fbpx

Representative offices 

Request callback
btn

iIT Distribution – офіційний дистриб’ютор компанії Lookout

News

Команда iIT Distribution підписала дистриб’юторську угоду з компанією Lookout!

Lookout — це лідер в області мобільної безпеки понад десяти років. Це єдиний постачальник засобів захисту від мобільних загроз, який вже чотири роки поспіль потрапляє в список Forbes Cloud 100!

Lookout забезпечує і розширює можливості нашого цифрового майбутнього у світі, орієнтованому на конфіденційність, де мобільні пристрої необхідні для всього, що ми робимо для роботи та розваг.


Платформа безпеки Lookout захищає мобільні пристрої від шкідливих додатків, програм-вимагачів, фішингу, забезпечуючи захист кінцевих точок, управління уразливостями та мережевий доступ з нульовою довірою.


Lookout використовує штучний інтелект для аналізу даних телеметрії майже з 200 мільйонів пристроїв і понад 120 мільйонів додатків, тому ви можете не турбуватися за вашу мобільну безпеку.


ЗА ОСТАННІ 12 МІСЯЦІВ LOOKOUT ЗУПИНИВ ПОНАД 3 МІЛЬЙОНІВ МОБІЛЬНИХ ЗАГРОЗ

Завдяки дослідженню більш ніж 100 мільйонів проаналізованих програм, Lookout має найбільший у світі набір мобільних даних, що забезпечує видимість всього спектра мобільних ризиків. Це дозволяє Lookout максимально контролювати ризики, пов'язані з додатками. Ця платформа безпеки створює відбиток кожного мобільного пристрою і порівнює його з даними більш ніж 185 мільйонів пристроїв для постійного захисту від мобільних ризиків. Кожен день компанія перевіряє понад 100 000 нових додатків. Клієнти Lookout використовують Lookout App Risk для швидкого виявлення ризикованої поведінки додатків і динамічного відхилення додатків для захисту своїх організацій.


Рішення Lookout забезпечує не тільки багаторівневий захист, але і являє собою технологію управління мобільними погрозами (MTM), широко застосовується в організаціях, які прагнуть до моделі нульової довіри. Завдяки конкурентним якостям IDC MarketScape for Mobile Threat Management Software третій рік поспіль називає Lookout лідером.


Багато сучасні користувачі все частіше вибирають мобільні пристрої в якості свого основного способу комунікації з мережею, в тому числі й для робочих процесів. Очевидно, що кіберзлочинці вже давно розцінюють мобільні пристрої як одну з пріоритетних цілей. Саме тому захист мобільних пристроїв не менш важливий, ніж захист будь-яких інших пристроїв в корпоративній мережі.

Дізнатися більше про Lookout

Back

iIT Distribution expands its portfolio with networking solutions from Aruba Networks

News

We provide supplies for the entire product line of the vendor, which is annually ranked among the leaders in the wired and wireless access networks market according to IDC MarketScape and Gartner Magic Quadrant (the leader of the quadrant for 15 years in a row!).

Aruba is a leading provider of innovative solutions for access control, network infrastructure, data network equipment (access points, controllers, routers and switches) and mobile applications for corporate networks. Aruba recently launched a line of devices that support the new wireless standard, Wi-Fi 6.

The technologies and approaches of this vendor make it possible to very quickly deploy and easily manage wireless data transmission networks. Aruba solutions are characterized by low cost of ownership relative to offerings from other manufacturers, versatility of use, ease of deployment and maintenance (installation, configuration and configuration of equipment takes little time) and high level of security. These characteristics have made the demand for Aruba solutions in the corporate sector consistent with strong leadership and worldwide recognition for over a decade.

2020 Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure Report 2020 Gartner Magic Quadrant for the Wired and Wireless LAN Access Infrastructure Report.


iIT Distribution company forms its product portfolio in such a way that partners and customers can get the best and most popular solutions for their projects. Having expanded it with products in the field of network infrastructure, our specialists are ready to provide partners with qualified advice on the choice of Aruba equipment, considering specific requirements, business tasks and goals.

To learn more about Aruba

Back

IIT Distribution received the status of a Business Partner in the Hewlett Packard Enterprise affiliate program

News

Obtaining this status opens even more opportunities for our partners to implement projects based on Hewlett Packard Enterprise solutions, as well as receive qualified support from our specialists. By joining our efforts to drive innovation, we help our customers keep pace with today's economic reality.


HPE Business Partner status means that our specialists have been trained, successfully passed exams and have the skills and experience to ensure the most effective development of corporate IT infrastructure of enterprises.



Hewlett Packard Enterprise (HPE) is a leading global manufacturer of software and hardware solutions for creating IT infrastructure of any level. HPE technologies improve the performance, efficiency and security of your IT infrastructure, making it responsive and flexible in the face of rapidly changing competitive environments. The company is a leading provider of servers, storage systems, wired and wireless networking equipment, converged systems, software services and cloud technologies. Hewlett Packard Enterprise tirelessly continues to innovate and improve best-in-class products.


Hewlett Packard Enterprise includes Aruba is the premier manufacturer of wireless networking equipment and other advanced networking equipment. Today Aruba is one of the three absolute world leaders in this segment. Aruba solutions have earned thousands of companies' commitment to being highly secure, easy to deploy and integrate with existing networks, and easy to manage and maintain.


As an official partner we have a unique opportunity to help clients at all stages of their transition to new hybrid technologies we guarantee high-quality consulting and implementation of enterprise-class solutions based on the manufacturer's technologies.

To learn more about Aruba solution

Back

Why should hosting providers pay attention to Infinidat data storage solution? Practical experience of use

Articles and reviews

Infinidat, a leading provider of enterprise-class storage solutions, noted that Virtual Data Corp. (VDC) a managed cloud hosting provider has been running smoothly for the past two years using the InfiniBox platform. This high availability allowed the VDC to combine multiple arrays into one for ease of management and cost savings without any disruption. At the same time VDC expanded its storage capabilities with InfiniBox beyond the petabyte to flexibly leverage storage as needed and to support the company's growth strategy.


The move to the InfiniBox storage platform has retooled high-quality, state-of-the-art VDCs in Canada. As an IT solutions provider, VDC provides customers in Canada, the United States and worldwide with public and private cloud hosting, cloud backup, managed server hosting and disaster recovery.


The company was able to combine five to six SANs into a single SAN, thereby simplifying the management of each individual SAN. In addition, VDC has moved on to the broad range of integrations and capabilities that the Infinidat storage platform provides with VMware and Veeam, in particular a disaster recovery (DR) solution.

With 24/7 hosting providers operating in an ever-growing data and workload environment, VDC appreciated the ability to pay for storage incrementally in response to growing business needs. Infinidat provides the ability to purchase and use storage when needed, giving customers a complete picture of their budget.


“The increasing data usage of VDC customers and other service providers has created a significant need to rescale storage capacity. Because we treat our customers as partners, our service and support team calls VDC monthly to help maximize the capabilities of the InfiniBox platform. The predictability, low total cost of ownership, and ease of use that VDC has gained are also enjoyed by all of our customers. "Steve Sullivan, executive vice president of sales at Infinidat.


Infinidat helps businesses and service providers scale their competitive advantage with petabyte data. Infinidat's architecture provides 100% availability and scalability with a significantly lower total cost of ownership than other vendors' solutions.


To read the full VDC case, click here.

Back

The ZTNA model helps reduce the stress loading of employees from remote work

Articles and reviews

As a result of the current pandemic, there are more and more people who must adapt to working at home. At the same time, many businesses are beginning to realize that these changes can be long-term.


Recent report of Gartner "The Best Networking Solutions for Telecommuting " (September 2020), contains a chart showing the percentage of employees who worked remotely before the pandemic and now. As you can see, the number of such employees has grown.

Not only do individual workers struggle with sudden changes and do their best to maintain efficiency in the new environment, but a significant portion of the problems are borne by the business itself. Companies are trying to adapt to the reality of remote workers, which are growing at an unprecedented rate.


In particular network security and network monitoring can create unforeseen difficulties for people who work remotely. Most corporate networks are not designed to handle the sudden increase in remote user activity, which can lead to errors and network disruptions, leading to security, functionality, and financial problems. Traditional solutions for network security and network monitoring fail to provide the necessary corporate requirements for users working from home. Therefore, companies must focus on ensuring the highest level of network security.


The Gartner report includes a recommendation section that includes a recommendation and how network security evolves towards zero-trust network access (ZTNA) principles. ZTNA is a service or product that allows users to securely access the services of an organization with the assurance that no attacker can gain access to applications. Under this model, users, devices, and applications are subject to validation every time they request access to any corporate resource.

Part of the functionality of ZTNA includes the provision of VPN, in addition to other services. ZTNA develops speed, flexibility and adaptability for remote access at a relatively affordable cost. To facilitate the remote user experience and reduce unnecessary traffic, ZTNA can be used as a powerful tool. It will help you successfully improve the security of your network and help reduce security risks or external tampering. Therefore, ZTNA is the ideal model for providing users with uninterrupted access without compromising security.


As corporate security experts, we recommend using ZoneZero from Safe-T. It is not only compatible with most of the leading VPNs that you likely already have in your organization, but it is also compatible with other components of your current network, including security solutions. ZoneZero provides users with authentication based on various factors, increasing the level of security and reducing the likelihood of threats. The solution also offers the ability to migrate from network access to application access to ensure users are not online.


The original source

Back

Сrowdstrike named leader in security Threat Detection, Response and Investigation of cyberincidents (MDMR)!

News

CrowdStrike CrowdStrike continues the good news streak, earning the highest scores on 11 criteria as well as in the market presence category in The Forrester Wave: Managed Detection And Response (MDR) for Q1 2021, making it a leader in its class.

As a reminder, the CrowdStrike Falcon X product was named the Forrester leader among Threat Intelligence providers last week. If you are new to this news, we recommend reading the full overview of the benefits for which CrowdStrike has received the highest marks and is universally recognized here.

CrowdStrike leverages the threat intelligence it collects through incident response and Falcon endpoint protection platforms, integrating organic threat intelligence from these sources into its MDR service delivery approach and delivering significant value to customers. In the Forrester report, CrowdStrike scored the highest possible score on 11 out of 19 criteria.

Based on the report, MDR will become a must-have in 2021. MDR has been around as a category of solutions for years, but analysts are predicting a sharp rise for the technology in the coming year, moving from a niche product to a necessity for many organizations.

For MDR, speed is one of the most important metrics, as it measures the ability to outrun increasingly sophisticated opponents. Forrester especially notes the speed of Falcon Complete:

  • Time of useful activity. Forrester scored 5/5 for its reactive deployment process, which ensures customers can be fully protected within days of installation, rather than weeks or months like many other vendors.
  • Threat response time. Forrester said customers interviewed highlighted that Falcon Complete's speed of response to security incidents is a key benefit and is key to staying ahead of attackers operating at increased speed. Falcon Complete closely monitors response times by following the 1-10-60 rule. This plays a significant role when cybercriminals can do damage in a matter of hours. In the latest report from CrowdStrike Services Cyber Front Lines, the Falcon Complete team showed that they can detect threats in the first minuteinvestigate in 6 minutes and remediate them in 29 minutes.
  • Quick support response. Customers also reported that general support issues such as help deploying the CrowdStrike Falcon or discovery questions were quickly and efficiently resolved by the Falcon Complete team.

CrowdStrike customer feedback highlights the speed with which the vendor responds to both detected security incidents and support issues in general, and the process-oriented nature of investigations as key strengths. Forrester also gave Falcon Complete the highest score possible for its presence in the market for MDR solutions. In less than three years since its first launch, Falcon Complete has grown to become one of the most widely deployed MDR solutions on the planet, providing 24/7 protection to thousands of customers representing millions of endpoints.


This recognition from Forrester strengthens CrowdStrike's position as the market leader in guided detection and response.

Full report The Forrester Wave: Managed Detection And Response (MDR), Q1 2021

The original source

Back

Falcon X від CrowdStrike визнаний лідер у звіті Forrester Wave: External Threat Intelligence Services за перший квартал 2021 року!

News

Forrester analysts rated Threat Intelligence providers on 26 criteria grouped into three high-level categories:

  • Current offering: Assessment of Analysis Requirements, Baseline Gathering, Information Analysis, Dissemination, Cyber Threats, Risk Analytics, and more.
  • Strategy: product vision, strategic partnerships, business model, and ancillary products and services.
  • Market presence: number of customers and revenue from product line.

CrowdStrike earned the highest possible score in 17 criteria and first place in the Market Presence category, showing us that more customers trust CrowdStrike than any other vendor.

Forrester Wave: External Threat Intelligence Services Q1 2021

Recognition of a company as a leader is associated with an assessment of the quality of the threat analysis life cycle. CrowdStrike defines five stages of the cycle:

  1. Intelligence Requirements: Define plans and targets for intelligence operations.
  2. Raw intelligence: gathering baseline information.
  3. Intelligent Analysis: Answers the questions asked during the requirements phase.
  4. Dissemination: Displays analysis results in a convenient format for end users.
  5. Feedback: Get feedback from customers and improve.

This set of five criteria is critical as they form the foundation upon which each vendor's threat intelligence capabilities are built. CrowdStrike received the highest scores on four of the above five criteria. These ratings confirm that CrowdStrike is unmatched in professionalism and analytics.

CrowdStrike received the highest score in the gathering phase of all vendors. We believe this important criterion highlights CrowdStrike's ability to collect data that no one else can, resulting in threat intelligence that no other vendor can provide.

Given the ratings, it is no surprise to us that CrowdStrike scored the highest possible score on Cyber Threat Intelligence.


CrowdStrike Falcon X enables organizations of all sizes and ages to easily deploy intelligence at the Security Management Center (SOC) and receive best-in-class analytics and technical analysis backed by a dedicated team of intelligence professionals. Based on CrowdStrike Threat Graph telemetry, which correlates over 5 trillion endpoint events per week, data collected from over a million unique sources and reviewed by the CrowdStrike analyst team, which tracks over 150 hacker groups, Falcon X gives organizations insight into tactics, methods and adversary actions, allowing clients to take proactive measures to detect and defend against current and future attacks.

CrowdStrike is also named a leader in The Forrester Wave: Enterprise Detection And Response, Q1 2020 and The Forrester Wave: Endpoint Security Suites (ESS), Q3 2019.

For more information on the benefits that helped Falcon X become a leader see CrowdStrike..

Read the full report The Forrester Wave: External Threat Intelligence Services, Q1 2021.

Back

New Forrester study shows all the economic benefits of using the Falcon Complete!

Articles and reviews

A recent large-scale study commissioned by Forrester Consulting commissioned by CrowdStrike, entitled “The Overall Economic Impact of Using CrowdStrike Falcon Complete,” uncovered the full benefits of CrowdStrike's Managed Detection and Response (MDR) approach.

Based on customer surveys, independent analysis, and financial simulations, Forrester estimates that a customer can save nearly $ 6 million in 3 years, representing an estimated return on investment (ROI) of 403% for Falcon Complete with a ROI in less than three months.

In interviews with a diverse group of Falcon Complete customers, Forrester assessed several distinct benefits that organizations can benefit from using Falcon Complete:


    • Operational efficiency and expansion.
      Organizations gain additional capabilities equivalent to 11 full-time SOC analysts.

    • The risk of being hacked is significantly reduced.
      Forrester's analysis found that the proactive management and customization provided by the Falcon Complete team, coupled with CrowdStrike's breach prevention guarantee, almost eliminates information security risks.

    • Eliminate redundant tools.
      CrowdStrike provides improved protection and performance while reducing costs by replacing many other security tools.

    • Reduced downtime due to security incidents.
      Falcon Complete can fully remediate violations in minutes, rather than relying on reimaging or replacing compromised endpoints.

Naturally, it is necessary to evaluate all the advantages in terms of the cost of certain solutions. Throughout its research, Forrester closely monitored the costs incurred by security services throughout the endpoint security lifecycle, including costs associated with:

    • acquisition and deployment of endpoint protection technologies;

    • 24/7/365 global monitoring and control;

    • 24/7/365 proactive threat search;

    • complete remediation and recovery of systems affected by incidents;

    • service and customization.

Comparing these overarching costs to the benefits organizations get from using Falcon Complete, Forrester has posted an astounding 403% ROI on the product.

More importantly, none of the organizations surveyed reported any serious intrusions since partnering with CrowdStrike Falcon Complete. As a result, Falcon Complete delivers amazing security results at a price far lower than purchasing and creating similar enterprise security environments with other solutions, manpower, and maintenance costs.

You can read the full study here.

Back

iITD is the official partner of the International Grand Forum "BIT & BIS-2021"!

Conference

On March 3, Kiev will host the main event of the domestic ICT market - the International Grand Forum "BIT & BIS-2021"!!


This annual unique industry event promises visitors a unique atmosphere and an impressive informational charge.

Partners and experts of the event will share the latest in the IT industry, their personal experience and advice.

Company iIT Distributionan official partner of the event, together with NetBrain and CrowdStrike, will share their knowledge in the field of information security.

The main problem for cybersecurity departments in most companies remains the lack of the necessary level of automation and visual control over the cyber environment. The lack of an automated mechanism for collecting data, contextual understanding of security incidents and visual control over hidden potential threats in the network significantly increases the risk of an organization becoming a victim of a cyber attack and reduces its confidence in its own security.

That is why Sergey Aleinikov, Head of Technical Department at iIT Distribution, will tell you about CrowdStrike – Identity Threat Detection. A solution for tracking the authentication process, questionable user behavior and detecting threats in real time! Identity Threat Detection correlates events around the user, their activity and the device to improve response to a threat, thereby reducing the need for complex, time-consuming analyzes by SOC employees, and shortening the response time to events.

Expect our second talk from Andrievsky, network engineer at iIT Distribution, who will tell you how to get rid of heavy manual work and save time and money with the Network Automation from NetBrain.

Organizations are constantly adding new solutions and connected devices to their networks. Traffic is increasing, and there is no understanding of the maximum capabilities of many products and ways to provide protection. During the pandemic and the transition to remote work, new devices were added spontaneously, and there was not enough time to fully study the functionality. It is time to structure the work of IT resources and build a unified and functional information security system! How exactly? We are ready to answer all your questions!

Back

CrowdStrike has announced the acquisition of Humio's leading high-performance log management platform!

Release

CrowdStrike introduces the industry-leading next generation XDR data processing platform.

CrowdStrike adds to its portfolio best-in-class Humio a logging and aggregation platform for unlimited, comprehensive event analysis - on-premises or in the cloud. The solution offers 1 TB of downloads per day, in-memory streaming, live, shared dashboards, alerts, analysis and real-time visualization of any events. Founded in 2016, Humio Event Log Management Platform is the fastest and most efficient solution with proven ability to do large scale jobs, making it ideal for extending CrowdStrike's capabilities.

The Humio data platform minimizes the problem of the ever-growing volume of event data and enables users to collect and analyze this data (structured or unstructured) at full scale. Leading organizations around the world such as Aruba HPE, Bloomberg, Decisiv and others have chosen Humio for the best technology and performance.

Humio will help CrowdStrike deliver a deeper, index-free XDR at a speed and scale that no other vendor can match. This EDR and XDR partnership is based on a combination of endpoint event logging with network visibility, account and identity management, and massive telemetry of all workloads, whether they are on-premises, in the cloud, or even deployed in a container.

Humio and CrowdStrike togetherwill create an enterprise-grade solution that solves the challenge of handling large and growing volumes of event data by empowering organizations to collect, observe, analyze and interact with all the structured and unstructured data in their environment to help meet enterprise IT challenges. including within the framework of the DevOps and DevSecOps models.

Customers and partners will be able to take advantage of the new data collection capabilities of the CrowdStrike Falcon platform to provide better analytics, threat detection and inter-event connectivity. All of this is delivered through a single intelligent server with great speed and efficiency.

CrowdStrike continues to innovate and improve its platform to solve real-world end-user problems, enriching it with additional capabilities.

Contact the iIT Distribution team , the official distributor of CrowdStrike, to learn more about the CrowdStrike Falcon platform and its new features!

Full release by the link.

Back

en_GBEnglish
ukUkrainian ru_RURussian en_GBEnglish