26 April 2013

Sinefa - Quality Overview Report

Sinefa is pleased to announce the immediate availability of a new quality overview report. Thanks to some great feedback from our user community, we’ve developed a report that displays all the quality, application utilization and capacity results for one or more locations on a single page. This report allows users to quickly correlate interesting events with changes in quality, utilization and capacity, which ultimately leads to quick troubleshooting and resolution of problems.

Highlights
Quickly view quality, utilization and capacity results for an individual location, together in a single report.
Correlate events over time – all the time series charts are aligned and zoom in sync which allows users to easily understand if a problem is congestion, quality or capacity related.

Proactive network management made easy with the ability to analyze quality, utilization and capacity trends over time for the entire WAN, a group of locations, or individual locations.


Sinefa collects hundreds of thousands of samples, measurements, metrics and results for every location each day and we are continuously looking at new and innovative ways to make the most of all this information. The ability to quickly view, digest, compare and analyse all this data is critically important, particularly as more and more applications and services rely on the network. Whether it’s for troubleshooting, trend analysis or capacity planning, the new quality overview report makes it super easy.

The power of being able to view application utilization, quality and capacity on the same time series allows users to quickly understand if a problem is congestion, a drop in network quality or a reduction in promised capacity. The following example explains how.

Example Scenario
After receiving an alert for high delay at a particular location, I want to find out what is causing it.
Solution: With the new quality overview report, simply view the location of interest and find the increased delay in the time series chart. This increase in delay lines up with a sudden increase in utilization, caused by a streaming video application. The capacity results remain unchanged, so the increase in delay is caused by congestion, due to the video.The quality overview report is available today and can be found by selecting Reports -> Quality, Overview from the menu.

25 April 2013

Cloud Distribution to sell Enterasys security kit

Cloud Distribution to sell Enterasys security kit: Expansive Cloud Distribution has added Enterasys mobile IAM, NAC and SIEM solutions to its catalogue

Since hiring networking vet Adam Davison with a brief to sniff out new and emerging vendors, Cloud Distribution has already signed storage software specialist Talon and datacentric information security solutions provider Watchful Software.

The addition of Enterasys, which is more popularly known for its wireless products, will help Cloud Distribution resellers address customers struggling with mobility concerns, the company said.

The deal, which sees Cloud Distribution take on Enterasys’ mobile IAM BYOD security solution as well as its NAC and SIEM tools, also sees a new security specialist category added to Enterasys’ Advantage Partner Programme, which will be managed exclusively by the distie.

“Being selected by Enterasys as the company’s dedicated security channel partner for the UK underscores our reputation as a serious player in this market,” said Davison, “not only for our understanding of the security ecosystem but for the value-add services we deliver.”

Mark Pearce, Enterasys EMEA channels and alliance director, said that the company was witnessing more and more buyers being told to mobilise their workforce, which meant security was becoming a much more important factor in the Enterasys’ reseller pitch.

“Cloud Distribution’s sustained growth and growing vendor portfolio makes them a great VAD to distribute our security portfolio and to explore further revenue streams,” he said.

17 April 2013

The fundamental principle of breach prevention!




The fundamental principle of breach prevention!

                                      







A layered Information Protection solution to keep data safe and secure regardless of whether it is in transit or stored inside or outside your perimeter
*
An advanced Persistent Security mechanism, using state-of-the-art e-Biometrics, to continuously verify that the people using your systems are who you think they are
*

For the past two decades, vast amounts of money and countless hours have been invested in breach prevention. The order of the day has been to harden network and server access through the deployment and redeployment of an evolving series of firewalls, anti-spam/anti-virus applications and intrusion detection and prevention systems – all of them, in essence, attempts to ‘reinforce the perimeter’ to protect what lies within.

While this remains good and necessary IT practise, it takes no account of two very important and inescapable truths:

  • users are always inside the perimeter, and
  • even those authorised users can cause significant damage.

By ignoring these, CIOs fail to address possibly the most fundamental persistent threat, that of a breach orchestrated by one or more of their organisation’s own users.

The antidote to this insider threat is to arrange persistent protection and control over information at all times. The best of today’s data-centric technologies ensure that even if confidential data is released, it is rendered meaningless to whoever may acquire it.

So long as the data itself is encrypted then there is control over who should be able to read it, when they are able to do so and for how long. This means that even if an insider with no malicious intent inadvertently misdirects sensitive data, it remains inaccessible and damage limitation can take place.

A data-centric approach to data breaches isn’t mutually exclusive of any other forms of defence, but the addition of classification and encryption mechanisms ensure the protection and control of proprietary information - arguably as important an asset of any company as its people.

RightsWATCH and TypeWATCH are market-leading products designed to keep sensitive information safe from security breaches resulting from malicious wrongdoing or inadvertent misuse. Come and see live demonstrations of just how simple they are to implement and use on stand O80 @ InfoSEC Europe, 23-25 April, Earls Court, London, UK.


Check your phone: Nations with the most mobile malware

Check your phone: Nations with the most mobile malware: Security threats from mobile malware are on the rise and nearly 95% of targets operate on the Android operating system, according to a new report from NQ Mobile.

16 April 2013

Watchful Software is Selected a Winner of Red Herring’s Top 100 Europe Award

Watchful Software is Selected a Winner of Red Herring’s Top 100 Europe Award: Watchful Software, a leading provider of data-centric information security solutions, announced today that it has been selected as one of the winners of Red Herring's Top 100 Europe award, a prestigious list honoring the year's most promising private technology ventures in Europe. The Top 100 winners were announced at an awards ceremony at the Red Herring Europe Forum in Amsterdam on April 10th.

11 April 2013

Cloud Distribution and Watchful Software join forces to tackle soaring incidents of corporate data loss

Reading, UK – 11th April 2013 – Security and networking value added distributor, Cloud Distribution, has announced a new partnership with Watchful Software, a leading provider of data-centric information security solutions. Cloud Distribution will distribute Watchful Software’s RightsWATCH product, a powerful encryption offering that keeps data secure regardless of whether it is at rest, 'on-the-fly', or even totally outside a network perimeter.

The new partnership between Cloud Distribution and Watchful Software aims to address “Insider Security Violations”, an increasingly significant concern for UK technology users as recently identified by industry firm Global Knowledge. Global Knowledge listed ‘Insider Violations’ as number seven on the Top Ten Security Risks of 2013. Whilst many of these types of breaches will be unintended, unfortunately the firm suggested that there will likely be an increase of intentional malicious actions on the part of employees as there is a growing underground black market for the sale and distribution of product information and company secrets.

Adam Davison, Director of Product Development at Cloud Distribution, comments: The BYOD (Bring Your Own Device) phenomenon really highlighted the importance of securing business critical information, as it makes it easy for employees to access company documents anywhere and anytime. Our channel partners recognise that supplying solutions that only secure the network perimeter is no longer enough to keep enterprises safe and have been looking for a product that focuses on shielding the information itself. RightsWATCH addresses this need, offering a cost-effective solution to truly protect a company’s greatest asset - its data.”

RightsWATCH only allows users with express authorisation to company data of any form (email, document, spreadsheet, business plan) to access and use it, regardless of whether that information is stored inside or outside of the network. Information is protected whether stored on a corporate server, a laptop, a web-drive or even a USB, as well as when it is in use and in transit. RightsWATCH leverages the capabilities of traditional DLP (data loss prevention) and ERM (enterprise risk management) approaches and offers a single solution that is simple to deploy, delivering a transparent and intuitive user experience on multiple platforms and file types.

To protect the enterprise legally and from an audit and compliance perspective, RightsWATCH can also implement automatic and dynamic fingerprinting and visual watermarking to protected content - decreasing corporate liability in case of an information security breach. The solution provides a complete audit trail on both user and systems admin actions for the life of the object; knowing things such as who opened, edited, printed or forwarded the information thereby enabling organisations to be compliant with regulations and best practices.

Charles Foley, Chairman and CEO of Watchful Solutions, said: “Cloud Distribution is a well-respected distributor of next generation solutions and has a deep knowledge of the security market. The team understands of all the issues involved surrounding risk management, best practice, audit and compliance and offers a wide variety of complimentary services and tools that will accelerate our go to market strategy. We are confident that partnering will Cloud Distribution will offer us the best possible platform to widen and strengthen the adoption of RightsWATCH in the UK.”

Come and see us at Infosecurity Europe, 23rd to 25th April at Earls Court – stand M96.  Register free via our website: www.cloud-distribution.com.

-End-

About Cloud Distribution
Cloud Distribution is a value-added distributor of disruptive next-generation security and networking solutions that VARs can take to market quickly and easily. It currently distributes Meraki, Lastline Inc., Talon Storage Solutions, Watchful Software, Tanaza, PepLink, Vyatta and  Vit@r in the UK. Its portfolio of disruptive networking and security solutions helps resellers to differentiate themselves from the competition and create new markets to sell in.
                                                                    
The company was founded in 2009 by senior executives with a wealth of experience in the security, networking and optimisation space. Its philosophy is to take innovative, cutting-edge vendors into the UK market by recruiting and working together with skilled, reputable, market making partners.
For further information please visit www.cloud-distribution.com.

About Watchful Software
Watchful Software was formed in 2012 to address the requirement to protect an organization’s most critical asset after its people – its information. The company is staffed by industry executives with decades of systems, software, networking, security, and compliance experience to address the growing need for protecting sensitive and proprietary information against accidental or malicious theft, leakage, or loss.  Leveraging key technologies including advanced encryption algorithms, digital rights management, and e-Biometrics, Watchful Software has developed a suite of solutions that ensure only authorized personnel have access to enterprise systems or can handle sensitive information, thereby protecting against the massive economic and competitive damage often done by cyber terrorists and information thieves. www.watchfulsoftware.com


09 April 2013

New hire underlines Cloud Distribution’s commitment to deliver ‘value-add’ in distribution

Reading, UK, 9th April 2013 - Security and networking Value Added Distributor, Cloud Distribution, has strengthened its team with the appointment of channel veteran, Andy Fidgeon.  This appointment comes on the back of the company’s sustained growth, its expanding partner base and its growing vendor portfolio.

Reporting to sales director, Greg Harris, Andy joins Cloud Distribution in the newly-created role of Southern Sales Manager.  His remit covers two separate, but directly-related, areas: the company’s vendor portfolio and its reseller base.

Andy will be responsible for growing Cloud’s existing southern-based sales team, expanding its reseller partner base and generating sales of the company’s growing portfolio of next-generation security and networking solutions.

He will also build on the success of the company’s complementary virtual market-making service known as Altitude.  He is tasked with creating a dedicated telemarketing and lead-generation team that will deliver accelerated, qualified pipelines by feeding enduser leads to the company’s growing reseller community.

Greg Harris, sales director, said: “We’re very excited to have Andy on board. Cloud’s mission is to bring innovative security and networking technology solutions to the UK.  We are filling a much-needed gap for a distributor that understands how to help vendors and resellers build markets around next-generation technology offerings. Our relationships with disruptive technology vendors demonstrate our commitment to delivering on our mission.  Andy brings first-hand experience of partnering with innovative, fast-growing technology vendors, delivering value-add and creating a solid sales pipeline for them.  To that end, Andy is the perfect fit for us.”

Andy’s IT Career began over 15 years ago when he joined networking reseller, LAN2LAN.  He subsequently joined Graham Fox at Fresh Egg Network Technologies, one of the UK’s first ‘boutique’ distributors to focus on the ‘value-add’ element of distribution.  After Fresh Egg’s acquisition by Voice Comms Warehouse (VCW), Andy spent three years helping to build the company’s success which was based primarily on evangelising emerging technologies and building brand names for new vendors to the UK.  A 4-year stint at VADition with Neil Ledger followed, before its 2011 acquisition by Exclusive Networks.  Andy left Exclusive in June 2012 and went full circle to re-join LAN2LAN. 

-End-
About Cloud Distribution
Cloud Distribution is a value-added distributor of disruptive next-generation security and networking solutions that VARs can take to market quickly and easily. It currently distributes Meraki, Vyatta, PepLink, Talon Storage Solutions, Lastline and Tanaza in the UK. Its portfolio of disruptive security and networking solutions helps resellers to differentiate themselves from the competition and create new markets to sell in.

The company was founded in 2009 by senior executives with a wealth of experience in the security, networking and optimisation space. Its philosophy is to take innovative, cutting-edge vendors into the UK market by recruiting and working together with skilled, reputable, market making partners.

For further information please visit www.cloud-distribution.com.