch throughput
• Provides antispam and AV filtering of up to 1.1 million messages/hour
FortiCarrier: Service Provider FortiSwitch 548B Extend FortiGate integrated security protection to critical applications across service provider’s IP network. • Delivers up to 182 Gbps firewall throughput
FortiAP: Secure Wireless Access Enables comprehensive, proven threat management and policy enforcement for wireless and wired networks. • Integrated WLAN protection, managed from a single console
FortiCarrier 3810A
FortiWeb: Application Firewall FortiAP 200 Web application and XML firewalls to protect, balance, and accelerate web applications, databases, and the information exchanged between them. • Inspects up to 22,000 HTTP transactions/second
FortiClient & FortiMobile: Remote Security FortiCliet PC™ and FortiClient Mobile™ provide comprehensive, dynamic security for personal computers, mobile laptops, and smartphones. • Extends Fortinet’s security expertise to endpoint devices
FortiWeb 1000C
FortiDB: Database Security Delivers vulnerability assessment, monitoring and auditing capabilities to harden databases and track the flow of information within them. • Protects up to 60 database instances
FortiDB 2000B
Page 7
D-Link
D-LINK UNDERSTANDS THE NETWORK DEMANDS OF TODAY’S SMB
Our Core Competencies. • “One-stop” solutions provider • Global knowledge, local expertise • Technology leader • Expertise in site audits • Customised solutions that improve business performance • Australia-wide network of systems integrator and partner • Technology training
• True developer, designer and manufacturer of IT products training on all products • Responsive, proactive and • Price-performance ratio / ROI
Value Added Services. • Pre-Sales / Sales Support • Local Warehouse • Advance Warranty Replacement • Limited Lifetime Warranty • Level 2 Support AUS / NZ
Contact D-Link to enquire about specialised solutions tailored for SMB, reference sites and 1300 700 100 or email sales@dlink.com.au Distributed by WhiteGold Distribution enquiries@whitegold.com.au, tel: 1300 137 993, www.whitegold.com.au
Page 8
That’s why our SMB proven end-to-end connectivity solutions should be your deployment of your switching, security, storage and wireless network requirements.
D-Link
D-Link IP Surveillance Solutions
Founded in 1986, D-Link is a global leader in the design, manufacture and marketing of advanced networking, broadband, digital, voice and data communications solutions. Following our company motto, "Building Networks for People", D-Link continually meets the global networking and connectivity needs of digital home consumers, small office professionals, small- to medium-sized businesses, and enterprise environments.
Small and unobtrusive, SecuriCam™ IP surveillance solutions from D-Link allow you to monitor your offices or warehouses from anywhere - at anytime. Extreme Low LUX optics, 2 way audio, and full pan/tilt/zoom manipulation provide everything an organisation needs to safeguard their valuable resources.
D-Link's core competency is in Ethernet connectivity. In fact, we are the global leader in providing network connectivity solutions to small and medium-sized business. From the beginning, D-Link engineers have researched, designed and manufactured innovative, standards-based networking solutions. We sell our state-of-the-art hardware at the best prices. Price may be the deciding factor for many new customers, but D-Link innovation, reliability and service keeps them loyal year after year.
• Day/Night Surveillance • Extreme Low Light Sensitivity • 2-way Audio Support • Motorised Pan/Tilt/Zoom • Smooth Video Recording • Selectable Compression Codec • 802.11n Wireless Connectivity or 10/100Mbps Fast Ethernet • Surveillance Software • Advance Warranty Replacement • Lifetime Warranty
If you want to Power Up Your Customer’s Businesses – you should know D-Link. D-Link is Switching, Storage, Security, Wireless, IP Surveillance and more.
D-Link Unified Wireless N Solutions From Unified Wireless Switching solutions, to plenum-rated business-class access points, D-Link is an industry pioneer in wireless networking. With xStack® wireless switches and the AirPremier® brand of business class indoor and outdoor wireless products, D-Link leads the industry in wireless networking and mobility. • Automation of administration procedures • Self healing functionality • Detection and mitigation of attacks • Suitable for sensitive applications • Fast roaming feature with IP tunnelling • Simultaneous operation on both 2.4GHz and 5GHzSupporting 802.11a/b/g/n • Supporting controller managed and stand-alone modes with automatic fail-over • Free AP Manager 2 Software • Medium to large wireless deployments • No additional subscription costs for maintenance
D-Link Switching Solutions
D-Link Storage Solutions The xStack® Storage line offers your business an affordable, high-performance, business-class solution for all of your storage needs. xStack iSCSI storage arrays are designed to address your growing network infrastructure and provide a solution capable of delivering disaster recovery, server consolidation and improved application performance. DSN-2100-10 - The 8-Bay xStack SAN Array storing up to 8TB is an ideal secure and reliable storage solution for the small to medium sized organisation. • Hot-Swaps SATA (including SATA II) HDD Bays • Supports RAID 0, 1, 1+0 and 5 • Handles Over 80,000 I/Os per Second DSN-3200-10 - The 15-Bay xStack SAN Array storing up to 15TB is an ideal solution for the SMB-SME looking for a critical data storage solution.
Networks today demand it all - high bandwidth, converged architectures, guaranteed interoperability, robust security and future compatibility. D-Link switching solutions offer all that and more at a price point tailored to the budget-conscious market. D-Link’s range of Switches include Unmanaged Switches, Smart Switches, Layer 2 Switches, Layer 3 Switches, Wireless Switches, Chassis, Switch Accessories, RPSU and Industrial Switches.
• Store up to 15TB using the 15 Hot-Swap (SATA & SATA II) HDD Bays • Supports RAID 0, 1, 1+0 and 5 • 8 Gigabit Ethernet iSCSI Ports
• Outstanding Performance and Reliability • 10 Gigabit Connectivity • High Speed Physical and Virtual Stacking • Advanced Security Features • User Control, Traffic Monitoring and Bandwidth Management
Protecting your network is vital. That is why D-Link offers the NetDefend™ line of security appliances designed to guard your data from malicious attacks and help you control the way you do business. NetDefend firewalls, VPN routers and security gateways provide secure solutions that will bring your business to the highest level of protection.
D-Link Security Solutions
Page 9
CompanyWatchGuard Hel Heavy It 17pt Main Title Main Para
Heading Body Copy
Page 10
WatchGuardÂŽ XTM Series
WatchGuard XCS Series
The XTM family of network security appliances is a
WatchGuard XCS solutions deliver the industry’s best
new class of performance-driven solutions. Blazing
defense-in-depth against email-borne threats, while
fast throughput combines with advanced networking
blocking over 98% of spam with 99.9% accuracy. All models include powerful data loss prevention capabilities that inspect sensitive data in outbound emails to ensure there are no policy violations. Optional email encryption is available. On higher end models, a Web Security subscription extends that protection to all web
tools that allow IT administrators to manage security through an intuitive centralised console, command line is
protocols from a single point of administration. Centralised administration and reporting reduces costs
easy to upgrade to a higher model in the line for more
and management requirements, and provides total
throughput, capacity, and networking features with a
visibility and control of incoming and outgoing email
simple downloadable license key. With 16 models to
With six models to choose from XCS series caters for
choose from XTM family caters for businesses of all sizes,
businesses of all sizes, from 250 or fewer users up to large
from 50 users or fewer up to 10,000 or more.
enterprises, ISPs, Fortune 500 and Global 1000 companies. For larger organisations and managed security service providers, the WatchGuard Quarantine Management Server (QMS) can be easily combined with an XCS
WatchGuardÂŽ SSL easy-to-use secure remote access solutions that provide reliable client and clientless connectivity to corporate data and resources for anywhere, anytime productivity. Ideal for small to mid-size companies with numerous remote workers needing access to essential network resources.
load unwanted email to a dedicated quarantine for up
requirements for the primary email security system or cluster, and gives end users the self-service capabilities to adjust their individual spam thresholds. Flexible
users. Two appliance models available.
Get red. Get secured. Page 11
Barracuda Networks
The Barracuda NG Firewall extends the next generation firewall concept by adding application-aware traffic routing and prioritisation across the Wide Area Network (WAN), thus optimizing performance and availability. Beyond its powerful network firewall and VPN technologies, the Barracuda NG Firewall integrates a comprehensive set of next generation firewall technologies including Layer 7 application profiling intrusion detection and prevention, Web filtering, anti-virus, anti-spam and network access control. Industry-leading capabilities for centralised management and scalability clearly distinguish the Barracuda NG Firewall from other next generation firewalls, making it the ideal solution for distributed network environments.
IMMEDIATE BENEFITS: Improved Security Posture: From a security perspective, organisations can improve their network security posture by integrating previously disparate security functions including: Web filtering, malware protection, email security, intrusion prevention, and Layer 7 application profiling into a single platform. Corporate Network Optimisation: From a global network operations perspective, administrative overhead can be reduced through centralised management that serves thousands of nodes and reduces hard dollar costs by optimizing WAN links and link bandwidth. Accelerated Troubleshooting: At a help desk and troubleshooting level, the Barracuda NG Firewall provides unprecedented levels of visibility into individual network ows, arming network engineers with powerful tools to diagnose and maintain the network.
Barracuda Networks continues to gain worldwide acclaim from customers, media, and analysts by offering exceptional customer service and top-notch products. Organisations of all sizes rely on Barracuda Networks’ products for four key reasons: • Up-and-running in 15 minutes • Automatic product updates • No support phone trees • Low total cost of ownership
Page 12
The Barracuda Networks Technical Support team strives for 100 percent customer satisfaction, and offers a variety of support options to ensure continuous uptime. Barracuda Energize Updates – The Energize Updates subscription provides Barracuda Networks products with protection against the latest Internet threats, delivers the latest firmware updates and provides basic support via email and phone. Definitions are automatically delivered for spam, virus, content categories, spyware filtering, applications, intrusion prevention, IM protocols, policies, security updates, attacks or document formats. Barracuda Instant Replacement – The Instant Replacement subscription provides an extended warranty, ensures a replacement is shipped the next business day upon notifcation of a failed unit, assists with data migration to the new unit, and provides a RAID hard disk replacement if needed. Instant Replacement also includes enhanced support with extended phone service 24x7. An active Energize Updates subscription is required to purchase Instant Replacement to ensure the best customer experience.
EV AV ALU FRE AI AT E LA IO BL N E S
Barracuda Premium Support – The Premium Support subscription is designed for enterprise customers with a Barracuda Networks product model 6xx and above. Premium Support offers the highest level of 24x7 technical support for mission-critical environments. Barracuda Networks is committed to meeting the demands of these environments by providing a dedicated and highly-trained Technical Support team.
Barracuda Networks Solutions Powerful • Easy-to-Use • Affordable SECURITY
SERVICES BARRACUDA WEB SECURITY FLEX Hybrid cloud and appliance-based
BARRACUDA SPAM & VIRUS FIREWALL
with centralised management and reporting
Blocks email-borne spam and virus intrusions while preventing data loss
BARRACUDA NG FIREWALL Provides application and identity-aware protection for distributed networks
BARRACUDA WEB FILTER
BARRACUDA EMAIL SECURITY SERVICE Cloud-based email security and Data Loss Prevention
Protects Web users from malicious and inappropriate content
BARRACUDA BACKUP SERVICE BARRACUDA SSL VPN Enables secure, clientless remote access
Cloud-based backup for fail-safe disaster recovery
BARRACUDA WEB APPLICATION FIREWALL
BARRACUDA CONTROL CENTER
Defends Web sites and Web applications from attacks
Cloud-based centralised management of Barracuda Networks Solutions
DATA PROTECTION
NETWORKING
VIRTUAL APPLIANCES BARRACUDA NETWORKS VX SOLUTIONS
BARRACUDA BACKUP SERVER
BARRACUDA LOAD BALANCER
Provides local disk-based data backup and deduplication
Provide the power of our award-winning hardware appliances and integrate seamlessly into virtualised environments Barracuda Networks is a VMware Technology Alliance Partner
BARRACUDA MESSAGE ARCHIVER
BARRACUDA LINK BALANCER
Archives email and IM communication for compliance readiness
Aggregates multiple Internet connections
Page 13
Page 14
About Kaspersky Lab Kaspersky Lab is the largest developer of secure content and threat management solutions in Europe and is among the top five vendors in the world. The company is headquartered in Moscow with five regional divisions managing the operations of local offices and partners in Western Europe, Eastern Europe, the Middle East and Africa, North and South America, Japan and other countries of the Asian and South Pacific region. Kaspersky Lab’s wide range of award winning solutions meets the needs of all categories of clients from home users to large corporations, offering powerful protection from IT security threats, including viruses, spyware, crimeware, hacker attacks, phishing and spam. The quality of Kaspersky Lab award winning products is certified by leading vendors of hardware and software such as Microsoft Corporation, IBM Corporation, Intel Corporation, Cisco Systems, Inc., Red Hat, Inc., Citrix Systems, Inc and Novell, Inc.
The Kaspersky Open Space Security suite of products is capable of protecting several types of network nodes simultaneously. The customer can choose from Kaspersky Work Space Security [KOSS1] to Kaspersky Total Space Security [KOSS 4] depending on which corporate network nodes require protection. Additionally, Kaspersky Lab offers products that protect just one type of corporate network node, for example, email or file servers and our ‘Security for Collaboration’ solution which is protection for Microsoft SharePoint. These products are ideal for customers who only need to protect specific network nodes. The components integrated in each product support all popular operating systems – Microsoft® Windows®, Linux®, Mac OS, Novell NetWare, etc. All solutions include centralised management tools and are easy to deploy and use.
Our Corporate Products Smartphones
Workstations / Laptops
Kaspersky Work Space Security [KOSS 1]
•
•
Kaspersky Business Space Security [KOSS 2]
•
•
•
Kaspersky Enterprise Space Security [KOSS 3]
•
•
•
•
Kaspersky Total Space Security [KOSS 4]
•
•
•
•
Product / Network Node Protected
File servers
Mail servers
Internet gateways
Storage
•
Collaboration
•
•
Kaspersky Security for File Server
•
Kaspersky Security for Mail Server
•
Kaspersky Security for Internet Gateway
•
Kaspersky Anti-Virus for Storage Kaspersky Security for Collaboration (SharePoint)
•
Product Highlights
Collaborate with Confidence
Advanced protection technologies. A unique set of proactive technologies ensures protection against unknown malware and targeted attacks. Separate components of the new antivirus engine can be upgraded regularly without reinstalling the application.
Kaspersky Security 8.0 for SharePoint Server keeps your SharePoint platform free from external threats, preventing the spread of malware, and supports policies to keep inappropriate content off the server. The solution keeps management time to a minimum due to an intuitive administration console and extensive monitoring capabilities.
360° Management. Kaspersky Security Center 9 Console provides tools for the remote deployment and management of protection for workstations and servers. It offers flexible control for enterprise-level networks with support for remote sub-networks and mobile users, hierarchical groups and management servers. A simplified mode allows small offices to quickly deploy protection using preconfigured settings and application packages.
Key Benefits • • • • • • • •
Ant-virus protection (on access scan & background scan) Ease of management Flexible reporting Support for communication policies File filtering Integration with active directories Automatic directories Content filtering
Scalability. Kaspersky Open Space Security solutions easily adapt to the changing needs of rapidly developing businesses: the system automatically searches for new unprotected computers in the network, installing the necessary antivirus software and implementing the Kaspersky Lab license policy.
Page 15
Solera Networks COLLECT
Collect At Record Speeds
Become more aware, more compliant, more secure with Solera Networks. SoleraSix offers unprecedented visibility into your network to protect against today’s targeted and advanced network threats. DEPLOY
Network Security Analytics We live in an era where the defensive capabilities of traditional security tools have been eclipsed by the capabilities of modern attackers. Major breaches are consistently occurring in the networks of even the most technically savvy enterprises, including national defense and prominent security vendors. Over the years, network security teams have relied on “set it and forget it” tools to block potential threats using known signatures and behaviors. In this environment however, those tools are providing a false sense of security, and as we have seen all too often, sole reliance on more and better preventionbased tool sets is not protecting high-profile organisations from being attacked. Solera Networks provides your incident response teams with a complete Network Security Analytics platform to make your company more aware, more compliant and more secure.
The Solera DS Appliances capture everything that crosses your network (packet header and payload) in the patented DS File System, giving you a complete and forensically sound record of network activity. Only Solera DS Appliances meet the grueling demands of the largest government and enterprise networks, yet swiftly recon-struct and deliver real files from within terabytes of raw packet data.
Application Classification and Description Identify network traffic by looking deep inside packet data to find the telltale signatures and detail of a network attack, insider threat, or data loss. Descriptive information about a network session is extracted and includes application, personal identity, content types, filenames, and up to thousands of descriptive details for more than 530 specific applications.
Indexed For Access In addition to capturing and classifying every bit of data at record speeds, each and every packet is indexed for quick retrieval and reconstruction. SoleraDB is our patented, highly-efficient, combination flat-file/hashed database system that has none of the performance issues inherent in relational databases. Drill down to precise packets, flows and artifacts in seconds, rather than hours or days. ANALYZE
Rules and Alerts Easy Deployment Solera DS Appliances easily connect to your network via a span port or network tap. They sit passively on the network and are completely undetected for enhanced security. Add additional storage for a virtually limitless and permanent record of all network traffic.
Choose How You Deploy Deploy as a dedicated 1U, 2U or 4U hardware appliance or as a virtual appliance. Deploy inside your virtual networks to expose vSwitch traffic to your physical security tools for analysis.
Size To Fit Your Needs Deployment options range from small or branch office appliances to dedicated 10Gb appliances with expand-able storage for today’s fastest networks.
Page 16
The flexible, new DeepSee® Rules and Alerts engine allows security professionals to automate many similar tasks and receive real-time notification of suspicious, malicious, or prohibited behavior.
Geolocation With DeepSee Maps and Google® Earth integration you see traffic patterns and can identify concentrations of traffic traveling to and from non-traditional locations. Abnormal traffic patterns may be your starting point of an investigation and reduce your time to resolution.
Reporting Identify evasive applications and malware with DeepSee. Reporting capabilities paint a deep and vivid picture of the network traffic and allows users the power to work with results as they are being returned and respond to incidents as they unfold. Reports act as a navigation point, helping even novice users find and access the data they are looking for faster and with more accuracy.
Root Cause Explorer Root Cause Explorer is the incident responder “Easy Button”. It allows the analyst to walk through the timeline of potentially associated events before and after the point of infection, commonly referred to as “T minus 0”. Using extracted network objects, the analyst can reconstruct and review suspect web pages, emails, and chat conversations to identify the source of potential malware or malicious activity and trace the chain of events that led to compromise.
The cost of data breaches continues to rise and most organisations are not prepared to effectively respond: $6.75M
$6.75 million is the average organisational cost of a data breach*
92%
92% of breaches came from outside sources**
Artifact Extraction
82%
Produce evidence that makes sense. With every packet captured and indexed, quick discovery, reconstruction and delivery of files in their original formats is easy and intuitive.
82% of CISOs believe they will have a serious security incident in the next 36 months†
52%
Integration Active response to incidents starts with solid integration with the most popular security tools on the market. Through our web services API, integration is simple and effective. Direct integration with Splunk® now provides an historical view to any alert managed by this leading log management solution. Packet analysis is also built into the appliance, eliminating unnecessary file transfers and application launching.
52% of CISOs say they are unprepared to adequately respond to an incident†
100,000
Security researchers are nowuncovering close to 100,000 new malware examples a day†† * Ponemon Institute’s Fifth Annual US Cost of a Data Breach report ** Verizon Business 2011 Data Breach Investigation Report †Trusted Strategies Network Forensics Market Survey Report ††GTISC Emerging Cyber Threats Report 2011
Solera DS Appliances
RESOLVE
Known Events
APPLIANCE Virtual Appliance
Incident Response • Root cause analysis to determine the full details of how an attack occurred • Outbreak and pathway analysis to identify where and how a threat spread throughout the network
AUP Audit/ Enforcement
SIZE –
PEAK RATE
SUSTAINED RATE iMix*
STORAGE CAPACITY
Varies
Varies
Varies 3 TB, non-redundant
DS 1200
1U
2.0 Gbps
1.8 Gbps
DS 3200
4U
5.0 Gbps
3.0 Gbps
12 TB, redundant
• Deliver clear proof or disproof of illegal activities on a network
DS 5200
4U
10.0 Gbps
5.0 Gbps
16 TB, redundant
DS H200
2U
5.0 Gbps
3.0 Gbps
32-252 TB, redundant
• See exactly what sites employees are visiting and what content they are seeing to enforce acceptable network use policies
DS H202
2U
10.0 Gbps
5.0 Gbps
32-252 TB, redundant
DS Storage
2U
DS C200
2U
–
–
20 TB, redundant
Central Management Appliance
*Sustained, iMix capture performance testing is conducted with a combination of packet sizes averaging 422 bytes and capturing 99.9999% of all packets on a continuous basis. This is a worst-case test and users should expect to see better performance in regular use.
Unknown Events Security Assurance • Validate your security tool effectiveness by replaying your own network traffic to your security devices to determine if your network was attacked during windows of vulnerability • With a full record of all network traffic, you have evidence of adherence to compliance mandates and regulations
Situational Awareness • Clearly see all application activity to discover and investigate possible data loss • Provide surveillance of specific user activity to observe and deter insider threats
Page 17
FireEye
Next Generation Threat Protection
Today, security-conscious enterprises and Federal governments choose FireEye for industry-leading protection against advanced, next-generation threats. FireEye combats advanced malware, zero-day and targeted APT attacks. FireEye’s convenient appliances supplement traditional firewalls, IPS and AV, adding integrated inbound and outbound protection to detect today’s stealthy Web and email threats. Like water, cybercrime moves effortlessly around obstacles. Since governments and enterprises have implemented stronger policyand signature-based protections for regulated data and endpoints, sophisticated criminal organizations have changed their tactics, using different tools and targeting intellectual property and other networked assets. Replacing mass-market malware, this next generation of threats is personalized and persistent. Threats are targeted, ever morphing, dynamic and zero-day. These carefully staged attacks look innocent as they walk by traditional firewall, intrusion prevention, and antivirus that rely on signatures and known patterns of misbehavior. Once inside, malware phones home for instructions, which could be to steal data, infect other endpoints, allow reconnaissance, or lie dormant until the attacker is ready to strike.
The Only Defense Against Advanced Malware, Zero Day and Targeted APT Attacks FireEye’s Web and Email Malware Protection Systems (MPS) defeat the next-generation attacks that aggressively evade signaturebased defenses and compromise the majority of today’s corporate networks. FireEye appliances block known malware and its outbound transmissions, and then utilize the most sophisticated virtual execution environment in the world to detect and block advanced malware. The dynamic analysis of zero-day attacks within our virtual environment yields real-time malware security content to protect the local network and shares the intelligence to all subscribers of the FireEye Malware Protection. MPS appliances also have near-zero false positive rates and are plug-and-play, deploying within 30 minutes for a rapid security ROI.
Virtual execution environments detects inbound 0-day attacks FireEye appliances fully execute suspicious code, analyzing attachments and Web objects to convict the bad actors and let the good guys go free. Automation moves malware through a signature filter—a screen against the known bad—into an instrumented virtual environment where FireEye examines the code through its full execution path. By including a broad range of operating systems, applications, browsers, and add-ons, the FireEye environment presents real-world targets to trigger the full set of zero-day exploits, rootkits, privilege escalations, and other malicious functions in next-generation threats.
Outbound blocking protects automatically across protocols FireEye gleans rich information from this testbed, such as the IP address, protocols and ports an attacker uses to communicate and distribute payloads. With this data, FireEye can block outreach by a compromised host to its command and control center. Even “patient zero” can be secured against sending out data or downloading more malware when FireEye systems are used inline. Detailed reports help system administrators identify infected hosts for clean up.
Intelligent cloud for real-time data exchange FireEye customers can also subscribe to the FireEye Malware Protection to share insights and keep protections up to date. As FireEye analyzes code for malicious intent, it creates a fingerprint of all confirmed malware. These dynamically generated signatures can be shared in real time by FireEye Malware Protection Systems.
Integrated Web and email protection Security dashboard provides rapid security assessment for IT administrators
Local Contacts Andrew Simbaqueba - Director of Sales, Australia / New Zealand Contact: Australia@FireEye.com
Page 18
Many threats use separate channels and successive stages to bypass traditional protections. One might enter the network as an innocentlooking email with an innocuous or shortened URL. When the user clicks the URL, an array of drive-by downloads assaults the browser, looking for any vulnerability. FireEye appliances can team to detect spear phishing, URLs, and malicious attachments and cut off blended threats.
Allied Telesis
Allied Telesis is a world class leader in delivering IP/Ethernet network solutions to the global marketplace.
data. Our networking solutions provide much of the networking need, from client connectivity through to infrastructure, especially using fibre optic cabling.
We create innovative, standards-based IP networks that seamlessly connect users with their voice, video and data services. We are an international company headquartered in Japan with major divisions in Europe, Asia and North and South America. Our partners include the world’s largest distributors, integrators, solution providers and resellers to assure you receive immediate local service and support. As a major industry manufacturer and importer, Allied Telesis is committed to providing you with products designed and built to the highest possible quality. Our manufacturing conforms to appropriate ISO 9000 standards, and all of our facilities adhere to the strict ISO 14001 standard to ensure a healthy world environment. Allied Telesis...
• Known for reliability • Chosen for affordability • Awarded for innovation For more than 20 years, Allied Telesis has been a leading provider of networking infrastructure. Today the Company enables delivery of voice, video, and data services to a variety of clients globally. The Company is committed to innovating the way in which services and applications are delivered and managed, resulting in increased value and lower operating costs.
Market Solutions Carriers, Service Providers and Utilities Competitive carriers, service providers and utilities can differentiate themselves by deploying Triple Play services that provide voice, video and data via one access line, together with deployment of fibre optics for their infrastructure. Our IP/Ethernet solutions for FTTx include an end-to-end suite of products optimised to deliver wholesale access, retail services or a combination of both. Our residential service gateways provide true end-to-end differentiation over legacy ATM/TDM solutions. Together, they make a compelling combination.
Education High-bandwidth, secure networks help deliver advanced teaching and communications tools that benefit students, teachers and administrators through virtual online classrooms, remote access to teaching specialists and automated attendance programs. Our high performance, multi-layer switching solutions provide intelligent, scalable and reliable connectivity from 10Mbps to 10Gbps, while our wireless offering enables high-performance, campus-wide wireless coverage.
Healthcare Advances in voice, video and data networking can make medical professionals faster, more accurate and more patient friendly, particularly with an increase in mobile wireless devices used for patient management. Our solutions keep you compliant with privacy regulations and help open up new opportunities for both patient care and broadband ‘to-the-pillow’ services, including audio and Internet services, pay-per-use channels and Video-on-Demand (VoD).
Enterprises Our multi-layer switch and router technology offers advanced features that ensure high-availability, manageability, security, adaptability and performance. Our intelligent, secure end-to-end IP network infrastructure scales to flexibly accommodate bandwidth-hungry voice, video and data applications into enterprises.
Products Aggregation and core Switches Aggregation and core switches provide the backbone to any large network, and therefore need to be reliable, resilient, with enough capacity and throughput to handle today’s networks. Redundant power supplies ensure high availability, whilst VCStack and link aggregation provide resilience, ensuring access switches continue to achieve connectivity even in the event of a major failure.
Power over Ethernet Power over Ethernet allows a copper Ethernet cable to provide power as well as data connectivity to a remote device. This device could be a VoIP phone, a security camera, or a wireless access point. Allied Telesis offers a range of PoE switch products delivering all the switching functionality needed for the network, plus power to PoE capable connected devices. Unamanaged and WebSmart Switches Unmanaged switches are simple to deploy, as they require no user setup, making them the idea product for SOHO (Small Office, Home Office) applications. Their silent operation, and eco-friendly low power operation ensures both minimal running costs, and no intrusive noise. For small office networks, WebSmart switches provide security and data priority, allowing Voice over IP and similar applications to be deployed at a lower cost point than a fully managed device.
Wireless Allied Telesis enterprise wireless solution utilises a unique channelblanket approach that delivers the performance benefits of technologies such as 802.11n but does away with the challenges of cell-based solutions including site surveys and cell-planning.
Media Converters Allied Telesis media converters enable the connection of disparate cabling types in networks where many cabling types exist. Typically, media converters are used to connect copper and fibre-optic cabling that coexist in a network. Converters exist in a variety of standalone, multi-port and modular forms. These different physical forms address the need for different applications and conversion densities.
Network Adapters Allied Telesis develops a large range of network adapters supporting a variety of speeds, media and bus types. From 100M copper PCI cards to Gigabit fibre cards for virtualisation environments, Allied Telesis has an adapter to meet your requirements.
Defence The defence industry requires high reliability and high availability, coupled with a wide range of applications from voice, video and
Page 19
Page 20
Page 21
Meraki About Meraki
Meraki Products
Meraki’s networking systems bring enterprise-class networking to organisations of all sizes. Meraki’s unique cloud-hosted controller architecture provides centralised management and security through an intuitive web interface, eliminating the high costs and complexity associated with traditional networking systems. Every day, over 18,000 organisations in 140+ countries around the world rely on Meraki for their networks.
Cloud Managed 802.11n Wireless LAN
Meraki is based in San Francisco, California and is a privately held company backed in part by Google and Sequoia Capital.
- Ultra-high performance and value-priced models
6 Access Point Models - Indoor, rugged/outdoor - 802.11n up to 900 Mbps
Enterprise-Class Hardware - Lifetime warranty for indoor APs
The Recognised Leader in Cloud Networking - Over 18,000 customer networks in 145 countries worldwide
- 802.3af Power over Ethernet - Voice, video optimisation
- World’s largest cloud networking deployment (Accor, 10k devices)
Fully Integrated Features
Focus on Technology Innovation
- Traffic shaping, mesh, NAC, guest access, device management
- Founded in 2006 at MIT, in the cloud since Day 1 - Extensive R&D investments
Cloud Managed Security Appliances
Strong Financial Performance
5 Versatile Models
- Privately held, backed by Sequoia Capital and Google
- Scale from small sites to large campuses
- Triple-digit annual revenue growth
Complete Networking and Security
- Trusted by Fortune 500 enterprises, governments
- Stateful firewall
and major universities.
- Site to site and client VPN
Recognised for innovation
- Link balancing and failover
Trusted in over 18,000 customer networks:
(including 3G/4G)
Education, professional services, healthcare, retail, government, industrial & manufacturing, hospitality.
L7 Application Control - Traffic shaping - NG application firewall
Why Cloud Networking? Creating New Challenges for IT
- Content filtering (CIPA-compliant) - WAN optimisation
“How do I support 10x more devices with a fixed staff?” “Can users securely bring their own devices?” “How do I keep BitTorrent from slowing down web apps?” The Cloud Increases IT Efficiency
Cloud Managed Switches Managed Access Switches in 4 Models - 24 and 48 port, with PoE available - Gigabit with 10 GbE uplinks Enterprise-Class Performance and Reliability
• Turnkey installation and management • No training or dedicated staff • Integrated, always up to date features • Scales to organisations of all sizes • TCO savings of over 50%
Page 22
- Lifetime warranty - 802.3af/at PoE on all ports - Voice, video QoS Centrally Managed from the Cloud - Visibility and control over thousands of ports - Built-in monitoring, cable testing, and alerts
Introducing 100% Cloud Managed Switching & Security
Page 23
Exinda Next Generation WAN Optimization Exinda provide users with the best network experience possible by maximizing the speed and efficiency of applications over the network. Exinda’s Unified Performance Management (UPM) solution brings together a suite of advanced, best-of-breed, visibility, traffic-shaping and WAN Optimization technologies into a single, easy to-use appliance designed to improve network productivity. Exinda is the only Unified Performance Management solution on the market. Controlled through a seemlessly integrated, Unified Management Console, Exinda reduces costs, increases revenue and allows you to get the most out of your network.
Unified Performance Management
With network traffic growing exponentially, application performance and WAN Optimization are two of the biggest IT challenges that organizations face. Until now, network managers and administrators lacked a comprehensive solution for monitoring and managing network resources and bandwidth while meeting user expectations for fast application response. Exinda revolutionizes the way organizations manage their network by offering an affordable and easy to use appliance that delivers visibility, control and optimization. The Exinda 2061
Designed for small branch offices, the 2061 model expands to support up to 20 Mbps worth of full duplex bandwidth and up to 50 users.
The Exinda 4061
Designed for medium/large branch offices, the 4061 model expands to support up to 250 Mbps worth of full duplex bandwidth and up to 1,000 users.
The Exinda 6060
Designed for Headquarters/Data Centre branch offices, the 6060 model expands to support up to 1 Gbps worth of full duplex bandwidth and up to 10,000 users.
The Exinda 8060
Designed for Headquarters/Data Centre branch offices, the 8060 model expands to support up to 2.5 Gbps worth of full duplex bandwidth and up to 100,000 users.
The Exinda 10060
Designed for Large Data Centres, the 10060 model expands to support up to 5Gbps worth of full duplex bandwith and up to 200,000 users.
Features & Benefits Visibility
Provides insight into network activity, usage and performance. Gives you the information you need to keep your network operating at peak performance - Layer 7 Classification - Heuristic Classification - URL Classification - Drill Down Capabilities - Real Time Monitoring - Top Talkers/Top Conversations - Active Directory User ID - Anonymous Proxy Detection - Application Response Time - Service Level Agreements - Citrix Published Applications - Automated PDF Reporting
Edge Cache
The Exinda Edge CacheTM enables single-sided caching of Internet-based content, including web objects, videos(including youtube) and software updates, delivering a superior user experience and reducing WAN resource utilization – resulting in overall network cost savings.
Exinda Service Delivery Point (SDP)
Exinda’s Service Delivery Point (SDP) is a revolutionary platform for centrally managing Exinda appliances distributed throughout the corporate network. Available as both a hosted service and hardware appliance, SDP further simplifies the task of installing, configuring, monitoring and reporting WAN optimization appliances. The SDP offering is one of Exinda’s key differentiators in the Traffic Shaping & WAN optimization space. A fundamental component of Exinda’s Unified Performance Management solution, it rounds out the Exinda product line and makes it the most comprehensive and effective solution for achieving peak application performance.
The Exinda Virtual Appliance Exinda is uniquely positioned to address issues faced by network managers by providing a variety compelling features within its Unified Performance Management (UPM) solution, providing Network Visibility + Bandwidth Control + WAN Optimization. Exinda delivered solutions that enable network managers to address today’s challenges; maximizing network resources, controlling operational costs, managing service level agreements, and improving user experience. Exinda’s virtual appliances are fully functional, and include all the Unified Performance Management (UPM) features and capabilities found in their hardware siblings. These virtual appliances complete Exinda’s strategy of flexible deployment options by offering a virtualized integration with WAN visibility, control and optimization in customer’s virtualized deployments. The Exinda Virtual Appliance allows you to realize the following benefits. WAN Monitoring and Reporting, Bandwidth Management & QoS Boost performance for Optimization features that rely on Disk Storage WAN Optimization & Acceleration Page 24
Control
Maximize network resources to the needs of your organization through comprehensive control over network traffic without placing heavy-handed restrictions on users. - QoS / Dynamic per IP User - Bandwidth Management - Traffic-shaping - Prioritization - Active Directory Integration
Optimization
Rapidly, turn understanding into action that drives network performance, improves the user experience, and optimizes productivity. - Layer 4 TCP Optimization - Layer 7 Application Acceleration - Universal Caching - Compression - Intelligent Acceleration - Peer Auto-Discovery
Exinda Mobile Client (EMC)
The Exinda Mobile Client delivers optimization for mobile client devices. Your users will experience improved response times and download speeds over a wide range of applications – including HTTP/HTTPs, Email, MS Exchange, CRM, ERP, FTP, CIFS file sharing, and collaboration applications such as SharePoint. The Exinda Mobile Client radically improves the remote user experience through compression, caching, de-duplication and protocol optimization.
About Exinda®
Exinda is a proven global supplier of WAN Optimization and Application Acceleration products, having shipped over 10,000 appliances to more than 2,000 organizations worldwide. The Exinda Unified Performance Management (UPM) solution encompasses application visibility, control, optimization and intelligent acceleration – all within a single network appliance that is affordable and easy to manage. Exinda is headquartered in Boston, MA and has established regional offices in around the world to support the growing global demand for its products and services. Exinda is a 100% channel business with products being distributed by a worldwide network of solution partners who offer local support and services.
Imation RDX HARDWARE
Imation Scalable Storage Imation offers a full range of scalable storage solutions, right-sized for SMB needs. Purpose-built to deliver maximum efficiency and ease of use in regulated bulk storage environments, Imation’s data archive, protection, and shuttle appliances reduce storage costs by optimizing and automating many data protection and compliance tasks faced by SMBs. Utilizing complementary, intelligent appliances within the same tiered (online, nearline, offline and offsite) infrastructure, Imation helps SMBs lower storage expenses, relay large datasets, ensure regulatory compliance and safeguard valuable data.
Purpose-built to mitigate data loss, retain long-term data, and support removable media workflows, Imation offers a portfolio of stand-alone and internal-mounted RDX hardware. RDX technology is an innovative industrial-strength storage platform that combines the best of tape backup with hard disk drive storage, delivering removability, portability, reliability, faster transfer rates and instant file retrieval. The multiple bay RDX A8 networked storage array enables online access to eight RDX media cartridges, or 8 TB’s of data (based on today’s 1 TB cartridges) and operates either as a backup target or online storage. Leveraging the availability of mixed capacity cartridges, 160 GB to 1TB, the RDX A8 provides “pay-as-you-grow” storage scalability and investment protection.
RDX Cartridge
RDX A8 Storage Array LTO HARDWARE
PRODUCT PORTFOLIO DATA PROTECTION SOLUTIONS DATAGUARD APPLIANCES Imation DataGuard is a new family of network attached storage (NAS) backup appliances, purpose-built for SMBs that are confronted with an increasing number of complex and expensive data protection challenges related to backup performance, backup restore, media management and deployment of cloud-based solutions.
Imation offers entry tape products that are designed to provide low-cost backup and archive of data using Linear Tape-Open (LTO) technology. Designed to support the newest generation of LTO, or Ultrium 5, while remaining backward compatible with prior generations, Imation’s LTO hardware is available as single tape drive systems or multiple drive autoloader systems in either rack mount or stand-alone configurations. Imation LTO hardware also offers a Linear Tape File System (LTFS), enabling users and applications to use an LTO-5 cartridge, as if it were a hard disk drive at a much lower cost per GB.
LTO-4 & LTO-5 HH SAS / FC Tape Drives
L1200 LTO 2U Tape Library
Dataguard T5R
Dataguard R4
L1400 LTO 4U Tape Library Page 25
Aastra
About Aastra Aastra is a leading company at the forefront of the enterprise communication market around the world. Aastra develops and delivers innovative communications products and applications for businesses. Aastra’s operations are truly global with more than 50 million installed lines around the world and a direct and indirect presence in more than 100 countries. Founded in 1983 and based in Ontario - Canada, Aastra has grown organically and by acquisitions to become a leading company on the enterprise communications market. Aastra Australia and Aastra New Zealand are a business unit of Aastra Technologies Limited (TSX:"AAH") and offer one of the most complete portfolios of unified communications solutions individually tailored to satisfy its customers’ requirements. Aastra is 100% committed to Australian and New Zealand market with a strong focus on open standards, that enables enterprises to communicate and collaborate more efficiently. The strong and comprehensive portfolio of communication products and applications is designed to create compelling solutions for both SMB and Enterprise market. Open IP Telephony systems Freedom & Flexibility with Mobility Total Unified & Collaborative Communications Multimedia contact centre solutions Configurable range of terminals HD videoconferencing
Key Facts about Aastra - Headquartered in Concord, Ontario, Canada, Aastra has an international reach with more than 2,000 employees around the world, a direct presence in more than 30 countries as well as thousands of sales partners and resellers, including a strong presence among carriers. - With more than 50 million lines installed globally, Aastra has one of the largest customer bases of any global telephony provider and the loyalty of our customers is a testimony to our product and service quality. - Aastra has a long time track record of protecting customers’ investments. - Aastra has a broad portfolio of enterprise communications solutions to satisfy its every customer’s requirements. Offerings range from feature-rich call managers for small and medium businesses to highly scalable ones for large enterprises, to integrated mobility solutions, unified communications applications, and call centre suites, complemented by a wide array of terminals. - Aastra embraces open standards to offer standalone network elements or complete system solutions to its customers. Aastra is the only company with a complete portfolio of architecture: IP-PBXs, software based call managers, open source platforms, hosted solutions and Microsoft based architecture (i.e. Response Point and OCS). - Aastra continues to invest aggressively in R&D to be at the forefront of IP technology.
Page 26
- Founded in 1983, Aastra has grown both organically and through M&A. With major acquisitions in Europe in recent years, Aastra has been at the forefront of consolidation in the enterprise communications sector (Ascom PBX Division September, 2003; EADS Telecom Division – March, 2005, DeTeWe - August 2005 and in April 2008 Ericsson’s Enterprise Communications division).
A Few Examples of the Aastra Product Range.... Terminals The Aastra 6730i offers exceptional features and flexibility in an enterprise grade IP telephone. With a sleek, elegant design and a compact footprint, this multi-line SIP telephone delivers the advanced features and performance traditionally found only in higher priced products.
The Aastra 6739i, our latest member of the carrier-grade, open-standards based 6700i Series SIP telephone portfolio, brings leading edge communications technology to the desktop in a stylish global design. Featuring a 5.7” full color high resolution VGA touch screen display, the 6739i offers an intuitive graphical user interface, touch screen softkeys, full duplex wideband audio speaker and handset, dedicated LED indicators, built-in bluetooth interface and a USB port. The Aastra 610d is the basic model for the business sector. Its local phone book contains up to 200 contacts with 7 entries each*. The redial list allows quick access to the last 20* numbers dialled. With its illuminated monochrome 2" display it guarantees an optimum overview and simple operation of the clearly structured menus at all times. The large TFT colour display of the Aastra 620d provides clear graphic displays and ideal legibility even under difficult light conditions. Many freely programmable keys support the simple navigation and the use of different lines. Equipped with a Bluetooth interface for a cordless headset, Aastra 620d allows maximum freedom of movement. The high-quality lithium-ion battery can be charged via the USB interface, independently of the charging bay.
INTRODUCING AASTRA 400 Your Complete Business Communication Solution Aastra 400 - Telephony & More! The Aastra 400 opens the full performance spectrum of modern business communication: Aastra 400 offers an all-in-one Unified & Collaborative Communications solution which is seamlessly integrated into the system. The product range includes communication servers, terminals, software and mobility solutions as well as unified and collaborative communication applications.
Telephony and More - Best Performance for your Business Communication The server handles the setting up and cutting of connection, both internally and externally. It also makes all telephony functions and communication services available. Switchover from IP-based to traditional analogue or digital telephony is ensured with integrated Media Gateways.
Aastra 415 is the perfect system for companies and organizations with up to 12 employees. A broad range of interface cards allows the use of traditional analogue and digital terminals, as well as connection to public networks via analogue or ISDN trunk lines. All Aastra 400 communication server open the full performance spectrum of modern business communication: call diversion, team switching, user groups and manager/secretary functions facilitate team work. Practical additional functions like Least Cost Routing (LCR) or call cost recording (for caller-oriented billing of calls made on personal or third-party telephone terminals) facilitate cost management and create more transparency. Call-barring or access-restriction functions are also available as additional cost-saving tools.
Some Highlights of the Aastra 400 Family.... - Cutting-edge technologies like VoIP, SIP and XML, as basis for innovative communication solutions. - Seamless availability on the company premises (DECT, SIP-DECT and WLAN) and outside the company premises (FMC) with professional, integrated mobility solutions. - Broad range of terminals. - Uniform and intuitive deployment of all terminals integrated into the system (fixed phone, cordless handsets, Softphone, mobile phone). - Unified and collaborative communications. - Specific solutions for contact centres, care facilities and hotels as well as monitoring; and alarm systems.
Aastra 430 is the perfect system for companies and organizations with up to 50 employees. A broad range of interface cards allows the use of traditional analogue and digital terminals, as well as connection to public networks via analogue or ISDN trunk lines. All Aastra 400 communication server open the full performance spectrum of modern business communication: call diversion, team switching, user groups and manager/secretary functions facilitate team work. Practical additional functions like Least Cost Routing (LCR) or call cost recording (for caller-oriented billing of calls made on personal or third-party telephone terminals) facilitate cost management and create more transparency. Call-barring or access-restriction functions are also available as additional cost-saving tools.
- Technological independence and future-proof development, thanks to an open system architecture and use of global standards (e.g. SIP). - Huge connection possibilities for multi-site companies.
Aastra 400 consists of three communication servers, for different company sizes. Aastra 415: 2 to 12 users Aastra 430: 6 to 50 users Aastra 470: 20 to 400 users A network of up to 600 users and 40 systems or sites will have access to the full range of services.
Aastra 470 is the perfect system for companies and organizations with up to 400 employees. Within a network of up to 600 users and 40 systems or sites have access to the full range of services offered by the Aastra 400 communication servers. Furthermore, the Aastra 470 can be fitted with an integrated application server. This server allows innovative communication services to be seamlessly integrated into the system. Examples are multimedia communication, unified communications (voice, e-mail, chat, etc.) as well as collaborative work. All Aastra 400 communication server open the full performance spectrum of modern business communication: call diversion, team switching, user groups and manager/secretary functions facilitate team work. Practical additional functions like Least Cost Routing (LCR) or call cost recording (for caller-oriented billing of calls made on personal or third-party telephone terminals) facilitate cost management and create more transparency. Call-barring or access-restriction functions are also available as additional cost-saving tools.
Page 27
nCircle About nCircle nCircle is the leading provider of Information Risk & Security Performance Management solutions to more than 6,500 businesses and government agencies worldwide. nCircle solutions enable enterprises of all sizes to 1) automate compliance and reduce risk, and 2) measure and compare the performance of their IT security program with their own goals and industry peers. nCircle solutions may be deployed on a customer’s premise, as a cloud-based service, or in combination, for maximum flexibility and value. nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership and has been ranked among the top 100 best places to work in the San Francisco Bay Area. nCircle is headquartered in San Francisco, CA, with regional offices throughout the United States and in London and Toronto. To learn how you can more effectively protect your company visit us at www.ncircle.com.
nCircle Benchmark
The First Security Application for CISOs nCircle Benchmark is a security performance management solution providing a comprehensive and unified view of the performance of an organisation’s entire IT security program. For the first time, CISOs have a metrics language to describe their company’s security performance just like the CFO describes financial performance. Benchmark provides cloud-based security and compliance scorecards, metrics and benchmarks for measuring an organisation’s performance against internal goals and against the performance of industry peers. This extraordinary and revolutionary solution enables performance comparison of an organisation’s, anti-virus and endpoint protection, identity and access management, vulnerability management, patch management and configuration auditing programs against industry benchmarks that are continuously updated by the organisations themselves.
Information Risk & Security Performance Management Solutions nCircle’s solutions enable organisations of all sizes to manage their information risk and security performance. Over 6,500 enterprises, government agencies and service providers around the world rely on nCircle solutions to automate compliance, reduce risk and measure and compare the performance of their IT security program with their own goals and industry peers. nCircle delivers an integrated and open solution connecting nCircle and third-party security products to leverage all available information to protect IT assets and high value data. nCircle offers the industry’s first security performance management application for CISOs – a cloud-based solution that gives CISOs a metrics language to communicate their company’s security performance just like the CFO describes financial performance. From vulnerability management to agentless file integrity monitoring, nCircle provides best-in-class products for reducing information risk and aligning security strategies with business initiatives. nCircle delivers solutions for your business’ security and compliance needs – regardless of size or industry. nCircle solutions uniquely: • Measure and benchmark security performance against internal goals and industry peers • Deliver actionable, risk-based insight and analytics aligned with business initiatives • Automate and assure regulatory and policy compliance • Provide continuous, agentless monitoring of the entire IT infrastructure • Deliver cloud-based scanning for internal and external networks without requiring on premise hardware or IT expertise • Offer flexible deployment options including on premise, cloud-based or hybrid
nCircle Benchmark delivers relevant and actionable security metrics and key performance indicators aligned with business initiatives to confidently monitor and effectively communicate the state, quality and effectiveness of information security initiatives.
“nCircle Benchmark is built on a rich foundation of metrics and scorecards and will give us the information that will help us make more informed security investment decisions.” — Cliff Reeser, IT Director, Global Security Operations, NetApp
nCircle Suite360™
Comprehensive Security Scanning Delivering Actionable Results nCircle Suite360 is a fully integrated, best-in-class agentless product line for auditing the entire information technology stack across a global network. With an ever-growing library of over 55,000 checks, Suite360 offers the greatest breadth and depth of coverage for automatically discovering vulnerabilities, applications, services, auditing configuration compliance and monitoring file integrity across an enterprise’s entire network. nCircle Suite360 products include: • IP360™ for vulnerability and risk management • WebApp360™ for web application scanning • Certified PCI Scan Service™ for on demand, self-service PCI compliance • Configuration Compliance Manager™ for agentless configuration auditing
Page 28
• File Integrity Monitor™ for agentless file integrity monitoring and compliance • Suite360 Intelligence Hub™ for advanced analytics and reporting “With nCircle’s solution suite, now we have a comprehensive, unified and enterprise-wide view of our risk and compliance across the entire IT stack.” — Dave Wiseman, Director of Information Security, Saint Luke’s Health System
nCircle PureCloud™
Twice the Security at Half the Cost nCircle PureCloud is the first network security scanning service that automatically scans internal and external networks without requiring hardware or software to be deployed or managed. PureCloud combines nCircle’s powerful enterprise class security technology used by the largest companies and government organisations in the world with a unique, easy to use browser-based scanning technology to scan both external and internal networks. Designed for small to medium networks, PureCloud automatically discovers and inventories all systems on the network, identifies where they are vulnerable and provides recommendations on how to secure them. PureCloud also provides a comparison of the discovered risk to other organisations using data from nCircle Benchmark, nCircle’s security performance management service, adding context to the scan results. “Great job on a simple, easy install and first use – It was easier than setting up iTunes.” — PureCloud User
Page 29
Zscaler Zscaler - The Cloud Security Company Information technology (IT) organizations increasingly face complex sets of issues today with the mobility and BYOD (bring-your-own-device) consumerization of IT. These trends, coupled with decreasing budgets, demand innovative solutions. Over 2,000 corporate customers have met these challenges with Zscaler’s cloud services. Zscaler, Inc, the leader in cloud security solutions, enables organizations to generate a high return on investment by saving money on backhauling traffic from branch offices, protecting mobile users and devices, and providing solutions without the need for any hardware or software. Zscaler protects your users from Internet security threats, ensures compliance to security policy, and helps monitor and enforce bandwidth and productivity targets on any device anywhere in the world.
Legacy Solution Cannot Scale to the Latest Trends Legacy technologies based on on-premise (appliance) solutions don’t fully address the newest trends because they cannot:
• No hardware nor software to install for fast and easy deployments • Real time compliance and security analytics and data mining (called NanoLog) • Single view, integrated solution for web, email and mobile traffic on or off premise (with policy based enforcement) • Full inline traffic inspection, including SSL traffic, with the ability to block malware and block compliance violations (even at the payload level) • Security research arm called ThreatLabZ that produces primary research and tools to continually protect Zscaler customers
Comprehensive & Integrated – Web, Mobile & Email Unmatched 0-day security against bots, malicious content, XSS and more…
Advanced Threats
Antivirus
1. Handle sophisticated APT, Botnet, and other related threats 2. Inspect SSL traffic (as most cloud services now use SSL)
Browser Control
3. Provide adequate detection through traditional anti-virus gateway or desktop solutions Protect loss of IP, credit cards, etc. via email, webmail and blogging
4. Provide sufficient performance and detection through on-premise firewalls and intrusion detection systems
Mobile Workforce
Web 2.0 Control Bandwidth QoS
WEB
MOBILE
Regulatory Compliance
Enforce Facebook, Twitter polices on PCs and iPad. Reduce liability; increase productivity
URL Filtering
IP Protection
Internet
World’s Largest Security Cloud Global Security Check Post
Regional Office
Web
Enforce business policy;
SaaS Services
HQ
Home or Hotel
Mobile Apps
Integrated Security
Email Services
Web | Mobile | Email
On-the-go
Over 2,000 Global Customers Choose Zscaler Zscaler provides protection and cost savings for over 2,000 corporate customers, millions of users, spanning over 180 countries, and some of the largest organizations in the world including: • The world’s largest nutrition, health, and wellness company with over 278,00 employees over 83 countries • One of the largest sports clothing stores in Europe with over 50,000 employees with 500+ stores in over 15 countries
The Zscaler Solution Zscaler’s expertise in cloud infrastructure and security has been developed through revolutionary technology: •
Massive scale through 40+ data centers, sales/support in 15 countries, and currently processing over 5 Billion transactions per day (more than Google!)
40+ Data Centers: The World’s Largest Security Cloud
• The largest single payer healthcare system in the world with over 1.6M users
“Zscaler is a very strong choice for any organization interested in a SaaS web gateway” Gartner Research
Oslo Toronto
London Paris I & II
Chicago San Francisco I & II Los Angeles
Denver Dallas
NY Wash. DC I & II Atlanta
Stockholm
Gartner positions Zscaler in the Leaders quadrant of their Secure Web Gateway Magic Quadrant.
Moscow
Warsaw Frankfurt I & II Bern
Madrid
Mexico City
Tokyo
Dubai Mumbai Bogota
Hong Kong Chennai
Singapore
Lima
Santiago
Sao Paulo Buenos Aires
Page 30
Johannesburg Adelaide
Be part of the cloud revolution…Zscaler the Cloud Security Company.
CTERA Cloud Attached Storage Cloud Storage Gateways with Hybrid Local/Cloud Data Protection
Run Your Own Managed Cloud-Based Storage, Backup and File Collaboration Services CTERA Networks combines customer-premises storage appliances with an advanced cloud services platform to deliver a best-in-class solution called Cloud Attached Storage®. This award-winning approach gives users LAN-speed experience, while the cloud provides off-site backup for disaster recovery, and allows remote access to files and file sharing for collaboration.
CTERA appliances deliver transparent, efficient backup and recovery, while also providing enterprise-grade network storage (NAS) and collaboration capabilities, such as shared network folders, folder synchronization and remote access to files. CTERA appliances give businesses automated, performanceoptimized data protection and collaboration services: • Protect servers, workstation and laptops across the business • File-level and disk-leve (”bare metal”) backup and recovery • Select what to back up locally or to the cloud for disaster recovery • 256-bit AES encryption, de-duplication and compression of cloud backups • Remotely manageable, real-time monitoring and reporting • End-users can access and restore their own backups • Synchronize Folders across multiple users • Use iPhone and Android app to securely access and share your files on mobile devices.
CTERA C800
The CTERA Portal service plan screen
Using CTERA’s cloud service delivery platform, CTERA Portal, MSPs and VARs can rapidly set up their own branded cloud-based storage services and generate recurring revenues. You don’t need to be a cloud provider to run managed services in the cloud, and CTERA makes it easy:
• 8-bay 2U rack-mount • Up to 8 x 3.5” SATA HDDs (Hot Swap) • Dual Gigabit Ethernet • RAID 5/6 configuration • Includes 50 CTERA Worksttions Agents for laptop & “bare-metal” backup • Ideal for sites with up to 200 users
• No need to invest in cloud infrastructure • Pay only for the storage you need • Remote web-based monitoring, reporting, upgrades and troubleshooting • Centralized multi-tenant management of customer accounts and appliances through a single portal • Option for hosted (SaaS) portal, or Datacenter editon for MSPs who wish to use their own datacenter storage.
Page 31
BlueCat Networks DNS, DHCP and IP Address Management Made Easy BlueCat Networks’ award-winning software solutions provide a platform for business-critical DNS, DHCP and IP Address Management (IPAM). Easy to deploy, configure and maintain, BlueCat Networks solutions are available as either virtual or physical appliances to match your scale, budget and business continuity needs. Whichever deployment option you choose, our solutions help you reduce the effort and costs required to manage your DNS, DHCP and IPAM infrastructure and implement IP-dependent initiatives like BYOD, cloud, virtualization and IPv6.
BlueCat Networks – The IPAM Experts
Proteus – IP Address Management
BlueCat Networks Proteus provides a platform to centrally manage your ever-growing IP infrastructure. With tightly integrated DNS, DHCP and IP Address Management (IPAM), Proteus allows you to easily manage “everything IP” in your network. With powerful automation and workflow, Proteus reduces management time, effort and costs by eliminating the need for frustrating spreadsheets, manual processes and homegrown solutions to track IP address space. Proteus also allows you to future-proof your network with unsurpassed scalability and support for cloud, IPv6 and DNSSEC. Benefits • Reduce the cost of managing DNS and DHCP core services • Quickly and easily provision IP addresses and core network services • View IP address and name space data across geographies, data centers and business units • Efficiently delegate network configuration workflow with full approval controls and auditing
BlueCat Networks delivers a winning combination of innovative technology, services and support:
Technology
BlueCat Networks software solutions are designed to deliver the performance, scalability and resiliency required to support even the largest networks.
Services
BlueCat Networks Professional Services provides the IT expertise, training and tools you need to accelerate your IPAM deployment, reduce risk and see a rapid return on investment.
Support
Our Customer Care team delivers best-in-class technical expertise, product resources and timely response – from 24/7 technical support and available five-hour on-site hardware repair to our online customer care portal and knowledgebase.
The BlueCat Networks Value Proposition Adonis – DNS and DHCP Core Services
In an IP-enabled world, your business depends upon reliable core services like DNS or DHCP. BlueCat Networks Adonis delivers resilient DNS and DHCP core services. Purpose-built to provide the highest levels of performance and availability, Adonis provides a powerful DNS and DHCP solution that is also incredibly easy to deploy and simple to manage using its intuitive user interface. With advanced features and functionality, as well as future-ready support for IPv6 and DNSSEC, BlueCat Networks Adonis is designed to meet the DNS and DHCP demands of any organization.
• Reduce IT and network management costs • Improve the reliability of core services • Enable mobility and BYOD initiatives • Accelerate the rollout of new services • Build clouds and virtualized data centres • Optimize branch office core services • Manage the transition to IPv6
Benefits • Deliver business-critical DNS and DHCP services with 99.999% availability • Safeguard DNS services against exploits and attacks • Simplify the provisioning of hosts and IP addresses in physical, virtual or cloud environments • IPv6-ready out of the box – support for DNS and DHCP in IPv4 and IPv6
BlueCat Networks is positioned as a 'Strong Positive' in the Gartner 2011 MarketScope for DNS, DHCP and IP Address Management. Read the report at: www.bluecatnetworks.com/gartner
For further enquiries please contact us at apac.sales@bluecatnetworks.com
Page 32
Gemalto Gemalto offers a complete family of compatible smart cards, smart card readers, authentication and secure memory tokens, software, and more. These products are based on our proven smart card expertise and enable component optimization and integration with existing hardware infrastructures.
SA Solution
PC Link reader PC-Link smart card readers are designed for securing network access, using the Gemalto PC Core hardware and firmware, handling all types of ISO7816 compatible smart cards. Several different models are available to adapt to every host PC interfaces and Smart Card usages. As the rates of identity theft increases, more and more companies are turning to smart technology to secure their networks. Enterprises, governments and financial institutions are rapidly deploying a smart card infrastructure for logical access and protecting the privacy of on-line bank customers and web shoppers.
SA Solutions gather available components needed to build your answer to strong authentication deployment. Those elements rely on the open standard OATH. Using SA Solutions, Enterprises can deploy strong authentication for a low total cost of ownership. This is realized through packaged and plug and play solutions adaptable to existing networks and AAA servers.
Gemalto’s user-friendly smart card readers are an integrated part of more global authentication solutions. Built on the latest technology they offer reliability and are certified by the major computing and banking organizations ensuring easy deployment. Our diversified series includes readers for desktops, laptops, for SIM size card and readers for Pin entry.
Contactless reader
Our wide range of hardware solutions embeds smart card technology offering the highest level of security for two-factor authentication. You can choose a smart card or a token usable in a connected or an unconnected environment according to your architecture constraints.
Prox-SU is a contactless reader with the added security of a built-in Secure Access Module (SAM) card slot for use in a wide array of applications such as physical and logical access control (i.e. border control that needs SAM) ticket control, enrollment systems and loyalty programs.
Our software solutions are open, scalable and evolutive.
Device Administration Service Device Administration Service (DAS) is a hosted service for issuing and supporting end-user devices based on Gemalto .NET technology. For Enterprises requiring strong security and valuing ease of use and maintenance free solution, DAS provides turnkey issuance & management of Gemalto .NET devices through software as a service model allowing SME to focus on their core business.
.Net card Gemalto .NET puts state of the art technology to the service of organizations committed to take their IT Security and Identity & Access infrastructure to the next level. Two-factor authentication (2FA) solutions help secure your company's digital assets from end to end. Gemalto .NET comes equipped with support for 2 different 2FA technologies: One Time Passwords (OTP) and Digital Certificates (PKI). Choose the one that suits you best, or combine both at once for different uses.
Works with DESFire, MIFARE Plus and Calypso cards.
USB Tokens Gemalto offers a series of portable security devices that protect sensitive mobile data and management platforms for these devices. Gemalto products for data loss prevention are easy to deploy and can be integrated into endpoint security policies to provide the highest level of security for portable data. Smart Guardian is a zero-footprint personal security device that protects portable data with Gemalto's proven smart card technology. Unlike other secure USB memory products, it provides an unsurpassed level of data protection because all critical functions and cryptographic keys are managed from within the secure environment of the smart card module.
With Gemalto .NET you will benefit from unparalleled level of integration with Microsoft's platforms and solutions: Support for the Gemalto .NET Smart Cards and Tokens is built into Windows Vista and Windows Server 2008, and available as a Windows Update for Windows XP and Server 2003. Gemalto .NET is also fully compatible with Forefront Edge, Microsoft's Identity Lifecycle Manager, Active Directory Domain Services and Certificate Services. With Gemalto .NET implementation of Two Factor Authentication, Encryption and Digital Signature services becomes easier than ever.
www.gemalto.com Page 33
Arbor Networks Secure Your Network and Ensure the Availability of Your Critical Applications. Industry-leading network availability and DDoS protection solutions from Arbor Networks and WhiteGold Solutions. Arbor Networks is a leading provider of network security and management solutions for Internet service providers (ISPs), hosting providers and enterprise data center operators. Our proven network security and management solutions help grow and protect customer networks, businesses and brands from around the globe. In partnership with leading security specialist WhiteGold Solutions, Arbor provides organizations in Australia with the services and solutions necessary to protect network infrastructure and ensure the availability of critical business applications.
The DDoS Threat Distributed denial of service (DDoS) attacks are a major cause of downtime for Internet service providers (ISPs), hosting providers and enterprise data center operators. And, the size and sophistication of these attacks continues to grow each year. Attacks can include volumetric attacks that send so much traffic to a service provider or data center that all available bandwidth is consumed, or they can be more stealthy, where a relatively low volume of traffic is targeted at key applications such DNS, HTTP or email and exhausts a server’s capacity to respond. In either case, the attacks effectively make services unavailable to legitimate users resulting in customer dissatisfaction, lost revenue through missed sales or customer churn, and increased operational expenses.
The DDoS Solution: Arbor Peakflow¨ SP and the Arbor Peakflow¨ SP Threat Management System The Arbor Peakflow SP solution (Peakflow SP) is a networkwide security and traffic-monitoring platform that enables ISPs, hosting providers and enterprises to optimize network availability and meet the DDoS challenge. As the first system to extensively integrate network-wide intelligence and carrierclass threat management, Peakflow SP identifies and stops network and application-layer threats without interrupting the flow of legitimate traffic.
and IPv6 traffic, Border Gateway Protocol (BGP) routing, Multiprotocol Label Switching virtual private
networks (MPLS VPNs), quality of service (QoS) and applications including DNS, VoIP and peer-to-peer (P2P), Peakflow SP enables network operators to recognize and correct serviceimpacting issues in real time, as well as improve traffic engineering and capacity planning. The Peakflow SP Threat Management System (TMS) is a vital component of the Peakflow SP solution. It is a robust application-intelligent system for multi-service converged networks that speeds remediation by coupling high-level threat identification with packet level analysis. TMS provides visibility into critical applications (e.g., VoIP/SIP, DNS, HTTP, P2P, etc.) running on the network; monitors key performance metrics; and delivers application-layer attack detection, surgical mitigation and reporting. It complements the other mitigation techniques of Peakflow SP, including fingerprint sharing, Border Gateway Protocol (BGP) blackhole routing, BGP flow-spec and support for other third-party packet scrubbing products.
Key Features and Benefits Peakflow SP and TMS can be implemented alone or in combination, and collectively provide the following features and benefits: • Infrastructure Protection - Automatically identify and remove only attack traffic without interrupting the flow of legitimate business traffic in order to maintain the highest level of customer satisfaction. • Protection for Services and Applications - Gain insight into the critical applications and services running on your network (e.g., DNS, VoIP, HTTP, etc.), monitor key performance metrics, and detect and stop threats. Maintain availability, reduce support costs and retain customer satisfaction. • Highly Scalable Global Mitigation - Scale your DDoS defenses to an unprecedented level by deploying and managing up to 2 terabits of aggregate mitigation capacity from a single, integrated configuration and point of control. • Flexible Deployment - Provides the flexibility to strategically deploy application-layer intelligence, threat detection and surgical mitigation in different portions of your network for infrastructure protection and profitable managed services. • Managed Services Enabler - Leverage the same Arbor Peakflow SP platform used for network visibility and security to easily provision, deliver and maintain differentiated, profitable, in-cloud DDoS managed services for your customers.
Learn More For more information, please visit the Arbor Networks Web site at www.arbornetworks.com or contact us by email at info@arbor.net. Peakflow SP leverages IP-flow, Simple Network Management Protocol (SNMP) and deep packet inspection (DPI) technologies to provide pervasive network and application visibility transforming masses of raw data from the network into high-value information that enables network and security operations staff to detect and mitigate threats to availability, improve network/service performance and make better business decisions. By providing detailed visibility into IPv4
Page 34
Vasco DIGIPASS e-Signature Vasco VASCO is a world leader of strong authentication solutions with unique feature sets to fit a wide range of industries, IT infrastructures and business needs. Our focus is to build competitive solutions that incorporate open industry-accepted protocols and technologies allowing for complete interoperability, ease of integration and low total cost of ownership. VASCO’s strong authentication solutions are compatible with over 200 leading application providers.
Hardware devices with e-signature functionalities and PIN protection.
VASCO Client Solutions A full range of fully customizable hardware and software authentication client devices.
DIGIPASS Nano – NEW Consists of a thin film that users can place on top of any SIM card, turning the phone into a mobile security device capable of generating one-time passwords and e-signatures hence turning the mobile devices into an authentication device.
DIGIPASS PKI Strong two-factor authentication for secure web login, Windows smart card PKI login for your desktop, e-mail signing and encrypting secure VPN access and disk encryption.
DIGIPASS for Mobile Provides strong two-factor authentication and signature functionality for Windows Mobile, Java-enabled, Palm and Blackberry handsets.
VASCO Server Solutions IDENTIKEY Server An off-the-shelf centralized authentication server that supports the deployment, use and administration of DIGIPASS strong user authentication. It offers complete functionality and management features without the need for significant budgetary or personnel investments.
aXsGUARD Appliance Strong Authentication and Internet security appliances. Built around solid and proven VACMAN core technology, aXsGUARD offers Strong Authentication for remote user access to corporate networks and web-based applications.
Virtual DIGIPASS User-friendly and cost efficient solution for strong user authentication and e-signatures. Can be used with existing ordinary cell phones, text pagers and wireless PDAs eliminating the rollout of hardware or software based devices.
DIGIPASS as a Service VASCO’s cloud based authentication service which makes use of VASCO’s proprietary authentication technology. Web application providers can focus on their core business while VASCO takes care of all aspects of securing their network and applications in a service model.
DIGIPASS Pack for Remote Authentication DIGIPASS GO Range Small, easy-to-use, single-button devices for remote use.
All in one Two-factor authentication solution, designed to secure remote access to corporate networks. It includes server software and DIGIPASS devices. Designed for the SMB to provide a high level of security with limited IT resources and budgets.
Page 35
Ultra Electronics – AEP Networks
Ultra Electronics – AEP Networks Grow your business with Ultra Electronics AEP Networks in Australia and New Zealand
Trusted Security Everywhere Ultra Electronics AEP Networks has offices across the globe. We develop market leading Security and Networking technologies for global markets as well as Australian and New Zealand Governments, Enterprises and Service Providers. The AEP Networks go-to-market model is Channel based and is assisted by our direct touch sales and specialist technical staff in the top 100 Australia & New Zealand accounts. Ultra Electronics AEP Networks delivers Secure Communications to fulfil a wide range of customer requirements utilising its unique portfolio of products and solutions
Ultra Protect – Taking secure application delivery to a new level. With Ultra Protect, users are able to access applications securely, regardless of location, end point device or the application environment. Designed with focus on secure versatility, Ultra Protect offers not only the depth and breadth of application and end-point compatibility, but also provides a unique approach to licensing: including concurrent usage, Pay as You Go, or both! Ultra Protect enables customers to deliver compelling policy based solutions that can achieve the highest security and performance levels in the industry: - Wide range of end point device support – Windows, Linux, OS X, IOS & Thin Terminals, with more on the way
- Role based security with extensive features including SSO and device integrity
- Comprehensive application environment support – Citrix, VDI, Terminal Services, Web, Proxy, IBM Main Frame etc…
- Available as hardware or virtualised platform with support for Linux KVM, Microsoft HyperV, Citrix Xen & VMware
- High Availability & Load Balancing Options - Ultra Protect Assurance Option incorporates the Ultra Safe HSM delivering the most secure application delivery solution in the market
- Versatile platform that breaks the barrier to closed competitive offerings with seamless access to hybrid environments, reduced TCO & complexity
- Compelling ROI, TCO and maximum leveraging of existing assets and environments
Ultra Communicate – Multi-purpose platform providing a range of products and services to compliment the deployment of voice and data communications in complex heterogeneous environments. A highly versatile solution set with support for multiple protocols, voice and data interfaces coupled with multi-service communications and highly optimised for low-speed bandwidth applications such as Satellite, 3G, BGAN. Ultra Communicate is the ideal platform for low bandwidth/ high latency environments that frequently occur in Military, Law Enforcement, Emergency Services, Maritime & Fisheries, Oil&Gas, Mining, Rail, Utilities plus many more examples. - Unique Quality of Service providing dynamic prioritisation for situational awareness
- Secure Communications wrap around solution up to Top Secret - Automatic Configuration, Asset Management and seamless Automatic Service Roaming
- Low cost / best service routing options for high availability and lower service costs - Protocol mediation and optimisation with high levels of compression for Voice and Data
- Flexible platform and module options covering almost any conceivable use case today.
Page 36
Ultra Safe – Purpose designed and built Hardware Security Module (HSM) designed to generate, store and protect cryptographic keys for mission critical applications that demand maximum security without compromise. It is ideally suited for any organisation that needs truly secure key management for certification authorities, registration authorities, smart card issuers and other applications reliant on high integrity keys. Typically used in the implementation of PKI, DNSSEC, software and media signing, and provides the Assurance Option to Ultra Protect. Trusted globally by Military, Intelligence, Law Enforcement, Banking & Finance, e-commerce, gaming in fact any organisation needing to safeguard their private key material and secure signing for the highest level of protection available today. - Most secure HSM on the market – the only HSM where all Key Material is positively and irretrievably destroyed upon physical, temperature, electrical or chemical attack
- Uncompromising security – both software and hardware purpose built for key storage and signing functions.
- Proven effectiveness with both FIPS 140-2 Level 4 certified & Common Criteria*
- DNSSEC compliant - Trusted by critical national infrastructure agencies including ICANN & country Top level Domains
- Impressively easy to operate, providing customers with rapid implementation, key rollover and day to day operational benefits
- Most effective Random Number generator (RNG) in the market providing the best possible signing against hacks and interceptions
- High Availability and Load balancing options - Scalable, next Generation ECDSA (Elliptic Curve) now available as a core feature (* Under evaluation, listing for EPL at EAL4/4+, Australia/NZ expected in 2012)
Ultra Encrypt – Independently assured encryption platform that protects IP traffic across networks. Unrivalled flexibility, security for both branch offices, remote & rapid deployments and individual users whilst maintaining productivity. Ultra Encrypt provides true VPN security with data separation, confidentiality and source authentication for network traffic. Unique secure remote key management solution available using Ultra Safe for key generation, storage and protection. Next Generation Suite-B product available soon. AEP Networks is part of the Ultra Electronics Ltd a FTSE 250 Defence and Cyber Security Company with a market capitalisation of $1.8B. There are currently 26 companies in 3 divisions, and with a core focus on Cyber Security, AEP Networks is able to offer integrated solutions together with its sister companies where a wider capability reach is required by the customer. Please contact your WhiteGold representative or visit www.ultra-aep.com for more information or to arrange a demonstration of our capability.
Swivel Swivel Trusted by major global enterprises, Swivel is a proven, flexible authentication platform that’s helping millions of users work more efficiently, and enhancing IT security. At Swivel we don’t take a ‘one size fits all’ approach. Instead we have a choice of authentication solutions that can be tailored around your business needs and your budget. Whatever you need to securely connect to and whatever communication devices you want to use, we can make it happen, securely and seamlessly.
PINsafe A key, and unique feature, of our authentication platform is our patented technology PINsafe. PINsafe combines the use of registered PINs with random 10 digit strings that are sent to you either by SMS, Mobile app, email, telephone, or web, either on demand or in advance. You then combine these in your head to work out your unique one-time access codes, putting you at the heart of the strong multi-factor authentication process. The beauty of PINsafe is that users need to enter a different credential every time, whilst never entering their PIN.
Devices When we talk about ‘devices’ we’re really referring to the interface options available for our users to manage the authentication process. Swivel can work with a wide range of devices including mobile apps, tablets, in fact, pretty much any device with a webbrowsing option. Or, if your preference is even more basic than that, we have the easier option of SMS. As you would expect, we are constantly evolving our device options so that, as user behaviour changes, our authentication platform can be used simply, efficiently and above all securely. Applications of Swivel
How it Works PINsafe allows challenge response authentication, without the need of a traditional token. The different user devices can be assigned to different users depending on your corporate security and access policies. It is designed with ultimate flexibility in mind – regardless of the size of your organisation. The benefits of our tokenless solutions are endless.
VPN
Web
Cloud
Desktop
VPNs provide secure remote access. This access requires immensely strong authentication. They can be configured to use the Swivel platform as an external RADIUS server for authentication. The Swivel platform can pass additional information back in RADIUS responses, to tailor the VPN integration.
The Swivel platform has been deployed to allow tokenless access to web sites and web applications on various levels; be it allowing secure enterprise to enterprise comms. (e.g. via Outlook Web Access or via an Extranet), or between an enterprise and its customers or partners, via a customer portal or e-commerce site.
As cloud computing continues to expand and revolutionise business, the need to consider security around cloud applications is evermore paramount. We’ve developed a range of cloud options, including integration with Office 365, Salesforce.com and Google Docs, ensuring peace of mind when it comes to secure access to cloud services.
Remote users have secure and rapid access to services and applications. Such an environment provides remote access to users with strong authentication. Equally it can be deployed to local desktop environments, ensuring strong authentication whenever corporate data is accessed, either locally or remotely.
Mobile App
Web
SMS
Telephony
As a leading technology business, we must ensure our products are accessible via the latest devices. It’s equally important that our clients can confidently access their unified networks remotely and securely. We have developed a secure mobile app that allows safe delivery of our security strings to mobile devices.
Since Swivel began, we’ve been innovators in image-based, tokenless authentication via web browsers – all designed to protect web pages, Outlook Web Access (OWA) and SSL VPNs. We have three such products: all of which enable the security string challenge to seamlessly integrate with web and VPN login pages.
We naturally have an SMS product for those users without smartphones. The option of the PINsafe protocol makes SMS a stronger and more flexible proposition. Our SMS solution is entirely flexible. Security strings can be sent in a a range of ways. You have the choice of a large number of SMS providers to choose from.
Swivel can be used as a voice channel to authenticate internet use. This operates in the same way as the standard OTC process. Either a challenge is delivered to the user’s phone, with a response then being entered on the web page; or the challenge is delivered onscreen, with the response being entered on the phone.
Device Options
Applications The key to Swivel is the variety and flexibility available with our products – i.e. we can meet all your authentication requirements. We can deliver a constant user experience for a wide range of applications including VPN-based, web-based or applicationbased. Our solutions can be software-only, as a physical appliance, or as a Virtual Machine Appliance, depending on your requirements.
Page 37
Page 38
Page 31 39 Page
WhiteGold Easy Contact Options:
WhiteGold Distribution ABN: 29 150 110 688
Website
SYDNEY
www.whitegold.com.au
Level 3, Building A 20 Rodborough Road Frenchs Forest NSW 2086 Phone: 1300 137 993 Switch: +61 (2) 8667 1300 Fax: +61 (2) 8572 6047
Sales sales@whitegold.com.au insidesales@whitegold.com.au
Support support@whitegold.com.au
MELBOURNE
Log a Support Ticket
training@whitegold.com.au
Unit 6, 79-83 High St Kew VIC 3004 Phone: 1300 137 993 Switch: +61 (3) 9006 6300 Fax: +61 (3) 8080 1783
Accounts
BRISBANE
simply choose the “WhiteGold Support� Menu on our website Home Page and complete the Form
Training
accounts@whitegold.com.au Loganholme QLD 4129 Phone: 1300 137 993 Switch: +61 (7) 3387 0125 Fax: +61 (7) 3112 5007
General Enquiries enquiries@whitegold.com.au
Pubic Relations/Press
PERTH
pr@whitegold.com.au
44 Kings Park Road West Perth WA 6005 Phone: 1300 137 993 Switch: +61 (8) 6263 4487 Fax: +61 (2) 8572 6047
Events events@whitegold.com.au
Logistics orders@whitegold.com.au shipping@whitegold.com.au
Building Networks for People
CloudWise