WEBINAR: Learn how to monitor BYOD on your network effectively

Forrester’s latest report on mobile adoption in the enterprise found that 66% of employees now use two or more devices every day, including desktops, laptops, smartphones and tablets. A smaller, but notable 12% percent said they now use tablets at work. That’s still far fewer than the 50% who report only using a desktop, or the 82% who use a desktop alone or alongside other devices.

66% of employees now use two or more devices every day

66% of employees now use two or more devices every day

"She won't take much more of this."

“She won’t take much more of this.”

Meanwhile, 55% of organizations stated that supporting a larger number of smartphones was a high or critical priority over the next 12 months, while 52% said the same of supporting tablets like Apple’s iPad.

We invite you to join a webinar presented by Darragh Delaney Head of technical Services at NetFort which will show you how to monitor BYOD activity on your network.

Getting this visibility into exactly what your network users are doing will help you ensure that you network does not suffer due to user actions.

Find out how BYOD is affecting your network on Friday, January 18, 2013 14:00 – 15:00 GMT

Register for this Webinar today: https://www1.gotomeeting.com/register/432130121

About NetFort LANGuardian

LANGuardian captures and analyses the traffic flowing through your network switch, stores it in a database, and displays the details in a web browser.

Read more T4B blog posts on Netfort here

For more information on NetFort LANGuardian and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on Linkedin, Twitter and Facebook, where we’ll keep you up to date on ourlatest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

WEBINAR: Find out what users are doing on your Network

Users interact with the network in many different ways during an average day. They visit websites, send and receive email, download files from the Internet, upload photos and videos, perform online backups, and more. They can also — usually unwittingly — expose the network and themselves to intrusions, malware, viruses, phishing attacks, and other security risks.

Good visibility into user activity on your network can help you to troubleshoot problems when they arise; in many cases, it can help you to anticipate problems and prevent them from arising.

Join NetFort  on December 6th at 15:00 GMT for a webinar presented by Head of Technical Services at NetFort, Darragh Delaney that will give you valuable insight into exactly what users could be doing on your network.

During the webinar, NetFort will show you how to monitor different areas of the network including:

  • Sources of user data
  • Network traffic on the LAN and WAN
  • Internet activity
  • File shares
  • Mobile devices

Register today to reserve your seat.

About LANGuardian

LANGuardian captures and analyzes the traffic flowing through your network switch, stores it in a database, and displays the details in a web browser.

Offering a depth of insight into network activity that is unmatched by products costing ten times as much, LANGuardian helps network administrators troubleshoot bandwidth issues right across the network, perform network forensics on past events, investigate activity on Windows file shares, and keep track of user activity on the Internet.

The list of things you can do with LANGuardian is endless. Every customer finds unique ways to use it, solving problems they cannot solve with other tools.

You can deploy LANGuardian on any size of network, from a small office to a global enterprise.

LANGuardian deployment with multiple core switches

For more information on NetFort LANGuardian and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on Linkedin, Twitter and Facebook, where we’ll keep you up to date on ourlatest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

Finding it difficult to assess your organisations firewall rules?

It is common for Network Engineers to find it difficult and time consuming to assess firewall rule sets to determine rule necessities and security risks.

Current rules could be:

  • Error-prone – redundant or no longer provide any benefit
  • Security risks – badly configured rules can allow unwanted traffic or intruders onto your network
  • Expensive to manage – require shorter cycle time and improvements to rulebase implementation process

Implementing Athena FirePAC alongside your existing NCM installation allows you to fully automate your firewall management and synchronise security across your whole firewall estate.

Athena FirePAC is flexible, available in a variety of bundle  options and includes many different tools to meet your firewall management needs including:

PCI Audit – Make PCI reporting easy – FirePAC identifies specific technical checks for PCI control items to allow you to secure your network but also allows you to prove your network is secure

Rulebase Cleanup – Analysis of your rules to remove redundant rules or rules that are not in line with your security policy – this speeds up traffic and removes risk

Change Advisor – Perform sophisticated packet tests using the same parameters contained in a simple change request form to identify the impact of changes before they are made and therefore reduce downtime caused by firewall config changes

You can find more information with the below downloadable resouces including a free white paper on Effective Solutions for Firewall Management’

For more information on Kerio products and promotions as well as other technology solutions for business, including where you can purchase from, request information here

Bitdefender integrates with VMware vShield 5 Endpoint, reducing operating costs and performance bottlenecks for organisations

Bitdefender, the award-winning provider of innovative security solutions, announced the integration of VMware vShield 5 Endpoint and Security for Virtualized Environments. The combined technologies give customers de-duplication capabilities of antimalware functions, using a series of proprietary cache mechanisms, which greatly improves consolidation ratios in VMware environments.

Until now, organisations have been forced to take traditional security approaches to protecting virtual environments, which created high operating costs and significant performance bottlenecks. The new approach to security saves resources and maximizes consolidation ratios in virtualized datacenters without sacrificing security

Click image to enlarge

“We congratulate Bitdefender for meeting all VMware requirements for complete integration with VMware vShield 5 Endpoint™ security technologies,” said Parag Patel, Vice President, Global Strategic Alliances, VMware. “The combined virtualisation and security expertise of VMware and Bitdefender will deliver on-going value to our customers by offloading key antimalware functions to a security virtual machine for improved performance.”

“Given the complexity and growth of virtualised environments, traditional endpoint security approaches are highly inefficient, lacking in scalability and quickly proving to be ineffective,” said Bogdan Dumitru, CTO, Bitdefender. “Working with industry leaders in virtualisation, our security solutions leverage technologies like VMware vShield to optimize performance and ensure that enterprises protect their valuable data, while reducing financial and operational burdens associated with other security approaches.”

For more information on Bitdefender products and promotions as well as other technology solutions for business, including where you can purchase from, request information here

Leading Industry Analyst Firm Includes Kerio Control in its Magic Quadrant for Unified Threat Management

Kerio Technologies has been placed in Gartner, Inc.’s March 2012 Unified Threat Management Magic Quadrant. The global analyst firm defines the UTM market as devices that provide small and midsize businesses with multiple network security functions in a single appliance.

Kerio Control 7.3 is ideal for organisations that demand robust network protection, traffic analysis, and user-based reporting. The Kerio Control UTM is available in a wide range of form factors, including two hardware firewall appliances, a bootable ISO software appliance, virtual appliances for VMware and Parallels, or an application on Windows Server software.

“As a rising vendor in the security space, we are delighted to be included in the Magic Quadrant report,” said Scott Schreiman, CEO Kerio Technologies. “Strong growth in our customer base and partner network will solidify Kerio Control as a viable alternative to some of the more difficult to use in the space.”

Gartner’s Magic Quadrant report researches and evaluates UTM vendors in terms of their “completeness of vision” and “ability to execute.” The Magic Quadrant aims to provide a qualitative analysis into a market and its direction, maturity and participants. 14 vendors were included in the UTM Magic Quadrant report.

For more information on Kerio products and promotions as well as other technology solutions for business, including where you can purchase from, request information here

Two powerful products integrated together to give Network Engineers the ideal firewall management solution

While most security and network engineers still prefer using the CLI, the need to manage configurations from a single console that works with multiple vendors and device types has several operational benefits. Firewall solution provider, Athena Security have integrated Athena FirePAC with the SolarWinds Orion Network Configuration Manager (NCM) product to offer you the most operations-friendly firewall management solution anywhere.

Using these two products together, you have the safety of daily backups and configuration change monitoring plus intelligence for determining the most optimal changes. The combination is more powerful, affordable and flexible than what you can do with typical firewall vendor management consoles.

Video – Firewall Management Using SolarWinds Orion NCM and Athena FirePAC

Athena FirePAC retrieves the latest configurations stored in Orion NCM to provide comprehensive policy validation. FirePAC Impact Analysis allows you to not only compare the rule and object definitions pre and post-change, but it will also help you predict how IP traffic will be handled by the firewall. You’ll know exactly what a rule or object does in just a few simple clicks and gain a dramatically easier way to locate what can be re-used for making changes.

If you are struggling with a bloated and cumbersome rulebase, FirePAC Rule and Object Cleanup allows you to simplify your objects and eliminate rule clutter to improve manageability and performance. Once you have run the analysis, you can automatically generate cleanup scripts in the CLI format, with extensive comments, so you can quickly deploy them to the devices.

You can try both products for free and learn first-hand how this solution will save you loads of time managing your network environment.

To extend your SolarWinds Orion NCM + FirePAC solution even further, check out how you can get even greater value by adding Security Audit and PCI Compliance to your component bundle.

For more information on Athena, SolarWinds and other technology solutions for business, including where you can purchase from, request information here: http://bitly.com/AAtB94

SMBs still need to improve when it comes to offsite data backup

Local SMBs are feeling more confident than ever about their ability to backup and recover data after a disaster, but one-third still aren’t employing an offsite backup strategy, despite experiencing a year marred by flooding and cyclones.

According to the Acronis Global Disaster Recovery Index 2012, while Australian SMBs confidence about their ability to recover data after a disaster remains below average, it more than doubled in 2011, growing 136 percent.

This report may be on Australian SMB’s but these figures don’t differ much across the globe. 

Underlying this rise is perceived improvements about having the right resources and the technologies to recover data. Confidence in these two criteria more than doubled over the past 12 months.

Another contributing factor to the increase is that 66 percent of SMBs now check their backup and disaster recovery plans more regularly, possibly as a result of the natural disasters which hit many regions in 2011, including destructive flooding in Australia, Brazil and Thailand, deadly earthquakes in New Zealand and Turkey, storms across the United States and the devastating tsunami in Japan.

The survey also found downtime as a result of disaster-related data loss costs a business an average of US$366,363 per year – which can mean the difference between a business’ survival and closure in many cases.

 

For more information on Acronis and other technology solutions for business, including where you can purchase from, request a call today: http://bitly.com/AAtB94

Red Hat Enterprise Virtualization 3 Beta Now Available

What’s all the excitement about? 

Red Hat, the world’s leading open source technology solutions provider with offerings including Red Hat Enterprise Linux, Red Hat Enterprise Virtualization, JBoss Enterprise Middleware, and a broad range of management and services have made available the beta version of its latest Virtualization solution.

With the release of the Red Hat Enterprise Virtualization 3.0 Beta, Red Hat previews new capabilities that build upon its industry-leading scalability and performance for both server virtualization and desktop virtualization use cases.

At the fraction of the cost of propriety virtualisation platforms, we highly recommend that the beta is downloaded to see just how this solution can work for you whilst carving back costs to the business.

For guidance and to sign up for the Red Hat Enterprise Virtualization 3 beta evaluation head to: http://red.ht/z7QsLt

For more information on Red Hat and more business software solutions request information: http://bitly.com/AAtB94